99 research outputs found
Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development
IT industry should inculcate effective defect management on a continual basis
to deploy nearly a zerodefect product to their customers. Inspection is one of
the most imperative and effective strategies of defect management.
Nevertheless, existing defect management strategies in leading software
industries are successful to deliver a maximum of 96% defect-free product. An
empirical study of various projects across several service-based and
product-based industries proves the above affirmations. This paper provides an
enhanced approach of inspection through a Four-Step Approach Model of
Inspection (FAMI). FAMI consists of i) integration of Inspection Life Cycle in
V-model of software development, ii) implementation of process metric Depth of
Inspection (DI), iii) implementation of people metric Inspection Performance
Metric (IPM), iv) application of Bayesian probability approach for selection of
appropriate values of inspection affecting parameters to achieve the desirable
DI. The managers of software houses can make use of P2 metric as a benchmarking
tool for the projects in order to improve the in-house defect management
process. Implementation of FAMI in software industries reflects a continual
process improvement and leads to the development of nearly a zero-defect
product through effective defect management.Comment: 13 Pages, 8 Tables, 6 Figures; InterJRI Science and Technology,
Volume3, Issue 1, August 201
Effectiveness Of Defect Prevention In I.T. For Product Development
Defect Prevention is the most critical but most neglected component of the
software quality assurance in any project. If applied at all stages of software
development, it can reduce the time, cost and resources required to engineer a
high quality product. Software inspection has proved to be the most effective
and efficient technique enabling defect detection and prevention. Inspections
carried at all phases of software life cycle have proved to be most beneficial
and value added to the attributes of the software. Work is an analysis based on
the data collected for three different projects from a leading product based
company. The purpose of the paper is to show that 55% to 65% of total number of
defects occurs at design phase. Position of this paper also emphasizes the
importance of inspections at all phases of the product development life cycle
in order to achieve the minimal post deployment defects.Comment: 8 pages, 1 figur
Defect Prevention Approaches in Medium Scale it Enterprises
The software industry is successful, if it can draw the complete attention of
the customers towards it. This is achievable if the organization can produce a
high quality product. To identify a product to be of high quality, it should be
free of defects, should be capable of producing expected results. It should be
delivered in an estimated cost, time and be maintainable with minimum effort.
Defect Prevention is the most critical but often neglected component of the
software quality assurance in any project. If applied at all stages of software
development, it can reduce the time, cost and resources required to engineer a
high quality product.Comment: 5 page
Defect Prevention Approaches In Medium Scale It Enterprises
The software industry is successful, if it can draw the complete attention of
the customers towards it. This is achievable if the organization can produce a
high quality product. To identify a product to be of high quality, it should be
free of defects, should be capable of producing expected results. It should be
delivered in an estimated cost, time and be maintainable with minimum effort.Comment: 5 page
Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels
Defect prevention is the most vital but habitually neglected facet of
software quality assurance in any project. If functional at all stages of
software development, it can condense the time, overheads and wherewithal
entailed to engineer a high quality product. The key challenge of an IT
industry is to engineer a software product with minimum post deployment
defects. This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software production
competence. The main aim of this paper is to provide information on various
methods and practices supporting defect detection and prevention leading to
thriving software generation. The defect prevention technique unearths 99% of
defects. Inspection is found to be an essential technique in generating ideal
software generation in factories through enhanced methodologies of abetted and
unaided inspection schedules. On an average 13 % to 15% of inspection and 25% -
30% of testing out of whole project effort time is required for 99% - 99.75% of
defect elimination. A comparison of the end results for the five selected
projects between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an appropriate
complementary ratio of inspection testing.Comment: 5 pages, 1 figur
Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis
Retention of secrecy is one of the significant features during communication
activity. Steganography is one of the popular methods to achieve secret
communication between sender and receiver by hiding message in any form of
cover media such as an audio, video, text, images etc. Least significant bit
encoding is the simplest encoding method used by many steganography programs to
hide secret message in 24bit, 8bit colour images and grayscale images.
Steganalysis is a method of detecting secret message hidden in a cover media
using steganography. RS steganalysis is one of the most reliable steganalysis
which performs statistical analysis of the pixels to successfully detect the
hidden message in an image. However, existing steganography method protects the
information against RS steganalysis in grey scale images. This paper presents a
steganography method using genetic algorithm to protect against the RS attack
in colour images. Stego image is divided into number of blocks. Subsequently,
with the implementation of natural evolution on the stego image using genetic
algorithm enables to achieve optimized security and image quality.Comment: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing
Conference (SEMCCO), Vishakhapatna
A Parametric Analysis of Project Management Performance to Enhance Software Development Process
Project Management process plays a significant role in effective development
of software projects. Key challenges in the project management process are the
estimation of time, cost, defect count, and subsequently selection of apt
developers. Therefore precise estimation of above stated factors decides the
success level of a project. This paper provides an empirical study of several
projects developed in a service oriented software company in order to
comprehend the project management process. The analysis throws light on the
existence of variation in the aforementioned factors between estimation and
observed results. It further captures the need for betterment of project
management process in estimation and allocation of resources in the realization
of high quality software product. The paper therefore aims to bring in an
improved awareness in software engineering personnel concerning the magnitude
and significance of better estimation and accurate allocation of resources for
developing successful project.Comment: 6 pages, 5 figures, 1 tables, IEEE International Conference on
Advanced Research in Engineering and Technology (ICARET - 2013
A Scheme for Automation of Telecom Data Processing for Business Application
As the telecom industry is witnessing a large scale growth, one of the major
challenges faced in the domain deals with the analysis and processing of
telecom transactional data which are generated in large volumes by embedded
system communication controllers having various functions. This paper deals
with the analysis of such raw data files which are made up of the sequences of
the tokens. It also depicts the method in which the files are parsed for
extracting the information leading to the final storage in predefined data base
tables. The parser is capable of reading the file in a line structured way and
store the tokens into the predefined tables of data bases. The whole process is
automated using the SSIS tools available in the SQL server. The log table is
maintained in each step of the process which will enable tracking of the file
for any risk mitigation. It can extract, transform and load data resulting in
the processing.Comment: 8 Pages, 8 Figures, Swarm Evolutionary and Memetric Computing
Conferenc
Estimation of Characteristics of a Software Team for Implementing Effective Inspection Process through Inspection Performance Metric
The continued existence of any software industry depends on its capability to
develop nearly zero-defect product, which is achievable through effective
defect management. Inspection has proven to be one of the promising techniques
of defect management. Introductions of metrics like, Depth of Inspection (DI, a
process metric) and Inspection Performance Metric (IPM, a people metric) enable
one to have an appropriate measurement of inspection technique. This article
elucidates a mathematical approach to estimate the IPM value without depending
on shop floor defect count at every time. By applying multiple linear
regression models, a set of characteristic coefficients of the team is
evaluated. These coefficients are calculated from the empirical projects that
are sampled from the teams of product-based and service-based IT industries. A
sample of three verification projects indicates a close match between the IPM
values obtained from the defect count (IPMdc) and IPM values obtained using the
team coefficients using the mathematical model (IPMtc). The IPM values observed
onsite and IPM values produced by our model which are strongly matching,
support the predictive capability of IPM through team coefficients. Having
finalized the value of IPM that a company should achieve for a project, it can
tune the inspection influencing parameters to realize the desired quality level
of IPM. Evaluation of team coefficients resolves several defect-associated
issues, which are related to the management, stakeholders, outsourcing agents
and customers. In addition, the coefficient vector will further aid the
strategy of PSP and TSPComment: 24 pages, 13 figure
Defect Management Using Depth of Inspection and the Inspection Performance Metric
Advancement in fundamental engineering aspects of software development
enables IT enterprises to develop a more cost effective and better quality
product through aptly organized defect management strategies. Inspection
continues to be the most effective and efficient technique of defect
management. To have an appropriate measurement of the inspection process, the
process metric, Depth of Inspection (DI) and the people metric, Inspection
Performance Metric (IPM) are introduced. The introduction of these pair of
metrics can yield valuable information from a company in relation to the
inspection process.Comment: 6 pages, CrossTalk, 2011, pp no. 22-2
- …