425 research outputs found

    Four-Step Approach Model of Inspection (FAMI) for Effective Defect Management in Software Development

    Full text link
    IT industry should inculcate effective defect management on a continual basis to deploy nearly a zerodefect product to their customers. Inspection is one of the most imperative and effective strategies of defect management. Nevertheless, existing defect management strategies in leading software industries are successful to deliver a maximum of 96% defect-free product. An empirical study of various projects across several service-based and product-based industries proves the above affirmations. This paper provides an enhanced approach of inspection through a Four-Step Approach Model of Inspection (FAMI). FAMI consists of i) integration of Inspection Life Cycle in V-model of software development, ii) implementation of process metric Depth of Inspection (DI), iii) implementation of people metric Inspection Performance Metric (IPM), iv) application of Bayesian probability approach for selection of appropriate values of inspection affecting parameters to achieve the desirable DI. The managers of software houses can make use of P2 metric as a benchmarking tool for the projects in order to improve the in-house defect management process. Implementation of FAMI in software industries reflects a continual process improvement and leads to the development of nearly a zero-defect product through effective defect management.Comment: 13 Pages, 8 Tables, 6 Figures; InterJRI Science and Technology, Volume3, Issue 1, August 201

    Effectiveness Of Defect Prevention In I.T. For Product Development

    Full text link
    Defect Prevention is the most critical but most neglected component of the software quality assurance in any project. If applied at all stages of software development, it can reduce the time, cost and resources required to engineer a high quality product. Software inspection has proved to be the most effective and efficient technique enabling defect detection and prevention. Inspections carried at all phases of software life cycle have proved to be most beneficial and value added to the attributes of the software. Work is an analysis based on the data collected for three different projects from a leading product based company. The purpose of the paper is to show that 55% to 65% of total number of defects occurs at design phase. Position of this paper also emphasizes the importance of inspections at all phases of the product development life cycle in order to achieve the minimal post deployment defects.Comment: 8 pages, 1 figur

    Defect Prevention Approaches In Medium Scale It Enterprises

    Full text link
    The software industry is successful, if it can draw the complete attention of the customers towards it. This is achievable if the organization can produce a high quality product. To identify a product to be of high quality, it should be free of defects, should be capable of producing expected results. It should be delivered in an estimated cost, time and be maintainable with minimum effort.Comment: 5 page

    Defect Prevention Approaches in Medium Scale it Enterprises

    Full text link
    The software industry is successful, if it can draw the complete attention of the customers towards it. This is achievable if the organization can produce a high quality product. To identify a product to be of high quality, it should be free of defects, should be capable of producing expected results. It should be delivered in an estimated cost, time and be maintainable with minimum effort. Defect Prevention is the most critical but often neglected component of the software quality assurance in any project. If applied at all stages of software development, it can reduce the time, cost and resources required to engineer a high quality product.Comment: 5 page

    Effective Defect Prevention Approach in Software Process for Achieving Better Quality Levels

    Full text link
    Defect prevention is the most vital but habitually neglected facet of software quality assurance in any project. If functional at all stages of software development, it can condense the time, overheads and wherewithal entailed to engineer a high quality product. The key challenge of an IT industry is to engineer a software product with minimum post deployment defects. This effort is an analysis based on data obtained for five selected projects from leading software companies of varying software production competence. The main aim of this paper is to provide information on various methods and practices supporting defect detection and prevention leading to thriving software generation. The defect prevention technique unearths 99% of defects. Inspection is found to be an essential technique in generating ideal software generation in factories through enhanced methodologies of abetted and unaided inspection schedules. On an average 13 % to 15% of inspection and 25% - 30% of testing out of whole project effort time is required for 99% - 99.75% of defect elimination. A comparison of the end results for the five selected projects between the companies is also brought about throwing light on the possibility of a particular company to position itself with an appropriate complementary ratio of inspection testing.Comment: 5 pages, 1 figur

    Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

    Full text link
    Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message in 24bit, 8bit colour images and grayscale images. Steganalysis is a method of detecting secret message hidden in a cover media using steganography. RS steganalysis is one of the most reliable steganalysis which performs statistical analysis of the pixels to successfully detect the hidden message in an image. However, existing steganography method protects the information against RS steganalysis in grey scale images. This paper presents a steganography method using genetic algorithm to protect against the RS attack in colour images. Stego image is divided into number of blocks. Subsequently, with the implementation of natural evolution on the stego image using genetic algorithm enables to achieve optimized security and image quality.Comment: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing Conference (SEMCCO), Vishakhapatna

    A Parametric Analysis of Project Management Performance to Enhance Software Development Process

    Full text link
    Project Management process plays a significant role in effective development of software projects. Key challenges in the project management process are the estimation of time, cost, defect count, and subsequently selection of apt developers. Therefore precise estimation of above stated factors decides the success level of a project. This paper provides an empirical study of several projects developed in a service oriented software company in order to comprehend the project management process. The analysis throws light on the existence of variation in the aforementioned factors between estimation and observed results. It further captures the need for betterment of project management process in estimation and allocation of resources in the realization of high quality software product. The paper therefore aims to bring in an improved awareness in software engineering personnel concerning the magnitude and significance of better estimation and accurate allocation of resources for developing successful project.Comment: 6 pages, 5 figures, 1 tables, IEEE International Conference on Advanced Research in Engineering and Technology (ICARET - 2013

    Pengaruh Atribut Supermarket Terhadap Motif Belanja Dan Damaknya Terhada Loyalitas Pelanggan Di Pamella 1 YOGYAKARTA

    Full text link
    The purpose of this research is to describe (1) the influence of supermarket attribute on the hedonicshopping motive in Pamella I Yogyakarta, (2) the influence of supermarket attribute on the utilitarianspending motive in Pamella I Yogyakarta; (3) the influence of supermarket attribute on customer loyalty inPamella I Yogyakarta, (4) the influence of hedonic shopping motive on customer loyalty in Pamella IYogyakarta, (5) influence of utilitarian spending motive to customer loyalty in Pamella I Yogyakarta. Thisresearch is a quantitative research by using media questionnaires distributed to 100 shoppers in Pamella IYogyakarta.The result of the research shows that (1) the supermarket attribute has a significant positive effect onhedonic shopping motive in Pamella I Yogyakarta, (2) supermarket attribute has no significant positiveeffect on utilitarian spending motive in Pamella I Yogyakarta, (3) supermarket attribute has significantpositive effect on customer loyalty In Pamella I Yogyakarta, (4) hedonic shopping motive has a significantpositive effect on customer loyalty in Pamella I Yogyakarta, (5) utilitarian spending motive has nosignificant positive effect on customer loyalty in Pamella I Yogyakarta

    A Scheme for Automation of Telecom Data Processing for Business Application

    Full text link
    As the telecom industry is witnessing a large scale growth, one of the major challenges faced in the domain deals with the analysis and processing of telecom transactional data which are generated in large volumes by embedded system communication controllers having various functions. This paper deals with the analysis of such raw data files which are made up of the sequences of the tokens. It also depicts the method in which the files are parsed for extracting the information leading to the final storage in predefined data base tables. The parser is capable of reading the file in a line structured way and store the tokens into the predefined tables of data bases. The whole process is automated using the SSIS tools available in the SQL server. The log table is maintained in each step of the process which will enable tracking of the file for any risk mitigation. It can extract, transform and load data resulting in the processing.Comment: 8 Pages, 8 Figures, Swarm Evolutionary and Memetric Computing Conferenc

    Estimation of Characteristics of a Software Team for Implementing Effective Inspection Process through Inspection Performance Metric

    Full text link
    The continued existence of any software industry depends on its capability to develop nearly zero-defect product, which is achievable through effective defect management. Inspection has proven to be one of the promising techniques of defect management. Introductions of metrics like, Depth of Inspection (DI, a process metric) and Inspection Performance Metric (IPM, a people metric) enable one to have an appropriate measurement of inspection technique. This article elucidates a mathematical approach to estimate the IPM value without depending on shop floor defect count at every time. By applying multiple linear regression models, a set of characteristic coefficients of the team is evaluated. These coefficients are calculated from the empirical projects that are sampled from the teams of product-based and service-based IT industries. A sample of three verification projects indicates a close match between the IPM values obtained from the defect count (IPMdc) and IPM values obtained using the team coefficients using the mathematical model (IPMtc). The IPM values observed onsite and IPM values produced by our model which are strongly matching, support the predictive capability of IPM through team coefficients. Having finalized the value of IPM that a company should achieve for a project, it can tune the inspection influencing parameters to realize the desired quality level of IPM. Evaluation of team coefficients resolves several defect-associated issues, which are related to the management, stakeholders, outsourcing agents and customers. In addition, the coefficient vector will further aid the strategy of PSP and TSPComment: 24 pages, 13 figure
    • …
    corecore