29 research outputs found

    A systematic literature review of computer ethics issues

    Get PDF
    Given the importance and concern of computer ethics, four issues have been identified in the field of computer and Information Technology (IT). This study was carried out to review the work done on computer ethics issues for the years 2010 to 2014. This paper identifies the methods used, topics addressed, and the main findings published of the research about ethical issues in computer usage. Systematic literature review (SLR) has been conducted according to the standard guidelines, and a study protocol was applied to answer three research questions: 1) What are the ethical issues in computer ethics that have been discussed in previous research?, 2) What are the most recent topics among computer ethics issues?, and 3) To what extent does investigation among IT students, Non-IT students and IT professionals display different perceptions of IT issues? Based on the evidence extracted from 40 studies, it has been clearly stated that software piracy in Privacy, Accuracy, Property and Accessibility (PAPA) and general issues are the topics most frequently discussed. It shows the gaps in the current literature pertaining to computer ethical issues and in particular, the issue of software piracy

    Complexity metrics for measuring the understandability and maintainability of Business Process Models using Goal-Question-Metric (GQM)

    Get PDF
    Business Process Models (BPMs), often modeling language such as UML activity between the created using stakeholders in the can provide us a diagrams, Event- Driven Process Chains Markup Language (EPML) and Yet Another Workflow Language (YAWL), serve as a base for communication that adequate software development process. In order to fulfill this purpose, they should be easy to understand and easy to maintain. For this reason, it is useful to have measures information about understandability and maintainability of the BPM. Although there are hundreds of software complexity measures that have been described and published by many researchers over the last few decades, measuring the complexity of business process models is a rather new area of research with only a small number of contributions. In this paper, we provide a comprehensive report on how existing complexity metrics of software were adapted in order to analyze the current business process models complexity. We also proposed a Goal- Question-Metric (GQM) framework for measuring the understandability and maintainability of BPMs

    Machine learning: tasks, modern day applications and challenges

    Get PDF
    During the last decade, we have witnessed significant development in artificial intelligence (AI) capabilities and its application areas such as healthcare, self-driving cars, eLearning, military, smart cities, industry, etc. Machine learning algorithms learned from available data. Further, this learning laid the foundation to develop AI for the various systems around us. These machine learning algorithms are a collection of complex mathematical models and human intuitions. Over the last decade, we are able to develop algorithms which can produce better accuracies so better decision making can be achieved. Particularly in today’s scenarios, deep learning algorithms are breaking all records. These algorithms mimic the neural system of humans and successfully breaking several barriers in image classification, NLP, and robotics, etc. The contributions of this paper are in three folds. Firstly, we reviewed current state-of-the-art research and development work in the area of machine learning. Secondly, we identified a machine learning task and reviewed them. Thirdly, we related these developments with how they are affecting human societies with respect to their applications such as image classification, autonomous driving, and data fusion. This paper provides reader with the direction of what has been done and what can be done in machine learning to exploit open problems in this area

    A case study research on software cost estimation using experts' estimates, Wideband Delphi, and Planning Poker technique

    Get PDF
    This article shows a case study research that is performed to compare effectiveness of the Planning Poker and Wideband Delphi in two case studies. Although, Wide Band Delphi has been proposed many years ago and has enough supports in both industry and academic area but, Planning Poker is somewhat new. The study showed that applying these techniques in two companies which were using expert’s view for software cost estimation, increased the accuracy of cost estimation. Also, the results showed that Planning Poker led to better accuracy comparing to Wideband Delphi. However, this accuracy is not too much than Wideband Delphi, it was important that Planning Poker led to reducing financial risks of the projects comparing to Wideband Delphi. The study also showed that both Wideband Delphi and Planning Poker reduced the underestimates significantly

    Source code analysis extractive approach to generate textual summary

    Get PDF
    Nowadays, obtain program features becomes a hot issue in source code comprehension. A large amount of efforts spent on source code understanding and comprehension to develop or maintain it. As a matter of fact, developers need a solution to rapidly detect which program functional need to revise. Hence, many studies in this field are concentrating on text mining techniques to take out the data by source code analysis and generate a code summary. However, in this paper, we attempt to overcome this problem by propose a new approach (Abstract Syntax Tree with predefined natural language text Template (AST-W-PDT)) to generates human readable summaries for Java methods role. This paper describes how we developed a tool that the java source code can be summarized from the methods role. In evaluating our approach, we found that the automatically generated summary from a java class 1) is helpful to the developers in order to understand the role of the methods and will be useful, and 2) the automatically generated summary is precise

    Systematic literature review on effort estimation for open sources (OSS) web application development

    Get PDF
    The development of Web applications has a crucial role as most organizations have their own corporate Web applications to meet the needs of their respective businesses. Different needs create different complexities which represent a new challenge to Web application development. In order to ensure the timely delivery of a project, software providers offering this service choose to use Open Sources (OSS) as an alternative. Since OSS consist of an existing framework that can be implemented directly into the application, how far does this affect the complexity of the effort estimation? A number of research papers have outlined the efforts made to refine the complexity of this field. However, to our best knowledge a systematic overview of the research done on Web application development that involves OSS usage does not appear to exist. Hence, the aim of this paper is to conduct a systematic literature review (SLR) of OSS Web application development. For this purpose, 34 papers from a total of 67 papers were identified and studied. The findings of this study indicate that (a) no research has been carried out on the field mentioned; (b) there is no early effort estimation model for Web projects that involve the usage of OSS. Therefore, this work provides an overview of the field besides identifying future research possibilities

    Literature review on energy consumption and conservation in mobile device

    Get PDF
    Mobile devices are increasing in number today. Consequently, computational resources are growing in tandem. Energy consumption has become a major issue all over the globe. On mobile devices (smart phones),there is a huge gap between battery power capabilities as well as innovations with other technologies (for example, developing and also memory space), this is especially the case with examining the rapid development in its consumed energy-lost mobile phone in different area (such as, multimedia streaming). Most of the insufficient power supplies and also the need for minimizing energy depletion offers the commitment for professionals to create energy consumption techniques or model for cominggeneration wireless network. Based on the above, it is necessary to take the approach for energy consumption minimization and improvement of energy conservation into consideration. This could help achieve the desire of green technology for using less energy power in mobile devices. To gain this aim is it possible? Consequently, heterogeneous approach in energy consumption and conservation in mobile device which have been proposed by various researchers has been investigated in this paper. This would help to put in proper perspective the different energy consumption models directed at energy conservation

    Software quality: predicting reliability of a software using decision tree

    Get PDF
    System availability can be expressed as an attribute of reliability that determines the total time a system or component is functioning. Most available models try to predict availability of a software during its life cycle but there are very few or no models that predict a software going days without a failure. Over the years, decision tree model have been used as a reliable technique for prediction. In this study, based on the sample data collected by John Musa of Bell Telephone Laboratories, a decision tree model has been used to predict the availability of a system going days without a failure. This study concluded that a decision tree model is able to decide availability of a software in terms of going days without a failure

    A preliminary study of personality traits and their influence on software piracy

    Get PDF
    Software piracy worldwide has resulted in serious industrial, academic and economic consequences. However, the problem can be solved if the root causes can be identified. Personality traits are said to be an effective positive influence on unethical behaviour. For this reason, personality traits could be a predictor for software piracy. This study investigates personality traits as a factor in students intention to pirate software by enhancing the Theory of Planned Behaviour (TPB) model. The objective of this current research is to provide a preliminary test on the personality traits with the TPB model in software piracy behaviour in order to determine the reliability and validating instruments. The personality traits used in this study were extraversion, agreeableness, conscientiousness, neuroticism and openness according to Big Five Inventory (BFI). A survey was conducted to achieve the research objective. Questionnaire was carried out on 40 computer sciences students to determine how reliable and valid it would be to proceed with further research. This study has been compared with previous studies, and several minor modifications of the instrument were made. All the instruments were validated and applied in the actual study. The results of factor analyses confirm and refine the reliability of the instruments for both big five personality variables and TPB elements in software piracy. The findings could also be helpful to information systems practitioners and academics in the implementation of measures to reduce the incidence of software piracy among students

    Measurement of software maintenance from user satisfaction perspective: a case study

    Get PDF
    The importance of software maintenance in a software development environment is a long term and continuous activity for improvement. The service quality of the software maintenance provided in which involving helpdesk, programmer and software analyst should be measured in order to satisfy users who use the software. In this paper, we propose a software measurement program for product improvement in order to maximize the user satisfaction where one government agency is selected as our case study. Our measurement plan is based on Goal Question Metric (GQM) approach. Results from this measurement program with some meaningful quantitative analysis has given an achievable roadmap for the organization to plan for next improvement activities toward their goals
    corecore