22 research outputs found

    Requirements Management Tool Elements for The Malaysian Software Industry

    Get PDF
    Developing quality software is becoming a challenge that requires the practitioners to employ appropriate techniques, methodologies and good practices in software engineering. In the Malaysian software industry, the challenges are the practitioners lack practice in software engineering especially in the requirements management practices, and the requirements management tool is not widely facilitated during software development projects. In order to encourage them to overcome these problems, this paper attempts to recommend a requirements management tool that embeds the best practices in managing requirements. In addition, this paper aims to investigate the elements of the tool to guarantee that the tool is appropriate for Malaysian software needs. Then, a comparative study is carried out to search for various available requirements management tools that have those elements. The results show that there is no specific tool that has all the elements to fit the Malaysian software needs. Therefore, it is essential to develop a requirements management tool that is able to assist the software practitioners in developing quality software

    A requirements management tool for small and medium projects: An industrial case study

    Get PDF
    In the previous years, there are many requirements management tools available in the market.However, these tools are expensive, complicated, difficult to learn and too sophisticated for small and medium projects. This paper presents a case study of implementing a Requirements Management Tool for small and medium projects (RMT-SMP) in the real industry in order for the RMT-SMP to be feasible for small and medium projects. The case study carried out by defining the hypothesis, selection of the pilot study, identification of different methods of comparison, consideration of the effects of cofounding factors, planning of the case study, monitoring the case study as well as result analysis and report generation.The results have shown that the RMT-SMP is practical and feasible for the small and medium projects in the Malaysian software industry and encourages the practitioners to have a better approach in managing their requirements during software development projects

    An investigation of a requirements management tool elements

    Get PDF
    Developing quality software is becoming challenges that required the practitioners to employ appropriate techniques, methodologies and good practices in software engineering.In the Malaysian software industry, the challenges are the practitioners are lack of practicing software engineering especially in the requirements management practices as well as the requirements management tool is not widely facilitated during software project development.In order to encourage them to overcome these problems, this paper attempts to recommend a requirements management tool that embeds the best practices in managing requirements.In addition, this paper aims to investigate the elements of the tool to guarantee that the tool is appropriate for the Malaysian software needs.Then, a comparative study is carried out to search for various available requirements management tools that have those elements.The result shown that, there is no specific tool that has all the elements in order to fit the Malaysian software needs.Therefore, it is essential to develop a requirements management tool that able to assist the software practitioners in developing quality software

    Knowledge sharing process for pair programming practice among university students

    Get PDF
    Pair programming practice has been widely used as a pedagogical approach in educational setting specifically in the programming course. Most pair programming studies agree that this practice can foster knowledge sharing among students. However, the studies do not highlight knowledge sharing during pair programming practices and towards their performance. Therefore, the main aim of this study is to test the suitability of knowledge sharing activities by using Socialization, Externalization, Combination, and Internalization (SECI) model in pair programming practices (PPP) amongst students in higher learning institution. In achieving the main aim, this study involved experimentation in order to test the effectiveness of the SECI model. 202 participants were actively engaged in pair programming practices, and involved in the experimentation of the study. The findings reveal that there are significant direct effect of Socialization towards Externalization, Externalization towards Combination and Combination towards Internalization. However, the direct effect of Internalization towards Performance are not significant. In addition, the direct effect of SECI model for pair programming practices are not significant towards the performance of the students

    Digital Information Needs for Understanding Cell Divisions in the Human Body

    Get PDF
    Information needs for understanding cell divisions in the human body is important in the learning process. Although sketches, images and blocks of 3D puzzles were used for teaching and learning, unfortunately those tools are static and incapable of being manipulated. Hence, digital information is the best tool for the teaching and learning of cell divisions in the human body via software applications. A cell motion is a digital information application developed using leap motion to demonstrate cell movement in the human body. However, the factors that influence students towards adopting this application are not obvious and often ignored. The method for evaluating the factors influencing its user's acceptance is the Technology Acceptance Model (TAM) via a questionnaire distributed among medical students to gain statistically valid quantitative results through hypothesis-testing. The result indicates that digital information needs for the understanding of cell divisions in the human body are influenced by the user's Perceived Ease of Use (PEOU) and Perceived Usefulness (PU). However, the Attitude (AT) towards use did have a significant effect on PU and PEOU. Moreover, PEOU had a strong and significant influence on PU, while AT positively influenced users' behavioural intention (BI) of using digital information needs for the understanding of cell divisions in the human body

    A Nonlinear Autoregressive Exogenous (NARX) Neural Network Model for the Prediction of Timestamp Influence on Bitcoin Value

    Get PDF
    The transaction and market of bitcoin is volatile, meaning it's uncertain because it changes frequently. There have been a number of research studies that have presented bitcoin price prediction models, but none of them have looked at the controlling variables linked with bitcoin transaction timestamps. It might be that price is not the only key criteria influencing bitcoin transactions, or the available model for bitcoin price prediction is yet to consider timestamp as a determining factor in its transaction. A better and more accurate model would be required to predict how the Timestamp influences changes of bitcoin transactions. That is why this current study utilized a Nonlinear Autoregressive Exogenous (NARX) Neural Network Model for the prediction of timestamp influence on Bitcoin value. Bitcoin historical datasets which are converted to a nonlinear regression into a "well-formulated" statistical problem in the manner of a ridge regression are used. Simulation analysis indicates that bitcoin digital currency's performance variation is highly influenced by its transaction timestamp with the prediction accuracy of 96%. The contributions of this research lies with the fact that specific Bitcoin transaction events repeat themselves over and over again, meaning that the Open-Price, High-Price, Low-Price, and Close-Price of Bitcoin price over timestamp developed a pattern that was predicted by NARX with less That means those involved in the transaction of bitcoin at the wrong timestamp will certainly face the uncertainty negative effect of the bitcoin market

    Conceptual model of tacit knowledge transfer for PBL teaching method in system analysis and design course

    Get PDF
    Problem Based Learning (PBL) is a teaching method that is able to transfer tacit knowledge from lecturers to students based on Socialization, Externalization, Combination, and Internalization (SECI) model.However, the SECI model does not include students’ performance factor, which is an indicator to measure the effectiveness of teaching and learning processes.Hence, this study proposes a conceptual framework to evaluate the effectiveness of using PBL as a teaching method in transferring tacit knowledge by enhancing the SECI model.The methodology begins with constructing a questionnaire to investigate the SECI and Performance processes in transferring tacit knowledge from lecturers to students.The respondents are students of System Analysis Design (SAD) in Universiti Utara Malaysia (UUM). The gathered data were analyzed using Structural Equation Modeling (SEM) to identify the effect of the significant direct relationship among the factors.The findings reveal that the SECI model fits the data for PBL teaching method in Software Engineering (SE) education.Three significant direct effects (regression weights) were obtained between the factors of SECI model.However, the direct effects of SECI processes on performance of students are not significant. The findings of this study also evidence that the SECI model is partially present in the knowledge creation processes in the PBL teaching method for SE education

    The efficacy of the strategy planning process criteria based on the fuzzy analytical hierarchy process

    Get PDF
    This study investigated the strategic planning procedure used by the University of Jeddah to determine which of its efficacy criteria are the most significant for future development. A university's performance is founded on its ability to capitalize on its specialization and set of skills obtained through meticulous planning and development and involves setting goals using analysis tools to compare options and prioritize constructs. Evaluation approaches to strategic planning lack adaptability and durability. Thus, a high-level deductive instrument that aggregates trade-offs and prioritizes the most essential aspects is needed. This study used the Fuzzy Analytical Hierarchical Procedure (FAHP) to examine whether the University of Jeddah's strategy formulation process improves strategy and planning. This study defined the objectives and criteria, established pairwise comparisons based on the owners of the strategic plan and the faculty and administration questionnaire responses, assigned weights to each criterion, verified their consistency, and ranked them in importance order. This study showed that FAHP can help groups make strategic planning decisions in universities

    The vendor and user organizations characteristics for COTS software evaluation and selection

    Get PDF
    Since the Commercial off-the-shelf (COTS) software become widespread components in the market for building the systems with less time and cost, the COTS evaluation and selection becomes a non-trivial task. There are many models attempted to propose a set of characteristics for evaluating and selecting COTS software.However, these models have concentrated on the functional and quality characteristics of COTS software, leaving other effective characteristics related to vendor (the organization that developed, support, and realized COTS software) and user (the organization that integrated and used COTS software) organizations. Therefore, this paper proposed a set of important characteristics relevant to the vendor and user organizations that play important role to discriminate between COTS alternatives in COTS evaluation and selection process.Most of the related studies have been analyzed and carefully studied in the literature to identify and propose these characteristics together with their attributes and associated metrics

    Misuse case modeling for secure e-tendering system

    Get PDF
    Tendering process is utilized by principal to invited capable tenderer to participate in competitive bid for winning a large project.Due to advent of IT infrastructure, E-tendering is introduced and adopted in many countries. Yet, an electronic environment did not promise curbing collusion between principal and certain tenderers. Other than common threats to system like security breaches by malicious parties, security issue related to ethical issue like fraud and repudiation issue where no evidence existed to denied it.In this paper, common threats for e-tendering process altogether with security countermeasure are described. This three interrelated attribute (consist of tender phase, threat and security countermeasure) are illustrated in misuse case for better understanding of the risk that may occurs in particular tender phase. Furthermore, it sought to ease the system developer for designing and constructing a secure e-tendering system
    corecore