Proceedings of the 9th International Conference on Information Communication and Management最新文献

筛选
英文 中文
A Novel Framework for Change Requirement Management (CRM) In Agile Software Development (ASD) 敏捷软件开发中变更需求管理(CRM)的新框架
Zainab Shehzadi, F. Azam, Muhammad Waseem Anwar, Iqra Qasim
{"title":"A Novel Framework for Change Requirement Management (CRM) In Agile Software Development (ASD)","authors":"Zainab Shehzadi, F. Azam, Muhammad Waseem Anwar, Iqra Qasim","doi":"10.1145/3357419.3357438","DOIUrl":"https://doi.org/10.1145/3357419.3357438","url":null,"abstract":"Requirements changes play a huge role in Software Development Life Cycle (SDLC). Therefore, the change requirement management (CRM) is always considered an important activity in SDLC. Changing one requirement have a major impact on other requirements especially when teams are working from geographically different locations then it's become difficult to manage, categorize, organize and track requirement changes therefore CRM is considered as difficult task in SDLC especially in agile methodology. This paper review different research papers and identify the major problems associated with each existing framework such as time complexity, quick cost estimation, verification of implemented and unimplemented requirements and customer notification. On this basis of identified problems this paper proposed a framework that provides a way how to categorize requirements, track implemented/unimplemented requirements, Save/Update requirements in repository and provide notification to stakeholder about current status of requirement. Proposed framework facilitates organizations to manage changing requirements in agile software development (ASD) and reduces overall complexity and traceability issues of RCM.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114179844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Configurable Approximation Min-Sum Decoding Algorithm for Low Density Parity Check Codes 低密度奇偶校验码的可配置近似最小和译码算法
Ruizhen Wu, Lin Wang, Mingming Wang
{"title":"A Configurable Approximation Min-Sum Decoding Algorithm for Low Density Parity Check Codes","authors":"Ruizhen Wu, Lin Wang, Mingming Wang","doi":"10.1145/3357419.3357422","DOIUrl":"https://doi.org/10.1145/3357419.3357422","url":null,"abstract":"A configurable approximation Min-sum decoding algorithm for LDPC is proposed in this paper. The degradation factor of BP to MS is found and optimized based on Jacobian Logarithm and hardware working mode. The decoding algorithm is configurable to satisfy different environment's need and will only need update the variable memory. The simulation is based on LDPC NR 3GPP 38.212 release and the comparison results showed the proposed configurable approximation Min-sum decoding algorithm have a better BER performance. The hardware of this proposed algorithm is based on Min-sum decoder and the extra cost is only a shifter and an adder besides the configurable memory.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126510708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meta-model For Software Project Change and Configuration Management 软件项目变更与配置管理的元模型
K. Khan, F. Azam, Muhammad Waseem Anwar, Ayesha Kiran
{"title":"A Meta-model For Software Project Change and Configuration Management","authors":"K. Khan, F. Azam, Muhammad Waseem Anwar, Ayesha Kiran","doi":"10.1145/3357419.3357437","DOIUrl":"https://doi.org/10.1145/3357419.3357437","url":null,"abstract":"Project change and configuration management refers to the process of controlling and managing of change in project development process. Change can occur in any of the items and phases. This paper has focused on change management i.e. when change occurs in requirements of the software project. Several approaches have been proposed for change/configuration management. But, a metamodel is required that accommodates the tracking of change in three of the requirements i.e. Functional Requirement (FR), Non-Functional Requirements (NFR) and Domain Requirements (DR). In this paper, we have proposed a metamodel for tracking that how change in one requirement impacts change in other requirement so that it can later manage the development process of the project. It provides the identification of hierarchal relation b/w FRs, NFRs and DRs and helps to authorize the changes in order to ensure the requirements consistency in the project.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121900325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of the Electrical Energy Meter Leading to an Automatic Evaluation of the Preliminary Cost of Electrical Energy Consumption 电能表的设计实现了电能消耗初步成本的自动评估
Orrawan Rewthong, U. Boonbumroong, Thatree Mamee, Somruedee Pongsena, Kanokwan Phochaisan, Parichad Kumkrong
{"title":"Design of the Electrical Energy Meter Leading to an Automatic Evaluation of the Preliminary Cost of Electrical Energy Consumption","authors":"Orrawan Rewthong, U. Boonbumroong, Thatree Mamee, Somruedee Pongsena, Kanokwan Phochaisan, Parichad Kumkrong","doi":"10.1145/3357419.3357445","DOIUrl":"https://doi.org/10.1145/3357419.3357445","url":null,"abstract":"This research was to study the design and construction of the electrical energy meter leading to an automatic evaluation of the preliminary electrical energy expenses. The design of the electrical energy meter and the standard energy meter were used to record the data of the electrical power (W) and electrical energy consumption (kWh). The measurement of the data were done from the 5 electrical instruments. There are the refrigerator, compact fluorescent, fan, television and notebook. Then, the data were automatically calculated to the energy price (THB). It was observed that the percentage of the error data of electrical power (W) was in the range of 1.6 ± 0.7 to 4.5 ± 0.0 %. Furthermore, the data recording of the electrical energy consumption (kWh) and the error of each instrument were observed. It was found that the value of the percentage of the error was the maximum value of 5%. The energy price from the electrical energy consumption of each instruments were observed. The minimum value of the energy price was 0.05 THB from the compact fluorescent. The result of the maximum value of the energy price was 0.27 THB from the refrigerator.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130120181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Meta-model for Planning and Execution Activities in Software Project Integration Management 软件项目集成管理中计划与执行活动的元模型
Fatima Waheed, F. Azam, Muhammad Waseem Anwar, Ayesha Kiran
{"title":"A Meta-model for Planning and Execution Activities in Software Project Integration Management","authors":"Fatima Waheed, F. Azam, Muhammad Waseem Anwar, Ayesha Kiran","doi":"10.1145/3357419.3357439","DOIUrl":"https://doi.org/10.1145/3357419.3357439","url":null,"abstract":"Project management is one of most important parts of every business and it demands to be controlled effectively. Project integration is one of the knowledge area of project management. It is a technique for influencing diverse methodology to coordinate; it takes different strategies that are being used in a task and guarantees that they are sorted out. Much work has been done on optimization of project management processes but not specifically on project management knowledge areas. This paper discusses the core knowledge area of project management i.e. project integration management. A meta-model for project integration management, for converting manual tasks into automated one, is presented in this research. The architectural concepts of proposed meta-model is described using different levels of meta-modeling i.e. M1, M2, M3, M4. The applicability of proposed approach is also validated through a case study.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114488557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors 使用击键动力学和智能手机传感器加强密码认证
Tanapat Anusas-Amornkul
{"title":"Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors","authors":"Tanapat Anusas-Amornkul","doi":"10.1145/3357419.3357425","DOIUrl":"https://doi.org/10.1145/3357419.3357425","url":null,"abstract":"Presently, a password authentication is a weak point for security in the authentication scheme because a password is easy to be stolen and a user may ignore the security by using a simple password, which is easy to remember or using the same password for all accounts. From the related works, basic keystroke dynamics features, i.e. key hold time, latency time, and interkey time, were studied on a smartphone. The results showed the weak aspect to use only basic keystroke dynamics for authentication on the phone. In this research, the study of smartphone sensors combining with keystroke dynamics is proposed to strengthen the password authentication, called a biometric authentication. New features are key hold pressure, finger area, and accelerometer sensors. The classification techniques in this work are Naïve Bayes, k Nearest Neighbors (kNN), and Random Forest. The classification accuracy percentage and equal error rate (EER) are used for measuring the performance of the features and classifiers. From the results, Random Forest gives the best performance and if all smartphone sensors and keystroke dynamics are used as features, the best accuracy percentage is at 97.90% and EER is at 5.1%.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132972906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach 基于遗憾匹配的无人机物联网节能关联方法
Safae Lhazmir, A. Kobbane, Khalid Chougdali, J. Ben-othman
{"title":"Energy-Efficient Associations for IoT networks with UAV: A Regret Matching Based Approach","authors":"Safae Lhazmir, A. Kobbane, Khalid Chougdali, J. Ben-othman","doi":"10.1145/3357419.3357455","DOIUrl":"https://doi.org/10.1145/3357419.3357455","url":null,"abstract":"Energy-Efficiency (EE) is an important issue in the IoT system. Unmanned Aerial Vehicles (UAVs) have been used as aggregators to collect data from IoT ground devices, and provide an energy-efficient and cost-effective solution. In this paper, we aim at maximizing the overall EE of the IoT network, by finding to most suitable IoT-UAV association. We formulate the problem as a non-cooperative game where IoT players choose the UAVs that minimize their transmit power by learning their best strategy using an approach based on regret-matching learning. Simulations results show a fast convergence to an optimal solution that provides a low average total transmit power and maximizes the IoT system's overall EE.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Vehicle Counting Evaluation on Low-resolution Images using Software Tools 基于软件工具的低分辨率图像车辆计数评估
Benny Hardjono, M. G. Rhizma, A. E. Widjaja, H. Tjahyadi, Madeleine Jose Josodipuro
{"title":"Vehicle Counting Evaluation on Low-resolution Images using Software Tools","authors":"Benny Hardjono, M. G. Rhizma, A. E. Widjaja, H. Tjahyadi, Madeleine Jose Josodipuro","doi":"10.1145/3357419.3357453","DOIUrl":"https://doi.org/10.1145/3357419.3357453","url":null,"abstract":"Vehicle counting is an important parameter in building highway macroscopic model. This model ultimately will help highway designers, road planners and even common commuters, since it can give short term predictions of the road's behaviour which is influenced for example by its traffic flow, number of lanes, as well as off and on ramps. This research attempts to count vehicles from existing video cameras, which gives low-resolution 3 seconds video of 1 frame per second. For low-resolution, conventional methods, such as Back-subtraction, and Viola Jones are unable to give high counting accuracy. However, with the aid of another custom-made software tool, various parameters of Deep Learning method, such as pixel-frame distance thresholds, and two different counting models can be run repetitively, to obtain better accuracy. Early results have shown that by varying pixel distance threshold, the percentage of error can go down from 40.8% to as low as 0.8%.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129736472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automated Classification of Software Bug Reports 软件Bug报告的自动分类
A. Otoom, Sara Al-jdaeh, M. Hammad
{"title":"Automated Classification of Software Bug Reports","authors":"A. Otoom, Sara Al-jdaeh, M. Hammad","doi":"10.1145/3357419.3357424","DOIUrl":"https://doi.org/10.1145/3357419.3357424","url":null,"abstract":"We target the problem of software bug reports classification. Our main aim is to build a classifier that is capable of classifying newly incoming bug reports into two predefined classes: corrective (defect fixing) report and perfective (major maintenance) report. This helps maintainers to quickly understand these bug reports and hence, allocate resources for each category. For this purpose, we propose a distinctive feature set that is based on the occurrences of certain keywords. The proposed feature set is then fed into a number of classification algorithms for building a classification model. The results of the proposed feature set achieved high accuracy in classification with SVM classification algorithm reporting an average accuracy of (93.1%) on three different open source projects.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124293889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Analysis of Numerical Grid-Based Authentication 基于数字网格的认证分析
Sirapat Boonkrong
{"title":"An Analysis of Numerical Grid-Based Authentication","authors":"Sirapat Boonkrong","doi":"10.1145/3357419.3357434","DOIUrl":"https://doi.org/10.1145/3357419.3357434","url":null,"abstract":"Passwords have been used as an authentication method for a long time. Many variations have also been proposed and applied. Grid-based passwords are also ones that have caught up with others in popularity. This paper analyses the security of such system. How the way that users select cell positions in different grid sizes affect overall security of the system is investigated. How they think of the ease of use of each of the grid sizes is also studied. As a result, an attempt is then made to find a balance between security and usability.","PeriodicalId":261951,"journal":{"name":"Proceedings of the 9th International Conference on Information Communication and Management","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123533690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信