{"title":"Making Decision in Requirement Change Management","authors":"Saffena Ramzan, N. Ikram","doi":"10.1109/ICICT.2005.1598607","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598607","url":null,"abstract":"Requirement change management a significant activity, which is performed through out the development of the software and even during the maintenance phase. It is the core activity to obtain one of the main objectives of software development, which is to satisfy the evolving needs of the customers. Software requirements are linked and dependent on other requirements and changing one requirement definitely affects interlinked requirements. Impact analysis is the crux of requirement change management which is to obtain with the change of requirements, so that the scope of that change is identified. Traceability is the pre-requisite to acquire proper impact analysis. As requirement change is directly linked with decision making (because when changes occur decisions are to be made), so organizations should have proper decision making and defined requirement change management processes, so the whole procedure can be performed in a defined way.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128744420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancement of Software Engineering by Shifting From Software Product to Software Service","authors":"M. Saeed, M. Jaffar-Ur-Rehman","doi":"10.1109/ICICT.2005.1598606","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598606","url":null,"abstract":"Software development has always been a supply side affair, in which domain experts were the main requirement providers. Software engineers have been creating new technologies, frameworks and methodologies but this has made the software engineering job more complex. Recently all this has been looked at from demand-side prospective. So a new concept of Service Based Software Engineering is shaping up which look at the software as a service rather then a product. This paper is going to analysis the fundamental requirements of such a paradigm shift, by first gathering the concept and then translating this to a workable solution. Different allied concept associated with the implementations will be analyzed. Software engineering from ground-up, totally from a different angle will be looked into. We will try to contrast the existing approaches vis-à-vis Service Based Software Engineering.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127592776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impact of PSEB Initiated Industrial Automation Project on IT & Domestic SME Manufacturing Industry of Pakistan","authors":"A. Luqman","doi":"10.1109/ICICT.2005.1598622","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598622","url":null,"abstract":"Pakistan Software Export Board (PSEB) Guarantee Limited is a semi-government organization working under the Ministry of Information Technology & Telecommunication (MoITT), Government of Pakistan (GoP). PSEB has initiated \"Automation of Domestic Manufacturing Industry - Bridge\" project in January, 2002 to facilitate the use of Information Technology (IT) for maximizing the output of Small and Medium Enterprises (SME) by utilizing the expertise of IT industry. The project [1] holds a two-fold impact. First it will help the domestic manufacturing industry in automating their business processes by increasing not only their efficiency but also their share in national exports. This will help in decreasing the operational pilferage, enhancement in process output and increase efficiency. Secondly, it will assist in up bringing domestic quality software companies that can provide world-class industry solutions and highlight such potential software solution development resources, which can later on be exploited for software export.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127182517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework to Refine, Verify, and Identify Aspectual Requirements","authors":"S.S. Khan, S. Ali, Jaffar-ur-Rehman","doi":"10.1109/ICICT.2005.1598636","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598636","url":null,"abstract":"Aspect oriented requirement engineering is concerned with capturing crosscutting concerns at an early stage of software development life cycle. Early identification of concerns enhances modularization at early stage and avoids tangled design and code at later stages. Furthermore, early identification improves quality of product and reduces maintenance costs. There are four main approaches to identify concerns from requirements: viewpoint oriented approach, scenario/use case based approach, problem frame based approach, and goal oriented approach. Each approach identifies, classifies, and refines concerns from different perspective. In this paper, we have combined viewpoint-oriented approach, scenario/use case based approach, and goal oriented approach. A framework is proposed based on this combination, which refines and verifies concerns identified from three different models. Duplicate concerns are removed and finally refined to generate aspects.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134525942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Challenge of Sustainability: the Difficulty of Operating Rural PC Kiosks","authors":"Kentora Toyoma","doi":"10.1109/ICICT.2005.1598549","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598549","url":null,"abstract":"India is a thriving testing ground for people working in \"Information and Communication Technology for Development,\" or ICT4D. Many of these projects take the form of a PC being taken to a rural village and operated like a small Internet cafe or kiosk, with the two-pronged goals of making socio-economic impact and turning the kiosk into a profitable micro-enterprise. A mounting body of evidence indicates, however, that it is extremely difficult to meet both goals simultaneously. I will give an overview of some work done at MSR India in this area, offer some analysis on what makes the goals challenging, and suggest some areas for future exploration.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115892591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role of Software Metrics in Software Engineering and Requirements Analysis","authors":"Q. Durrani","doi":"10.1109/ICICT.2005.1598551","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598551","url":null,"abstract":"The current software engineering practices observed in the local software industry generally lacks the software metrics planning part. The specific planning required to improve the software practices, to gauge the productivity of the individuals, and productivity at different phases of software development life cycle (SDLC), is generally missing. These organizations do not have any planning to gauge and control the business development issues and improve their productivities. During development phase, most of these software houses do collect data about different aspects of the project like project planning, requirement specification, testing, and bugs found. However, these organizations, generally, do not understand the importance of such data elements, how to maintain the data, how to built measurements plan, and most importantly how to use this data to improve their processes and productivity. In fact most of the time, the available data gets destroyed and hence never used. The current talk will discuss the need and importance of software metrics, the role of metrics in different phases of SDLC, and particularly the requirement phase. The requirement elicitation is considered as the most important aspect of software development, and if not handled properly, may cause severe productivity and quality issues. The talk will elaborate different metrics that may be used in requirement elicitation process and hence may help improve the requirement document resulting in improved productivity in the overall software development.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117236876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanveer-ul-Haq, S.I. Shah, A. Chaudhry, M. Adeel, A. Samad, J. Ahmad
{"title":"Wireless Local Loop and the Limited Mobility Issue in Pakistan","authors":"Tanveer-ul-Haq, S.I. Shah, A. Chaudhry, M. Adeel, A. Samad, J. Ahmad","doi":"10.1109/ICICT.2005.1598609","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598609","url":null,"abstract":"Wireless Local Loop (WLL) licenses have been issued to increase the tele-density in the country. Almost all WLL operators have chosen Code Division Multiple Access (CDMA) based technologies to implement their networks. Government policy allows limited mobility, which, if implemented literally, can severely degrade the performance of these networks. On the other hand, if certain conditions on mobility are relaxed, it can make the WLL systems potential competitors for the cellular systems present in the country. This paper discuses technical background of the limited mobility issues and proposes few potential solutions to solve this problem.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122491576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Metaheuristic Applications and Their Solutions Quality","authors":"Z. Hussain","doi":"10.1109/ICICT.2005.1598560","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598560","url":null,"abstract":"Over the past few decades, a wide variety of classes of combinatorial problems (e.g. the assignment problem, the knapsack problem, the vehicle routing problem, etc.) have emerged - from such areas as management science, telecommunication, AI, VLSI design and many others. Many large combinatorial problems are NP-hard problems because of the combinatorial growth of their solution search space with the problem size. Such problems are commonly solved by some version of a prominent metaheuristic (e.g. Genetic Algorithms, Tabu Search, Simulated Annealing and etc.). These heuristics seek good but approximate solutions at a reasonable computational cost. These heuristics are of stochastic nature. Heuristic researchers often make claims about the relative performance of metaheuristics without considering their stochastic nature and consequently their claims are not reliable. This paper discusses how to make an effective application of these metaheuristics to any NP-hard problem and to assess their solution quality in an acceptable way.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115950682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Software Agents with MPEG-7 Descriptions for a Distribute Flexible Multimedia System","authors":"M. Khokhar, Z. I. Malik, S. Ali","doi":"10.1109/ICICT.2005.1598635","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598635","url":null,"abstract":"Distributed Multimedia & its applications are evolving day by day. However, the issues of limited transmission bandwidth, network reliability, QoS, and flexibility are not yet completely resolved. On the other hand, the www is growing at a rapid pace and a huge amount of new multimedia data is introduced everyday. This data includes downloadable and stream-able multimedia content. To enhance the streaming quality with the available bandwidths, several new codecs and standards are under development. This paper initially discusses the MPEG-4 and MPEG-7 standards for streaming and description of multimedia content respectively and proposes an agent based architecture to introduce a distributed flexible scheme to query, search, filter, and gather results using the multimedia content descriptions as provided by the MPEG-7 standard. A resource agent has been used to convert the multimedia content descriptions of MPEG-7 to a local XML repository, so that efficient query and platform independence can be achieved.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129051260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of IP Information of Pakistan & Vulnerability Assessment","authors":"N. Ali","doi":"10.1109/ICICT.2005.1598593","DOIUrl":"https://doi.org/10.1109/ICICT.2005.1598593","url":null,"abstract":"Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, regulatory authorities dealing with information security in Pakistan can get an empirical proof on state of network security in Pakistan.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}