Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22)
  • Open Access

    ARTICLE

    Crowdsourced Requirements Engineering Challenges and Solutions: A Software Industry Perspective

    Huma Hayat Khan1,*, Muhammad Noman Malik2, Youseef Alotaibi3, Abdulmajeed Alsufyani4, Saleh Alghamdi5

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 221-236, 2021, DOI:10.32604/csse.2021.016510

    Abstract Software crowdsourcing (SW CS) is an evolving software development paradigm, in which crowds of people are asked to solve various problems through an open call (with the encouragement of prizes for the top solutions). Because of its dynamic nature, SW CS has been progressively accepted and adopted in the software industry. However, issues pertinent to the understanding of requirements among crowds of people and requirements engineers are yet to be clarified and explained. If the requirements are not clear to the development team, it has a significant effect on the quality of the software product. This study aims to identify… More >

  • Open Access

    ARTICLE

    Eliciting Requirements from Stakeholders’ Responses Using Natural Language Processing

    Mohammed Lafi1,*, Bilal Hawashin2, Shadi AlZu’ bi3

    CMES-Computer Modeling in Engineering & Sciences, Vol.127, No.1, pp. 99-116, 2021, DOI:10.32604/cmes.2021.013026

    Abstract Most software systems have different stakeholders with a variety of concerns. The process of collecting requirements from a large number of stakeholders is vital but challenging. We propose an efficient, automatic approach to collecting requirements from different stakeholders’ responses to a specific question. We use natural language processing techniques to get the stakeholder response that represents most other stakeholders’ responses. This study improves existing practices in three ways: Firstly, it reduces the human effort needed to collect the requirements; secondly, it reduces the time required to carry out this task with a large number of stakeholders; thirdly, it underlines the… More >

  • Open Access

    ARTICLE

    Usability Evaluation Through Fuzzy AHP-TOPSIS Approach: Security Requirement Perspective

    Yoosef B. Abushark1, Asif Irshad Khan1,*, Fawaz Jaber Alsolami1, Abdulmohsen Almalawi1, Md Mottahir Alam2, Alka Agrawal3, Rajeev Kumar3,4, Raees Ahmad Khan3

    CMC-Computers, Materials & Continua, Vol.68, No.1, pp. 1203-1218, 2021, DOI:10.32604/cmc.2021.016610

    Abstract Most of the security strategies today are primarily designed to provide security protection, rather than to solve one of the basic security issues related to adequate software product architecture. Several models, frameworks and methodologies have been introduced by the researchers for a secure and sustainable software development life cycle. Therefore it is important to assess the usability of the popular security requirements engineering (SRE) approaches. A significant factor in the management and handling of successful security requirements is the assessment of security requirements engineering method performance. This assessment will allow changes to the engineering process of security requirements. The consistency… More >

  • Open Access

    REVIEW

    An Evaluation of Value-Oriented Review for Software Requirements Specification

    Qiang Zhi1,*, Shuji Morisaki2

    Computer Systems Science and Engineering, Vol.37, No.3, pp. 443-461, 2021, DOI:10.32604/csse.2021.015157

    Abstract A software requirements specification (SRS) is a detailed description of a software system to be developed. This paper proposes and evaluates a lightweight review approach called value-oriented review (VOR) to detect defects in SRS. This approach comprises setting core values based on SRS and detecting the defects disturbing the core values. To evaluate the effectiveness of the proposed approach, we conducted a controlled experiment to investigate whether reviewers could identify and record the core values based on SRS and find defects disturbing the core values. Results of the evaluation with 56 software engineers showed that 91% of the reviewers identified… More >

  • Open Access

    ARTICLE

    A Data Security Framework for Cloud Computing Services

    Luis-Eduardo Bautista-Villalpando1,*, Alain Abran2

    Computer Systems Science and Engineering, Vol.37, No.2, pp. 203-218, 2021, DOI:10.32604/csse.2021.015437

    Abstract Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloud-based technologies, such as the Internet of Things. With increasing industry adoption and migration of traditional computing services to the cloud, one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies. This work proposes a Data Security Framework for cloud computing services (CCS) that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS. This framework… More >

  • Open Access

    REVIEW

    Automated Test Case Generation from Requirements: A Systematic Literature Review

    Ahmad Mustafa1, Wan M. N. Wan-Kadir1, Noraini Ibrahim1, Muhammad Arif Shah3,*, Muhammad Younas2, Atif Khan4, Mahdi Zareei5, Faisal Alanazi6

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 1819-1833, 2021, DOI:10.32604/cmc.2021.014391

    Abstract Software testing is an important and cost intensive activity in software development. The major contribution in cost is due to test case generations. Requirement-based testing is an approach in which test cases are derivative from requirements without considering the implementation’s internal structure. Requirement-based testing includes functional and nonfunctional requirements. The objective of this study is to explore the approaches that generate test cases from requirements. A systematic literature review based on two research questions and extensive quality assessment criteria includes studies. The study identifies 30 primary studies from 410 studies spanned from 2000 to 2018. The review’s finding shows that… More >

  • Open Access

    REVIEW

    Economical Requirements Elicitation Techniques During COVID-19: A Systematic Literature Review

    Tauqeer ul Amin1,*, Basit Shahzad1, Fazal-e-Amin2, Muhammad Shoaib2

    CMC-Computers, Materials & Continua, Vol.67, No.2, pp. 2665-2680, 2021, DOI:10.32604/cmc.2021.013263

    Abstract Requirements elicitation is a fundamental phase of software development in which an analyst discovers the needs of different stakeholders and transforms them into requirements. This phase is cost- and time-intensive, and a project may fail if there are excessive costs and schedule overruns. COVID-19 has affected the software industry by reducing interactions between developers and customers. Such a lack of interaction is a key reason for the failure of software projects. Projects can also fail when customers do not know precisely what they want. Furthermore, selecting the unsuitable elicitation technique can also cause project failure. The present study, therefore, aimed… More >

  • Open Access

    ARTICLE

    Research on Optimal Matching of Heating Ventilation Air Conditioning System Based on Energy Saving Requirements

    Dongsheng Xu*

    Energy Engineering, Vol.117, No.3, pp. 143-152, 2020, DOI:10.32604/EE.2020.010335

    Abstract With the continuous development of society and the progress of science and technology, the living standards of the people also constantly improve, people pay more and more attention to the pursuit of material life, and the living space of everyday life and office space requirements are also rising, the air conditioning has become the essential in people’s daily life a kind of electrical equipment. The traditional optimal matching methods of heating, ventilation, air conditioning (HVAC) system have common problems such as long matching time, low matching accuracy and many matching times. The application of the best matching method of HAVC… More >

  • Open Access

    ARTICLE

    Germination of Eryngium regnellii: a major species for ecological restoration of plant-pollinator interactions in the Southern Pampas (Buenos Aires, Argentina)

    Sabatino M1,2, AE Rovere1, N Maceira2

    Phyton-International Journal of Experimental Botany, Vol.84, No.2, pp. 435-443, 2015, DOI:10.32604/phyton.2015.84.435

    Abstract Eryngium regnellii Malme belongs to the largest genera in the Apiaceae family, with 250 species worldwide and 65 represented in South America. It is a herbaceous species typical of hill plant communities, which, along with remnant grassland patches, are the most relevant natural habitats for the maintenance of diversity in the Southern Pampas. Eryngium regnellii is key to the maintenance of pollination mutualisms, being a generalist (displaying a diverse assemblage of pollinators) and ubiquitous species (present in all studied sierras). However, fragmentation of the Pampean landscape due to agricultural intensification has led to the loss of natural environments. Therefore, the… More >

  • Open Access

    ARTICLE

    Selection of double purpose wheat genotypes. Vernalization requirements

    Morant AE, HD Merchán, EE Lutz

    Phyton-International Journal of Experimental Botany, Vol.80, pp. 5-8, 2011, DOI:10.32604/phyton.2011.80.005

    Abstract This study aimed to characterize wheat cultivars for their chilling requirements for differentiation and their relationship to flowering time, to establish a dual purpose ideotype. Seeds of eight genotypes (cultivars and advanced lines) of bread wheat were exposed to constant temperature (4 °C) in germination chambers for 8, 6, 4 and 2 weeks. A control treatment was kept at room temperature. Four replicates of each treatment were placed in the greenhouse in 250 cc pots containing 4 seedlings each, with irrigation and natural photoperiod, following a randomized complete block design. The greenhouse temperature was constant (20 °C) and the natural… More >

Displaying 11-20 on page 2 of 22. Per Page