Volume-2 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Abstract : CONTEXT – Global Software Development (GSD) is a modern software engineering paradigm adopted by many client organisations in developed countries to get high quality product at low cost in low wage countries. Production of high quality software is considered as one of the key factor in the rapid growth of GSD. However GSD projects have put new challenges to practitioners and researchers. In order to address these challenges Software Quality Metrics (SQMs) are frequently used in organisations to fabricate high quality products. OBJECTIVE - The objective of this SLR protocol is to identify and assess strengths and weaknesses of the existing SQMs used in GSD to assist vendor organisations in choosing appropriate SQMs for measuring software quality. METHOD – Systematic Literature Review (SLR) will be used for the identification of the existing SQMs in GSD. SLR is based on a structured protocol, and is therefore, different from ordinary review. EXPECTED OUTCOME – We have developed the SLR protocol and are currently in process of its implementation. The expected outcomes of this review will be the identification of different SQMs for GSD along with their SWOT analysis to assist vendor organisations in choosing appropriate SQMs at the right time to produce a high quality product.
Keywords - Software Quality Metrics, Global Software Development, Systematic Literature Review Protocol
Keywords - Software Quality Metrics, Global Software Development, Systematic Literature Review Protocol
[1] S. U. Khan, "Software outsourcing vendors‟ readiness model (SOVRM)," Keele University UK, 2010.
[2] IEEE, ",IEEE Std 610.12-1990-IEEE Standards Glossary of Software Engineering Terminology, IEEE Computer Society," IEEE Std 610.12-1990, 1991.
[3] S. R. Pressman, Software Engineering : A practitioner's Approach, Sixth Edition ed.
[4] N. Fenton, "Software Measurement: A Necessary Scientific Basis," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, NO. 3. MARCH 1994, vol. VOL. 20, 1994.
[5] T. DeMacri, "Controlling Software Projects," 1982.
[6] "A Software Metrics Primer," 2007.
[7] S. L. P. Fenton Norman E, Software Metrics: a Rigorous and Practical Approach, 2nd Edition ed, 1997.
[8] H. Zuse, Bollmann-Sdorra, and Peter, "Measurement Theory and Software Measures," presented at Proceedings of the BCS-FACS Workshop on Formal Aspects of Measurement, London, 1991.
[9] E. M. Everald, "Software Metrics SEI Curriculum Module SEI-CM-12-1.1," Seattle University Seattle, Washington, Washington December 1988.
[10] L. L. Westfall, "Twelve Step to Useful Software Metrics," presented at Proceedings of the Seventeenth Annual Pacific Northwest Software Quality Conference, 2005.
[11] J. Capers, "STRENGTHS AND WEAKNESSES OF SOFTWARE METRICS," Software Productivity Research LLC, 2006.
[12] M. Xenos, "Software Metrics and Measuremnts," Encylopedia of E-Commerce,E-Government and Mobile Commerce, pp. 8, 2006.
[13] J. Magne, "Software quality measurement."
[14] S. F.Norman "Knowledge Requirements for Software Quality Measurement," Empricial Software Engineering, 2001.
[15] Z. Dave, "Measuring Software Product Quality: the ISO 25000 Series and CMMI," European SEPG, 2004.
[2] IEEE, ",IEEE Std 610.12-1990-IEEE Standards Glossary of Software Engineering Terminology, IEEE Computer Society," IEEE Std 610.12-1990, 1991.
[3] S. R. Pressman, Software Engineering : A practitioner's Approach, Sixth Edition ed.
[4] N. Fenton, "Software Measurement: A Necessary Scientific Basis," IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, NO. 3. MARCH 1994, vol. VOL. 20, 1994.
[5] T. DeMacri, "Controlling Software Projects," 1982.
[6] "A Software Metrics Primer," 2007.
[7] S. L. P. Fenton Norman E, Software Metrics: a Rigorous and Practical Approach, 2nd Edition ed, 1997.
[8] H. Zuse, Bollmann-Sdorra, and Peter, "Measurement Theory and Software Measures," presented at Proceedings of the BCS-FACS Workshop on Formal Aspects of Measurement, London, 1991.
[9] E. M. Everald, "Software Metrics SEI Curriculum Module SEI-CM-12-1.1," Seattle University Seattle, Washington, Washington December 1988.
[10] L. L. Westfall, "Twelve Step to Useful Software Metrics," presented at Proceedings of the Seventeenth Annual Pacific Northwest Software Quality Conference, 2005.
[11] J. Capers, "STRENGTHS AND WEAKNESSES OF SOFTWARE METRICS," Software Productivity Research LLC, 2006.
[12] M. Xenos, "Software Metrics and Measuremnts," Encylopedia of E-Commerce,E-Government and Mobile Commerce, pp. 8, 2006.
[13] J. Magne, "Software quality measurement."
[14] S. F.Norman "Knowledge Requirements for Software Quality Measurement," Empricial Software Engineering, 2001.
[15] Z. Dave, "Measuring Software Product Quality: the ISO 25000 Series and CMMI," European SEPG, 2004.
- Citation
- Abstract
- Reference
- Full PDF
CONTXEXT:-Software outsourcing partnership (SOP) is a relationship between client and vendor
organizations for shared goals. A SOP is different than ordinary outsourcing contractual relationship. Usually
a successful outsourcing relationship may lead to outsourcing partnership.
OBJECTIVE:-The objective of this research is to identify factors via systematic literature review (SLR), that are significant to be developed by outsourcing vendor organization which lead them to convert existing outsourcing contractual relationship into outsourcing partnership with client organization.
METHOD: -SLR will be used for the aforementioned objective. SLR is based on a structured protocol and is more thorough than ordinary review.
EXPECTED OUTCOMES: - We have developed a SLR protocol for the SOP. The anticipated outcome of this review will be a list of critical success factors (CSFs) and critical risks (CRs) which can have a positive or a negative role in building or converting the existing outsourcing relationship into outsourcing partnership.
Keywords: Client-Vendor Relationship, Software Outsourcing partnership, Systematic Literature Review Protocol
OBJECTIVE:-The objective of this research is to identify factors via systematic literature review (SLR), that are significant to be developed by outsourcing vendor organization which lead them to convert existing outsourcing contractual relationship into outsourcing partnership with client organization.
METHOD: -SLR will be used for the aforementioned objective. SLR is based on a structured protocol and is more thorough than ordinary review.
EXPECTED OUTCOMES: - We have developed a SLR protocol for the SOP. The anticipated outcome of this review will be a list of critical success factors (CSFs) and critical risks (CRs) which can have a positive or a negative role in building or converting the existing outsourcing relationship into outsourcing partnership.
Keywords: Client-Vendor Relationship, Software Outsourcing partnership, Systematic Literature Review Protocol
[1] J. N. Lee, Huynh, M.Q., Kwok, C.W., and Pi S.M., "The evolution of outsourcing research: What is the next issue?,," presented at
Proceeding of the Thirty-third Hawaii International Conference on Systems Sciences, Maui in Hawaii, 2000.
[2] W. F. a. N. McFarlan, R.L., "How to Manage an IT Outsourcing Alliance.," Sloan Management Review, vol. 36(2), pp. 9-23, 1995.
[3] M. A. Zviran, Niv Armoni,Aviad, "Building outsourcing relationship across the global community: the UPS-Motorola experience,"
Strategic information System, vol. 10, pp. 313-333, 2001.
[4] R. M. L.M. Applegate, E., "Kodak, Managing information systems through strategic alliances,," Harvard Business School Press,
Boston, Boston 9-192-030,, 1991.
[5] B. F. Yang, Hongjiao Zuo,Meiyun, "A Case Study of Disaster Backup Outsourcing of SDB and Hi Sun," ICEC, Xi'an,China August
15 2005.
[6] B. I. D.R. Lasher, S.L. Jarvenpaa,, "USAA-IBM partnerships in information technology: managing the image project," MIS
Quarterly, vol. 15, pp. 551-565., 1991.
[7] K. D. L.M. Applegate, "Xerox: outsourcing global information technology resources," Harvard Business School Press, Boston 9 -
195-158, 1995.
[8] S. U Khan, M Niazi Ahmad,Rashid, "Factors influencing clients in the selection of offshore software outsourcing vendors,"
Journal of System and Software, 2010.
[9] J. T. V.Grover, M.Cheon, "The effect of service quality and partnership on the outsourcing of information system," Journal of
Management information system, 1996.
[10] D. M. Lambert, M.A. Emmelhainz, and J.T. Gardner,, "Building Successful Logistics Partnerships," Journal of Business Logistics,
vol. 20, pp. 165-181, 1999.
[11] J. N. a. K. Lee, Y. G,, "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation,"
Journal of Management Information Systems, vol. 15, pp. 29-61, 1999.
[12] R. Kishore, Rao, H.R., Nam, K., Rajagopalan, S., and Chaudhury, A., "A relationship perspective on IT outsourcing,"
Communications of the ACM, vol. 46(12), pp. 87-92, 2003.
[13] V. a. F. Michell, G., "The IT outsourcing market-place: vendors and their selection," Journal of Information Technology, vol. 12,
pp. 223-237, 1997.
[14] R. a. B. Srinivasan, T.H., "Supplier Performance in Vertical Alliances: The Effects of Self-Enforcing Agreements and Enforceable
Contracts," Organization Science,, vol. 17(4), pp. 436-452, 2006.
[15] B. F. Yang, Hongjiao Zuo,Meiyun, "The Integration Mechanism of IT Outsourcing Partnership," 2005...........
Proceeding of the Thirty-third Hawaii International Conference on Systems Sciences, Maui in Hawaii, 2000.
[2] W. F. a. N. McFarlan, R.L., "How to Manage an IT Outsourcing Alliance.," Sloan Management Review, vol. 36(2), pp. 9-23, 1995.
[3] M. A. Zviran, Niv Armoni,Aviad, "Building outsourcing relationship across the global community: the UPS-Motorola experience,"
Strategic information System, vol. 10, pp. 313-333, 2001.
[4] R. M. L.M. Applegate, E., "Kodak, Managing information systems through strategic alliances,," Harvard Business School Press,
Boston, Boston 9-192-030,, 1991.
[5] B. F. Yang, Hongjiao Zuo,Meiyun, "A Case Study of Disaster Backup Outsourcing of SDB and Hi Sun," ICEC, Xi'an,China August
15 2005.
[6] B. I. D.R. Lasher, S.L. Jarvenpaa,, "USAA-IBM partnerships in information technology: managing the image project," MIS
Quarterly, vol. 15, pp. 551-565., 1991.
[7] K. D. L.M. Applegate, "Xerox: outsourcing global information technology resources," Harvard Business School Press, Boston 9 -
195-158, 1995.
[8] S. U Khan, M Niazi Ahmad,Rashid, "Factors influencing clients in the selection of offshore software outsourcing vendors,"
Journal of System and Software, 2010.
[9] J. T. V.Grover, M.Cheon, "The effect of service quality and partnership on the outsourcing of information system," Journal of
Management information system, 1996.
[10] D. M. Lambert, M.A. Emmelhainz, and J.T. Gardner,, "Building Successful Logistics Partnerships," Journal of Business Logistics,
vol. 20, pp. 165-181, 1999.
[11] J. N. a. K. Lee, Y. G,, "Effect of Partnership Quality on IS Outsourcing Success: Conceptual Framework and Empirical Validation,"
Journal of Management Information Systems, vol. 15, pp. 29-61, 1999.
[12] R. Kishore, Rao, H.R., Nam, K., Rajagopalan, S., and Chaudhury, A., "A relationship perspective on IT outsourcing,"
Communications of the ACM, vol. 46(12), pp. 87-92, 2003.
[13] V. a. F. Michell, G., "The IT outsourcing market-place: vendors and their selection," Journal of Information Technology, vol. 12,
pp. 223-237, 1997.
[14] R. a. B. Srinivasan, T.H., "Supplier Performance in Vertical Alliances: The Effects of Self-Enforcing Agreements and Enforceable
Contracts," Organization Science,, vol. 17(4), pp. 436-452, 2006.
[15] B. F. Yang, Hongjiao Zuo,Meiyun, "The Integration Mechanism of IT Outsourcing Partnership," 2005...........
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Noises are the unwanted information in an image, so they should be removed before further
processing. Existing methods consider histogram based analysis which is globally varied one. A modified
statistical measured based automatic noise type recognition technique is proposed in this paper. This has 2
phases including training phase and testing phase. The key role involves deduction of noise samples using
filters like wiener, lee, median and extracts the statistical measures like kurtosis and skewness from samples.
Kurtosis and skewness values exhibit behavior based on noise type. By using the statistical information and
trained data we can classify the type of noise. Finally the noise type is identified and corresponding filter is
applied. Thus noise eliminated image would give the desirable results during further processing. Experimental
results show that the method is capable of accurately classifying the types of noise.
Keywords: Enhanced Noise Type Recognition, Kurtosis, Noise type identification, Skewness, Statistical features.
Keywords: Enhanced Noise Type Recognition, Kurtosis, Noise type identification, Skewness, Statistical features.
[1] Yixin Chen, Manohar Das (2007), "An Automated Technique for Image Noise Identification Using a Simple Pattern Classification Approach", IEEE International conference on Circuits and systems, pp.819-822.
[2] Lionel Beaurepaire, Kacem chedi and Benoit Vozel (1997), "Identification of the nature of noise and estimation of its statistical parameters by analysis of local histograms", IEEE International conference on Acoustics, Speech and Signal Processing, Volume: 4, pp. 2805-2808
[3] Dr. P. Subashini, Bharathi.P. T (2011), "Automatic Noise Identification in Images using Statistical Features", International Journal of Computer Science and Technology, Vol. 2, Issue 3, pp. 467-471.
[4] Raina , Shamik Tiwari ,Deepa Kumari ,Deepika Gupta (2012), "An approach for image noise identification using minimum distance classifier", International Journal of Scientific & Engineering Research Volume 3, Issue 4, pp 1-4
[5] Karibasappa K.G and K. Karibasappa (2010), "Identification and Removal of Impulsive noise using Hypergraph Model", IJCSE International Journal on Computer Science and Engineering, Vol. 02, No. 08, pp. 2666-2669.
[6] K. Chehdi, M. Sabri(1992), "A New Approach to identify the nature of noise affecting an image, IEEE on Accoustics, Speech, Signal Processing", Vol.3, pp. 285-288
[7] B. Vozel, K. Chehdi, L. Klaine, Vladimir V. Lukin, Sergey K. Abramov, "Imitation of its statistical parameters by using unsupervised variational classification", IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2, pp. 841-844.
[8] T. Santhanam and S. Radhika (2010), "A Novel Approach to Classify Noises in Images Using Artificial Neural Network" , Journal of Computer Science, Vol 1, Pp. 506-510.
[9] Shamik Tiwari, Ajay Kumar Singh, V.P. Shukla (2011), "Statistical Moments based Noise Classification using Feed Forward Back Propagation Neural Network", Proc. International Journal of Computer Applications, Vol. 18, No. 2, pp. 36-40
[10] K. Chehdi(1993). "Automatic identification of noises for an optimal filtering", Proceedings IEEE CCSP 93, pp. 474-477.
[2] Lionel Beaurepaire, Kacem chedi and Benoit Vozel (1997), "Identification of the nature of noise and estimation of its statistical parameters by analysis of local histograms", IEEE International conference on Acoustics, Speech and Signal Processing, Volume: 4, pp. 2805-2808
[3] Dr. P. Subashini, Bharathi.P. T (2011), "Automatic Noise Identification in Images using Statistical Features", International Journal of Computer Science and Technology, Vol. 2, Issue 3, pp. 467-471.
[4] Raina , Shamik Tiwari ,Deepa Kumari ,Deepika Gupta (2012), "An approach for image noise identification using minimum distance classifier", International Journal of Scientific & Engineering Research Volume 3, Issue 4, pp 1-4
[5] Karibasappa K.G and K. Karibasappa (2010), "Identification and Removal of Impulsive noise using Hypergraph Model", IJCSE International Journal on Computer Science and Engineering, Vol. 02, No. 08, pp. 2666-2669.
[6] K. Chehdi, M. Sabri(1992), "A New Approach to identify the nature of noise affecting an image, IEEE on Accoustics, Speech, Signal Processing", Vol.3, pp. 285-288
[7] B. Vozel, K. Chehdi, L. Klaine, Vladimir V. Lukin, Sergey K. Abramov, "Imitation of its statistical parameters by using unsupervised variational classification", IEEE International Conference on Acoustics, Speech and Signal Processing, Vol. 2, pp. 841-844.
[8] T. Santhanam and S. Radhika (2010), "A Novel Approach to Classify Noises in Images Using Artificial Neural Network" , Journal of Computer Science, Vol 1, Pp. 506-510.
[9] Shamik Tiwari, Ajay Kumar Singh, V.P. Shukla (2011), "Statistical Moments based Noise Classification using Feed Forward Back Propagation Neural Network", Proc. International Journal of Computer Applications, Vol. 18, No. 2, pp. 36-40
[10] K. Chehdi(1993). "Automatic identification of noises for an optimal filtering", Proceedings IEEE CCSP 93, pp. 474-477.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Enhancing Shadow Area Using RGB Color Space |
Country | : | India |
Authors | : | M. S. V. Jyothirmai || Dr. K. Srinivas || Dr. V. Srinivasa Rao |
: | 10.9790/0661-0212428 | |
Abstract: Shadow detection and removal from color images is invariably significant for image processing. Existing methods use illuminant invariant methods to detect and minimize shadow which is computationally expensive. RGB color space based shadow removal method is existing one which blurs shadow edges. The performance of this existing method mainly depends on structuring element. To overcome all disadvantages, this paper is aimed to utilize RGB color space with modified structuring element. The effect of shadow is decreased on pixel while increasing values of 3 color channels of pixel using modified approach. Experiment results show that proposed system is computationally inexpensive and can robustly remove shadow from complex images.
Keywords: Enhancing Shadow Area, RGB Color space, Shadow Detection, Shadow Removal, Shadow mask,
Keywords: Enhancing Shadow Area, RGB Color space, Shadow Detection, Shadow Removal, Shadow mask,
[1] Li Xu Feihu Qi Renjie Jiang (2006), "Shadow Removal from a Single Image", IEEE Sixth International Conference on Intelligent Systems Design and Applications,. ISDA '06, Vol. 2, pp. 1049-1054.
[2] Ruiqi Guo Qieyun Dai Derek Hoiem (2011), "Single-Image Shadow Detection and Removal using Paired Regions", 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2033-2040. [3] Yael Shor Dani Lischinski (2008), "The Shadow Meets the Mask: Pyramid-Based Shadow Removal", Computer Graphics Forum, Volume 27, Number 2, pp 577–586.
[4] Haijian Ma Qiming Qin Xinyi Shen, (2008), "Shadow Segmentation And Compensation In High Resolution Satellite Images", IEEE International conference on Geoscience and Remote Sensing Symposium, Vol. 2, pp: 1036-1039
[5] G. D. Finlayson, M. S. Drew, and C. Lu. (2009), "Entropy minimization for shadow removal", IJCV, 85(1):35–57,
[6] B.K.P. Horn (1974), "Determining Lightness from an Image", Computer Graphics and Image Processing, vol, 3. pp.277~299,.
[7] D.J. Jobson, Z. Rahman, and G. A. Woodell (1997), "Properties and Performance of the Center Surround Retinex", IEEE Trans. on Image Proc., vol. 6, pp.451-462,
[8] Y. Weiss (2001), "Deriving intrinsic images from image sequences", Proc. Int. Conf. Computer Vision,
[9] Y. Matsushita, K. Nishino, K. Ikeuchi, M. Sakauchi (2004), "Illumination Normalization with Time-Dependent Intrinsic Images for Video Surveillance", IEEE Trans. Pattern Anal. Machine Intell. 26(10):1336-1347.
[10] J.-F. Lalonde, A. A. Efros, and S. G. Narasimhan (2009), "Estimating natural illumination from a single outdoor image".
[2] Ruiqi Guo Qieyun Dai Derek Hoiem (2011), "Single-Image Shadow Detection and Removal using Paired Regions", 2011 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 2033-2040. [3] Yael Shor Dani Lischinski (2008), "The Shadow Meets the Mask: Pyramid-Based Shadow Removal", Computer Graphics Forum, Volume 27, Number 2, pp 577–586.
[4] Haijian Ma Qiming Qin Xinyi Shen, (2008), "Shadow Segmentation And Compensation In High Resolution Satellite Images", IEEE International conference on Geoscience and Remote Sensing Symposium, Vol. 2, pp: 1036-1039
[5] G. D. Finlayson, M. S. Drew, and C. Lu. (2009), "Entropy minimization for shadow removal", IJCV, 85(1):35–57,
[6] B.K.P. Horn (1974), "Determining Lightness from an Image", Computer Graphics and Image Processing, vol, 3. pp.277~299,.
[7] D.J. Jobson, Z. Rahman, and G. A. Woodell (1997), "Properties and Performance of the Center Surround Retinex", IEEE Trans. on Image Proc., vol. 6, pp.451-462,
[8] Y. Weiss (2001), "Deriving intrinsic images from image sequences", Proc. Int. Conf. Computer Vision,
[9] Y. Matsushita, K. Nishino, K. Ikeuchi, M. Sakauchi (2004), "Illumination Normalization with Time-Dependent Intrinsic Images for Video Surveillance", IEEE Trans. Pattern Anal. Machine Intell. 26(10):1336-1347.
[10] J.-F. Lalonde, A. A. Efros, and S. G. Narasimhan (2009), "Estimating natural illumination from a single outdoor image".
- Citation
- Abstract
- Reference
- Full PDF
Abstract : CONTEXT – Global Software Development (GSD) is an emerging trend to perform software development activities across national boundaries. Despite of the benefits gained from GSD, there are certain challenges associated with it. Amongst these challenges one of the critical challenge, which has comparatively little attention in software engineering research community, is the integration of products and components developed by different teams at different locations.
OBJECTIVE – The objective of this paper is to design SLR protocol to identify the challenges associated with software/product integration based on project size and product type in GSD environment from vendor's perspective and to identify the factors to be addressed before, during and after the integration process by the vendor organisations.
METHODOLOGY – We will conduct a Systematic Literature Review (SLR) to identify the challenges and factors mentioned above. SLR is different from ordinary review because it is comparatively unbiased and is based on a predefined protocol.
EXPECTED OUTCOME – The expected outcome of the review will be identification of challenges and factors for software integration in GSD. The identified factors through the review will lead us to develop a Software Integration Model (SIM) that will assist vendors to appropriately address the challenges and factors associated with software/product integration in GSD for different sized and types of projects and products.
Keywords - Global software Development, Integration Challenges, Software Integration, Systematic Literature Review, Vendors
OBJECTIVE – The objective of this paper is to design SLR protocol to identify the challenges associated with software/product integration based on project size and product type in GSD environment from vendor's perspective and to identify the factors to be addressed before, during and after the integration process by the vendor organisations.
METHODOLOGY – We will conduct a Systematic Literature Review (SLR) to identify the challenges and factors mentioned above. SLR is different from ordinary review because it is comparatively unbiased and is based on a predefined protocol.
EXPECTED OUTCOME – The expected outcome of the review will be identification of challenges and factors for software integration in GSD. The identified factors through the review will lead us to develop a Software Integration Model (SIM) that will assist vendors to appropriately address the challenges and factors associated with software/product integration in GSD for different sized and types of projects and products.
Keywords - Global software Development, Integration Challenges, Software Integration, Systematic Literature Review, Vendors
[1] M. Romero, A. Vizcaíno, and M. Piattini, "Toward a Definition of the Competences for Global Requirements Elicitation," ACM 978-1-60558-115-6/08/06., 2008.
[2] B. H. C. Cheng and J. M. Atlee, "Research Directions in Requirements Engineering.," in FOSE, 2007.
[3] D. Šmite, C. Wohlin, T. Gorschek, and R. Feldt, "Empirical evidence in global software engineering: a systematic review," Journal of Empirical Software Engineering, vol. 15, no. 1, pp. 91-118, 2010.
[4] S. U. Khan, M. Niazi, and R. Ahmad, "Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review," Information and Software Technology 53, pp. 693–706, 2011.
[5] M. I. Azeem and S. U. Khan, "Intercultural Challenges in Offshore Software Development Outsourcing Relationships: A Systematic Literature Review Protocol.," presented at IEEE The 5th MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, "MYSEC2011", THE PUTERI PACIFIC, JOHOR, Malaysia., 2011.
[6] A. Zafar, S. Ali, and R. K. Shahzad, ""Investigating integration challenges and solutions in global software development"," presented at Frontiers of Information Technology (FIT), 2011, 2011.
[7] S. Larsson, "Key Elements of the Product Integration Process," Malardalen University Sweden, 2007, pp. 78.
[8] J. H. Van Moll and R. W. M. Ammerlaan, ""Identifying Pitfalls of System Integration -- An Exploratory Study"," presented at IEEE International Conference on Software Testing Verification and Validation Workshop, 2008.
[9] M. Cataldo and S. Nambiar, "On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality," in Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on "The foundations of software engineering". Amsterdam, The Netherlands: ACM, 2009, pp. 101-110.
[10] C. Farcas, E. Farcas, I. H. Krueger, and M. Menarini, "Addressing the Integration Challenge for Avionics and Automotive Systems— From Components to Rich Services," Proceedings of the IEEE, vol. 98, pp. 562-583, 2010.
[11] J. Bosch and Petra Bosch-Sijtsema, "From integration to composition: On the impact of software product lines, global development and ecosystems," Journal of Systems and Software, vol. 83, pp. 67-76, 2010.
[12] J. D. Herbsleb and R. E. Grinter, ""Splitting the Organization and Integrating the Code: Conway's Law Revisited"," presented at Proc. of the 21st International Conference on Software Engineering, 1999.
[13] S. McConnel, Code Complete 2, 2nd ed: USA: Microsoft Press Redmond, Wa, 2004.
[14] M. Cataldo and J. D. Herbsleb, ""Factors leading to integration failures in global feature-oriented development: An empirical analysis"," presented at Software Engineering (ICSE), 2011 33rd International Conference on DO, 2011.
[15] B.Kitchenham and S.Charters, ""Guidelines for performing Systematic Literature Reviews in Software Engineering"," Keele University, UK 2007.
[16] S. U. Khan and M. Niazi, "Systematic Literature Review Protocol for Software Outsourcing Vendors Readiness Model (SOVRM), Technical Report: TR/08-01, ISSN: 1353-7776, School of Computing and Maths, Keele University, UK.," 2008.
[2] B. H. C. Cheng and J. M. Atlee, "Research Directions in Requirements Engineering.," in FOSE, 2007.
[3] D. Šmite, C. Wohlin, T. Gorschek, and R. Feldt, "Empirical evidence in global software engineering: a systematic review," Journal of Empirical Software Engineering, vol. 15, no. 1, pp. 91-118, 2010.
[4] S. U. Khan, M. Niazi, and R. Ahmad, "Barriers in the selection of offshore software development outsourcing vendors: An exploratory study using a systematic literature review," Information and Software Technology 53, pp. 693–706, 2011.
[5] M. I. Azeem and S. U. Khan, "Intercultural Challenges in Offshore Software Development Outsourcing Relationships: A Systematic Literature Review Protocol.," presented at IEEE The 5th MALAYSIAN SOFTWARE ENGINEERING CONFERENCE, "MYSEC2011", THE PUTERI PACIFIC, JOHOR, Malaysia., 2011.
[6] A. Zafar, S. Ali, and R. K. Shahzad, ""Investigating integration challenges and solutions in global software development"," presented at Frontiers of Information Technology (FIT), 2011, 2011.
[7] S. Larsson, "Key Elements of the Product Integration Process," Malardalen University Sweden, 2007, pp. 78.
[8] J. H. Van Moll and R. W. M. Ammerlaan, ""Identifying Pitfalls of System Integration -- An Exploratory Study"," presented at IEEE International Conference on Software Testing Verification and Validation Workshop, 2008.
[9] M. Cataldo and S. Nambiar, "On the relationship between process maturity and geographic distribution: an empirical analysis of their impact on software quality," in Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on "The foundations of software engineering". Amsterdam, The Netherlands: ACM, 2009, pp. 101-110.
[10] C. Farcas, E. Farcas, I. H. Krueger, and M. Menarini, "Addressing the Integration Challenge for Avionics and Automotive Systems— From Components to Rich Services," Proceedings of the IEEE, vol. 98, pp. 562-583, 2010.
[11] J. Bosch and Petra Bosch-Sijtsema, "From integration to composition: On the impact of software product lines, global development and ecosystems," Journal of Systems and Software, vol. 83, pp. 67-76, 2010.
[12] J. D. Herbsleb and R. E. Grinter, ""Splitting the Organization and Integrating the Code: Conway's Law Revisited"," presented at Proc. of the 21st International Conference on Software Engineering, 1999.
[13] S. McConnel, Code Complete 2, 2nd ed: USA: Microsoft Press Redmond, Wa, 2004.
[14] M. Cataldo and J. D. Herbsleb, ""Factors leading to integration failures in global feature-oriented development: An empirical analysis"," presented at Software Engineering (ICSE), 2011 33rd International Conference on DO, 2011.
[15] B.Kitchenham and S.Charters, ""Guidelines for performing Systematic Literature Reviews in Software Engineering"," Keele University, UK 2007.
[16] S. U. Khan and M. Niazi, "Systematic Literature Review Protocol for Software Outsourcing Vendors Readiness Model (SOVRM), Technical Report: TR/08-01, ISSN: 1353-7776, School of Computing and Maths, Keele University, UK.," 2008.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing security (sometimes referred to simply as "cloud security") is an evolving sub-domain of Computer security, Network security and, more broadly, Information security It refers to a broad set of policies, technologies, and controls deployed to protect data, applications, and the associated infrastructure of cloud computing. Cloud security is not to be confused with security software offerings that are "cloud-based" (a.k.a. security-as-a-service).There are a number of security issues/concerns associated with cloud computing but these issues fall into two broad categories: Security issues faced by cloud providers (organizations providing software, platform, or infrastructure as a service via the cloud) and security issues faced by their customers. In most cases, the provider must ensure that their infrastructure is secure and that their clients' data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information. The extensive use of virtualization in implementing cloud infrastructure brings unique security concerns for customers or tenants of a public cloud service. Virtualization alters the relationship between the OS and underlying hardware - be it computing, storage or even networking.
Keywords : Accountability, Authentication attacks, Computer security, Cloud Computing, Flooding attacks, Hypervisor, Virtualization, Wrapping attacks, Browser attacks, secure clouds.
Keywords : Accountability, Authentication attacks, Computer security, Cloud Computing, Flooding attacks, Hypervisor, Virtualization, Wrapping attacks, Browser attacks, secure clouds.
[1] W3C. (n.d.). SPARQL. Retrieved from http://www. w3.org/TR/rdf-sparql-query
[2] Bertino, E. (2002). Access Control for XML Documents. Data & Knowledge Engineering, 43(3).
[3] Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63
[4] DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verification with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[5] Gates, F., Natkovich, O., Chopra, S., Kamath, S. M., Kamath, P., Narayanamuthry, S. M., et al. (2009). Building a High-Level Dataflow System on top of Map-Reduce: The Pig Experience. In Proceedings of the Thirty-Fifth International Conference on Very Large Data Bases (VLDB) (Industrial, Applications and Experience Track), Lyon, France. Hadoop. (n.d.). Retrieved from http://hadoop. apache.org Hama. (n.d.). Retrieved from http://cwiki.apache. org/labs/cloudsglossary.html
[6] Hamlen, K. W., & Jones, M. (2008).Aspect-Oriented In-lined Reference Monitors. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[7] Hamlen, K. W., Morrisett, G., & Schneider, F. B. (2006). Certified In-lined Reference Monitoring on. NET. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[8] IBM. (2004). IBM PCI cryptographic coprocessor. Retrieved from http://www.ibm.com/security/ crypto cards.Jena. (n.d.). Retrieved from http://jena.sourceforge. net...................................
[2] Bertino, E. (2002). Access Control for XML Documents. Data & Knowledge Engineering, 43(3).
[3] Bertino, E. (2004). Selective and Authentic Third Party Distribution of XML Documents. IEEE Transactions on Knowledge and Data Engineering, 16(10). doi:10.1109/TKDE.2004.63
[4] DeVries, B. W., Gupta, G., Hamlen, K. W., Moore, S., & Sridhar, M. (2009). ActionScript Bytecode Verification with Co-Logic Programming. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[5] Gates, F., Natkovich, O., Chopra, S., Kamath, S. M., Kamath, P., Narayanamuthry, S. M., et al. (2009). Building a High-Level Dataflow System on top of Map-Reduce: The Pig Experience. In Proceedings of the Thirty-Fifth International Conference on Very Large Data Bases (VLDB) (Industrial, Applications and Experience Track), Lyon, France. Hadoop. (n.d.). Retrieved from http://hadoop. apache.org Hama. (n.d.). Retrieved from http://cwiki.apache. org/labs/cloudsglossary.html
[6] Hamlen, K. W., & Jones, M. (2008).Aspect-Oriented In-lined Reference Monitors. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[7] Hamlen, K. W., Morrisett, G., & Schneider, F. B. (2006). Certified In-lined Reference Monitoring on. NET. In Proceedings of the ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS).
[8] IBM. (2004). IBM PCI cryptographic coprocessor. Retrieved from http://www.ibm.com/security/ crypto cards.Jena. (n.d.). Retrieved from http://jena.sourceforge. net...................................
- Citation
- Abstract
- Reference
- Full PDF
Abstract: We consider a hybrid wireless sensor network with static and mobile nodes. Static sensors monitor the environment and report events occurring in the sensing field. Mobile sensors are then dispatched to visit these event locations to conduct more advanced analysis. The sensing field may contain obstacles of any shape and size. A big challenge is how to dispatch the mobile sensor to the event location without colliding with any obstacles and in a shortest path. Therefore the objective of the paper is to dispatch the mobile sensor to the event location in a hybrid wireless sensor network in the presence of obstacles. Our solution proposes a simple way to dispatch the mobile sensor to the event location in the presence of obstacle. This paper contributes in defining a more general and easiest dispatch solution in the presence of obstacle.
Index terms: Collision-Free Path, Mobile Sensor, Hybrid WSN, Global Positioning System, Dispatch, Static WSN.
Index terms: Collision-Free Path, Mobile Sensor, Hybrid WSN, Global Positioning System, Dispatch, Static WSN.
[1] Ian F.Akyildiz, WeilianSu, Yogesh Sankarasubramanian, and Erdal Cayirci Georgia Institute of Technology "A Survey on Sensor Networks" IEEE Communication Magazine August 2002.
[2] Yong Wang, Garhan Attebury and Byrav Ramamurthy "A Survey Of Security Issues In Wireless Sensor Networks" IEEE Communications surveys, The Electrinoc Magazine of Original Peer-Reviewed Survey Articles, Volume 8, No. 2, 2006.
[3] Y.C. Wang and Y.C. Tseng, "Intentional Mobility in Wireless Sensor Networks," Wireless Networks: Research, Technology and Applications, Nova Science Publishers, 2009.
[4] M.A. Batalin, M. Rahimi, Y. Yu, D. Liu, A. Kansal, G.S. Sukhatme, W.J. Kaiser, M. Hansen, G.J. Pottie, M. Srivastava, and D. Estrin, "Call and Response: Experiments in Sampling the Environment," Proc. ACM Int'l Conf. Embedded Networked Sensor Systems, pp. 25- 38, 2004.
[5] Y.C. Tseng, Y.C. Wang, K.Y. Cheng, and Y.Y. Hsieh, "iMouse: An Integrated Mobile Surveillance and Wireless Sensor System," Computer, vol. 40, no. 6, pp. 60-66, June 2007.
[6] Y.C. Wang, W.C. Peng, and Y.C. Tseng, "Energy-balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network," IEEE Trans. On parallel and distributed systems, vol. 21, no. 12, December. 2010.
[7] A. Verma, H. Sawant, and J. Tan, "Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network," Pervasive and Mobile Computing, vol. 2, no. 1, pp. 65-84, 2006.
[8] Y.C. Wang and Y.C. Tseng, "Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 9, pp. 1280-1294, Sept. 2008.
[9] Y.C. Wang, C.C. Hu, and Y.C. Tseng, "Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network," IEEE Trans. Mobile Computing, vol. 7, no. 2, pp. 262-274, Feb. 2008.
[10] L. P. Chew, "Planning the shortest path for a disc in O (n2 log N) time," in Proc. ACM Symp. Computational Geometry, 1985, pp. 214-219...............
[2] Yong Wang, Garhan Attebury and Byrav Ramamurthy "A Survey Of Security Issues In Wireless Sensor Networks" IEEE Communications surveys, The Electrinoc Magazine of Original Peer-Reviewed Survey Articles, Volume 8, No. 2, 2006.
[3] Y.C. Wang and Y.C. Tseng, "Intentional Mobility in Wireless Sensor Networks," Wireless Networks: Research, Technology and Applications, Nova Science Publishers, 2009.
[4] M.A. Batalin, M. Rahimi, Y. Yu, D. Liu, A. Kansal, G.S. Sukhatme, W.J. Kaiser, M. Hansen, G.J. Pottie, M. Srivastava, and D. Estrin, "Call and Response: Experiments in Sampling the Environment," Proc. ACM Int'l Conf. Embedded Networked Sensor Systems, pp. 25- 38, 2004.
[5] Y.C. Tseng, Y.C. Wang, K.Y. Cheng, and Y.Y. Hsieh, "iMouse: An Integrated Mobile Surveillance and Wireless Sensor System," Computer, vol. 40, no. 6, pp. 60-66, June 2007.
[6] Y.C. Wang, W.C. Peng, and Y.C. Tseng, "Energy-balanced Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Network," IEEE Trans. On parallel and distributed systems, vol. 21, no. 12, December. 2010.
[7] A. Verma, H. Sawant, and J. Tan, "Selection and Navigation of Mobile Sensor Nodes Using a Sensor Network," Pervasive and Mobile Computing, vol. 2, no. 1, pp. 65-84, 2006.
[8] Y.C. Wang and Y.C. Tseng, "Distributed Deployment Schemes for Mobile Wireless Sensor Networks to Ensure Multilevel Coverage," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 9, pp. 1280-1294, Sept. 2008.
[9] Y.C. Wang, C.C. Hu, and Y.C. Tseng, "Efficient Placement and Dispatch of Sensors in a Wireless Sensor Network," IEEE Trans. Mobile Computing, vol. 7, no. 2, pp. 262-274, Feb. 2008.
[10] L. P. Chew, "Planning the shortest path for a disc in O (n2 log N) time," in Proc. ACM Symp. Computational Geometry, 1985, pp. 214-219...............