SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING  
TECHNOLOGY (IJCET) 
ISSN 0976 – 6367(Print) 
ISSN 0976 – 6375(Online) 
Volume 5, Issue 7, July (2014), pp. 48-54 
© IAEME: www.iaeme.com/IJCET.asp 
Journal Impact Factor (2014): 8.5328 (Calculated by GISI) 
www.jifactor.com 
48 
 
 
IJCET 
© I A E M E 
A CONSTRUCTIVE AND DYNAMIC FRAME WORK FOR REQUIREMENT 
ENGINEERING PROCESS MODEL – BEE HIVE MODEL 
Swarnalatha K S1, G.N Srinivasan2, Pooja S Bhandary3 
R V College of Engineering 
Mysore Road, R V Vidyanikethan Post, Bangalore, Karnataka 560059 
ABSTRACT 
Despite of many advances in design of complex software development there remains the 
problem of highly inadequately specifying the requirements form the stakeholders for any real time 
application. This paper mainly focuses on BEE-HIVE model based process for requirement process 
model. BEE-HIVE MODEL driven development fits in any evolutionary and conventional 
prototyping because design and analysis key parts of any software development process. A BEE-HIVE 
model is applied to increase speed up and also to check the time required to gather the data 
from the stake holders in designing the prototype. The BEEHIVE model may ensure the correctness 
of the timely generated code, which is another important factor in enabling the software development 
designing the prototype. The BEEHIVE model may ensure the correctness of the timely generated 
code, which is another important factor in enabling the software development. 
Keywords: Bee-Hive Model, Requirement Specification, Security, Prototyping, Elicitation and 
Analysis. 
1. INTRODUCTION 
The Success of any software system is the level of degree to which it meets the purpose of the 
customers or stake holders. Therefore, requirements engineering plays a vital role for successful 
completion of any projects. Requirements engineering commonly defined as a part of software 
engineering which is mainly concerned with real world entities, constraints from stake holders on a 
complex software systems. Requirements engineering facilitates the converts the informal 
requirements to formal specifications, which serve stakeholders for any real time application. This 
paper mainly focuses on BEE-HIVE model based process for requirement process model. BEE-HIVE 
MODEL driven development fits in any evolutionary and conventional prototyping because 
design and analysis key parts of any software development process. A BEE-HIVE model is applied
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
to increase speed up and also to check the time required to gather the data from the stake holders inas 
the basis for design and development of the software [1]. The proposed The Bee-Hive model 
attempts to find a compromise between two conventional and tested models of requirements 
engineering which are waterfall model and evolutionary development model in such a way that the 
advantages of both the models are effectively incorporated into the system and at the same time 
trying to reduce and overcome the shortcomings and disadvantages [2]. In other words it tries to 
maximise the gains while minimizing the disadvantages. 
49 
2. CONVENTIONAL APPROACH 
 
Requirements Engineering is the process of understanding and defining what services are 
required from the system and identifying the constraints on the system’s operation and development 
[3]. It is an extremely important phase as the success of the subsequent phases directly and indirectly 
depend on the efficiency with which requirements engineering is carried out. 
A strong and robust building needs a sound foundation [4]. This analogy can be extended to 
the softwareengineering process where the Requirements engineering process can be considered as 
the foundation [5]. Hence, it is imperative that novel and efficient techniques of requirements 
engineering should be developed. 
The conventional requirements engineering processes have the following disadvantages: 
1) Time consuming [7]. 
2) Too orthodox i.e. either follow the waterfall or iterative development model. 
3) Too much documentation [8]. 
No clear segregation into system, user and domain requirements. 
3. BEE-HIVE MODEL -APPROACH 
We have tried to overcome the disadvantages of conventional approach by using a novel and 
innovative model called the bee-hive model. It is called a bee-hive model because the structure at the 
centre is in the shape of a bee-hive. The fig 1 below shows the overview of BEE-hive model. 
4 PHASES OF BEE-HIVE MODEL 
4.1 Background Research 
This is the first phase in the requirements engineering model. This can be compared to the 
feasibility step in the conventional models. But unlike feasibility study which is one dimensional and 
only focuses on whether the proposed system is cost-effective or not and if it lies within the required 
budget the background research is carried out in specific areas related to the project [9] . The areas of 
background research considered here are generic and can be applied to most of the project 
undertaking.The areas of background research are:
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
50 
 
Fig 1: BEE-Hive model 
1. Application Domain 
Determines the feasibility of the application platform proposed to implement the project. 
Research is done based on considering the current platforms and facilities available and analysing 
whether they are good enough to support the project[ 10]. If the current resources are found 
inadequate then it is determined whether developing new and application specific resources and 
facilities are feasible or not. Criteria for choosing the application domain are listed below. 
 Available technology. 
 The platform to be selected. 
 Required software and hardware. 
 Decision whether new technology is to be developed or not.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
51 
2. Scope of evolution 
 
This phase is used to predict the kind of future the product or the service developed has. This 
phase is used to predict the changes it might be subjected to in the future. Depending on the level and 
the rate of changes it might be subjected either time or quality is set as the critical factor. For 
example, if a software is changed every 3 months then time is the critical factor here. If on the other 
hand the software is to be used for a longer lifetime quality is the critical factor.Criteria for choosing 
the scope of the product are listed below. 
 The novelty of the product. 
 Shelf-life of the product. 
 The kind of acceptance garnered by the product (More popular technologies have a better 
scope of evolution). 
 Future need of such aproduct/technology. (Try and produce a reliable prediction). 
3. Organisational factors 
Constitutes the organisational policies, laws, staff, growth plan and resources available in the 
company in terms of capital and technology owned by it. 
Criteria for choosing the Organisational factors are listed below. 
 Management hierarchy. 
 Company policy. 
 Proprietary products available to support research and technology. 
 The financial condition of the company that affects the budget. 
4. Market 
This phase used to determine the current competition in the market, the need and aspiration 
for the product or service being developed.Criteria for choosing market for the product are listed 
below. 
 Current Competition in the market. 
 Previous response to similar products/technologies. 
 The demand and the need of the product/technology to be released. 
 The market trends and conditions. 
5. Scale check 
This basically determines the scale on which the product or service is to be released. Based 
on the estimated profit margin the scale is determined and correspondingly the amount of money to 
be invested into it is determined.Criteria to check scalability of the product are listed below. 
 The budget for marketing and distribution. 
 The investment on the product. 
 The expectations out of the product/technology. 
 The brand name and the reputation of the company. 
Advantages 
 Feasibility study can be carried out parallel in each of the above specified areas. 
 It does not hold up the requirement elicitation and analysis of other unrelated areas. 
 Talent and skills of people can be mobilized. People who are good at a particular area can be 
allotted work in that particular area.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
52 
 
 Based on the application, different areas are given different precedence’s or importance 
depending on how critical that aspect is to the application. 
 Based on the importance of the different areas of feasibility study a rank is given to each area 
and the area with the higher rank is given more importance and more time and effort is spent 
on its feasibility study. If in a high grade area of say 1 or 2, project is found unfeasible it is 
scrapped. Between 3 and 4 grade if found unfeasible then it is manageable but advisable to 
work on and improve the feasibility. Between 5 and 6 grades if risk involved is not too high 
then the problems in this area are avoided. 
6. Safety and Security 
Whether the product to be developed is safe to use and whether it can assure security against data 
theft and loss [11]. .Criteria for choosing the safety and security of product are listed below. 
 Vulnerability to loss of data or other damages. 
 Preserving data integrity. 
 Data backup and back up plans for the facility if an accident occurs. 
 Recovery mechanisms if something should go wrong. 
4.2 Requirements Elicitation and Analysis 
This phase is carried out as a continuation to the feasibility study carried out in different 
areas. Because the Feasibility study was very specific the requirement elicitation and analysis is 
simplified to a great extent. As mentioned above requirement elicitation and analysis process is sped 
up because of greater clarity and non-dependence on areas that do not affect it [12]. This phase 
generates the want requirements which are the requirements that the customer or user expects and 
requires. 
4.3Prototyping 
A prototype is developed to evaluate the performance of the current system and find out the 
requirements that are satisfied by the system. This constitutes the have requirements. 
4.4 Requirement Verification and validation 
Here a Venn diagram is drawn between the have and the want requirements as specified 
above. Based on the level of intersection the success of that particular area of research is determined. 
The level of intersection indicates the extent to which the prototype satisfies the user’s needs and 
expectations [13]. 
To indicate a successful model a certain ideal percentage of intersection is assigned to each 
area based on its grade. If the ideal percentage criteria is met in all the areas then it can be considered 
a complete model. 
Advantages 
 If a particular area falls back on the intersection criteria and does not meet it then work needs to 
be done only in that particular area and the entire process need not be repeated. 
 Based on the grade of a particular area the intersection criteria is allotted. Hence too much time 
need not be invested in areas where too much efficiency is not required. 
4.5 Requirement Specification 
Only those requirements that lie in the intersection region are documented. Hence the 
documentation cost and time is greatly reduced as requirements that are irrelevant are not
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
documented [14]. Also as each area generates its own requirements itsmanagement is simpler 
because the volume of data generated is greatly reduced. Each area of background research generated 
requirements specific to that area [16]. The application domain produces the domain requirements. 
The market research produces the user requirements. Safety and security produces critical system 
requirements. Scope and organisation produces system requirements. Hence an easy segregation of 
requirements is achieved. 
The advantage of the Bee-hive model is listed below: 
53 
5. BEE-HIVE MODEL – ADVANTAGES 
 
1. It is a combination of both parallel and serial model. While the phases of feasibility study are 
carried out parallel, the flow of control within a particular area is sequential. 
2. It is a good combination of waterfall and evolutionary development model. 
3. Each phase in the feasibility study is largely independent of other areas and if one area fails 
the negative effects on other areas are reduced to a great extent. 
4. Helps us to identify the critical requirements and helps us to focus on the important 
requirements and not waste time on the others. 
5. There is a scope for compromise and imperfections in the system as a few non critical errors 
cannot directly affect the system. 
6. Once the feasibility study is complete the rest of the processes can be completed with relative 
ease. 
Future Enhancement 
Critics may argue that feasibility study in the requirements engineering process should be 
quick and easy. But if the added complexity and time consumption can ensure the efficiency of the 
subsequent processes at large and reduce the time taken by them then the trade-off is acceptable. 
CONCLUSION 
It is roughly calculate that to fix an any kind of defect found during requirements engineering 
process model cost twice the modelling and delivering the new product .This asserts the important 
role of requirements engineering in any software development process. Requirement prototyping 
plays vital role in requirements elicitation technique that can help identify any defects at an initial 
stage and make the project more successful. We have proposed a BEE-Hive model based for 
requirements engineering. 
REFERENCES 
[1]. Pandey, D., Suman, U.  Ramani, A.K., 2013. An Effective Requirement Engineering 
Process Model for Software Development and Requirements Management. 2013 
International Conference on Advances in Recent Technologies in Communication and 
Computing, 0, p.287-291. 
[2]. Arif.S., Khan. Q.  Gahyyur. S.A.K., (2012-2012). Requirement Engineering Processes, 
Tools/Technologies,  Methodologies, International Journal of Reviews in Computing 
(IJRIC), ISSN: 2076-3328, Vol.2. 
[3]. Paetsch, F., Eberlein, A.  Maurer, F., (2013). Requirements engineering and agile software 
development. WET ICE 2013 Proceedings Twelfth IEEE International Workshops on 
Enabling Technologies Infrastructure for Collaborative Enterprises 2013, 2(3), p.308-313.
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), 
ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 
54 
 
[4]. Pandey, S. K. and Batra, Mona 2013. Formal Methods in Requirements Phase of SDLC. 
International Journal of Computer Applications. Published by Foundation of Computer 
Science. New York. USA.pp.7-14. 
[5]. Pandey, S. K. and Mustafa, K. 2010. Risk Assessment Framework (RAF). International 
Journal of Advanced Research in Computer Science. Vol. 01. pp. 423-432. 
[6]. Social Innovator: Ethnography research techniques, Last Retrieved on July 20, 2013 
http://www.socialinnovator.info/process-social-innovation/prompts-and-inspirations/research-and- 
mapping/ethnographic-research-techniques. 
[7]. http://www.cs.toronto.edu/~sme/CSC2106S/slides/04-elicitation-techniques.pdf, 
Last Retrieved on July 13, 2013. 
[8]. AzlenaHaron and ShamsulSahibuddin, The Strength and Weakness of Requirement 
Engineering (RE) Process, presented at the ICCTD 2012: 2012 the 2nd International 
Conference on Computer Technology and Development, Cairo, Egypt, 2012. 
[9]. B. Mutschler, M. Reichert, and J. Bumiller, Unleashing the Effectiveness of Process- 
Oriented Information Systems: Problem Analysis, Critical Success Factors, and 
Implications, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications 
and Reviews, vol. 38, no. 3, pp. 280-291, 2008. 
[10]. Jiang-Ping, W., H. De-Yi and D. Wan, 2009. Knowledge conversion in software 
requirement elicitation. Proceeding of the 1st International Conference on Information 
Science and Engineering (ICISE), Sch. of Bus. Adm., SCUT, Guangzhou, China, 
pp: 2328-2331. 
[11]. Liu, L. and L. Lin, 2012. ARED-CK: An automated requirements elicitation approach based 
on decision-making with complete knowledge. Proceeding of the 1st IEEE International 
Workshop on Managing Requirements Knowledge, Sch. of Software, Tsinghua Univ., 
Beijing, pp: 47-52. 
[12]. Mishra, D., A. Mishra and A. Yazici, 2012. Successful requirement elicitation by combining 
requirement engineering techniques. Proceeding of the 1st IEEE International Conference on 
the Applications of Digital Information and Web Technologies, Dept. of Comput. Eng., 
Atilim Uni., Ankara, pp: 258-263. 
[13]. Ramsin, R. and R.F. Paige, 2011. Iterative criteria-based approach to engineering the 
requirements of software development methodologies. IET Software, 4(2): 91-104. 
[14]. Sharp, H., C.W.A. Finkelstein and H. Galal, 1999. Stakeholder identification in the 
requirements engineering process. Proceeding of the 10th IEEE International Workshop on 
Database and Expert Systems Applications, Centre for HCI Design, City Univ., London, 
UK, pp: 387-391. 
[15]. Singh, Y., P.K. Bhatia and O. Sangwan, 2007. A review of studies on machine learning 
Techniques. Int. J. Comp. Sci. Secur., 1(1): 70-84. 
[16]. Wongthongtham, P., E. Chang, T.S. Dillon and I. Sommerville, 2009. Development of a 
software engineering ontology for multisite software development. IEEE Trans. Knowl. 
Data Eng., 21(8): 1205-1217. 
[17]. N. Sivakumar, Dr. P. Sivaraman, N. Tamilselvan and Dr. R. Sevukan, “User Expectations 
and Requirements in the Knowledge Society in Digital Era”, International Journal of 
Computer Engineering  Technology (IJCET), Volume 3, Issue 1, 2012, pp. 38 - 43, 
ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 
[18]. P.Salini and S.Kanmani, “A Model Based Security Requirements Engineering Framework”, 
International Journal of Computer Engineering  Technology (IJCET), Volume 1, Issue 1, 
2010, pp. 180 - 195, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

Contenu connexe

Tendances

IRJET- A Case Study Analysis through the Implementation of Value Engineering
IRJET- A Case Study Analysis through the Implementation of Value EngineeringIRJET- A Case Study Analysis through the Implementation of Value Engineering
IRJET- A Case Study Analysis through the Implementation of Value EngineeringIRJET Journal
 
IRJET- A Study on Project Management Techniques to Avoid Project Failure
IRJET- A Study on Project Management Techniques to Avoid Project FailureIRJET- A Study on Project Management Techniques to Avoid Project Failure
IRJET- A Study on Project Management Techniques to Avoid Project FailureIRJET Journal
 
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...IJSRED
 
Safety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectsSafety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectseSAT Publishing House
 
Safety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectsSafety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectseSAT Journals
 
Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing AM Publications,India
 
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...IRJET- Development of Conceptual Model for Effective Selection of Subcontract...
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...IRJET Journal
 
Software process and product quality assurance in it organizations
Software process and product quality assurance in it organizationsSoftware process and product quality assurance in it organizations
Software process and product quality assurance in it organizationsiaemedu
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...ijmpict
 
The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...amiraiti
 
IRJET- Decision Making in Construction Management using AHP and Expert Ch...
IRJET-  	  Decision Making in Construction Management using AHP and Expert Ch...IRJET-  	  Decision Making in Construction Management using AHP and Expert Ch...
IRJET- Decision Making in Construction Management using AHP and Expert Ch...IRJET Journal
 
IRJET- Productivity Improvement in Construction Industry using Automation Tec...
IRJET- Productivity Improvement in Construction Industry using Automation Tec...IRJET- Productivity Improvement in Construction Industry using Automation Tec...
IRJET- Productivity Improvement in Construction Industry using Automation Tec...IRJET Journal
 
Adaptive fuzzy hierarchical cumulative voting a novel approach toward requir...
Adaptive fuzzy hierarchical cumulative voting  a novel approach toward requir...Adaptive fuzzy hierarchical cumulative voting  a novel approach toward requir...
Adaptive fuzzy hierarchical cumulative voting a novel approach toward requir...eSAT Journals
 

Tendances (17)

D0704014018
D0704014018D0704014018
D0704014018
 
IJMSE Paper
IJMSE PaperIJMSE Paper
IJMSE Paper
 
IRJET- A Case Study Analysis through the Implementation of Value Engineering
IRJET- A Case Study Analysis through the Implementation of Value EngineeringIRJET- A Case Study Analysis through the Implementation of Value Engineering
IRJET- A Case Study Analysis through the Implementation of Value Engineering
 
IRJET- A Study on Project Management Techniques to Avoid Project Failure
IRJET- A Study on Project Management Techniques to Avoid Project FailureIRJET- A Study on Project Management Techniques to Avoid Project Failure
IRJET- A Study on Project Management Techniques to Avoid Project Failure
 
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...
Construction Site Monitoring and Predictive Analysis Using Artificial Neural ...
 
Safety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectsSafety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projects
 
Safety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projectsSafety and health risk assessment at oman building construction projects
Safety and health risk assessment at oman building construction projects
 
Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing Benefits of Automated Testing Over Manual Testing
Benefits of Automated Testing Over Manual Testing
 
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...IRJET- Development of Conceptual Model for Effective Selection of Subcontract...
IRJET- Development of Conceptual Model for Effective Selection of Subcontract...
 
project management
project managementproject management
project management
 
Software process and product quality assurance in it organizations
Software process and product quality assurance in it organizationsSoftware process and product quality assurance in it organizations
Software process and product quality assurance in it organizations
 
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
 
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
Transitioning IT Projects to Operations Effectively in Public Sector : A Case...
 
The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...The result of applying a new testing model for improving the quality of softw...
The result of applying a new testing model for improving the quality of softw...
 
IRJET- Decision Making in Construction Management using AHP and Expert Ch...
IRJET-  	  Decision Making in Construction Management using AHP and Expert Ch...IRJET-  	  Decision Making in Construction Management using AHP and Expert Ch...
IRJET- Decision Making in Construction Management using AHP and Expert Ch...
 
IRJET- Productivity Improvement in Construction Industry using Automation Tec...
IRJET- Productivity Improvement in Construction Industry using Automation Tec...IRJET- Productivity Improvement in Construction Industry using Automation Tec...
IRJET- Productivity Improvement in Construction Industry using Automation Tec...
 
Adaptive fuzzy hierarchical cumulative voting a novel approach toward requir...
Adaptive fuzzy hierarchical cumulative voting  a novel approach toward requir...Adaptive fuzzy hierarchical cumulative voting  a novel approach toward requir...
Adaptive fuzzy hierarchical cumulative voting a novel approach toward requir...
 

En vedette (20)

Economic defintions semsester 2 2011
Economic defintions semsester 2 2011Economic defintions semsester 2 2011
Economic defintions semsester 2 2011
 
Superfoods revised
Superfoods revisedSuperfoods revised
Superfoods revised
 
TQAADLIwooddy2001
TQAADLIwooddy2001TQAADLIwooddy2001
TQAADLIwooddy2001
 
2010 SDBN Poll
2010 SDBN Poll2010 SDBN Poll
2010 SDBN Poll
 
001
001001
001
 
What It Means To Be A Tis Lm
What It Means To Be A Tis LmWhat It Means To Be A Tis Lm
What It Means To Be A Tis Lm
 
2013
20132013
2013
 
Bradbury06
Bradbury06Bradbury06
Bradbury06
 
Cbsr detailed
Cbsr detailedCbsr detailed
Cbsr detailed
 
Comparing PC
Comparing PCComparing PC
Comparing PC
 
Are we there yet? Searching for the bottom of the recession of 2007
Are we there yet? Searching for the bottom of the recession of 2007Are we there yet? Searching for the bottom of the recession of 2007
Are we there yet? Searching for the bottom of the recession of 2007
 
Wbbitinerary
WbbitineraryWbbitinerary
Wbbitinerary
 
Oct 25
Oct 25Oct 25
Oct 25
 
Pcs Binder
Pcs BinderPcs Binder
Pcs Binder
 
E-COMB
E-COMBE-COMB
E-COMB
 
Test pdf
Test pdfTest pdf
Test pdf
 
Bioerg in english
Bioerg in englishBioerg in english
Bioerg in english
 
New Year, New You PowerPoint 2013
New Year, New You PowerPoint 2013New Year, New You PowerPoint 2013
New Year, New You PowerPoint 2013
 
Butlleti 27
Butlleti 27Butlleti 27
Butlleti 27
 
Managerial economics
Managerial economicsManagerial economics
Managerial economics
 

Similaire à 50120140507007

Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsiaemedu
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product developmentiaemedu
 
A study of critical success factors for adaption of agile methodology
A study of critical success factors for adaption of agile methodologyA study of critical success factors for adaption of agile methodology
A study of critical success factors for adaption of agile methodologyIAEME Publication
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
 
30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)IAESIJEECS
 
30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)IAESIJEECS
 
An Empirical Study of the Improved SPLD Framework using Expert Opinion Technique
An Empirical Study of the Improved SPLD Framework using Expert Opinion TechniqueAn Empirical Study of the Improved SPLD Framework using Expert Opinion Technique
An Empirical Study of the Improved SPLD Framework using Expert Opinion TechniqueIJEACS
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and HearingIRJET Journal
 
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...ijseajournal
 
A Systematic Review On Software Cost Estimation In Agile Software Development
A Systematic Review On Software Cost Estimation In Agile Software DevelopmentA Systematic Review On Software Cost Estimation In Agile Software Development
A Systematic Review On Software Cost Estimation In Agile Software DevelopmentBrooke Heidt
 
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...zillesubhan
 
http___www.irma-international.org_viewtitle_32970_
http___www.irma-international.org_viewtitle_32970_http___www.irma-international.org_viewtitle_32970_
http___www.irma-international.org_viewtitle_32970_Abdul Hakeem
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsIAESIJAI
 
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECTREQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECTAM Publications,India
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionIRJET Journal
 

Similaire à 50120140507007 (20)

Software process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various modelsSoftware process methodologies and a comparative study of various models
Software process methodologies and a comparative study of various models
 
50120130405029
5012013040502950120130405029
50120130405029
 
Software metric analysis methods for product development
Software metric analysis methods for product developmentSoftware metric analysis methods for product development
Software metric analysis methods for product development
 
A study of critical success factors for adaption of agile methodology
A study of critical success factors for adaption of agile methodologyA study of critical success factors for adaption of agile methodology
A study of critical success factors for adaption of agile methodology
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
 
Ijetcas14 545
Ijetcas14 545Ijetcas14 545
Ijetcas14 545
 
30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)
 
30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)30 8948 prakash paper64 (edit ndit)
30 8948 prakash paper64 (edit ndit)
 
An Empirical Study of the Improved SPLD Framework using Expert Opinion Technique
An Empirical Study of the Improved SPLD Framework using Expert Opinion TechniqueAn Empirical Study of the Improved SPLD Framework using Expert Opinion Technique
An Empirical Study of the Improved SPLD Framework using Expert Opinion Technique
 
IRJET- Speech and Hearing
IRJET- Speech and HearingIRJET- Speech and Hearing
IRJET- Speech and Hearing
 
20120140506013
2012014050601320120140506013
20120140506013
 
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...
A MAPPING MODEL FOR TRANSFORMING TRADITIONAL SOFTWARE DEVELOPMENT METHODS TO ...
 
A Systematic Review On Software Cost Estimation In Agile Software Development
A Systematic Review On Software Cost Estimation In Agile Software DevelopmentA Systematic Review On Software Cost Estimation In Agile Software Development
A Systematic Review On Software Cost Estimation In Agile Software Development
 
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...Integrated Analysis of Traditional Requirements Engineering Process with Agil...
Integrated Analysis of Traditional Requirements Engineering Process with Agil...
 
http___www.irma-international.org_viewtitle_32970_
http___www.irma-international.org_viewtitle_32970_http___www.irma-international.org_viewtitle_32970_
http___www.irma-international.org_viewtitle_32970_
 
Ijm 06 10_008
Ijm 06 10_008Ijm 06 10_008
Ijm 06 10_008
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methods
 
P44098087
P44098087P44098087
P44098087
 
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECTREQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
REQUIREMENT ENGINEERING: HOW TO MAKE IT COMPLETE AND CORRECT
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps Adoption
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Dernier

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 

Dernier (20)

Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 

50120140507007

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2014): 8.5328 (Calculated by GISI) www.jifactor.com 48 IJCET © I A E M E A CONSTRUCTIVE AND DYNAMIC FRAME WORK FOR REQUIREMENT ENGINEERING PROCESS MODEL – BEE HIVE MODEL Swarnalatha K S1, G.N Srinivasan2, Pooja S Bhandary3 R V College of Engineering Mysore Road, R V Vidyanikethan Post, Bangalore, Karnataka 560059 ABSTRACT Despite of many advances in design of complex software development there remains the problem of highly inadequately specifying the requirements form the stakeholders for any real time application. This paper mainly focuses on BEE-HIVE model based process for requirement process model. BEE-HIVE MODEL driven development fits in any evolutionary and conventional prototyping because design and analysis key parts of any software development process. A BEE-HIVE model is applied to increase speed up and also to check the time required to gather the data from the stake holders in designing the prototype. The BEEHIVE model may ensure the correctness of the timely generated code, which is another important factor in enabling the software development designing the prototype. The BEEHIVE model may ensure the correctness of the timely generated code, which is another important factor in enabling the software development. Keywords: Bee-Hive Model, Requirement Specification, Security, Prototyping, Elicitation and Analysis. 1. INTRODUCTION The Success of any software system is the level of degree to which it meets the purpose of the customers or stake holders. Therefore, requirements engineering plays a vital role for successful completion of any projects. Requirements engineering commonly defined as a part of software engineering which is mainly concerned with real world entities, constraints from stake holders on a complex software systems. Requirements engineering facilitates the converts the informal requirements to formal specifications, which serve stakeholders for any real time application. This paper mainly focuses on BEE-HIVE model based process for requirement process model. BEE-HIVE MODEL driven development fits in any evolutionary and conventional prototyping because design and analysis key parts of any software development process. A BEE-HIVE model is applied
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME to increase speed up and also to check the time required to gather the data from the stake holders inas the basis for design and development of the software [1]. The proposed The Bee-Hive model attempts to find a compromise between two conventional and tested models of requirements engineering which are waterfall model and evolutionary development model in such a way that the advantages of both the models are effectively incorporated into the system and at the same time trying to reduce and overcome the shortcomings and disadvantages [2]. In other words it tries to maximise the gains while minimizing the disadvantages. 49 2. CONVENTIONAL APPROACH Requirements Engineering is the process of understanding and defining what services are required from the system and identifying the constraints on the system’s operation and development [3]. It is an extremely important phase as the success of the subsequent phases directly and indirectly depend on the efficiency with which requirements engineering is carried out. A strong and robust building needs a sound foundation [4]. This analogy can be extended to the softwareengineering process where the Requirements engineering process can be considered as the foundation [5]. Hence, it is imperative that novel and efficient techniques of requirements engineering should be developed. The conventional requirements engineering processes have the following disadvantages: 1) Time consuming [7]. 2) Too orthodox i.e. either follow the waterfall or iterative development model. 3) Too much documentation [8]. No clear segregation into system, user and domain requirements. 3. BEE-HIVE MODEL -APPROACH We have tried to overcome the disadvantages of conventional approach by using a novel and innovative model called the bee-hive model. It is called a bee-hive model because the structure at the centre is in the shape of a bee-hive. The fig 1 below shows the overview of BEE-hive model. 4 PHASES OF BEE-HIVE MODEL 4.1 Background Research This is the first phase in the requirements engineering model. This can be compared to the feasibility step in the conventional models. But unlike feasibility study which is one dimensional and only focuses on whether the proposed system is cost-effective or not and if it lies within the required budget the background research is carried out in specific areas related to the project [9] . The areas of background research considered here are generic and can be applied to most of the project undertaking.The areas of background research are:
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 50 Fig 1: BEE-Hive model 1. Application Domain Determines the feasibility of the application platform proposed to implement the project. Research is done based on considering the current platforms and facilities available and analysing whether they are good enough to support the project[ 10]. If the current resources are found inadequate then it is determined whether developing new and application specific resources and facilities are feasible or not. Criteria for choosing the application domain are listed below. Available technology. The platform to be selected. Required software and hardware. Decision whether new technology is to be developed or not.
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 51 2. Scope of evolution This phase is used to predict the kind of future the product or the service developed has. This phase is used to predict the changes it might be subjected to in the future. Depending on the level and the rate of changes it might be subjected either time or quality is set as the critical factor. For example, if a software is changed every 3 months then time is the critical factor here. If on the other hand the software is to be used for a longer lifetime quality is the critical factor.Criteria for choosing the scope of the product are listed below. The novelty of the product. Shelf-life of the product. The kind of acceptance garnered by the product (More popular technologies have a better scope of evolution). Future need of such aproduct/technology. (Try and produce a reliable prediction). 3. Organisational factors Constitutes the organisational policies, laws, staff, growth plan and resources available in the company in terms of capital and technology owned by it. Criteria for choosing the Organisational factors are listed below. Management hierarchy. Company policy. Proprietary products available to support research and technology. The financial condition of the company that affects the budget. 4. Market This phase used to determine the current competition in the market, the need and aspiration for the product or service being developed.Criteria for choosing market for the product are listed below. Current Competition in the market. Previous response to similar products/technologies. The demand and the need of the product/technology to be released. The market trends and conditions. 5. Scale check This basically determines the scale on which the product or service is to be released. Based on the estimated profit margin the scale is determined and correspondingly the amount of money to be invested into it is determined.Criteria to check scalability of the product are listed below. The budget for marketing and distribution. The investment on the product. The expectations out of the product/technology. The brand name and the reputation of the company. Advantages Feasibility study can be carried out parallel in each of the above specified areas. It does not hold up the requirement elicitation and analysis of other unrelated areas. Talent and skills of people can be mobilized. People who are good at a particular area can be allotted work in that particular area.
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 52 Based on the application, different areas are given different precedence’s or importance depending on how critical that aspect is to the application. Based on the importance of the different areas of feasibility study a rank is given to each area and the area with the higher rank is given more importance and more time and effort is spent on its feasibility study. If in a high grade area of say 1 or 2, project is found unfeasible it is scrapped. Between 3 and 4 grade if found unfeasible then it is manageable but advisable to work on and improve the feasibility. Between 5 and 6 grades if risk involved is not too high then the problems in this area are avoided. 6. Safety and Security Whether the product to be developed is safe to use and whether it can assure security against data theft and loss [11]. .Criteria for choosing the safety and security of product are listed below. Vulnerability to loss of data or other damages. Preserving data integrity. Data backup and back up plans for the facility if an accident occurs. Recovery mechanisms if something should go wrong. 4.2 Requirements Elicitation and Analysis This phase is carried out as a continuation to the feasibility study carried out in different areas. Because the Feasibility study was very specific the requirement elicitation and analysis is simplified to a great extent. As mentioned above requirement elicitation and analysis process is sped up because of greater clarity and non-dependence on areas that do not affect it [12]. This phase generates the want requirements which are the requirements that the customer or user expects and requires. 4.3Prototyping A prototype is developed to evaluate the performance of the current system and find out the requirements that are satisfied by the system. This constitutes the have requirements. 4.4 Requirement Verification and validation Here a Venn diagram is drawn between the have and the want requirements as specified above. Based on the level of intersection the success of that particular area of research is determined. The level of intersection indicates the extent to which the prototype satisfies the user’s needs and expectations [13]. To indicate a successful model a certain ideal percentage of intersection is assigned to each area based on its grade. If the ideal percentage criteria is met in all the areas then it can be considered a complete model. Advantages If a particular area falls back on the intersection criteria and does not meet it then work needs to be done only in that particular area and the entire process need not be repeated. Based on the grade of a particular area the intersection criteria is allotted. Hence too much time need not be invested in areas where too much efficiency is not required. 4.5 Requirement Specification Only those requirements that lie in the intersection region are documented. Hence the documentation cost and time is greatly reduced as requirements that are irrelevant are not
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME documented [14]. Also as each area generates its own requirements itsmanagement is simpler because the volume of data generated is greatly reduced. Each area of background research generated requirements specific to that area [16]. The application domain produces the domain requirements. The market research produces the user requirements. Safety and security produces critical system requirements. Scope and organisation produces system requirements. Hence an easy segregation of requirements is achieved. The advantage of the Bee-hive model is listed below: 53 5. BEE-HIVE MODEL – ADVANTAGES 1. It is a combination of both parallel and serial model. While the phases of feasibility study are carried out parallel, the flow of control within a particular area is sequential. 2. It is a good combination of waterfall and evolutionary development model. 3. Each phase in the feasibility study is largely independent of other areas and if one area fails the negative effects on other areas are reduced to a great extent. 4. Helps us to identify the critical requirements and helps us to focus on the important requirements and not waste time on the others. 5. There is a scope for compromise and imperfections in the system as a few non critical errors cannot directly affect the system. 6. Once the feasibility study is complete the rest of the processes can be completed with relative ease. Future Enhancement Critics may argue that feasibility study in the requirements engineering process should be quick and easy. But if the added complexity and time consumption can ensure the efficiency of the subsequent processes at large and reduce the time taken by them then the trade-off is acceptable. CONCLUSION It is roughly calculate that to fix an any kind of defect found during requirements engineering process model cost twice the modelling and delivering the new product .This asserts the important role of requirements engineering in any software development process. Requirement prototyping plays vital role in requirements elicitation technique that can help identify any defects at an initial stage and make the project more successful. We have proposed a BEE-Hive model based for requirements engineering. REFERENCES [1]. Pandey, D., Suman, U. Ramani, A.K., 2013. An Effective Requirement Engineering Process Model for Software Development and Requirements Management. 2013 International Conference on Advances in Recent Technologies in Communication and Computing, 0, p.287-291. [2]. Arif.S., Khan. Q. Gahyyur. S.A.K., (2012-2012). Requirement Engineering Processes, Tools/Technologies, Methodologies, International Journal of Reviews in Computing (IJRIC), ISSN: 2076-3328, Vol.2. [3]. Paetsch, F., Eberlein, A. Maurer, F., (2013). Requirements engineering and agile software development. WET ICE 2013 Proceedings Twelfth IEEE International Workshops on Enabling Technologies Infrastructure for Collaborative Enterprises 2013, 2(3), p.308-313.
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 7, July (2014), pp. 48-54 © IAEME 54 [4]. Pandey, S. K. and Batra, Mona 2013. Formal Methods in Requirements Phase of SDLC. International Journal of Computer Applications. Published by Foundation of Computer Science. New York. USA.pp.7-14. [5]. Pandey, S. K. and Mustafa, K. 2010. Risk Assessment Framework (RAF). International Journal of Advanced Research in Computer Science. Vol. 01. pp. 423-432. [6]. Social Innovator: Ethnography research techniques, Last Retrieved on July 20, 2013 http://www.socialinnovator.info/process-social-innovation/prompts-and-inspirations/research-and- mapping/ethnographic-research-techniques. [7]. http://www.cs.toronto.edu/~sme/CSC2106S/slides/04-elicitation-techniques.pdf, Last Retrieved on July 13, 2013. [8]. AzlenaHaron and ShamsulSahibuddin, The Strength and Weakness of Requirement Engineering (RE) Process, presented at the ICCTD 2012: 2012 the 2nd International Conference on Computer Technology and Development, Cairo, Egypt, 2012. [9]. B. Mutschler, M. Reichert, and J. Bumiller, Unleashing the Effectiveness of Process- Oriented Information Systems: Problem Analysis, Critical Success Factors, and Implications, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, vol. 38, no. 3, pp. 280-291, 2008. [10]. Jiang-Ping, W., H. De-Yi and D. Wan, 2009. Knowledge conversion in software requirement elicitation. Proceeding of the 1st International Conference on Information Science and Engineering (ICISE), Sch. of Bus. Adm., SCUT, Guangzhou, China, pp: 2328-2331. [11]. Liu, L. and L. Lin, 2012. ARED-CK: An automated requirements elicitation approach based on decision-making with complete knowledge. Proceeding of the 1st IEEE International Workshop on Managing Requirements Knowledge, Sch. of Software, Tsinghua Univ., Beijing, pp: 47-52. [12]. Mishra, D., A. Mishra and A. Yazici, 2012. Successful requirement elicitation by combining requirement engineering techniques. Proceeding of the 1st IEEE International Conference on the Applications of Digital Information and Web Technologies, Dept. of Comput. Eng., Atilim Uni., Ankara, pp: 258-263. [13]. Ramsin, R. and R.F. Paige, 2011. Iterative criteria-based approach to engineering the requirements of software development methodologies. IET Software, 4(2): 91-104. [14]. Sharp, H., C.W.A. Finkelstein and H. Galal, 1999. Stakeholder identification in the requirements engineering process. Proceeding of the 10th IEEE International Workshop on Database and Expert Systems Applications, Centre for HCI Design, City Univ., London, UK, pp: 387-391. [15]. Singh, Y., P.K. Bhatia and O. Sangwan, 2007. A review of studies on machine learning Techniques. Int. J. Comp. Sci. Secur., 1(1): 70-84. [16]. Wongthongtham, P., E. Chang, T.S. Dillon and I. Sommerville, 2009. Development of a software engineering ontology for multisite software development. IEEE Trans. Knowl. Data Eng., 21(8): 1205-1217. [17]. N. Sivakumar, Dr. P. Sivaraman, N. Tamilselvan and Dr. R. Sevukan, “User Expectations and Requirements in the Knowledge Society in Digital Era”, International Journal of Computer Engineering Technology (IJCET), Volume 3, Issue 1, 2012, pp. 38 - 43, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [18]. P.Salini and S.Kanmani, “A Model Based Security Requirements Engineering Framework”, International Journal of Computer Engineering Technology (IJCET), Volume 1, Issue 1, 2010, pp. 180 - 195, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.