i-manager's Journal on Software Engineering (JSE)


Volume 14 Issue 4 April - June 2020

Research Paper

Importance of Functional Requirements Prioritization: ODOO ERP as Case Study

Muhammad Yaseen* , Aida Mustapha **, Noraini Ibrahim ***, Atta Ur Rahman ****, Syed Wajid Kamal *****, Ijaz Ahmad ******
*-*** Universiti Tun Hussein Onn Malaysia, Malaysia.
**** COMSATS University Islamabad, Pakistan.
***** Abasyn University, Peshawar, Pakistan.
****** University of Malakand, Chakdara, Pakistan.
Yaseen, M., Mustapha, A., Ibrahim, N., Rahman, A. U., Kamal, S. W., and Ahmad, I. (2020). Importance of Functional Requirements Prioritization: ODOO ERP as Case Study. i-manager's Journal on Software Engineering, 14(4), 1-10. https://doi.org/10.26634/jse.14.4.17726

Abstract

Functional Requirements (FRs) are core low level requirements of software that must be implemented in order to fulfill high level user requirements and business goals. FRs do not exist independently but are inter-related. Identifying pre-requisite FRs are necessary during user requirements prioritization and development of these requirements. For developing large size requirements of enterprises, identifying these pre-requisite FRs are more necessary as some of these requirements are common for more than one module of these enterprises. Using ODOO ERP as case study, importance of identifying dependencies in FRs during prioritization and implementation is discussed in detail. With prioritization, effect of interdependencies in FRs in parallel developer's team members can be significantly reduced. With reduced interdependencies, time implementation and delivery of software requirements can be assured. Using graph-based approach, inter-related FRs are assigned priority values. Prioritized FRs with similar priority are assigned to priority groups. The proposed graph-based approach is applied on FRs of ODOO ERP and prioritized requirements are analyzed based on priority groups of different sizes. The results of analysis show that inter-dependencies in FRs of parallel developers can be reduced priority groups.

Research Paper

Stock Price Prediction based on Finance Related News using NLP, LASSO and ARIMAX

Kalva Sudhakar * , S. Naganjaneyulu **
* Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Kakinada, Andhra Pradesh, India.
** Department of Information Technology, Lakireddy Bali Reddy College of Engineering, Krishna, Andhra Pradesh, India.
Sudhakar, K., and Naganjaneyulu, S. (2020). Stock Price Prediction based on Finance Related News using NLP, LASSO and ARIMAX. i-manager's Journal on Software Engineering, 14(4), 11-19. https://doi.org/10.26634/jse.14.4.17661

Abstract

Stock trends in the finance sector are particularly critical and unpredictable in nature. In recent years, it has attracted the attention of researchers to study the patterns on its uncertainty for better forecasting. Stock trends are used in order to help investors and industry analysts evaluate market behaviour and prepare their investment strategies accordingly. There are many influences driving stock trends, one of which is daily news releases. In order to allow investors to make good trading decisions before making actual investments, it is important to thoroughly predict the impact. The aim of this paper is to merge the traditional numerical stock prediction model which is designed by using LASSO and ARIMAX with related financial news analysis. To process the huge amount of news dataset Mahout and map reduce estimating algorithm has been used, and executed on Hadoop to get faster results. Our results show that the learning model based on numerical features and NLP features using historical prices has shown the best performance.

Review Paper

Practices for Implementing Collaborative Tools and Modern Technologies during Requirement Elicitation in Global Software Development

Syed Wajid Kamal * , Muhammad Yaseen **, Atta Ur Rahman ***, Mohim Bacha ****, Irfan Kazim *****
* Abasyn University, Peshawar, Pakistan.
** Universiti Tun Hussein Onn Malaysia, Malaysia.
***,***** COMSATS University Islamabad, Pakistan.
**** University of Swat, Peshawar, Pakistan.
Kamal, S. W., Yaseen. M., Rahman, A. U.. Bacha, M., and Kazim, I. (2020). Practices for Implementing Collaborative Tools and Modern Technologies during Requirement Elicitation in Global Software Development. i-manager's Journal on Software Engineering, 14(4), 20-26. https://doi.org/10.26634/jse.14.4.17843

Abstract

In Global Software Development (GSD) where face to face and timely communication of clients and vendors are difficult, role of using collaborative tools and modern new technologies become more significant. With collaborative tools, clients and vendors can efficiently communicate to reduce the effect of challenges such as time zone and language differences. With modern technologies, process of software engineering during requirements management in GSD become easier. Previously in several studies, collaborative tools and modern technologies are identified as success factors during successful requirements implementation in GSD. The purpose of this research work is to identify all possible best practices from literature for using collaborative tools and adopting modern technologies in GSD. To do so, Systematic Literature Review (SLR) is being conducted and as a result, 12 practices are identified.

Review Paper

Cyber Security Management: Creating Governance, Risk, and Compliance Framework

Ashish Batra*
Batra, A. (2020). Cyber Security Management: Creating Governance, Risk, and Compliance Framework. i-manager's Journal on Software Engineering, 14(4), 27-33. https://doi.org/10.26634/jse.14.4.17403

Abstract

It is important to view cyber security management from an integrated context that identifies how deliberated organizational strategies can be used to reinforce it in affiliated engagements. This study offers an insight as to how a highlyspecialized field can benefit both the specialized cybersecurity practitioners as well as the base level benefactors of cybersecurity. Ideally, cybersecurity management is integrated into the basic policies, systems, and procedures set up by an establishment with the desire to protect itself from cyberattacks. However, these interactions can be advanced into other aspects of organizational management and vice-versa. Consequently, this study uses a conceptual review of Governance, Risk and Compliance (GRC) frameworks and how they can make cyber-security system in an establishment efficient. The conceptual reviews consider the specific business continuity management planning framework that are built on a multi-cultural communication and management model, different pliability management models, as well as communication risk model systems, all designed to counter cyberattacks. The results of the study realize that cybersecurity management is a holistic process that cannot be demystified by a particular cyber-attack reaction but a conglomeration of efforts and ideas resulting from several cyber-attack reactions. Collective efforts can be built and reinforced through perpetual-oriented decisions/considerations of governance, risk and compliance frameworks.

Review Paper

Cluster based Data Collection Scheme for VANET

Thamizhmaran K.*
Department of Electronics and Communication Engineering, Government College of Engineering, Bodinayakkanur, Theni, Tamil Nadu, India.
Thamizhmaran, K. (2020). Cluster based Data Collection Scheme for VANET. i-manager's Journal on Software Engineering, 14(4), 34-38. https://doi.org/10.26634/jse.14.4.17822

Abstract

This paper presents the framework of cluster based architecture for Vehicle to Vehicle communication network and Vehicle to Infrastructure (V2I) communication network. A cluster based algorithm (VMCA) for multi-hop clustering will be designed to be used in V2V communication. The algorithm will be simulated using ns-3 simulator and its performance will be compared with other existing multi-hop clustering algorithm discussed in the literature review. It is expected that the simulation results will prove this new cluster based algorithm to be the optimum one when compared with the other of same type. Once validity of that algorithm is done, it will be improved to provide V2I communication. This improved algorithm will be implemented in the hybrid architecture of V2I for handover management. We will simulate the complete scenario using ns-3 and some real mobility simulator for VANETs. The simulation results expected to show that the proposed cluster based algorithm will be the optimum solution approach to the VANET handover.