An Approach for Analyzing ISO / IEC 25010 Product Quality Requirements based on Fuzzy Logic and Likert Scale for Decision Support Systems
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 12
Abstract
Decision Support Systems (DSS) are collaborative software systems that are built to support controlling of an organization in decision making process when faced with non-routine problems in a specific application domain. It’s important to measure portability, maintainability, security, reliability, functional suitability, performance efficiency, compatibility, and usability quality requirements of DSS properly. ISO / IEC 25010 which replaced ISO 9126, used for three different quality models for software products, such as: a) Quality in use model, b) Product quality model, and c) Data quality model. There is a lack of methodologies to measure and quantify these quality requirements. Fuzzy logic used to specify quality requirements of DSS, because it’s an approach to computing based on degrees of truth, rather than true or false logics. Likert scale is a method in which it converts qualitative values into quantitative values to make a best statistical analysis. The measurement and quantification of quality requirements of DSS is a challenging task, because these quality requirements are in qualitative form and can’t be represented in quantitative way. Although, several quality requirements methods for DSS have been proposed so far, but the research on analyzing quality requirements of DSS are still limited. In this paper, quantitative approach proposed for analyzing ISO / IEC 25010 product quality requirements based on fuzzy logic and likert scale for DSS which aims to quantify quality requirements. Moreover implemented proposed framework on a case study ‘Internet Banking’ and got data from 25 respondents i.e. System Analysts and Domain Experts of banking sector.
Authors and Affiliations
Hasnain Iqbal, Muhammad Babar
A Novel Cloud Computing Security Model to Detect and Prevent DoS and DDoS Attack
Cloud computing has been considered as one of the crucial and emerging networking technology, which has been changed the architecture of computing in last few years. Despite the security concerns of protecting data or pr...
Evaluation and Comparison of Binary Trie base IP Lookup Algorithms with Real Edge Router IP Prefix Dataset
Internet network is comprised of routers that forward packets towards their destinations. IP routing lookup requires computing the Best-Matching Prefix. The main Functionality of Router is finding the Appropriate Path fo...
Evaluating the Usability of Optimizing Text-based CAPTCHA Generation
A CAPTCHA is a test that can, automatically, tell human and computer programs apart. It is a mechanism widely used nowadays for protecting web applications, interfaces, and services from malicious users and automated spa...
Using FDD for Small Project: An Empirical Case Study
Empirical analysis evaluates the proposed system via practical experience and reveals its pros and cons. Such type of evaluation is one of the widely used validation approach in software engineering. Conventional softwar...
Neutrosophic Relational Database Decomposition
In this paper we present a method of decomposing a neutrosophic database relation with Neutrosophic attributes into basic relational form. Our objective is capable of manipulating incomplete as well as inconsistent infor...