Failure Model of Peopleware Factors: A Neuro-Computing Approach
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2011, Vol 1, Issue 2
Abstract
Human Resource can play a critical role in the success and failure of Information systems in an organization. It has been established that even the best of Information systems do fail due to the neglect of the human factor. According to OASIG Report [1], 80-90% IT projects do fail mainly due to neglect of human factor. Therefore, in this paper an attempt has been made to propose an Artificial Neural Network(ANN) based approach that help us to study the failure/success of the Industry due to Peopleware(Human Resource) for an Information system. The study is particularly important because most of the studies make use of conventional approaches having their own limitations such as following an algorithmic approach. The ANNs do not suffer from such limitations and they process information in a similar way the human brain does. Neural networks learn by example. Thus this approach is likely to provide better results as it is done using the MATLAB R2007B programming by Neural Network programs. Hence, such a study will be of great importance with respect to the Indian Industry.
Authors and Affiliations
Bikrampal Kaur and Dr. Himanshu Aggarwal
Congestion Control in TCP/IP Using Fuzzy Logic
Congestion occurs in the network when arrival rate to a router is greater than its departure rate. In this paper, using fuzzy logic approach, we have proposed a modified TCP delay-based congestion avoidance mechanism w...
EVOLUTION OF DATA WAREHOUSE AND DATA MINING
Data warehouse is the requisite of all present competitive business communities‟ i.e. profitable and non-profitable as well as educational institutions where data is complex, huge and dynamic. The technology advent is...
HIGHER ORDER MUTATION TESTING (RESULT- EQUIVALENT MUTANTS)
Whenever we make a single change to the original program we get First Order Mutant (FOM). When we apply another single change to FOM we get Second Order Mutant (SOM).On applying another single change to SOM we get Thir...
Kerberos Authentication Protocol Modeling Using NUSMV Model
Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protoco...
Achieving Optimal DoS Resistant P2P Topologies for Live Multimedia Streaming using Cost function Algorithm
The peer-to-peer approach for live multimedia streaming applications offers the promise to obtain a highly scalable, decentralized, and robust distribution service. When constructing streaming topologies, however, spec...