Ranking XP Prioritization Methods based on the ANP
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 5
Abstract
The analytic network process (ANP) is considered one of the most powerful tools to facilitate decision-making in complex environments. The ANP allows decision makers to structure their problems mathematically using a series of simple binary comparisons. Research suggests that ANP can be useful in software development, where complicated decisions are routinely made. Industrial adoption of ANP, however, is virtually nonexistent because of its perceived complexity. We believe that ANP can be very beneficial in industry as it resolves conflicts in a mutually acceptable manner. We propose a protocol for its adoption by means of a case study that aims to explain a ranking method to assist an XP team in selecting the best prioritization method for ranking the user stories. The protocol was tested in a professional course environment.
Authors and Affiliations
Abdulmajeed Aljuhani, Luigi Benedicenti, Sultan Alshehri
Three Levels Quality Analysis Tool for Object Oriented Programming
In terms of evolution of software engineering methods for complex software developments techniques, new concepts have been emerged in the software languages, which used to develop software quality models. In this researc...
Most Valuable Player Algorithm for Solving Minimum Vertex Cover Problem
Minimum Vertex Cover Problem (MVCP) is a combinatorial optimization problem that is utilized to formulate multiple real-life applications. Owing to this fact, abundant research has been undertaken to discover valuable MV...
Role Term-Based Semantic Similarity Technique for Idea Plagiarism Detection
Most of the text mining systems are based on statistical analysis of term frequency. The statistical analysis of term (phrase or word) frequency captures the importance of the term within a document, but the techniques t...
Divide and Conquer Approach for Solving Security and Usability Conflict in User Authentication
Knowledge based authentication schemes are divided into textual password schemes and graphical password schemes. Textual password schemes are easy to use but have well known security issues, such as weak against online s...
A Topic based Approach for Sentiment Analysis on Twitter Data
Twitter has grown in popularity during the past decades. It is now used by millions of users who share information about their daily life and their feelings. In order to automatically process and analyze these data, appl...