Requirement Elicitation in Web Applications: Challenges
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 3
Abstract
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate stakeholders and exploring their needs and the quality of requirements. This is greatly influenced by techniques adopted during requirements elicitation process. Complete and structured requirements can make projects more consistent. The most common challenges faced by the analyst during elicitation process are to guarantee effectual communication between stakeholders and acquisition of implicit knowledge. Most of the faults in the systems are mainly due to poor communication between stakeholder and analyst, and these faults require more time and money to correct them. The improper understandability during elicitation process of web applications can lead to requirements ambiguity, inconsistency, incorrect and unfeasible [1]. Conversational, Observational, Analytical and Synthetic are available elicitation methods to deal with the difficulty during requirement elicitation process. Selection of an appropriate method or set of methods for the unambiguous, consistent and correct requirement gathering is a challenge for analysts.
Authors and Affiliations
Swarnalatha K S, Srinivasan G N, Pooja Bhandary, Kishore P V, Rakesh R
Technical Survey of Heart of Propagation Models: A Spectrum Analysis
In this paper, we exhibit a sneak peak of dynamic spectrum access approaches. Different methodologies foreseen for dynamic spectrum access a r e expansively characterized under three models: selective model, impartin...
Hopfield Neural Network as Associated Memory with Monte Carlo- (MC-)Adaptation Rule and Genetic Algorithm for pattern storage
This paper describes the performance analysis of Hopfield neural networks by usinggenetic algorithm and Monte Carlo-(MC-) adaptation learning rule.A set of five objects has been considered as the pattern set. In the...
A Wide Band Pattern and Frequency Reconfigurable Microstrip Patch Antenna using Varactors for WLAN Applications
Wireless communication systems are being used for a number of applications nowadays and for that, a number of antennas or a single antenna with multiple functional capabilities has become inevitable. This paper atte...
Three-Party Authenticated Quantum Key Distribution Protocols based Security in WLANs
This work presents quantum key distribution protocols (QKDPs) to safeguard security in large networks, ushering in new directions in classical cryptography and quantum cryptography. Two three-party QKDPs, one with i...
Hash Function based MAC Protocol to cope with MAC Layer Misbehavior in Manets
Mobile adhoc networks consist of mobile nodes connected by wireless links without using any preexisting infrastructure. MANET nodes rely on network cooperation schemes to properly work, forward traffic unrelated to it...