slugSoftware Project Selection Under Requirement Perspective
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 3
Abstract
The primary aim of this paper is to develop and demonstrate an integrated model by which selection of suitable software project based on specific requirements for any organization can be easily done. In this paper, an integrated model is proposed by combining AHP, DEMATEL, and QFD into a single evaluation model in a multi-criteria environment. The proposed integrated model firstly identifies the technical requirements followed by the customer requirements. AHP method of this approach finds the priority values among alternatives based on each technical requirement. DEMATEL method identifies the weights of customer’s requirements. Finally QFD method finds the overall score among all alternatives. The numerical results show that the new approach is superior to standard methods for software project selection and also presents indexing among alternatives to show the optimality and robustness of the proposed model. This research does not consider the time constraints. It makes a significant contribution to any organization where one can compare the financial performance of the organization by selecting the right decision model.
Authors and Affiliations
Santanu Kr. Misra, Bijoyeta Roy
Histophysiology of Byssus Gland of Captive Mytilus viridis Revealed through Histochemistry
Histochemical and Electron microscopic studies were carried out on byssus gland of Mytilus viridis (found along the coast of Gujarat) to get an idea of histophysiology of the gland of the animal during the conditions of...
Android Based Remote System Security and Monitoring
Face recognition presents a challenging problem in the field of image analysis and computer vision, and as such has received a great deal of attention over the last few years because of its many applications in various...
FTP Based Honeypot Implementation Model for Network Security
In this paper, we have presented Network security using Honeypot technique that pretends to have one or more network vulnerabilities that a blackhat is looking for. But actually it does not have those vulnerabilities. I...
slugEdge Detection using Memetic Algorithm
Edge detection is one of the open issues in image processing. GA, inspired by biological evolution has been typically used for addressing this problem. MA, inspired by biological and / or social evolution, having been t...
Colour Image Compression and Performance Analysis Using EZW, SPIHT, and EBCOT
With advancement of technology and large-scale use of computers in almost every field it becomes necessary to compress images for storing large amount of data in less space. Image compression is a data compression techn...