Process and product quality assurance are very important aspects in development of software. Process
and product quality assurance monitor the software engineering processes and methods to ensure quality.
It is the process of confirming and verifying that whether services and products meet the customer
expectation or not.
This research will identify general measures for the specific goals and its specific practices of Process and
Product Quality Assurance Process Area in Capability Maturity Model Integration (CMMI). CMMI is
developed by Software Engineering Institute (SEI) in Carnegie Mellon University in USA. CMMI is a
framework for assessment and improvement of computer information systems. The procedure we used to
determine the measures is to apply the Goal Questions Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance Process Area in CMMI.
A details introduction of quality, its elements, Cost of Poor Quality and difference in Quality Control and Quality Assurance.
To download these slides please visit my site:
http://www.xubitech.com/
A details introduction of quality, its elements, Cost of Poor Quality and difference in Quality Control and Quality Assurance.
To download these slides please visit my site:
http://www.xubitech.com/
BugRaptors has domain expertise team skilled in working with various test models like Sequential & Agile. We provide users with quality consultancy. They help users from all over the world to clear all their doubts and issues on any type or kind of testing. Either it’s Automation, Security or any kind of testing, We have team which is highly experienced in all types of testing. It helps in developing great quality products. We have well experienced team of manual as well as Automation testing. The main focus of BugRaptors team is quality because the Life is better with lesser issues in it.
Quality assurance (QA) is a way of preventing mistakes or defects in manufactured products and avoiding problems when delivering solutions or services to customers.
Quality control (QC), is a process by which entities review the quality of all factors involved in production.
the difference between quality control and quality assurance. the main difference is quality assurance is process oriented and makes sure you are doing the right things, the right way. while quality control is product oriented and makes sure the results of what you have done are what you expected
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
Relational Over the last two decades, the
advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper
use
Canny edge detection method for facial expression recognition. Image color space transfor
mation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's fe
atures
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach p
rovides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
BugRaptors has domain expertise team skilled in working with various test models like Sequential & Agile. We provide users with quality consultancy. They help users from all over the world to clear all their doubts and issues on any type or kind of testing. Either it’s Automation, Security or any kind of testing, We have team which is highly experienced in all types of testing. It helps in developing great quality products. We have well experienced team of manual as well as Automation testing. The main focus of BugRaptors team is quality because the Life is better with lesser issues in it.
Quality assurance (QA) is a way of preventing mistakes or defects in manufactured products and avoiding problems when delivering solutions or services to customers.
Quality control (QC), is a process by which entities review the quality of all factors involved in production.
the difference between quality control and quality assurance. the main difference is quality assurance is process oriented and makes sure you are doing the right things, the right way. while quality control is product oriented and makes sure the results of what you have done are what you expected
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
Relational Over the last two decades, the
advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper
use
Canny edge detection method for facial expression recognition. Image color space transfor
mation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's fe
atures
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach p
rovides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
There are subsets of genes that have similar behavior under subsets of conditions, so we say that they
coexpress, but behaveindependently under other subsets of conditions. Discovering such coexpressions can
be helpful to uncover genomic knowledge such as gene networks or gene interactions. That is why, it is of
utmost importance to make a simultaneous clustering of genes and conditions to identify clusters of genes
that are coexpressed under clusters of conditions. This type of clustering is called biclustering.
Biclustering is an NP-hard problem. Consequently, heuristic algorithms are typically used to approximate
this problem by finding suboptimal solutions. In this paper, we make a new survey on tools , biclusters
validation and evaluation functions.
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
One common cause of visual impairment among people of working age in the industrialized countries is
Diabetic Retinopathy (DR). Automatic recognition of hard exudates (EXs) which is one of DR lesions in
fundus images can contribute to the diagnosis and screening of DR.The aim of this paper was to
automatically detect those lesions from fundus images. At first,green channel of each original fundus image
was segmented by improved Otsu thresholding based on minimum inner-cluster variance, and candidate
regions of EXs were obtained. Then, we extracted features of candidate regions and selected a subset which
best discriminates EXs from the retinal background by means of logistic regression (LR). The selected
features were subsequently used as inputs to a SVM to get a final segmentation result of EXs in the image.
Our database was composed of 120 images with variable color, brightness, and quality. 70 of them were
used to train the SVM and the remaining 50 to assess the performance of the method. Using a lesion based
criterion, we achieved a mean sensitivity of 95.05% and a mean positive predictive value of 95.37%. With
an image-based criterion, our approach reached a 100% mean sensitivity, 90.9% mean specificity and
96.0% mean accuracy. Furthermore, the average time cost in processing an image is 8.31 seconds. These
results suggest that the proposed method could be a diagnostic aid for ophthalmologists in the screening
for DR.
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
M
obile computing
and
Mobile Commerce is
most popular now a days because of t
he service offered during
the mobility
.
Mobile computing has become the reality today rather than the luxury.
Mobile wireless market
is increasing by leaps and bounds. The quality and speeds available in the mobile environment must
match the fixed network
s if the convergence of the mobile wireless and fixed communication network is to
happen in the real sense. The
challenge for mobile network lies
in providing very large footprint of mobile
services with high speed and security. Online transactions using m
obile devices must ensure high security
for user credentials
and it
should not be possible for misuse.
M
-
Commerce is the electronic commerce
performed using mobile devices.
Since user credentials to be kept secret, a high level of security should be
ensured
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
Due to the environmental pressures on organizations, the demand on Business Process Management
(BPM) automation suites has increased. This led to the arising need for managing process
-
related risks.
Theref
ore the management of risks in business processes has been the subject of many researches during
the past few years. However, most of these researches focused mainly on one or two stages of the BPM
life
cycle and introduced a support for it. This paper aim
s to provide a reference model for Risk
-
Aware BPM
which addresses the whole stages of the BPM life cycle, as well as some current techniques are liste
d for
the implementation of this model. Additionally, a case study for a business process in an Egyptian
university is introduced, in order to apply this model in realworld environment. The results will be
analyzed and concluded
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...IJCSES Journal
This paper presents a simulation and comparison analysis conducted to investigate the due-date
assignment methods through various scheduling rules. The due date assignment methods investigated are
flow time due date (FTDD) and total work content (TWK) method. Three scheduling rules are integrated in
the simulation for scheduling of jobs on machines. The performance of the study is evaluated based on the
configuration system of Hibret manufacturing and machine building Industry, subsidiary company of
Metals and Engineering Corporation were thoroughly considered. The performance of the system is
evaluated based on maximum tardiness, number of tardy jobs and total weighted tardiness. Simulation
experiments are carried in different scenarios through combining due-date assignment methods and
scheduling rules. A two factor Analysis of variance of the experiment result is performed to identify the
effect of due-date assignment methods and scheduling rules on the performance of the job shop system. The
least significant difference (LSD) method was used for performing comparisons in order to determine
which means differ from the other. The finding of the study reveals that FTDD methods gives less mean
value compared to TWK when evaluated by the three scheduling rules.
Research and Development of DSP-Based Face Recognition System for Robotic Reh...IJCSES Journal
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
In this paper, a dynamic K-means algorithm to improve the routing process in Mobile Ad-Hoc networks
(MANETs) is presented. Mobile ad-hoc networks are a collocation of mobile wireless nodes that can
operate without using focal access points, pre-existing infrastructures, or a centralized management point.
In MANETs, the quick motion of nodes modifies the topology of network. This feature of MANETS is lead
to various problems in the routing process such as increase of the overhead massages and inefficient
routing between nodes of network. A large variety of clustering methods have been developed for
establishing an efficient routing process in MANETs. Routing is one of the crucial topics which are having
significant impact on MANETs performance. The K-means algorithm is one of the effective clustering
methods aimed to reduce routing difficulties related to bandwidth, throughput and power consumption.
This paper proposed a new K-means clustering algorithm to find out optimal path from source node to
destinations node in MANETs. The main goal of proposed approach which is called the dynamic K-means
clustering methods is to solve the limitation of basic K-means method like permanent cluster head and fixed
cluster members. The experimental results demonstrate that using dynamic K-means scheme enhance the
performance of routing process in Mobile ad-hoc networks.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
Automatic Fingerprint authentication for personal identification and verification has received considerable
attention over the past decades among various biometric techniques because of the distinctiveness and
persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being
used to secure smart phones and to authorize payments in online stores. The main objective of this paper is
to review the extensive research work that has been done over the past decade and discuss the various
approaches proposed for fingerprint matching. The proposed methods were based on 2D correlation in the
spatial and frequency domains, Artificial Neural Networks, Hough transform, Fourier transform, graphs,
local texture, ridge geometry etc. All these different techniques have their pros and cons. This paper also
provides the performance comparison of several existing methods proposed by researchers in fing
Detection system design of subsea tree controllerIJCSES Journal
To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts
the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL ".Using the configuration software,
completed the development and design of production tree detection system to monitor, control and data
communication. The monitoring function has realized the process simulation of oil tree, the control
function has realized the remote control of oil tree, and database SQL has realized the management and
analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and
reporting level of oil production engineering design .At the same time the design center can make full use
of the database to complete the design of required query, statistical analysis and the output function of
related form .
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
Engineers have been actively developing tools to detect tumors and to process medical images. Medical image segmentation is a powerful tool that is often used to detect tumors. Many scientists and researchers are working to develop and add more features to this tool. This project is about detecting Brain tumors from MRI images using an interface of GUI in Matlab. Using the GUI, this program can use various combinations of segmentation, filters, and other image processing algorithms to achieve the best results.
We start with filtering the image using Prewitt horizontal edge-emphasizing filter. The next step for detecting tumor is "watershed pixels." The most important part of this project is that all the Matlab programs work with GUI “Matlab guide”. This allows us to use various combinations of filters, and other
image processing techniques to arrive at the best result that can help us detect brain tumors in their early stages.
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
The aim of this paper is to design a convenient system that is helpful for the people who have hearing difficulties and in general who use very simple and effective method; sign language. This system can be used for converting sign language to voice and also voice to sign language. A motion capture system is used for sign language conversion and a voice recognition system for voice conversion. It captures the
signs and dictates on the screen as writing. It also captures the voice and displays the sign language meaning on the screen as motioned image or video.
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files from the unallocated space based on file type-specific information (header and footer) and/or file contents is known as Data Carving. The research in this domain has witnessed various
technological enhancements in terms of tools and techniques over the past years. This paper surveys various data carving techniques, in particular multimedia files and classifies the research in the domain into three categories: classical carving techniques, smart carving techniques and modern carving
techniques. Further, seven popular multimedia carving tools are empirically evaluated. We conclude with the need to develop the new techniques in the field for carving multimedia files due to the fact that the fragmentation and compression are very common issues for these files
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
The Dynamic Software Product Line (DSPL) is becoming the system with high vulnerability and high confidentiality in which the adaptive security is a challenging task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of
security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical
security services and what level of adaptation they achieve. This work will be done following the Systematic
Review approach. Our results concluded that the research field of security approaches for DSPL is still
poor of methods and metrics for evaluating and comparing different techniques. The comparison reveals
that the existing adaptive security approaches widely cover the information gathering. However, comparative approaches do not describe how to decide on a method for performing adaptive security DSPL or how to provide knowledge input for adapting security. Therefore, these areas of research are promising.
Project monitoring and control measures in cmmiijcsit
Project monitoring and control process is an important process in developing any computer information
system. Monitoring and Control provides an understanding of the project’s progress so that when the
project deviates significantly from the plan appropriate corrective actions can be taken. This research will
identify general measures for the specific goals and its specific practices of Project Monitoring and
Control Process Area in Capability Maturity Model Integration (CMMI). CMMI is developed in USA by
Software Engineering Institute (SEI) in Carnegie Mellon University. CMMI is a framework for assessment
and improvement of computer information systems. The procedure we used to determine the measures is to
apply the Goal Questions Metrics (GQM) approach to the two specific goals and its ten specific practices
of Project Monitoring and Control Process Area in CMMI.
Integrated Project Management Measures in CMMIijcsit
Project management is quite important to execute projects effectively and efficiently. Project management
is vital to projects success. The main challenge of project management is to achieve all project goals,
taking into consideration time, scope, budget constraints, and quality. This paper will identify general
measures for the two specific goals and its ten specific practices of Integrated Project management Process
Area in Capability Maturity Model Integration (CMMI). CMMI is a framework for improvement and
assessment of computer information systems. The method we used to define the measures is to apply the
Goal Questions Metrics (GQM) paradigm to the two specific goals and its ten specific practices of
Integrated Project management Process Area in CMMI.
Computer information project planning is one of the most important activities in the modern software
development process. Without an objective and realistic plan of software project, the development of
software process cannot be managed effectively. This research will identify general measures for the
specific goals and its specific practices of Project Planning Process Area in Capability Maturity Model
Integration (CMMI). CMMI is developed in USA by Software Engineering Institute (SEI) in Carnegie
Mellon University. CMMI is a framework for assessment and improvement of computer information
systems. The procedure we used to determine the measures is to apply the Goal Questions Metrics (GQM)
approach to the three specific goals and its fourteen specific practices of Project Planning Process Area in
CMMI.
STATISTICAL ANALYSIS OF METRICS FOR SOFTWARE QUALITY IMPROVEMENT ijseajournal
Software product quality can be defined as the features and characteristics of the product that meet the user needs. The quality of any software can be achieved by following a well defined software process. These software process results into various metrics like Project metrics, Product metrics and Process metrics. Software quality depends on the process which is carried out to design and develop software. Even though the process can be carried out with utmost care, still it can introduce some error and defects. Process metrics are very useful from management point of view. Process metrics can be used for improving the software development and maintenance process for defect removal and also for reducing the response
time.
This paper describes the importance of capturing the Process metrics during the quality audit process and also attempts to categorize them based on the nature of error captured. To reduce such errors and defects found, steps for corrective actions are recommended.
A Novel Method for Quantitative Assessment of Software QualityCSCJournals
This paper deals with quantitative quality model that needs to be practiced formally through out the software development life cycle at each phase. Proposed quality model emphasizes that various stakeholders need to be consulted for quality requirements. The quality goals are set through various measurements and metrics. Software under development is evaluated against expected value of set of metrics. The use of proposed quantitative model is illustrated through a simple case study. The unaddressed quality attribute reusability in ISO 9126 is also discussed.
Lightweight processes are beginning to replace more formal methods. The motivation for this transition is based on many factors. The Internet, time to market, cost reduction, quality increases, market pressures, as well as the popularization of these programming methods. This series of articles will investigate the various lightweight methods, their impact on the management of software development projects and the processes by which managers can determine the appropriateness and usefulness of the various processes. The definition of a lightweight Process is more difficult than it would first appear. This article outlines the foundations of a heavyweight process and describes the appropriate pieces that can be converted to lightweight.
An Empirical Study of SQA Function Effectiveness in CMMI Certified Companies ...zillesubhan
The most vital component for any software development process is, “quality”, as it ensures the reliability and effectiveness of new software. Software Quality Assurance (SQA) techniques as well as a standardized qualitative metric known as Capability Maturity Model Integration (CMMI) are used to ensure this quality. The purposes of both the practices are same as both make efforts for end product’s quality. In spite of this, CMMI certified organizations have SQA function, but face a lot of issues, which resulted in lowering the quality of the products. Standards usually provide documentation, but SQA consider testing as a chief element and also documentation only for authentication and appraisals. The relationship of the SQA function with CMMI has not attended much in common literatures. This paper is centered on investigation conducted through data collection from diverse CMMI certified software development firm to check the practice of SQA function.
7.significance of software layered technology on size of projects (2)EditorJST
The objective of the software engineering is committed to build software projects within the budget, time and required quality. Software engineering is a layered paradigm comprised of process, methods, tools and quality focus as bedrock to develop the product. Software firms build software projects of varying sizes constrained on resources, time and functional requirement. Impact of software engineering layered technology may vary according to the size of the projects during their development. Quantitative evaluation of layer significance on size of the software project could be categorized as a complex task because it involves a collective decision on multiple criteria. Analytic Hierarchy Process (AHP) provides an effective quantitative approach for finding the significance of software layered technology on size of the projects. This paper presents the estimations through quantitative approach on real time data collected from several software firms. These findings help for a better project management with respect to the cost, time and resources during building a software project.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
DOI : 10.5121/ijcses.2014.5301 1
PROCESS AND PRODUCT QUALITY ASSURANCE
MEASURES IN CMMI
Mahmoud Khraiwesh
Faculty of Science and Information Technology, Zarqa University, Zarqa – Jordan
ABSTRACT
Process and product quality assurance are very important aspects in development of software. Process
and product quality assurance monitor the software engineering processes and methods to ensure quality.
It is the process of confirming and verifying that whether services and products meet the customer
expectation or not.
This research will identify general measures for the specific goals and its specific practices of Process and
Product Quality Assurance Process Area in Capability Maturity Model Integration (CMMI). CMMI is
developed by Software Engineering Institute (SEI) in Carnegie Mellon University in USA. CMMI is a
framework for assessment and improvement of computer information systems. The procedure we used to
determine the measures is to apply the Goal Questions Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance Process Area in CMMI.
KEYWORDS
Process, product, quality assurance, Measures, CMMI, GQM.
1. INTRODUCTION
Since software increasingly govern our society and becomes common and embedded in nearly
everything we do. We have to make sure that systems work in a better way as we want. Software
project measures are the discipline that ensures that the project is stay in control. Measurements
of a software project apply to people, processes, and products[8].
The quality assurance of software involves product and process assurance. Process oriented
approaches deal with the establishment of standards, principles, rules, guidelines, manuals,
process definitions, and improvement of software quality processes. The high quality product is
resulted from high quality development process [36]. The absence of process and product quality
increase problems during software development project [15].
Process and product quality assurance are process driven approaches with specific steps to
achieve development goals. The process and product quality assurance consider design,
development, and production. Quality assurance is preventive approach from occurring by
providing methods and rules. Quality assurance prevents defects from occurring. It starts in
software development process from the early stages of SDLC. It grants confidence to customer
regarding the software development process and the product. It is a systematic and planned
pattern of all actions necessary to provide adequate confidence that a product or an item conforms
to established technical requirements.
2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
2
The purpose of process and product quality assurance (PPQA) is to provide management and
staff with objective insight into processes and related work products [35]. Process and product
quality have become the key to success in software development lifecycle [18].
For the time being we know the fact that software measurement helps us to better understand,
evaluate, and control the processes, products, and software projects from the perspective of
controlling, evaluating, tracking, forecasting, and understanding [12]. A valid measurement
process can provide organizations to make better and timely decisions to achieve success in
software systems [19].
Measurement is a helpfully support tool for software management [26]. Measurement is an
important factor to effective management of processes. Measurement is a mechanism for
evaluating, identifying, and predicting for various software products and processes [2]. The best
way to enhance software processes is to measure specific attributes of the process then define a
set of related metrics based on the attributes of the process, and then use these metrics to define
indicators that will lead to improvement planning. Measurements of software do an important
function in understanding and controlling of software development products and processes [25].
In software measurement we give numbers or symbols to attributes of the selected entities in the
real life in such a way to characterize the attributes by some defined rules [11]. Software
measurement is important for the following main activities: understanding, controlling and
improvement [13]. Measurements are used to assess achievement of goals, to determine status
according to plans, to gain understanding of resources, environments processes, and products, to
establish principles for comparisons with future evaluation and follow improvement efforts [31].
The main measurement objective is to control and monitor the performance of software processes
[29].
At present software measurement is in a status in which terminologies, methods and principles
are still being defined and combined. We should not expect to find quantitative laws that are
mostly valid and usable, and have the same accuracy and precisions as the laws of physics. The
definition of usable measures and internationally valid may be long term and ideal research goal,
which cannot be realized in the nearer future [6]. Software engineering measurements is not
similar to quantitative laws of physics. Specific measurements such as mass, voltage,
temperature, or velocity are unusual in the software engineering field. Because software
measurements are often indirect, they are open to controversy [33]. There is insufficiency of an
agreed-upon framework of validation metrics [16]. The goal of software measures is to enhance
the software development [9].
The Software Engineering Institute (SEI) started a study for determining the capability of
software contractors in the mid-1980s. The conclusion of this capability evaluation was the
Software Capability Maturity Model for Software (CMM/SW) [32]. There is other capability
maturity models were improved, such as the People Capability Maturity Model (P- CMM) [7].
Software Engineering Institute (SEI) and some other associations shared the same field are get
together to develop the CMMI software framework, a set of combined CMMI models.
In United State (USA) the Department of Defense and other government parts use the Capability
Maturity Model Integrated (CMMI) for process improvement to reduce the risk of poor working
of developer contractors. The CMMI is used widely and it is a comprehensive framework for
improving the processes of organizations that produce complex products [34].
3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
3
CMMI framework provides technical guidelines to achieve a particular level of process
development quality. The main objective of CMMI is to enhance the quality the produced
software according to final user’s requirements. Using models such as CMMI model to assess
quality of software is not only a minimum need for organization’s existence but also a business
strategy [30].
CMMI model includes the following materials [1]:
1. Materials which help evaluating the meaning of your processes, this information is
essential for both administrative activities and technical help activities.
2. Materials which help improving process performance, this information are used to
increase the capability in the targeted organizations.
Through the process of choosing CMMI, we try to realize the following objectives: 1-Improving
project management capability; 2- Enhancing product quality; 3- Increasing productivity and cost
down; 4- Improving the capability of estimating the project budget and schedule; 5- Increasing
customer satisfaction [27].
CMMI framework is a comprehensive model. CMMI covers many subjects of information in
software production, defined many Process Areas (PA), generic goals and generic practices,
specific goals and specific practices, and a lot of work products. CMMI framework is used to
enhance processes, increase production and increase competitiveness of an organization [39].
CMMI framework is a well known and widely used process improvement. Goal realizing is used
in appraisal as the basis for determining whether a process area has been satisfied. CMMI
framework is a well structured quality approach which is clearly defines its activities in an easy to
recognize text styles [20].
In each selected process area in CMMI/SW, there are generic goals and related generic practices,
and specific goals and related specific practices. Each specific goal relates to a process area and
concentrates on the related properties that describe what must be done to accept the process area.
A specific practice is considered as an important activity in realizing the associated specific goal.
However, specific practices are recognized by CMMI as goals rather than the ways that we reach
the goal [37].
Software process improvement becomes the key to the existence of most software development
organizations. CMMI can help in setting process improvement goals and provide guidance for
quality processes. CMMI framework supports process and product improvement, reduces
redundancy and eliminates inconsistency because of using multiple standalone models. The
CMMI is designed to cover all processes in the software development life cycle and involve a
wide range of systems and products [38].
Goal-Question-Metric (GQM) is an approach that identifies process metrics, it was developed by
Basili and Weiss [4] as an approach for identifying meaningful metrics for software development
processes. GQM has proven that it is an efficient approach to selecting and implementing metrics.
This paper defines measures for the two specific goals and its four specific practices of Process
and Product Quality Assurance which is one of the process areas in level 2 in CMMI-SW (Staged
Representation) model. Measures will be compatible with the four specific practices associated
with the two specific goals of Process and Product Quality Assurance PA. The measures will be
4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
4
determined by applying the Goal-Question-Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance PA. The determined
measures will be helpful when used for evaluation and control the software products and
processes.
The remainder of the paper is arranged as the following: section two describes the relative work
in software development measurement for the CMMI/SW, section three presents an overview of
the CMMI/SW, section four presents an overview of the (GQM), section five describes the
application of the (GQM) to the CMMI/SW and defines the measures, section six describes the
validity and reliability of the defined measures for Process and Product Quality Assurance
process area, and section seven presents conclusions.
2. RELATED WORK
Many software measures researches have been suggested in the literature, some of them are [5]
[14] [17] [21] [22] [23] [24] [28] [32]. The most related to our work are [5] [28] [32] [21] [22]
[23] and [24]. The study of Baumert and McWhinney [5] defines a set of indicators that are
convenient with the measurement practice (a common features) described in the Capability
Maturity Model for CMM/SW. The defined indicators cover thirteen categories; categories don’t
occur at all of the maturity levels. Baumert and McWhinney don't concentrate on a specific
process. There work was related to CMM not CMMI.
Paulk, Weber, Garcia, Crissis and Bush [32] identify a set of examples of metrics in measurement
practice (one of the common features) of the Capability Maturity Model for Software (CMM/SW)
in Key Process Areas (KPAs). In there research they defined a few examples related to
requirements management KPA. They don't concentrate on a specific process. Their work was
based on (CMM/SW) not on (CMMI/SW). Loconsole [28] defined measures for the
Requirements Management Key Process Area of the CMM/SW. Her work was based on
(CMM/SW) not on (CMMI/SW). Khraiwesh [21] [22] [23] [24] provided measurements for
Requirements Validation, Risk Management, Project Planning, and Project Monitoring and
Control process areas of the CMMI/SW.
This paper provides a set of general measures that are related to a specific PA, which is Process
and Product Quality Assurance PA of the CMMI/SW. The defined measures are for the two
specific goals and the related four specific practices of Process and Product Quality Assurance
PA.
3. OVERVIEW OF THE CMMI-SW
The CMMI/SW (Staged Representation) consists of five levels of maturity: Initial, Managed,
Defined, Quantitatively Managed and Optimizing, which are shown in Figure 1. Each maturity
level contains several process areas excluding Level1 [35].
Each process area in (CMMI/SW) has generic goals with related generic practices and one or
more specific goals with related specific practices. The generic goals are related to the
institutionalization of suitable practices, they called generic because the same goal related to
multiple process areas as shown in figure 2. The specific goal is related to the process area and
handles the features that only describe what must be implemented to complete the process area.
The specific practice is an action that must be implemented to complete the associated specific
goal [35].
5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
5
The purpose of Process and Product Quality Assurance (PPQA) is to provide an understanding
for the project progress and to take a suitable action when the project deviates from the plan. The
documented plan is the base for tracking activities. Progress is usually determined by comparing
the plan to effort, cost, schedule, and work product [35].
In the following we will list the specific goals related to Process and Product Quality Assurance
process area and the specific practices related to each specific goal:
1- Objectively Evaluate Processes and Work Products
1.1 Objectively Evaluate Processes
1.2 Objectively Evaluate Work Products
2- Provide Objective Insight
2.1 Communicate and Resolve Noncompliance Issues
2.2 Establish Records
Figure 1. The five levels in CMMI with Process Areas
Optimizing (5)
Organizational innovation and Deployment.
Causal Analysis and Resolution.
Defined (3)
Decision Analysis and Resolution.
Risk Management.
Integrated Project Management.
Organizational Process Definition.
Organizational Process Focus.
Validation.
Verification.
Product Integration.
Technical Solution.
Requirements Development.
Managed (2)
Configuration Management.
Process and Product Quality
Assurance.
Measurement and Analysis.
Supplier Agreement Management
Project Monitoring and Control.
Project Planning.
Requirements Management.
.
Quantitatively Managed (4)
Organizational Process Performance.
Quantitative Project Management.
Initial (1)
Process and
Product Quality
Assurance
6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
6
4. OVERVIEW OF THE GQM
The Goal/Question/Metric (GQM) paradigm is a process which helps organizations to
concentrate the measurement activity on their goals. GQM declares that an organization should
have defined goals before they collected data [2]. The more mature your process is, the more that
it is visible and therefore measurable. GQM does not define fix goals, it is in fact an approach
which defines goals and revises them into a set of quantifiable questions, and these questions
present a specific set of measures and collected data lead to realize these goals.
The GQM paradigm consists of three steps:
1. Define a set of goals related to the needs of the organization and its projects. Determine what
should be learned or improved. The goals can be determines as purpose, perspective, and
environment. Measurement goals should be defined in a clear structure and an understandable
way. We do this by identifying the purpose (what object and why), viewpoint (what aspect and
who), and characteristics of context [3].
2. Generate a set of quantifiable questions. The defined goals are moved to quantifiable questions
with a concentration on measuremen. Basili and Rombach [2] define different sets of
recommendations to classify questions associated to processes or products.
3. Define series of measures that suit the quantitative information we need to answer the defined
quantifiable questions. In this phase, we define the measures proper to provide information to
answer the questions and join them to each question. Various metrics may be generated from one
goal. Various measurements may be needed to answer a single question. One measurement may
apply to more than one question.
Figure 2. specific and generic goals
Specific
Goals
Generic
Goals
Process Area 1 Process Area nProcess Area 2
Maturity Levels
Specific
Practices
7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
7
5. APPLYING GQM TO THE CMMI-SW
The CMMI/SW defines two specific goals for Process and Product Quality Assurance PA. There
are four specific practices related to the specific goals. We consider the specific practices as
goals. We will apply the GQM on the four specific practices.
The four specific practices associated with Process and Product Quality Assurance process area
are:
1- Objectively Evaluate Processes: Evaluate objectively selected performed processes against
applicable process descriptions, procedures, and standards.
2- Objectively Evaluate Work Products: Evaluate objectively selected work products against
applicable process descriptions, procedures, and standards.
3- Communicate and Resolve Noncompliance Issues: Connect quality issues and confirm the
resolution of noncompliance issues with managers and staff.
4- Establish Records: Build and maintain registers of quality assurance activities.
These four specific practices can be used as goals for the first step of the GQM. The second phase
in the GQM approach is to generate a set of quantifiable questions related to the four specific
practices. The third phase of the GQM is to determine a set of measures that provide the needed
quantitative information to answer the generated questions. Normal work products and sub
practices which are mentioned in each of the four specific practices are take into account when
we define the measures.
A collection of questions and measures are given in the following tables, table 1 to table 4, each
table represents one specific practice. There are interfering between the questions and between
the measures. The same measure can be used to provide information to answer different
generated questions.
5.1 Measures for specific practice 1
Objectively Evaluate Processes: Evaluate objectively selected performed processes against
applicable process descriptions, procedures, and standards.
1. A collection of questions and measures are given in the following table related to specific
practice
Table 1. collection of questions and measures related to specific practice 1.
Questions Measures
Q1 Do you evaluate objectively selected
performed processes against
applicable process descriptions,
procedures, and standards?
Evaluating selected performed
processes.
# Selected performed processes.
# Standards.
# Procedures.
(# means number of)
8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
8
Q2 Do you provide a description of the
quality assurance reporting chain and
how it ensures objectivity?
providing a description of the quality
assurance reporting chain.
Q3 Do you produce evaluation reports,
noncompliance reports?
Producing evaluation reports,
noncompliance reports.
# Evaluation reports.
# Noncompliance reports.
Q4 Do you specify a corrective action? Specifying a corrective action.
# Corrective actions.
Q5 Do you promote an environment that
encourages the staff in identifying
and reporting quality issues?
Promoting an environment that
encourages the staff.
# Staff in the quality assurance
environment.
Q6 Do you define and maintain clearly
stated criteria for valuation based on
business needs?
Defining and maintaining clearly
stated criteria for valuation.
# Criteria for valuation.
Q7 Do you identify what will be
evaluated?
Identifying what will be evaluated.
# Selected performed processes.
Q8 Do you identify how the evaluation
will be performed?
Identifying how the evaluation will
be performed.
Q9 Do you identify how often a process
will be evaluated?
Identifying how often a process will
be evaluated.
# Evaluations in a period of time.
Q1
0
Do you identify who must be
involved in the evaluation?
Identifying who must be involved in
the evaluation.
# Persons involved in the evaluation.
Q1
1
Do you identify every noncompliance
found during the evaluation?
Identifying every noncompliance
found during the evaluation.
# Noncompliance found.
Q1
2
Do you identify lessons learned in
order to improve processes?
Identifying lessons learned in order to
improve processes.
# Lessons learned.
5.2 Measures for specific practice 2.
Objectively Evaluate Work Products: Evaluate objectively selected work products against
applicable process descriptions, procedures, and standards.
2.A collection of questions and measures is given in the following table related to specific
practice
9. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
9
Table 2. Collection of questions and measures related to specific practice 2
Questions Measures
Q1 Do you evaluate objectively selected
work products against process
descriptions, procedures, and standards?
Evaluating selected work products
against process descriptions procedures,
and standards.
# Work products.
Q2 Do you produce evaluation reports and
noncompliance reports?
Producing evaluation reports and
noncompliance reports.
# Evaluation reports.
# Noncompliance reports.
Q3 Do you specify a corrective action? Specifying a corrective action.
# corrective actions.
Q4 Do you select work products to be
evaluated based on documented criteria?
Selecting work products to be evaluated.
# work products to be evaluated.
Q5 Do you establish and maintain clearly
stated criteria for the evaluation of work
products based on business needs?
Establishing and marinating clearly
stated criteria for the evaluation of work
products.
# Criteria for the evaluation.
Q6 Do you identify what will be evaluated? Identifying what will be evaluated.
# Work products to be evaluated.
Q7 Do you identify how often a work
product will be evaluated?
Identifying how often a work product
will be evaluated.
# Evaluations in a period of time.
Q8 Do you identify how the evaluation will
be performed?
Identifying how the evaluation will be
performed.
Q9 Do you identify who must be involved in
the evaluation?
Identifying who must be involved in the
evaluation.
# Persons involved in the evaluation.
Q10 Do you evaluate selected work products
during unit testing and integration?
Evaluating selected work products
during unit testing and integration.
# selected work products during unit
testing.
# selected work products during
integration.
Q11 Do you evaluate selected work products
before delivery to the customer, during
delivery to the customer and
incrementally when it is appropriate?
Evaluating selected work products
before delivery to the customer, during
delivery to the customer and
incrementally when it is appropriate.
# selected work products before
delivery.
# selected work products during
delivery.
# selected work products incrementally
10. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
10
when it is appropriate.
Q12 Do you identify every case of
noncompliance found?
Identifying every case of
noncompliance found.
# Noncompliance found.
Q13 Do you identify lessons learned to
improve processes?
Identify lessons learned to improve
processes.
# Lessons learned.
5.3 Measures for specific practice 3.
Communicate and Resolve Noncompliance Issues: connect quality issues and confirm the
resolution of noncompliance issues with managers and staff..
A collection of questions and measures is given in the following table related specific practice 3.
Table 3. Collection of questions and measures related to specific practice 3
Questions Measures
Q1 Do you connect quality issues and ensure
the solution of noncompliance issues
with the managers, and staff ?
(Noncompliance issues are the identified
problems in evaluations that show the
lack of commitment to standards, process
descriptions, or procedures).
Connecting quality issues and ensures
the solution of noncompliance issues.
# Noncompliance issues.
Q2 Do you identify the status of
noncompliance issues which provides an
indication of quality trends?
Identifying the status of noncompliance
issues.
# Noncompliance.
Q3 Do you track the noncompliance issues
to reach a resolution?
Tracking the noncompliance issues to
reach a resolution.
# Resolved noncompliance.
Q4 Do you identify corrective action reports
and evaluation reports?
Identifying corrective action reports and
evaluation reports.
# Corrective action reports.
# Evaluation reports.
Q5 Do you identify the quality trends? Identifying the quality trends.
Level of quality trend.
Q6 Do you resolve every noncompliance
with the appropriate member staff?
Resolving every noncompliance with
the appropriate member staff.
# Member staff share the resolving.
11. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
11
Q7 Do you document non compliance issues
which can’t be resolved?
Documenting noncompliance issues
which can’t be resolved.
# Noncompliance issues which can’t be
resolved.
Q8 Do you escalate unresolved compliance
issues to the appropriate level of
management?
Escalating unresolved noncompliance
issues to the appropriate level.
# Unresolved noncompliance.
Q9 Do you analyze noncompliance issues to
find the quality trends that can be
identified and addressed?
Analyzing noncompliance issues to find
the quality trends.
Level of quality trend.
Q10 Do you ensure that relevant stakeholders
are familiar with the results of evaluation
and quality trends?
Ensuring that relevant stakeholders are
familiar with the results of evaluation
and quality trends.
# Stakeholders involved.
Q11 Do you review periodically open
noncompliance issues and trends with
the assigned manager?
Reviewing open noncompliance issues
and trends with the assigned manager.
# Reviewing open noncompliance
issues.
Q12 Do you track noncompliance issues to
resolution?
Tracking noncompliance issues to
resolution.
# Tracking noncompliance issues.
# Resolved noncompliance.
5.4 Measures for specific practice 4.
Establish Records: Build and maintain registers of quality assurance activities.
4. A collection of questions and measures is given in the following table related to specific
practice
Table 4. Collection of questions and measures related to practice 4
Questions Measures
Q1 Do you build and maintain records of
quality assurance activities?
Building and maintaining records of
quality assurance activities.
Q2 Do you establish evaluation logs? Establishing evaluation logs.
# Evaluations in a period of time.
Q3 Do you establish quality assurance
reports?
Establishing quality assurance reports.
# Quality assurance reports.
Q4 Do you establish status reports of
corrective actions?
Establishing status reports of corrective
actions.
# Corrective actions reports.
Q5 Do you establish reports of quality
trends?
Establishing reports of quality trends.
# quality trends reports.
12. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
12
Q6 Do you record process and product
quality assurance activities in suitable
detail?
Recording process and product quality
assurance activities in suitable detail.
Q7 Do you review the status and history of
quality assurance activities as necessary?
Reviewing the status and history of
quality assurance activities.
# Reviewing the status of quality
assurance activities.
# Reviewing the history of quality
assurance activities.
6. VALIDITY AND RELIABILITY OF THE DEFINED MEASURES
We have made a questionnaire to examine the validity and reliability of the defined measures for
Process and Product Quality Assurance PA and confirm that they are actually measure the ten
specific practices. We will test the data we collected using cronbach alpha reliability in SPSS.
The questionnaire was reviewed and confirmed by practitioners in software building and
academics in software engineering in Zarqa University. The questionnaire was filled by software
developers, designers, and students in information technology departments. The questionnaire
consists of four sections, each section is related to one of the four specific practices of the Process
and Product Quality Assurance process, each section consists of a group of statements (measures)
related to the specific practice, beside each statement there is five options: strongly agree, agree,
neither agree nor disagree, disagree, strongly disagree. When questioner reads the statement he
will write his opinion of the statement related to the specific practice by selecting one of the
above five options, a sample shown in Appendix A.
Cronbach alpha is used to measure the internal consistency, which means, do all items measure
the same thing? (Measure a single unidirectional structure). Cronbach alpha values are varying
between 0 and 1. There is a great internal consistency of items being assessed if alpha is closer to
1 [13]. If Cronbach alpha is less than 0.5 then internal consistencies is rejected [13]. When we
apply the collected data on Cronbach Alpha we found alpha results between over 0.5 and less
than 1.
7. CONCLUSION
Our paper defined general measures for Process and Product Quality Assurance Process Area
(PA) in Capability Maturity Model Integration (CMMI-SW) for software development. We
defined the measures by applying the Goal Question Metrics (GQM) paradigm to the two specific
goals and its four specific practices of Process and Product Quality Assurance PA. Our paper
concentrated on defining measures for a particular process area rather than defining measures for
group of process areas.
The set of defined measures in the paper provide the organization with better insight into the
activities related to Process and Product Quality Assurance, enhancing the development of
software to the goal of having a matured process. The set of measures can be used to evaluate and
control software products and processes. The Use of the defined measures determines by the
software development process maturity in the organization.
15. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.5, No.3, June 2014
15
Please, fill the enclosed form by writing down in the proper place. Replying to the question: do
you think that the sentences have an effect on the accomplishment of the goals?
1. Goal1: Objectively Evaluate Processes.
(Do you think that these sentences have an impact on the achievement of goal1: Objectively
Evaluate Processes.)
stateme
nt
serial
statements Strongl
y
agree
Agree Neither
agree nor
disagree
disagre
e
Strongly
disagree
1 Evaluating selected
performed
processes.
2 Defining a
description of the
quality assurance
reporting chain.
3 Producing
evaluation reports,
noncompliance
reports.
4 Specifying a
corrective action.
5 Promoting an
environment that
encourages the
staff.
Author
Mahmoud khraiwesh is an associate professor at Faculty of Science and Information
Technology in Zarqa University, Jordan. He got his master degree in computer science
from Jordan University, Jordan, in 2002 and his doctorate degree in computer information
system from The Arab Academy for Banking and Financial sciences, Jordan, in 2006. Dr.
Khraiwesh area of research is in software development measures.