Considerable resources are wasted on projects that deliver few or no benefits. The main objective is to better understand the characteristics of projects that are successful in delivering good client benefits. We aske...
详细信息
ISBN:
(纸本)9781728199269
Considerable resources are wasted on projects that deliver few or no benefits. The main objective is to better understand the characteristics of projects that are successful in delivering good client benefits. We asked 71 Norwegian software professionals to report information about projects completed between 2016 and 2018. We found that both benefits management and agile practices have a significant relationship with perceived realisation of client benefits. This includes the benefits management practices of having a plan for benefits realisation, individuals with assigned responsibility for benefits realisation, benefits management during project execution, quantification of realised benefits, evaluation of realised benefits, re-estimation of benefits during project execution, and the agile practices of a flexible scope and frequent deliveries to production. The software projects that were successful in delivering client benefits adopted benefits management and agile practices to a larger extent than the less successful ones. Future studies are required to establish more comprehensive understanding of what distinguishes projects that deliver good client benefits from the rest, including studies of the realisation of client benefits in agile software projects.
The Distributed Coordination Function (DCF) in the ieee 802.11 protocol is a random access scheme based on the carrier sense multiple access with collision avoidance (CSMA/CA). In recent years, there have been numerou...
详细信息
The role of SMEs in the economy of Indonesia is significant. However, the problems faced by the SMEs as less professional management often become an obstacle to the progress of the business. To solve these problems, w...
详细信息
ISBN:
(纸本)9781509016488
The role of SMEs in the economy of Indonesia is significant. However, the problems faced by the SMEs as less professional management often become an obstacle to the progress of the business. To solve these problems, we need an application that can help small business owners to help manage their business and can also be accessed by a variety of platforms. All these problems can be solved with the application SIKASIR. In order SIKASIR application can be accessed by multiple platforms, it takes a web service that resides on a server. Each application SIKASIR of various platforms to be connected to the service RESTful Web Service so interconnected and synchronized. However, there are some problems when making a multi-platform service, one of them is an authentication problem. In REST architecture, we need authentication methods that are stateless, one of which is a token-based authentication methods. On this occasion, this study will use JSON Web Token. JSON Web Token is the new industry standard based (RFC 7519). JSON Web Token is stateless, so it is suitable to be implemented on a RESTful Web Service application. In this research will be discussed how to implement authentication technique using token-based authentication method with a JSON Web Token, which will produce a secure authentication and make web service SIKASIR be multi-platform.
In this paper, models are created to predict the levels of ground level Ozone at particular locations based on the cross-correlation and spatial-correlation of different air pollutants whose readings are obtained from...
详细信息
ISBN:
(纸本)9781509028702
In this paper, models are created to predict the levels of ground level Ozone at particular locations based on the cross-correlation and spatial-correlation of different air pollutants whose readings are obtained from several different air quality monitoring stations in Gauteng province, South Africa, including the City of Johannesburg which is on the cusp of being one of the world's megacities and is currently the most polluted city in the country. Datasets spanning several years collected from the monitoring stations and transmitted through the Internet-of-Things are used. Big data analytics and cognitive computing is used to get insights on the data and create models that can estimate levels of Ozone without requiring massive computational power or intense numerical analysis.
Cloud computing recently offers immense benefits. But higher education institutions (HEIs) are hesitating to adopt. As a result, they are not benefited more from such technology. This is because key adoption capabilit...
详细信息
ISBN:
(纸本)9781509046423
Cloud computing recently offers immense benefits. But higher education institutions (HEIs) are hesitating to adopt. As a result, they are not benefited more from such technology. This is because key adoption capabilities are not explored in detail in HEIs context. In addition to this, there is no comprehensive empirically validated adoption readiness assessment model which helps them to adopt Cloud solutions efficiently. Hence, to fill this gap this study identifies the critical capabilities and develops a model to assess Cloud computing adoption readiness of higher education institutions before initiating the adoption. Resource based view theory was used as theoretical lens to identify capabilities and to build the model. The conceptual model considers adoption readiness and adoption success from technological, human, organizational, financial and external environment dimensions. The model proposes that the degree to which an organization holds these capabilities is related to the degree to which they are ready to deploy and use computing resources, thereby increasing the possibility of adoption success. Further empirical research will be used to validate and refine the conceptual model.
Large and complex buildings built in China in recent years, such as Olympic venues, airports, and large hospitals, have brought new fire evacuation problems. Many designs are using Internet of Things (IOT) technology ...
详细信息
ISBN:
(纸本)9781665426558
Large and complex buildings built in China in recent years, such as Olympic venues, airports, and large hospitals, have brought new fire evacuation problems. Many designs are using Internet of Things (IOT) technology to enhance buildings' perception of flames and smoke. In this paper, in addition to using IoT to improve the fire-awareness of buildings, a set of algorithms based on the Dijkstra' s shortest path method is designed to operate on the local FPGA edge computing terminal to determine the current optimal evacuation path. An IoT system with an evacuation lighting system provides an optimal route indication for people in the *** with the traditional Internet of Things and cloud computing technology, this design uses FPGA near the data terminal to process and analyze the collected data in real time, which effectively improves the speed of data response and Reduced bandwidth congestion caused by massive *** power consumption of *** system was tested in the office building of Beijing University of Technology, which can effectively indicate the path under different fire *** the event of a fire, the evacuation algorithm can be updated every 10 seconds, and the emergency lights are updated every 5 seconds and indicate an emergency route.
Hand posture classification is a key problem for many human computer interaction ***,this is not a simple *** this paper,we propose to decompose the hand posture classification problem into 2 *** the first step,we det...
详细信息
ISBN:
(纸本)9781424467860
Hand posture classification is a key problem for many human computer interaction ***,this is not a simple *** this paper,we propose to decompose the hand posture classification problem into 2 *** the first step,we detect skin regions using a very fast algorithm of color segmentation based on thresholding *** segmentation is robust to lighting condition thank to a step of color normalization using neural *** the second step, each skin region will be classified into one of hand posture class using Cascaded Adaboost *** contributions of this paper are:(i) By applying a step of color normalization,the posture classification rate is significantly improved under varying lighting condition;(ii) The cascaded Adaboost technique has been studied for the problem of face detection(2 classes).In this paper, it will be studied and evaluated in more detail in a problem of classification of hand postures(multi-classes).
This paper compares the transient characteristics of aluminum (Al) and copper (Cu) microstrip line structures. Interconnects are represented using distributed resistance inductance capacitance (RLC) transmission line ...
详细信息
ISBN:
(纸本)9781509052561
This paper compares the transient characteristics of aluminum (Al) and copper (Cu) microstrip line structures. Interconnects are represented using distributed resistance inductance capacitance (RLC) transmission line (TL) model. The equivalent RLC-ladder networks for Al and Cu interconnects are first implemented using VHDL-AMS, and their time-domain simulation responses are compared. For the verification of the results obtained from VHDL-AMS implementation, the process is repeated with SPICE modeling. Both the simulation results are in good agreement.
Cloud computing simply referred as cloud is a pay per use technology. To be simple a cloud computing by using resource allocation algorithms will allocate resource to the user as per his/her request and the user will ...
详细信息
ISBN:
(纸本)9781467366809;9781467366793
Cloud computing simply referred as cloud is a pay per use technology. To be simple a cloud computing by using resource allocation algorithms will allocate resource to the user as per his/her request and the user will pay only for what they use similar to electricity. There are several available services in cloud like SaaS, laaS, PaaS, TaaS etc. We are going to concentrate on TaaS (Testing as a Service). So what is cloud testing? Cloud testing is a type of software testing in which cloud computing is used to generate real world user traffic for web based applications. In this paper we would mentioning the types, steps and forms of Cloud Testing. We would then consider two types of testing namely Security Testing and Performance Testing. In this paper we would also be also concentrating on Data Integrity, Data confidentiality and Data availability since they form the core of the Security testing and Performance testing.
Cloud computing delivers a computing environment where different resources are delivered as a service to the customer or multiple tenants over the internet. Task scheduling is an essential and most important part in a...
详细信息
ISBN:
(纸本)9781467397452
Cloud computing delivers a computing environment where different resources are delivered as a service to the customer or multiple tenants over the internet. Task scheduling is an essential and most important part in a cloud computing environment. The task scheduling mainly focuses to enhance the efficient utilization of resources and hence reduction in task completion time. Task scheduling is used to allocate certain tasks to particular resources at a particular time instance. Many different techniques have been proposed to solve the problems of task scheduling. Task scheduling improves the efficient utilization of resource and yields less response time so that the execution of submitted tasks takes place within a possible minimum time. This paper discusses about the study of various scheduling algorithms in a cloud computing environment.
暂无评论