The accuracy and efficiency of cost estimation methodology for web-based application is very important for software development as it would be able to assist the management team to estimate the cost. Furthermore, it w...
详细信息
The accuracy and efficiency of cost estimation methodology for web-based application is very important for software development as it would be able to assist the management team to estimate the cost. Furthermore, it will ensure that the development of cost is within the planned budget and provides a fundamental motivation towards the development of web-based application project. The literature review reveals that COCOMO II provides accurate result because more variables are considered including reuse parameter. The parameter is one of the essential variables in estimating the cost in web-based application development. This research investigates the feasibility to combine and implement COCOMO II and expert judgment technique in a tool called WebCost. In estimating a cost, the tool considers all variables in COCOMO II and requires expert judgment to key-in the input of the variables such as project size, project type, cost adjustment factor and cost driven factor. Developed in JAVA, WebCost is proven able to estimate cost and generate its estimation result. The usability evaluation conducted had shown that WebCost is usable when compared with other tools, it has its own advantages. WebCost is evidence suitable for everyone especially the project managers, software practitioners or software engineering student in handling the cost estimation tasks.
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains...
详细信息
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.
暂无评论