Unstructured source artifacts ontology for requirement validation in GDSD
Analyst while transforation, may not capture true representation of user opinion thus reating deviation fro actual user needs Roles of stakeholders is primary in both requirements elictation and alidation process In eliitation stage they are initators whereas in alidation stage they are authentiator...
| Main Authors: | Altaf, Sohaib, Shah, Asadullah, Imtiaz, Najma, Shah, Abdul Salaam, Ahmed, Syed Faiz |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Science Publishing Corporation
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/62796/ http://irep.iium.edu.my/62796/13/62796%20Unstructured%20source%20artifacts%20ontology%20for%20requirement%20validation%20in%20GDSD.pdf http://irep.iium.edu.my/62796/14/62796%20Unstructured%20source%20artifacts%20ontology%20for%20requirement%20validation%20in%20GDSD%20SCOPUS.pdf |
Similar Items
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Integration social media technology and ethical collaborative learning
by: Ataie, Fariba, et al.
Published: (2018)
by: Ataie, Fariba, et al.
Published: (2018)
An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies
by: Ataie, Farib, et al.
Published: (2018)
by: Ataie, Farib, et al.
Published: (2018)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation
by: Khosravi, Mohsen, et al.
Published: (2018)
by: Khosravi, Mohsen, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Using lexical ontology for semi-automatic logical data warehouse design
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
by: Mior Nazri, Mior Nasir, et al.
Published: (2010)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
A hybrid method using kinect depth and color data stream for hand blobs segmentation
by: Karbasi, Mostafa, et al.
Published: (2017)
by: Karbasi, Mostafa, et al.
Published: (2017)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Selecting respondents for survey questionnaire in Islamic way
by: Shah, Asadullah, et al.
Published: (2017)
by: Shah, Asadullah, et al.
Published: (2017)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Development of a game for history course of secondary school students
by: Ghulamani, Sumbul, et al.
Published: (2017)
by: Ghulamani, Sumbul, et al.
Published: (2017)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Competitive algorithms for online conversion problems with interrelated prices
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
Similar Items
-
Visualization representation benefits of pre-requirement specification tractability
by: Altaf, Sohaib, et al.
Published: (2018) -
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017) -
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018) -
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018) -
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)