Visualization representation benefits of pre-requirement specification tractability
Representation of Pre-RST information is very useful using visualization elements for realization of benefits of requirements tractability This improves the practitioners motivation to maintain Pre-RST information during life cycle processes. Few researchers proposed visualization for post-RST due t...
| Main Authors: | Altaf, Sohaib, Shah, Asadullah, Imtiaz, Najma, Shah, Abdul Salaam, Ahmed, Syed Faiz |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Science Publishing Corporation Inc.
2018
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/62797/ http://irep.iium.edu.my/62797/1/sohaib-Visualization%20representing-2018.pdf |
Similar Items
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Visualization representing benefits of pre-requirement specification traceability
by: Altaf, Sohaib, et al.
Published: (2018)
by: Altaf, Sohaib, et al.
Published: (2018)
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018)
by: Ujan, Imran Anwar, et al.
Published: (2018)
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018)
by: Imtiaz Ali, Najma, et al.
Published: (2018)
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)
by: Imtiaz Ali, Najma, et al.
Published: (2016)
Near field communication enabled mobile payments: preliminary study
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
An assessment of proximity technology adoption from a user's perspective
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
Approach for successful knowledge management system deployment for organizations
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Integration social media technology and ethical collaborative learning
by: Ataie, Fariba, et al.
Published: (2018)
by: Ataie, Fariba, et al.
Published: (2018)
An innovative Web 2.0-Based collaborative learning framework: activities for the initial development of social negotiation competencies
by: Ataie, Farib, et al.
Published: (2018)
by: Ataie, Farib, et al.
Published: (2018)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Comparison between NFC/RFID and bar code system for halal tags identification: Paired sample t-test evaluation
by: Khosravi, Mohsen, et al.
Published: (2018)
by: Khosravi, Mohsen, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
A hybrid method using kinect depth and color data stream for hand blobs segmentation
by: Karbasi, Mostafa, et al.
Published: (2017)
by: Karbasi, Mostafa, et al.
Published: (2017)
A review of near field communication process: how do it works?
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
by: Brohi, Imtiaz Ali, et al.
Published: (2018)
A review of slicing techniques in software engineering
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Approximate methods for minimum vertex cover fail to provide optimal results on small graph instances: A review
by: Fayaz, Muhammad, et al.
Published: (2018)
by: Fayaz, Muhammad, et al.
Published: (2018)
A robust technique of brain MRI classification using color features and k-nearest neighbor algorithm
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
Selecting respondents for survey questionnaire in Islamic way
by: Shah, Asadullah, et al.
Published: (2017)
by: Shah, Asadullah, et al.
Published: (2017)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Development of a game for history course of secondary school students
by: Ghulamani, Sumbul, et al.
Published: (2017)
by: Ghulamani, Sumbul, et al.
Published: (2017)
Disparity between theory & practice beyond the worst-case competitive analysis
by: Iqbal, Javeria, et al.
Published: (2019)
by: Iqbal, Javeria, et al.
Published: (2019)
A customer methodology for developing green cellular phone: a case of University Malaysia Pahang Students
by: Uddin, Mueen, et al.
Published: (2015)
by: Uddin, Mueen, et al.
Published: (2015)
Similar Items
-
Unstructured source artifacts ontology for requirement validation in GDSD
by: Altaf, Sohaib, et al.
Published: (2018) -
Visualization representing benefits of pre-requirement specification traceability
by: Altaf, Sohaib, et al.
Published: (2018) -
Health information system (HMS) in Malaysia
by: Ujan, Imran Anwar, et al.
Published: (2018) -
Preliminary study for customer’s online shopping satisfaction from security perspective
by: Imtiaz Ali, Najma, et al.
Published: (2018) -
Online shopping satisfaction in Malaysia: A framework for security, trust and cybercrime
by: Imtiaz Ali, Najma, et al.
Published: (2016)