Pub Date : 2023-01-01DOI: 10.12720/jait.14.5.892-896
Songsong Wang, Wenxuan Qiao, Lei Wang, Zhewei Shen, Pengju Yang, Li Bian
—Aiming at the problems of heavy workload and large errors in traditional substation engineering estimation methods, an intelligent estimation method for substation engineering based on Building Information Modeling (BIM) combined with a Differential Evolution (DE) algorithm to optimize Random Forest (RF) is proposed. This proposed method uses DE to optimize the RF model’s splitting features and decision trees to enhance the model’s estimation accuracy. The BIM of the substation project is used to determine engineering quantity information, which serves as the input of the DE-RF model, enabling intelligent cost estimation of the substation project. The results of the example analysis show that the relative error of the proposed cost estimation method for substation engineering based on BIM and DE-RF is below 10%. This accuracy level meets various substation engineering cost estimation scenarios, validating the feasibility and correctness of the proposed model.
{"title":"Research on Substation Engineering Estimates Based on BIM-DE-RF","authors":"Songsong Wang, Wenxuan Qiao, Lei Wang, Zhewei Shen, Pengju Yang, Li Bian","doi":"10.12720/jait.14.5.892-896","DOIUrl":"https://doi.org/10.12720/jait.14.5.892-896","url":null,"abstract":"—Aiming at the problems of heavy workload and large errors in traditional substation engineering estimation methods, an intelligent estimation method for substation engineering based on Building Information Modeling (BIM) combined with a Differential Evolution (DE) algorithm to optimize Random Forest (RF) is proposed. This proposed method uses DE to optimize the RF model’s splitting features and decision trees to enhance the model’s estimation accuracy. The BIM of the substation project is used to determine engineering quantity information, which serves as the input of the DE-RF model, enabling intelligent cost estimation of the substation project. The results of the example analysis show that the relative error of the proposed cost estimation method for substation engineering based on BIM and DE-RF is below 10%. This accuracy level meets various substation engineering cost estimation scenarios, validating the feasibility and correctness of the proposed model.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135649056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.5.950-959
Irfan Syamsuddin, Dedy Syamsuar
—The escalating dependence on information technology for daily activities ensures that cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators is becoming increasingly crucial in addressing the surge of cybercrime incidents. Live forensics investigation, a challenging facet of digital evidence investigation, confronts several limitations. This study focuses on the complexities associated with retrieving digital evidence from volatile memory during live forensics investigations, explicitly comparing the efficacy of extracting digital evidence from DDR2 and DDR3 Random Access Memory (RAM). This study aims to analyze and compare potential variations in evidence acquisition outcomes between the two RAM types by applying three distinct scenarios: identifying registry and network activities, catching malicious codes, and obtaining login passwords on Social Media. The results demonstrate that DDR2 RAM exhibits a lower propensity for concealing digital evidence during live forensics investigations compared to DDR3 RAM. The implications of these findings are discussed, along with suggestions for potential ramifications and avenues for future research.
{"title":"Live Memory Forensics Investigations: A Comparative Analysis","authors":"Irfan Syamsuddin, Dedy Syamsuar","doi":"10.12720/jait.14.5.950-959","DOIUrl":"https://doi.org/10.12720/jait.14.5.950-959","url":null,"abstract":"—The escalating dependence on information technology for daily activities ensures that cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators is becoming increasingly crucial in addressing the surge of cybercrime incidents. Live forensics investigation, a challenging facet of digital evidence investigation, confronts several limitations. This study focuses on the complexities associated with retrieving digital evidence from volatile memory during live forensics investigations, explicitly comparing the efficacy of extracting digital evidence from DDR2 and DDR3 Random Access Memory (RAM). This study aims to analyze and compare potential variations in evidence acquisition outcomes between the two RAM types by applying three distinct scenarios: identifying registry and network activities, catching malicious codes, and obtaining login passwords on Social Media. The results demonstrate that DDR2 RAM exhibits a lower propensity for concealing digital evidence during live forensics investigations compared to DDR3 RAM. The implications of these findings are discussed, along with suggestions for potential ramifications and avenues for future research.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136203530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.1.122-129
Keerthi Kethineni, G. Pradeepini
Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.
{"title":"Identification of Leaf Disease Using Machine Learning Algorithm for Improving the Agricultural System","authors":"Keerthi Kethineni, G. Pradeepini","doi":"10.12720/jait.14.1.122-129","DOIUrl":"https://doi.org/10.12720/jait.14.1.122-129","url":null,"abstract":"Diagnosing plant disease is the foundation for effective and accurate plant disease prevention in a complicated environment. Smart farming is one of the fast-growing processes in the agricultural system, with the identification of disease in plants being a major one to help farmers. The processed data is saved in a database and used in making decisions in advance support, analysis of plants, and helps in crop planning. Plants are one of the essential resources for avoiding global warming. However, diseases such as blast, canker, black spot, brown spot, and bacterial leaf damage the plants. In this paper, image processing integration is developed to identify the type of disease and help automatically inspect all the leaf batches by storing the processed data. In some places, farmers are unaware of the experts and do not have proper facilities. In such conditions, one technique can be beneficial in keeping track and monitoring more crops. This technique makes it much easier and cheaper to detect disease. Machine learning can provide a method and algorithm to detect the disease. There should be training in images of all types of leaves, including healthy and disease leaf images. Five-stage detection processes are done in this paper. The stages are preprocessing, segmentation using k-Mean, feature extraction, features optimization using Firefly optimization Algorithm (FA), and classification using Support Vector Machine (SVM). The accuracy rate achieved using the proposed technique, i.e., GA-SVM is 91.3%, sensitivity is 90.72%, specificity 91.88, and precision is 92%. The results are evaluated using the matlab software tool.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.1.39-45
Bleron Zherka, Zhilbert Tafa
Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.
{"title":"A Vehicle Sensor Network for Real-Time Air Pollution Analysis","authors":"Bleron Zherka, Zhilbert Tafa","doi":"10.12720/jait.14.1.39-45","DOIUrl":"https://doi.org/10.12720/jait.14.1.39-45","url":null,"abstract":"Air Pollution (AP) is one of the main threats to global health. Real-time dynamic mapping of pollution distribution is of a crucial importance to the AP reduction and management. Conventional air quality monitoring relies on expensive and cumbersome monitoring stations. Such stations are sparsely deployed over a region – typically one to a few per city. The extrapolation of the dynamic spatiotemporal data away from these stations might be inaccurate. In this paper, we present a participatory Vehicle Sensor Network (VSN) based on low-cost mobile nodes deployed on public (taxi) vehicles. The system enables continuous real-time data acquisition, transmission, and utilization. As compared to the conventional approaches, our system greatly improves sensing coverage. The proposed platform enables the acquisition of a large amount of georeferenced and time-stamped data. It provides real time pollution mapping and historical data view. The system’s operational stability and continuity are examined and confirmed through the analysis of background data collected during 15 days of experimental implementation.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66329998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.2.264-270
Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal
—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.
{"title":"A Weighted Ensemble of VAR and LSTM for Multivariate Forecasting of Cloud Resource Usage","authors":"Jyoti Shetty, Karthik Cottur, G. Shobha, Y. Prajwal","doi":"10.12720/jait.14.2.264-270","DOIUrl":"https://doi.org/10.12720/jait.14.2.264-270","url":null,"abstract":"—Forecasting resource usage values of a cloud service has ample applications such as service performance management, auto-scaling, capacity planning, and so on. While univariate forecasting techniques are the focus of current research, multivariate forecasting is rarely explored. This research work focuses on multivariate forecasting of resource usage values believing that there exists interdependency among the features of the underlying system that must be considered while forecasting. At first, the interdependency among the attributes is verified using Granger causality tests. Then the research explores various forecasting approaches — univariate Multi-Layer Perceptron (MLP), univariate Long Short Term Memory (LSTM), multivariate Vector Autoregression (VAR), and multivariate stacked LSTM. Further based on the observations of performances of these models the research proposes an implementation of a weighted ensemble of VAR and LSTM models to forecast key cloud resource usage metrics. The models thus proposed are implemented and validated using the publicly available GWA-T-12 Bitbrains time series dataset. The results show that the multivariate models outperform univariate models with lesser Normalised Root Mean Square Error (NRMSE) values. Also, the multivariate stacked LSTM outperforms VAR and the proposed ensemble forecasting model with lesser NRMSE values within a range of 1–5% for various resources across different lag values.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.2.204-211
Dominic Kern, Matthias Tessmann
—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.
{"title":"Client-Based Distributed Video Conferencing via WebRTC","authors":"Dominic Kern, Matthias Tessmann","doi":"10.12720/jait.14.2.204-211","DOIUrl":"https://doi.org/10.12720/jait.14.2.204-211","url":null,"abstract":"—The most common video conferencing topologies are mesh and star topologies. The star topology requires a powerful server which leads to high costs. In the mesh topology, this is not the case, as each participant is directly connected to every other participant. However, due to the load caused by the numerous connections, the mesh topology is not suitable for larger video conferences. In this paper, we propose a video conferencing service that combines the advantages of the mesh and star topologies to enable larger video conferences without the need for powerful servers. This is achieved by distributing the video streams over the most powerful participants instead of a server. The resulting system achieves an improvement in video quality compared to a reference test in the mesh topology, which was determined based on the transmission rate and frame rate.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66330539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.3.495-500
Mayank Agarwal, Abhay H. Kashyap, G. Shobha, Jyothi Shetty, R. Dev
—Conditional Independence (CI) testing is a crucial operation in causal model discovery and validation. Effectively performing this requires a linearly scalable and robust algorithm and its implementation. Previous techniques, such as cross-correlation, a linear method; Kernel Conditional Independence Test (KCIT,) and a kernel-based algorithm, do not scale well with dataset size and pose a bottleneck for CI algorithms. An improved version of kernel-based algorithms which use linear mapping to decrease computational time is the Randomized conditional Correlation Test (RCoT) and Randomized Conditional Independence Test (RCIT). This paper describes their use and implementation in Python. This paper then compares the time complexity of the RCoT algorithm with a previously implemented Discretization-based algorithm Probspace. The results show that the accuracy of the previous and current models is similar, but the time taken to get these results has been reduced by 50%. The implemented algorithm takes about 3s to run the testcases (the data used and testcases generated are described in Section IV-C).
{"title":"Causal Inference and Conditional Independence Testing with RCoT","authors":"Mayank Agarwal, Abhay H. Kashyap, G. Shobha, Jyothi Shetty, R. Dev","doi":"10.12720/jait.14.3.495-500","DOIUrl":"https://doi.org/10.12720/jait.14.3.495-500","url":null,"abstract":"—Conditional Independence (CI) testing is a crucial operation in causal model discovery and validation. Effectively performing this requires a linearly scalable and robust algorithm and its implementation. Previous techniques, such as cross-correlation, a linear method; Kernel Conditional Independence Test (KCIT,) and a kernel-based algorithm, do not scale well with dataset size and pose a bottleneck for CI algorithms. An improved version of kernel-based algorithms which use linear mapping to decrease computational time is the Randomized conditional Correlation Test (RCoT) and Randomized Conditional Independence Test (RCIT). This paper describes their use and implementation in Python. This paper then compares the time complexity of the RCoT algorithm with a previously implemented Discretization-based algorithm Probspace. The results show that the accuracy of the previous and current models is similar, but the time taken to get these results has been reduced by 50%. The implemented algorithm takes about 3s to run the testcases (the data used and testcases generated are described in Section IV-C).","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.3.532-542
Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis
—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded
{"title":"A Model to Prevent Gray Hole Attack in Mobile Ad-Hoc Networks","authors":"Thabiso N. Khosa, Topside E. Mathonsi, D. D. Plessis","doi":"10.12720/jait.14.3.532-542","DOIUrl":"https://doi.org/10.12720/jait.14.3.532-542","url":null,"abstract":"—Over the past few years, Mobile Ad-hoc Networks (MANET) has been playing an important role in ubiquitous networks based on its ability to support mobility without depending on infrastructure-based design, dynamic topology, and thus, are known as decentralized environment. One of the advantages of MANET is that its nodes can act both as routers and hosts. This, therefore, implies that its nodes can transmit packets between source to destination nodes. As a result of such and many more advantages, these networks are more vulnerable to different types of network attacks. In the recent past, several secured routing protocols were proposed and implemented for MANET. However, those protocols cannot fully guarantee security within these networks in terms of Denial of Services (DoS) attacks such as black hole and gray hole attacks. The review of the literature showed that existing solutions cannot always ensure true node classification. This is because MANET’s cooperative existence sometimes leads to the false exclusion of innocent nodes and/or proper classification of malicious nodes. A new Gray Hole Prevention (GRAY-HP) algorithm for the detection of malicious nodes with the actual high accuracy ratio of node classification is proposed in this paper. The proposed algorithm employs and modifies the gray-attack prevention technique known as Secure Detection Prevention and Elimination Gray Hole (SDPEGH), and the proactive scheme. It has been confirmed by Network Simulator 2 (NS2) computer simulation that the proposed algorithm outperforms the Genetic Algorithm to Bacterial Foraging Optimization (GA-BFO) and Rough Set Theory (RSetTheory) algorithms in terms of throughput, routing overhead and delivery ratio. The proposed GRAY-HP algorithm guarantees the successful elimination of Gray hole nodes, while it also ensures that no legitimate nodes are excluded","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66331787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DASS-21 Based Psychometric Prediction Using Advanced Machine Learning Techniques","authors":"Jayshree Ghorpade-aher, Ahbaz Memon, S. Chugh, Abhishek Chebolu, Prajakta Chaudhari, Janhavi Chavan","doi":"10.12720/jait.14.3.571-580","DOIUrl":"https://doi.org/10.12720/jait.14.3.571-580","url":null,"abstract":".","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66332287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.12720/jait.14.4.685-693
Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod
—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.
{"title":"A Distributed Software Project Management Framework","authors":"Kamal Uddin Sarker, R. Hasan, A. Deraman, Salman Mahmmod","doi":"10.12720/jait.14.4.685-693","DOIUrl":"https://doi.org/10.12720/jait.14.4.685-693","url":null,"abstract":"—The software industry is enjoying the permeable and trans-border flow of software markets and can access resources from all corners of the world. Software engineers gain international work experience through a distributed working environment. It involves participation from individuals with different cultures, languages, and geographic time zones to work on a single project. In addition to providing global opportunities for software experts and businessmen, it also introduces new project management challenges. Barriers exist in trust, communication, monitoring, languages, cultures, and time zones. Distance mode management faces more technical challenges due to stakeholders’ ambiguous understanding and various documentation. This study addresses an in-depth analysis of challenges and currently practicing methods. Moreover, a new virtual project management framework is proposed to minimize issues and maximize the virtual project management team’s throughput. The framework is compared with commonly used methodologies by experts who have experience in global software project management, and the analysis is performed using the analytical hierarchy process. The evaluation matrix has shown that the proposed model is adequate for distance project management with better score in virtual scope and virtual management). Its excellency is in standard documentation practice, change management, and improving re-usability practice that will enhance business goals and stakeholder’s satisfaction.","PeriodicalId":36452,"journal":{"name":"Journal of Advances in Information Technology","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66333308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}