Pub Date : 2020-10-01DOI: 10.4018/ijitpm.2020100104
D. Verma, A. Kush, R. Jain
Mobile ad hoc networks are characterized by wireless medium used for communication, frequent change of topology, and non-availability of centralized control for authentication. Out of all the attributes, communication through open air poses the biggest threat to security. Absence of security implementations by the routing protocols gives opening for intrusion to malicious nodes which then operate various attacks to hinder the normal communication. Solution suggested modifies vastly used AODV protocol to exploit the unused reserved bits of RREP message for identifying the malicious nodes in the MANET. Proposed algorithm finds the neighbors of the destination through RREQ messages, identifies vindictive neighbors providing contrived DSNs of the destination.
{"title":"Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol","authors":"D. Verma, A. Kush, R. Jain","doi":"10.4018/ijitpm.2020100104","DOIUrl":"https://doi.org/10.4018/ijitpm.2020100104","url":null,"abstract":"Mobile ad hoc networks are characterized by wireless medium used for communication, frequent change of topology, and non-availability of centralized control for authentication. Out of all the attributes, communication through open air poses the biggest threat to security. Absence of security implementations by the routing protocols gives opening for intrusion to malicious nodes which then operate various attacks to hinder the normal communication. Solution suggested modifies vastly used AODV protocol to exploit the unused reserved bits of RREP message for identifying the malicious nodes in the MANET. Proposed algorithm finds the neighbors of the destination through RREQ messages, identifies vindictive neighbors providing contrived DSNs of the destination.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123508618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijitpm.2020100101
A. Dumka, Alaknanda Ashok, Parag Verma
The software-defined network (SDN) emerges as an updated technology that changes the scenario of networking where the network is managed by means of software. Any network is always not secure, and hence, the research in terms of securing this network is an area of research. DDoS is one of the attacks that makes a network insecure. This paper proposes the impact in terms of performance of SDN networks due to DDoS attack and proposes a new algorithm for increasing the performance of network. The proposed algorithm prevents the DDoS attack at the application level of flooding by keeping track of IP addresses and thus improves the performance of the network by preventing from DDoS attacks.
{"title":"Performance Analysis of DDoS Attack on SDN and Proposal of Cracking Agorithm","authors":"A. Dumka, Alaknanda Ashok, Parag Verma","doi":"10.4018/ijitpm.2020100101","DOIUrl":"https://doi.org/10.4018/ijitpm.2020100101","url":null,"abstract":"The software-defined network (SDN) emerges as an updated technology that changes the scenario of networking where the network is managed by means of software. Any network is always not secure, and hence, the research in terms of securing this network is an area of research. DDoS is one of the attacks that makes a network insecure. This paper proposes the impact in terms of performance of SDN networks due to DDoS attack and proposes a new algorithm for increasing the performance of network. The proposed algorithm prevents the DDoS attack at the application level of flooding by keeping track of IP addresses and thus improves the performance of the network by preventing from DDoS attacks.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124933154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijitpm.2020100102
D. Saravanan, P. V. Paul, S. Janakiraman, A. Dumka, L. Jayakumar
Soft computing is recognized as the fusion of methodologies mainly designed to model and formulate solutions to real-world problems that are too difficult to model mathematically. The grey wolf optimizer (GWO) algorithm is the recently proposed bio-inspired optimization algorithm that is mainly based on their foraging and hunting behavior. This GWO is proved as the recent and best in solving complex problems, but they too face some drawbacks of low solving precision, slow convergence, and bad local searching ability. In order to overcome the shortcomings of the existing algorithms, this paper is intended to propose a novel algorithm based on the foraging behavior of the cheetah. The cheetah is well known for their leadership hierarchy, decision making, and efficient communication capabilities between their teammates during group hunting. The famous benchmark functions such as unimodal and multimodal functions are being chosen as the testbed, and the experiments are performed on them. The proposed scheme outperforms in terms of computational time and optimal solution.
{"title":"A New Bio-Inspired Algorithm Based on the Hunting Behavior of Cheetah","authors":"D. Saravanan, P. V. Paul, S. Janakiraman, A. Dumka, L. Jayakumar","doi":"10.4018/ijitpm.2020100102","DOIUrl":"https://doi.org/10.4018/ijitpm.2020100102","url":null,"abstract":"Soft computing is recognized as the fusion of methodologies mainly designed to model and formulate solutions to real-world problems that are too difficult to model mathematically. The grey wolf optimizer (GWO) algorithm is the recently proposed bio-inspired optimization algorithm that is mainly based on their foraging and hunting behavior. This GWO is proved as the recent and best in solving complex problems, but they too face some drawbacks of low solving precision, slow convergence, and bad local searching ability. In order to overcome the shortcomings of the existing algorithms, this paper is intended to propose a novel algorithm based on the foraging behavior of the cheetah. The cheetah is well known for their leadership hierarchy, decision making, and efficient communication capabilities between their teammates during group hunting. The famous benchmark functions such as unimodal and multimodal functions are being chosen as the testbed, and the experiments are performed on them. The proposed scheme outperforms in terms of computational time and optimal solution.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127912000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-01DOI: 10.4018/ijitpm.2020100105
S. Rawat, Anushree Sah, A. Dumka
Testing of software remains a fundamentally significant way to check that software behaves as required. Component-based software testing (CBST) is a crucial activity of component-based software development (CBSD) and is based on two crucial proportions: components testing by developers with the source code (e.g., system testing, integration testing, unit testing, etc.) and components testing by end users without source code (black box testing). This work proposes a black box testing technique that calculates the total number of interactions made by component-based software. This technique is helpful to identify the number of test cases for those components where availability of source code is questionable. On the basis of interaction among components, the authors draw a component-link graph and a direct-indirect-link matrix, which helps to calculate the number of interactions in component-based software.
{"title":"Direct-Indirect Link Matrix: A Black Box Testing Technique for Component-Based Software","authors":"S. Rawat, Anushree Sah, A. Dumka","doi":"10.4018/ijitpm.2020100105","DOIUrl":"https://doi.org/10.4018/ijitpm.2020100105","url":null,"abstract":"Testing of software remains a fundamentally significant way to check that software behaves as required. Component-based software testing (CBST) is a crucial activity of component-based software development (CBSD) and is based on two crucial proportions: components testing by developers with the source code (e.g., system testing, integration testing, unit testing, etc.) and components testing by end users without source code (black box testing). This work proposes a black box testing technique that calculates the total number of interactions made by component-based software. This technique is helpful to identify the number of test cases for those components where availability of source code is questionable. On the basis of interaction among components, the authors draw a component-link graph and a direct-indirect-link matrix, which helps to calculate the number of interactions in component-based software.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070103
M. Ramanathan, M. Punnniyamoorthy, V. Balamurugan
The evaluation of the complexity of research and development (R&D) projects is critical for the successful management of projects. In Defence, R&D projects could be classified as mission mode (MM) projects, technology development (TD) projects, science and technology (S&T) projects, infrastructure facilities (IF) projects, and product support (PS) projects. This study is focused on the assessment of the complexity in the five categories of the R&D projects, and it is based on the survey (with about 179 respondents) undertaken by considering about 40 attributes. The purpose of this exercise is to rank the five types of projects based on their complexity. A series of algorithms such as K-means clustering, analytic hierarchy process, modified TOPSIS method, and Henry Garrett ranking technique were applied to arrive at the results. Thus, a scenario analysis framework in terms of different methods is portrayed to select the appropriate ranking of the critical project.
{"title":"Means to Classify the R&D Projects on the Criticality Dimensions","authors":"M. Ramanathan, M. Punnniyamoorthy, V. Balamurugan","doi":"10.4018/ijitpm.2020070103","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070103","url":null,"abstract":"The evaluation of the complexity of research and development (R&D) projects is critical for the successful management of projects. In Defence, R&D projects could be classified as mission mode (MM) projects, technology development (TD) projects, science and technology (S&T) projects, infrastructure facilities (IF) projects, and product support (PS) projects. This study is focused on the assessment of the complexity in the five categories of the R&D projects, and it is based on the survey (with about 179 respondents) undertaken by considering about 40 attributes. The purpose of this exercise is to rank the five types of projects based on their complexity. A series of algorithms such as K-means clustering, analytic hierarchy process, modified TOPSIS method, and Henry Garrett ranking technique were applied to arrive at the results. Thus, a scenario analysis framework in terms of different methods is portrayed to select the appropriate ranking of the critical project.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070102
M. D. Nguyen
The research aims to introduce a new decision-making model for designing a manufacturing line (ML) project in Vietnamese manufacturing plants. The new model has been built from the theory of made-in-Vietnam lean decision-making model and authenticated via multitude of practical methods (observation, surveys, in-depth interviews, and case studies). This model pursues the method of optimal thinking to make the most effective decision in designing manufacturing lines. The proposed model has been confirmed by practical application. The model would be used not only for Vietnamese enterprises but also for other enterprises in both developing and developed countries.
{"title":"A New Decision-Making Model for Manufacturing Line Designs in Vietnamese Manufacturing Plants","authors":"M. D. Nguyen","doi":"10.4018/ijitpm.2020070102","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070102","url":null,"abstract":"The research aims to introduce a new decision-making model for designing a manufacturing line (ML) project in Vietnamese manufacturing plants. The new model has been built from the theory of made-in-Vietnam lean decision-making model and authenticated via multitude of practical methods (observation, surveys, in-depth interviews, and case studies). This model pursues the method of optimal thinking to make the most effective decision in designing manufacturing lines. The proposed model has been confirmed by practical application. The model would be used not only for Vietnamese enterprises but also for other enterprises in both developing and developed countries.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122432274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070106
Sindre Gjøystdal, Thashmee Karunaratne
Building self-organizing teams in agile projects is considered an important job for project leaders. However, the reality is that building self-organized teams lacks focus as many go back to managing tasks because it is more concrete and tangible. While there are an excessive number of studies proving that developing self-organized teams has a positive contribution to project success, there is a lack of knowledge about the consequences of not doing it. This study, therefore, explores the impact inadequate self-organizing teams has on agile project success. Results have identified five failure areas in a self-organizing team that have a negative impact on three success factors in agile projects. Due to a weak direct link between success factors and success criteria, conclusions are limited to a universally applicable impact on success factors. Further research is recommended to generate a universal checklist for success criteria in agile projects that can have a direct link to the identified success factors.
{"title":"Effect of Inadequate Self-Organized Teams in Agile Project Management: A Case Study From the Oil and Gas Industry","authors":"Sindre Gjøystdal, Thashmee Karunaratne","doi":"10.4018/ijitpm.2020070106","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070106","url":null,"abstract":"Building self-organizing teams in agile projects is considered an important job for project leaders. However, the reality is that building self-organized teams lacks focus as many go back to managing tasks because it is more concrete and tangible. While there are an excessive number of studies proving that developing self-organized teams has a positive contribution to project success, there is a lack of knowledge about the consequences of not doing it. This study, therefore, explores the impact inadequate self-organizing teams has on agile project success. Results have identified five failure areas in a self-organizing team that have a negative impact on three success factors in agile projects. Due to a weak direct link between success factors and success criteria, conclusions are limited to a universally applicable impact on success factors. Further research is recommended to generate a universal checklist for success criteria in agile projects that can have a direct link to the identified success factors.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123832659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070105
Quyet-Thang Huynh, Ngoc-Tuan Nguyen
Project management and project scheduling are crucial to help development teams keep track of timing as well as resource allocation. In order to manage software projects, project managers need to anticipate, analyze the risk factors that may occur as well as their impacts on the progress of the project, and assess and adapt the project resource allocation. This paper concentrates on a quantitative approach for risk analysis in software project scheduling by taking advantage of Bayesian networks capacity (including related mathematical calculations) in modeling and assessing uncertainty and incorporates them in software project scheduling with program evaluation and review technique (PERT). Common risk factors in project scheduling are also examined, and a Bayesian networks model of 19 common risk factors and their causal relationships is proposed and confirmed. The research also borrows and implements categories and levels of risk from construction projects into software projects. A tool was built to experiment and validate the proposed model.
{"title":"Probabilistic Method for Managing Common Risks in Software Project Scheduling Based on Program Evaluation Review Technique","authors":"Quyet-Thang Huynh, Ngoc-Tuan Nguyen","doi":"10.4018/ijitpm.2020070105","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070105","url":null,"abstract":"Project management and project scheduling are crucial to help development teams keep track of timing as well as resource allocation. In order to manage software projects, project managers need to anticipate, analyze the risk factors that may occur as well as their impacts on the progress of the project, and assess and adapt the project resource allocation. This paper concentrates on a quantitative approach for risk analysis in software project scheduling by taking advantage of Bayesian networks capacity (including related mathematical calculations) in modeling and assessing uncertainty and incorporates them in software project scheduling with program evaluation and review technique (PERT). Common risk factors in project scheduling are also examined, and a Bayesian networks model of 19 common risk factors and their causal relationships is proposed and confirmed. The research also borrows and implements categories and levels of risk from construction projects into software projects. A tool was built to experiment and validate the proposed model.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125927231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070104
João Costa, André Vasconcelos, Bruno Fragoso
Enterprise architecture existing approaches are expected to support the organization's evolution from a current state to a future one. Although some researches address the identification of the alignment between projects and strategic objectives, the measurement and quantification of this architectural alignment, considering the information system architecture quality attributes, is not usually considered when defining or implementing projects. This paper contributes to fulfil this gap by extending Archimate enterprise architecture framework and proposing a 4-step approach for assessing the alignment between enterprise projects and goals, namely 1) identify the alignment between the projects and the strategic objectives, 2) identify the quality attributes derived from the strategic objectives, 3) identify the applicable metrics to the projects' architecture, 4) quantify the alignment level between the projects and the strategic objectives. The results show that it is possible to use enterprise architecture for selecting projects that have higher impact on the company's strategy.
{"title":"An Enterprise Architecture Approach for Assessing the Alignment Between Projects and Goals","authors":"João Costa, André Vasconcelos, Bruno Fragoso","doi":"10.4018/ijitpm.2020070104","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070104","url":null,"abstract":"Enterprise architecture existing approaches are expected to support the organization's evolution from a current state to a future one. Although some researches address the identification of the alignment between projects and strategic objectives, the measurement and quantification of this architectural alignment, considering the information system architecture quality attributes, is not usually considered when defining or implementing projects. This paper contributes to fulfil this gap by extending Archimate enterprise architecture framework and proposing a 4-step approach for assessing the alignment between enterprise projects and goals, namely 1) identify the alignment between the projects and the strategic objectives, 2) identify the quality attributes derived from the strategic objectives, 3) identify the applicable metrics to the projects' architecture, 4) quantify the alignment level between the projects and the strategic objectives. The results show that it is possible to use enterprise architecture for selecting projects that have higher impact on the company's strategy.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115575120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-07-01DOI: 10.4018/ijitpm.2020070101
S. Parthasarathy, C. Sridharan, T. Chandrakumar, S. Sridevi
Software quality is a very important aspect in evolving strategy for IT vendors involved in commercial off-the-shelf (COTS) (also referred as packaged software) product development. Software metrics are widely accepted measures for monitoring and managing the quality in software projects. Enterprise resource planning (ERP) systems are COTS products and attempt to integrate data and processes in organizations and often require extensive customization. Using software quality metrics already established in literature, software quality attributes defined by the quality model ISO/IEC 9126 were evaluated for a standard and a customized ERP product. This will help the ERP team to identify the specific quality attributes that were affected owing to customization. This research study infers that there exists a considerable impact of ERP system customization over the quality of ERP product. The implications of the findings for both practice and research are discussed, and possible areas of future research are identified.
{"title":"Quality Assessment of Standard and Customized COTS Products","authors":"S. Parthasarathy, C. Sridharan, T. Chandrakumar, S. Sridevi","doi":"10.4018/ijitpm.2020070101","DOIUrl":"https://doi.org/10.4018/ijitpm.2020070101","url":null,"abstract":"Software quality is a very important aspect in evolving strategy for IT vendors involved in commercial off-the-shelf (COTS) (also referred as packaged software) product development. Software metrics are widely accepted measures for monitoring and managing the quality in software projects. Enterprise resource planning (ERP) systems are COTS products and attempt to integrate data and processes in organizations and often require extensive customization. Using software quality metrics already established in literature, software quality attributes defined by the quality model ISO/IEC 9126 were evaluated for a standard and a customized ERP product. This will help the ERP team to identify the specific quality attributes that were affected owing to customization. This research study infers that there exists a considerable impact of ERP system customization over the quality of ERP product. The implications of the findings for both practice and research are discussed, and possible areas of future research are identified.","PeriodicalId":375999,"journal":{"name":"Int. J. Inf. Technol. Proj. Manag.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115393028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}