Provenance means origin. There are two types of Provenance namely Data Provenance and Workflow Provenance. Data Provenance refers to the process of recording and tracking the source or origin of data while workflow provenance means history of workflows and their data that were used while performing an operation to get required result. The results which are obtained while performing operations are called datasets. On these datasets, the queries are performed to get required result. While exploring provenance topic in data and workflow, the author have tried to explore how a model can be presented and discussed which can capture interaction between data provenance and workflow provenance. In this paper, the author have discussed further about provenance, its types and its importance and also discussed how to execute query on provenance data. The main focus of this study was on the model which captures interaction between workflow and data provenance including the above mentioned topics.
{"title":"A Model To Capture Interaction Between Data Provenance And Workflow Provenance","authors":"Zeeshan Ahmed, Syed Saif ur Rahman","doi":"10.31645/2014.12.2.1","DOIUrl":"https://doi.org/10.31645/2014.12.2.1","url":null,"abstract":"Provenance means origin. There are two types of Provenance namely Data Provenance and Workflow Provenance. Data Provenance refers to the process of recording and tracking the source or origin of data while workflow provenance means history of workflows and their data that were used while performing an operation to get required result. The results which are obtained while performing operations are called datasets. On these datasets, the queries are performed to get required result. While exploring provenance topic in data and workflow, the author have tried to explore how a model can be presented and discussed which can capture interaction between data provenance and workflow provenance. In this paper, the author have discussed further about provenance, its types and its importance and also discussed how to execute query on provenance data. The main focus of this study was on the model which captures interaction between workflow and data provenance including the above mentioned topics.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124523570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of web services APIs play a vital role in the development of project in web where as in the era of rapid development; the use of web services are involved as a software as services; with the assistance of Internet web sites containing the full of useful information. Therefore, the trend of REST has increases, the uses of services development gained much more attention and widely used in last few years. Hence, the values of information security are becoming a challenge. Similarly, the restful web services are becoming a favorite, because it is lightweight, easy to implement and it also compatible with the cross platform solutions like mobile, PDAs and enterprises applications. As it has not any predefined security model, therefore the engineers also take the responsibility to implement the techniques to secure the information of enterprises. In this study our focus is to explore the best practices such as claim based, web tokens and delegation based by using Asp.Net Web API.
在web飞速发展的时代,web服务api的使用在项目开发中起着至关重要的作用;网络服务的使用涉及到作为软件的服务;在载有丰富有用资讯的互联网网站的协助下。因此,REST的趋势越来越明显,服务开发的使用在最近几年得到了越来越多的关注和广泛的应用。因此,资讯保安的价值正成为一个挑战。同样,rest式web服务正成为人们的最爱,因为它轻量级,易于实现,并且与跨平台解决方案(如移动、pda和企业应用程序)兼容。由于它没有任何预定义的安全模型,因此工程师也有责任实现企业信息安全的技术。在本研究中,我们的重点是探索使用Asp的最佳实践,如基于索赔,web令牌和基于委托。Net Web API。
{"title":"Restful Web Services Security By Using ASP.NET Web API MVC Based","authors":"Muhammad Imran Hussain, Naveed Dilber","doi":"10.31645/2014.12.1.1","DOIUrl":"https://doi.org/10.31645/2014.12.1.1","url":null,"abstract":"The use of web services APIs play a vital role in the development of project in web where as in the era of rapid development; the use of web services are involved as a software as services; with the assistance of Internet web sites containing the full of useful information. Therefore, the trend of REST has increases, the uses of services development gained much more attention and widely used in last few years. Hence, the values of information security are becoming a challenge. Similarly, the restful web services are becoming a favorite, because it is lightweight, easy to implement and it also compatible with the cross platform solutions like mobile, PDAs and enterprises applications. As it has not any predefined security model, therefore the engineers also take the responsibility to implement the techniques to secure the information of enterprises. In this study our focus is to explore the best practices such as claim based, web tokens and delegation based by using Asp.Net Web API.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The explosive growth of data in banking sector is common phenomena. It is due to early adaptation of information system by Banks. This vast volume of historical data related to financial position of individuals and organizations compel banks to evaluate credit worthiness of clients to offers new services. Credit scoring can be defined as a technique that facilitates lenders in deciding to grant or reject credit to consumers. A credit score is a product of advanced analytical models that catch a snapshot of the consumer credit history and translate it into a numeric number that signify the amount of risks that will be generated in a specific deal by the consumer. Automated Credit scoring mechanism has replaced onerous, error-prone labour-intensive manual reviews that were less transparent and lacks statistical-soundness in almost all financial organizations. The credit scoring functionality is a type of classification problem for the new customer. There are numerous data classification algorithm proposed and each one has its pros and cons. This independent study focuses on comparing three data classification algorithms namely: Naïve Bayes, Bayesian Network and Bagging, for credit scoring task. An extensive series of experiments are performed on three standard credit scoring datasets: (i) German credit dataset, (ii) Australian credit dataset and (iii) Pakistan credit dataset. One of the main contributions of this study is to introduced Pakistan credit dataset; it is collected from local credit repository, and transformed accordingly to be used in the study. The studies compare the experimental results of different selected algorithms for classification, their standard evaluation measures, performance on the three datasets, and conclude the major findings.
{"title":"Development of Credit Scoring Model to Determine the Creditworthiness of Borrowers","authors":"Amjad Ali, Muhammad Rafi","doi":"10.31645/2014.12.2.2","DOIUrl":"https://doi.org/10.31645/2014.12.2.2","url":null,"abstract":"The explosive growth of data in banking sector is common phenomena. It is due to early adaptation of information system by Banks. This vast volume of historical data related to financial position of individuals and organizations compel banks to evaluate credit worthiness of clients to offers new services. Credit scoring can be defined as a technique that facilitates lenders in deciding to grant or reject credit to consumers. A credit score is a product of advanced analytical models that catch a snapshot of the consumer credit history and translate it into a numeric number that signify the amount of risks that will be generated in a specific deal by the consumer. Automated Credit scoring mechanism has replaced onerous, error-prone labour-intensive manual reviews that were less transparent and lacks statistical-soundness in almost all financial organizations. The credit scoring functionality is a type of classification problem for the new customer. There are numerous data classification algorithm proposed and each one has its pros and cons. This independent study focuses on comparing three data classification algorithms namely: Naïve Bayes, Bayesian Network and Bagging, for credit scoring task. An extensive series of experiments are performed on three standard credit scoring datasets: (i) German credit dataset, (ii) Australian credit dataset and (iii) Pakistan credit dataset. One of the main contributions of this study is to introduced Pakistan credit dataset; it is collected from local credit repository, and transformed accordingly to be used in the study. The studies compare the experimental results of different selected algorithms for classification, their standard evaluation measures, performance on the three datasets, and conclude the major findings.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116911507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data mining algorithms have been using since few years in financial institutions like banks, insurance organizations, etc, and these organizations are using applications of data mining techniques in prediction of business collapse, marketing analysis and fraud detection. In this study our objective is to provide a comparative analysis and find the most suitable techniques of data mining for fraud detection in the area of branchless banking on certain comparison criteria. We have used few different mining algorithms like decision tree, association rules, clustering, naïve bayes and neural network. Our other objective is to find out the comparison criteria, through which we compare these algorithms and that criteria are training volume (small dataset) against quality patterns level, model creation Time, ease of implementation, ease of presentation, extensibility, efficiency, simplicity, training volume (large dataset) against quality patterns level, popularity. In the end we have suggested the most suitable algorithms for fraud detection on branches bank.
{"title":"Comparative Analysis of Data Mining Techniques for Fraud Detection (A Case Study of Branchless Banking)","authors":"Talha Umair, Syed Saif-ur-Rahman","doi":"10.31645/2013.11.1.2","DOIUrl":"https://doi.org/10.31645/2013.11.1.2","url":null,"abstract":"Data mining algorithms have been using since few years in financial institutions like banks, insurance organizations, etc, and these organizations are using applications of data mining techniques in prediction of business collapse, marketing analysis and fraud detection. In this study our objective is to provide a comparative analysis and find the most suitable techniques of data mining for fraud detection in the area of branchless banking on certain comparison criteria. We have used few different mining algorithms like decision tree, association rules, clustering, naïve bayes and neural network. Our other objective is to find out the comparison criteria, through which we compare these algorithms and that criteria are training volume (small dataset) against quality patterns level, model creation Time, ease of implementation, ease of presentation, extensibility, efficiency, simplicity, training volume (large dataset) against quality patterns level, popularity. In the end we have suggested the most suitable algorithms for fraud detection on branches bank.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"499 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134007670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multiprotocol label switching is the latest and developing technology in the world of the internet. It speeds up the network by using the technique of label instead of an IP address. It provides reliable transmission of data with high speed and low delay. For efficient use of network utilization MPLS has a key feature of QoS. Due to the effective utilization of network resources, minimum delay and predictable performance MPLS technology make it more appropriate for implementing multimedia type applications. In this research, the performance of MPLS technology is compared with the traditional IP network for multimedia traffic in node scalable networks. For simulating and comparing the performance of both technologies OPNET modular 14.5 is used. This comparison is done on the basis of network performance parameters such as packet loss/ traffic drop, end-to-end delay, and throughput. Finally, the results have been evaluated which show that MPLS technology provides better performance as compared to IP in node scalable environment.
{"title":"PERFORMANCE ANALYSIS OF MPLS AND TRADITIONAL IP IN NODE SCALABLE NETWORKS","authors":"Muhammad Arshad, L. Rukh, Hussain Shah, B. Khan","doi":"10.31645/jisrc-019-02","DOIUrl":"https://doi.org/10.31645/jisrc-019-02","url":null,"abstract":"Multiprotocol label switching is the latest and developing technology in the world of the internet. It speeds up the network by using the technique of label instead of an IP address. It provides reliable transmission of data with high speed and low delay. For efficient use of network utilization MPLS has a key feature of QoS. Due to the effective utilization of network resources, minimum delay and predictable performance MPLS technology make it more appropriate for implementing multimedia type applications. In this research, the performance of MPLS technology is compared with the traditional IP network for multimedia traffic in node scalable networks. For simulating and comparing the performance of both technologies OPNET modular 14.5 is used. This comparison is done on the basis of network performance parameters such as packet loss/ traffic drop, end-to-end delay, and throughput. Finally, the results have been evaluated which show that MPLS technology provides better performance as compared to IP in node scalable environment.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117332900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The DBpedia is an open data repository extracted from a crowd sourced Knowledge base Wikipedia, because of which the information available there is more vulnerable to inconsistency, grammatical errors, structures and, data type problems. These are just a few issues that existing data is prone to. In this research, our prime focus would be on Data type problems, particularly, the problem of one attribute containing multiple facts. Proposed is the approach in which the issue of Inconsistent behavior of the desired output is addressed and improved, on the idea based on concept hierarchy i.e. association of Parent - Child relationship by employing Human computation and the confidence, and trust of the output has been calculated, out of which the Hierarchies of the entities could be maintained in the form of Triples which could be used to mapped on other data to led the data out of the problem of Implicit type of relationship between attributes.
{"title":"Improving data quality using techniques from human computation","authors":"Vikram Kumar Kirpalani, Saif-ur-Rahman Saif-ur-Rahman","doi":"10.31645/2014.12.1.10","DOIUrl":"https://doi.org/10.31645/2014.12.1.10","url":null,"abstract":"The DBpedia is an open data repository extracted from a crowd sourced Knowledge base Wikipedia, because of which the information available there is more vulnerable to inconsistency, grammatical errors, structures and, data type problems. These are just a few issues that existing data is prone to. In this research, our prime focus would be on Data type problems, particularly, the problem of one attribute containing multiple facts. Proposed is the approach in which the issue of Inconsistent behavior of the desired output is addressed and improved, on the idea based on concept hierarchy i.e. association of Parent - Child relationship by employing Human computation and the confidence, and trust of the output has been calculated, out of which the Hierarchies of the entities could be maintained in the form of Triples which could be used to mapped on other data to led the data out of the problem of Implicit type of relationship between attributes.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This study is focused on the conceptual relationship between different ayah of Al-Quran. Let’s take an example what Allah says about Muttaqee in the Al-Quran, the Quran say Muttaqee are those “They are on (true) guidance from their Lord” or “Those who got Falah” but when we go in the context of “Falah” we don’t find such word related Muttaqee means the relationship is there like if someone ask, who are Muttaqee the answer will be “Those who got Falah”; similarly if it is asked that who got Falah the answer is Muttaqee. There are several examples available in the Quran where we are not aware what will be the next related ayah to it. Another example in surah Al- Baqara Allah says: “The month of Ramadan in which was revealed the Qur'an” but next related ayah which we found in surah Al-Qadr in which Allah says: “Verily! We have sent it (this Qur'an) down in the night of Al-Qadr (Decree)” means the Allah revealed Al-Quran in Ramadan also in next surah it is further explained that it was revealed in lailat-ul-qadr.
{"title":"Ontological Knowledge Management System Of Islamic Concepts","authors":"H. Ali","doi":"10.31645/2013.11.1.5","DOIUrl":"https://doi.org/10.31645/2013.11.1.5","url":null,"abstract":"This study is focused on the conceptual relationship between different ayah of Al-Quran. Let’s take an example what Allah says about Muttaqee in the Al-Quran, the Quran say Muttaqee are those “They are on (true) guidance from their Lord” or “Those who got Falah” but when we go in the context of “Falah” we don’t find such word related Muttaqee means the relationship is there like if someone ask, who are Muttaqee the answer will be “Those who got Falah”; similarly if it is asked that who got Falah the answer is Muttaqee. There are several examples available in the Quran where we are not aware what will be the next related ayah to it. Another example in surah Al- Baqara Allah says: “The month of Ramadan in which was revealed the Qur'an” but next related ayah which we found in surah Al-Qadr in which Allah says: “Verily! We have sent it (this Qur'an) down in the night of Al-Qadr (Decree)” means the Allah revealed Al-Quran in Ramadan also in next surah it is further explained that it was revealed in lailat-ul-qadr.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123911800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research report is about providing a solution to the problem of channel assignment in the multi radio wireless mesh networks that have an ad hoc based infrastructure. The aim was to minimize the fractional interference so that throughput can be maximized. The algorithms to solve this problem were classified and explained how they work. A description of channel assignment techniques is given along with a brief comparison in the literature. Main focus was towards the use on genetic algorithm. It also gives a detailed explanation of how genetic algorithm could be implemented in order to solve this problem along with conflict graphs being made by running functions in MATLAB.
{"title":"Channel Assignment Algorithms and Strategies for Wireless Mesh Networks","authors":"Maliha Amir Ali Charania, Husnain Mansoor Ali","doi":"10.31645/2013.11.1.1","DOIUrl":"https://doi.org/10.31645/2013.11.1.1","url":null,"abstract":"This research report is about providing a solution to the problem of channel assignment in the multi radio wireless mesh networks that have an ad hoc based infrastructure. The aim was to minimize the fractional interference so that throughput can be maximized. The algorithms to solve this problem were classified and explained how they work. A description of channel assignment techniques is given along with a brief comparison in the literature. Main focus was towards the use on genetic algorithm. It also gives a detailed explanation of how genetic algorithm could be implemented in order to solve this problem along with conflict graphs being made by running functions in MATLAB.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126471881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growing use of mobile devices, it is a known fact that more people use internet from mobile devices than the conventional desktop PCs. Specifically, mobile devices are gaining popularity and with ease of availability its usage is a global phenomenon, creating a market and eco system of its own. Similarly online and mobile banking facilities have made a mark of its own, as consumers can now easily access their financial information from anywhere in the world and commit transactions without physically being present in financial institution of their choice. Combining the above two technologies opens a new arena of challenges, where a balance of functionality and security is to be carefully considered. Using online and mobile banking systems from mobile devices, either via browser or mobile business application, both the consumer and the institution are required to adopt a paradigm shift with respect to understanding the risks and required controls to mitigate those risks. In this research we attempted to study security issues and risks related to mobile devices faced by the banking industry, more particularly, mobile banking. Further, we shall look into the current trends, future challenges and solutions available in order to secure the communication between mobile devices and business application and how they can be mitigated. Furthermore, we will conduct a survey within the banking industry to understand the current security mechanisms adopted by these institutions. Moreover, consumer awareness, their thought process and views related to security threats shall be studied to identify their understanding of the risks and challenges and their comfort level while using mobile devices for financial transactions.
{"title":"A Survey: Online and mobile banking risks, security issues and challenges on mobile devices and its user awareness","authors":"A. Abbas, Naveed Dilber","doi":"10.31645/2013.11.2.1","DOIUrl":"https://doi.org/10.31645/2013.11.2.1","url":null,"abstract":"With the growing use of mobile devices, it is a known fact that more people use internet from mobile devices than the conventional desktop PCs. Specifically, mobile devices are gaining popularity and with ease of availability its usage is a global phenomenon, creating a market and eco system of its own. Similarly online and mobile banking facilities have made a mark of its own, as consumers can now easily access their financial information from anywhere in the world and commit transactions without physically being present in financial institution of their choice. Combining the above two technologies opens a new arena of challenges, where a balance of functionality and security is to be carefully considered. Using online and mobile banking systems from mobile devices, either via browser or mobile business application, both the consumer and the institution are required to adopt a paradigm shift with respect to understanding the risks and required controls to mitigate those risks. In this research we attempted to study security issues and risks related to mobile devices faced by the banking industry, more particularly, mobile banking. Further, we shall look into the current trends, future challenges and solutions available in order to secure the communication between mobile devices and business application and how they can be mitigated. Furthermore, we will conduct a survey within the banking industry to understand the current security mechanisms adopted by these institutions. Moreover, consumer awareness, their thought process and views related to security threats shall be studied to identify their understanding of the risks and challenges and their comfort level while using mobile devices for financial transactions.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129790563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The title of my research paper is ―Enhancement in existing Agile Testing methodology to counter the issues and challenges in QA process‖. In this research study I have worked on the issues that are faced by QA teams during agile methodology processes and have identified ways of improvement in current agile frameworks that is being used. The solution to counter the challenges and issues during testing phase is proposed to improve the time constraint in a testing environment and making testing an easy and effective job in terms of cost and time constraints in an agile environment where deadlines are very strict and time is always short. At the end, there is a survey and interview with domain expert to analyze the results achieved and to prove the hypothesis of my research.
{"title":"Enhancement in existing agile methodology to counter the issues and challenges in QA process","authors":"Ali Ashraf Khanani, M. Tayyab","doi":"10.31645/2014.12.1.3","DOIUrl":"https://doi.org/10.31645/2014.12.1.3","url":null,"abstract":"The title of my research paper is ―Enhancement in existing Agile Testing methodology to counter the issues and challenges in QA process‖. In this research study I have worked on the issues that are faced by QA teams during agile methodology processes and have identified ways of improvement in current agile frameworks that is being used. The solution to counter the challenges and issues during testing phase is proposed to improve the time constraint in a testing environment and making testing an easy and effective job in terms of cost and time constraints in an agile environment where deadlines are very strict and time is always short. At the end, there is a survey and interview with domain expert to analyze the results achieved and to prove the hypothesis of my research.","PeriodicalId":412730,"journal":{"name":"Journal of Independent Studies and Research Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116799036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}