期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Offshore Software Maintenance Outsourcing Process Model Validation:A Case Study Approach
1
作者 atif ikram Masita Abdul Jalil +3 位作者 Amir Bin Ngah Adel Sulaiman Muhammad Akram Ahmad Salman Khan 《Computers, Materials & Continua》 SCIE EI 2023年第3期5035-5048,共14页
The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most... The successful execution and management of Offshore Software Maintenance Outsourcing(OSMO)can be very beneficial for OSMO vendors and the OSMO client.Although a lot of research on software outsourcing is going on,most of the existing literature on offshore outsourcing deals with the outsourcing of software development only.Several frameworks have been developed focusing on guiding software systemmanagers concerning offshore software outsourcing.However,none of these studies delivered comprehensive guidelines for managing the whole process of OSMO.There is a considerable lack of research working on managing OSMO from a vendor’s perspective.Therefore,to find the best practices for managing an OSMO process,it is necessary to further investigate such complex and multifaceted phenomena from the vendor’s perspective.This study validated the preliminary OSMO process model via a case study research approach.The results showed that the OSMO process model is applicable in an industrial setting with few changes.The industrial data collected during the case study enabled this paper to extend the preliminary OSMO process model.The refined version of the OSMO processmodel has four major phases including(i)Project Assessment,(ii)SLA(iii)Execution,and(iv)Risk. 展开更多
关键词 Offshore outsourcing process model model validation vendor challenges case study
下载PDF
Project Assessment in Offshore Software Maintenance Outsourcing Using Deep Extreme Learning Machines
2
作者 atif ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Saqib Raza Ahmad Salman Khan Yasir Mahmood Nazri Kama Azri Azmi Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2023年第1期1871-1886,共16页
Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different w... Software maintenance is the process of fixing,modifying,and improving software deliverables after they are delivered to the client.Clients can benefit from offshore software maintenance outsourcing(OSMO)in different ways,including time savings,cost savings,and improving the software quality and value.One of the hardest challenges for the OSMO vendor is to choose a suitable project among several clients’projects.The goal of the current study is to recommend a machine learning-based decision support system that OSMO vendors can utilize to forecast or assess the project of OSMO clients.The projects belong to OSMO vendors,having offices in developing countries while providing services to developed countries.In the current study,Extreme Learning Machine’s(ELM’s)variant called Deep Extreme Learning Machines(DELMs)is used.A novel dataset consisting of 195 projects data is proposed to train the model and to evaluate the overall efficiency of the proposed model.The proposed DELM’s based model evaluations achieved 90.017%training accuracy having a value with 1.412×10^(-3) Root Mean Square Error(RMSE)and 85.772%testing accuracy with 1.569×10^(-3) RMSE with five DELMs hidden layers.The results express that the suggested model has gained a notable recognition rate in comparison to any previous studies.The current study also concludes DELMs as the most applicable and useful technique for OSMO client’s project assessment. 展开更多
关键词 Software outsourcing deep extreme learning machine(DELM) machine learning(ML) extreme learning machine ASSESSMENT
下载PDF
Efficient Cloud Resource Scheduling with an Optimized Throttled Load Balancing Approach
3
作者 V.Dhilip Kumar J.Praveenchandar +3 位作者 Muhammad Arif Adrian Brezulianu Oana Geman atif ikram 《Computers, Materials & Continua》 SCIE EI 2023年第11期2179-2188,共10页
Cloud Technology is a new platform that offers on-demand computing Peripheral such as storage,processing power,and other computer system resources.It is also referred to as a system that will let the consumers utilize... Cloud Technology is a new platform that offers on-demand computing Peripheral such as storage,processing power,and other computer system resources.It is also referred to as a system that will let the consumers utilize computational resources like databases,servers,storage,and intelligence over the Internet.In a cloud network,load balancing is the process of dividing network traffic among a cluster of available servers to increase efficiency.It is also known as a server pool or server farm.When a single node is overwhelmed,balancing the workload is needed to manage unpredictable workflows.The load balancer sends the load to another free node in this case.We focus on the Balancing of workflows with the proposed approach,and we present a novel method to balance the load that manages the dynamic scheduling process.One of the preexisting load balancing techniques is considered,however it is somewhat modified to fit the scenario at hand.Depending on the experimentation’s findings,it is concluded that this suggested approach improves load balancing consistency,response time,and throughput by 6%. 展开更多
关键词 Load balancing throttled algorithm efficient resource allocation
下载PDF
Encryption Algorithm for Securing Non-Disclosure Agreements in Outsourcing Offshore Software Maintenance
4
作者 atif ikram Masita Abdul Jalil +6 位作者 Amir Bin Ngah Nadeem Iqbal Nazri Kama Azri Azmi Ahmad Salman Khan Yasir Mahmood Assad Alzayed 《Computers, Materials & Continua》 SCIE EI 2022年第11期3827-3845,共19页
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ... Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of images.Since the work is done offshore,these agreements or images must be shared through the Internet or stored over the cloud.The breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of danger.This article proposes a novel algorithm for securing the NDAs in the form of images.As an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the Internet.As the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of time.The confusion effects have been realized through an XOR operation between the confused image,and chaotic data.Besides,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it has.The machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images. 展开更多
关键词 Non-disclosure agreement encryption DECRYPTION secret key chaoticmap CONFUSION diffusion
下载PDF
K-Banhatti Invariants Empowered Topological Investigation of Bridge Networks
5
作者 Khalid Hamid Muhammad Waseem Iqbal +5 位作者 Erssa Arif Yasir Mahmood Ahmad Salman Khan Nazri Kama Azri Azmi atif ikram 《Computers, Materials & Continua》 SCIE EI 2022年第12期5423-5440,共18页
Any number that can be uniquely determined by a graph is called graph invariants.During the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation analysis.In the... Any number that can be uniquely determined by a graph is called graph invariants.During the most recent twenty years’innumerable numerical graph invariants have been described and used for correlation analysis.In the fast and advanced environment of manufacturing of networks and other products which used different networks,no dependable assessment has been embraced to choose,how much these invariants are connected with a network graph or molecular graph.In this paper,it will talk about three distinct variations of bridge networks with great capability of expectation in the field of computer science,chemistry,physics,drug industry,informatics,and mathematics in setting with physical and synthetic constructions and networks,since K-Banhatti invariants are newly introduced and have various forecast characteristics for various variations of bridge graphs or networks.The review settled the topology of bridge graph/networks of three unique sorts with three types of K-Banhatti Indices.These concluded outcomes can be utilized for the modeling of interconnection networks of Personal computers(PC),networks like Local area network(LAN),Metropolitan area network(MAN)and Wide area network(WAN),the spine of internet and different networks/designs of PCs,power generation interconnection,bio-informatics and chemical structures. 展开更多
关键词 Bridge networks INVARIANTS k-banhatti indices MAPLE network graph molecular graph
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部