Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
hamayoon ghafory
  • Kabul-Afghanistan
  • 0093789068703
  • Hamayoon Ghafory is a senior lecturer at Shahid Prof. Rabbani Education University at the Computer Science Faculty, Information System Department, Kabul Afghanistan. He received his Master Degree in Software Engineering in 2014. His inte... moreedit
Software cost estimation is the process of predicting the amount of effort required to build a software system. Models provides one or more mathematical algorithms that compute cost as a function of a number of variables, size is primary... more
Software cost estimation is the process of predicting the amount of effort required to build a software
system. Models provides one or more mathematical algorithms that compute cost as a function of a
number of variables, size is primary cost factor in most models and can be measuring using lines of
code (LOC). The models should be used to estimate the cost of software, SLIM is a useful model to
estimate the cost and it is a good model for big projects, also this model required some parameters to
generate an estimation. Software cost estimation always characterized one of the biggest challenges in
Computer Science for the last decades. Because time and cost estimate at the early stages of the
software development are the most difficult to obtain, and they are often the least accurate. Traditional
algorithmic techniques such as regression models, Software Life Cycle Management (SLIM), require
an estimation process in a long term.
Software inspections are a proven concept that is much used in industry. An inspection is a visual examination of a software product to detect and identify software defects, including errors and deviations from standards and... more
Software inspections are a proven concept that is much used in industry. An inspection is a visual examination of a software product to detect and identify software defects, including errors and deviations from standards and specifications. Software requirements inspection is important as defects found late are expensive to correct and detecting defects in the requirements specification will considerably reduce the costs on rework in later stages. The unified modeling language (UML) aids developers to model different static and dynamic aspects of the software system and it is common to see UML diagrams included in software requirements specification (SRS) as a visual representation of the system. This research proposes the design of controlled experiment in an academic context in Malaysia to investigate the effect of including UML diagrams in (SRS) on the rate of defects detected in (SRS) and the effectiveness of the inspection process as well as the efficiency of inspection in term...
The advancement of technology has had an influence on every part of our lives, from banking to the way we connect with one another. Indeed, technology has become an essential component of sustaining civilization, and its incorporation... more
The advancement of technology has had an influence on every part of our lives, from banking to the way we connect with one another. Indeed, technology has become an essential component of sustaining civilization, and its incorporation into education is consequently unavoidable. Technology not only gives students access to a plethora of online materials, but it also helps them study. The majority of colleges and educational institutions have already begun to use technology into their teaching techniques. This paper provides in-depth on the effect and impact of the modern technology in the teaching and learning process through reviewing various secondary data. Education has been transformed by technological advancements. The significance of technology in classrooms cannot be overstated. Indeed, the introduction of computers into education has made it simpler for instructors to transfer information and for pupils to retrieve it. The integration of technology into education ecosystem ha...
Forum is a huge space where people from different geographical location can express and share their own opinions, influencing any aspect of life by marketing and communication. On one side, Monitoring suspicious communication on these... more
Forum is a huge space where people from different geographical location can express and share their own opinions, influencing any aspect of life by marketing and communication. On one side, Monitoring suspicious communication on these forums is the best way to measure the loyalty of users. On the other side, Many malicious people use these discussion forums for illegal purpose by posting suspicious chats in the form of text, video or images, exchange them with other users. The law enforcement agencies are looking for solutions to monitor these communication forums for possible criminal activities. Mostly the data stored in chat forums are in the form of text, so the proposed system will focus only on text posts. Considering this scenario, I propose a system which tackle this problem. Monitoring the malicious activities is the best way to calculate the user’s honesty, keeping a track of their sentiment toward their chats. The exponential advancement in information and communication t...
Abstract Forum is a huge space where people from different geographical location can express and share their own opinions, influencing any aspect of life by marketing and communication. On one side, Monitoring suspicious communication on... more
Abstract
Forum is a huge space where people from different geographical location can express and share their own opinions, influencing any aspect of life by marketing and communication. On one side, Monitoring suspicious communication on these forums is the best way to measure the loyalty of users. On the other side, Many malicious people use these discussion forums for illegal purpose by posting suspicious chats in the form of text, video or images, exchange them with other users. The law enforcement agencies are looking for solutions to monitor these communication forums for possible criminal activities. Mostly the data stored in chat forums are in the form of text, so the proposed system will focus only on text posts. Considering this scenario, I propose a system which tackle this problem. Monitoring the malicious activities is the best way to calculate the user’s honesty, keeping a track of their sentiment toward their chats. The exponential advancement in information and communication technology has fostered the creation of new online forums for many online discussions and has also reduced a distance between people. In online forums the user produce various formats of malicious post like text, image, video, gif and exchange them online with other people.
Keywords: Monitoring suspicious communication, own opinions, marketing and communication
Abstract:Software inspection is a means of detecting faults in software artifacts, such as documents and code.The objective of an inspection is to detect and identify faults in the software product by a visual examination. Finding faults... more
Abstract:Software inspection is a means of detecting faults in software artifacts, such as documents and code.The objective of an inspection is to detect and identify faults in the software product by a visual examination. Finding faults early in the development life cycle is important since the cost of correction increases the later the fault is found in the development cycle. Faults can be found early with inspections, since inspections can be performed as soon as an artifact has been created. Unified Modeling Language (UML) diagrams have been widely used for modeling different aspects of software systems during its life cycle. In this study an experiment is conducted in an educational institution to verify the effect of including Use Case and Activity diagram in the software requirements specification on the inspection effectiveness and the amount of reported defects. The result showed that those students inspected documents with text only, reported more faults than students inspected documents with text + diagram and those students inspected documents with text + diagram reported correct faults same as those students inspected document with text only but those students inspected the documents with text only, reported more incorrect faults than students inspected document with text + diagram.
Keywords:Software Requirements, Software engineering.