Requirement elicitation is considered to be a very vital activity in requirement engineering. It is a proven fact that improper elicitation of requirements leads to a project failure. S o for the improvement in the software industry's success rate more attention is required in the elicitation process. In order to help elicitor to understand and select different methods, many frameworks are proposed that highlight the key issues of requirement elicitation but most of the frameworks are theoretical in nature. They lack practical guidance and extensive study of a wide variation of methods for requirements Elicitation. In this paper we propose a framework for requirement elicitation that support elicitor to understand and select methods for requirement elicitation and also addresses three core problem areas of requirements elicitation, pre-domain development, stakeholders management and elicitation technique selection that were identified as lacking and needed guidance and support .Finally we validate the framework of effective requirement elicitation using finite state machine. Test cases are generated for the validation of the framework. The approach for generating the test cases through FS M is very reliable and efficient and does not support for the invalid test cases. Valid input strings are generated as test cases.
There are various techniques involved in identification of defects in developing software but could not find a successful identification process in early stages. A concrete and cost effective technique for defect identification in early stage is high indispensable in modern era of software application and implications. In this study, we are attentive over an effort to commence an appropriate defect identification technique having two major components i.e. Requirement Inspection Participants (RIP) and Requirement Inspection Method (RIM). Although RIP is executed through author, moderator, reader, inspector and recorder, but RIM is covered through plan development, outline design, preparation and reporting to deliver overall requirement defect. After mutual course of action in identification, the inspection technique may be competent to deliver a significant output in the form of requirement defect. The implementation of defect inspection technique would also be appreciated by industry, software developers and innovators in future.
Abstract-Rapid development of Wireless sensor network led to applications ranging from industry to military fields. These sensors are deployed in the military base station such as battlefield surveillances. The important issues like security & DoS attacks play crucial role for wireless sensor network. Due to the limitations of resources, traditional security scheme cannot be employed efficiently. Therefore, designing a framework that can operate securely using smart intelligence technique is the best option. In this paper, an efficient way of detecting an intrusion using Flooding and Ant colony is proposed. The flooding technique enables the master agents to track the activity of intruder tampering the part of the network. The ACO identifies the path followed by the nodes and also the intruder, who wants to jam the whole wireless sensor network. The architecture strategically enables the Bait agents to detect the intruders threatening the network. The proposed framework is designed for the military station. It helps the base station to detect the intrusion and decide whether the activity is normal or terrestrial and send the signal to the nearest missile station situated near the intrusion location and destroy it in minimum time. The process of detecting the intrusion earlier not only helps to learn future attacks, but also a defense counter measures.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.