An Ontology based on the Methodology Proposed by Ushold and King

2016 ◽  
Vol 7 (1) ◽  
pp. 13-26 ◽  
Author(s):  
Neha Jain ◽  
Lalit Sen Sharma

A number of methodologies are available in literature for ontology development but as the Ontology engineering field is relatively new, it is still unclear how the existing ontology building methodologies can be applied to develop semantic ontology models. In this work, firstly an overview of various ontology building methodologies and their limitations as compared to some standard software development methodologies are presented. Then the methodology proposed by Ushold and King is selected to build an ontology in e-banking domain. The challenge in this domain is to recognize, communicate and steadily improvise the banking solutions. The ontologies are prospective candidates to assist overcome these challenges and enhance interoperability of banking data and services. The study aims to provide direction for the application of existing ontology building methodologies in the Semantic Web Development processes of e-banking domain specific models which would enable their reusability and repeatability in other projects and strengthen the adoption of semantic technologies in the domain.

Author(s):  
Muhammad Aminu Umar ◽  
Sheidu Salami Tenuche ◽  
Sahabi Ali Yusuf ◽  
Aminu Onimisi Abdulsalami ◽  
Aliyu Muhammad Kufena

As the popularity and acceptance of agile software development methodologies increases, the need to integrate usability engineering in the design and development processes is imperative. While, agile the focus is on technical and functional requirements not on end-user interaction, usability is usually only dealt with on the side. Combining this two in practice will go a long way in development of better product. Since the success and acceptance of software product depends not only on the technologies used but how well it integrates user-oriented methods. Therefore, this chapter puts together works on how usability engineering has been integrated with agile processes.


Author(s):  
Sergio Galvan-Cruz ◽  
Manuel Mora ◽  
Rory V. O'Connor ◽  
Francisco Acosta ◽  
Francisco Álvarez

Software Process Improvement efforts (SPI) are pursued by organizations for improving the overall quality of their software development processes. However, very small entities (VSEs) avoid them by the lack of required financial and other organizational resources. In contrast, VSEs use agile software development methodologies (ASDMs), but these ASDMs do not foster adherence to best scholastic practices promoted by SPI. Furthermore, while a new ISO/IEC standard (29110) has been recently released for VSEs, it was not designed taking account the ASDM approaches. Thus, we investigate the extent of adherence of main ASDMs (two industrial and one academic type) with this new standard. Initial results provide evidence on the strong need to enhance the two industrial ASDMs (XP and SCRUM). In contrast, the academic ASDM (UPEDU) fits the standard very well but it is scarcely used by VSEs. Hence, it is concluded that there is a knowledge gap between the praxis with ASDMs and the recommended scholastic software processes like the ISO/IEC 29110 standard for VSEs.


Author(s):  
Sergio Galvan-Cruz ◽  
Manuel Mora ◽  
Rory V. O'Connor ◽  
Francisco Acosta ◽  
Francisco Álvarez

Software Process Improvement efforts (SPI) are pursued by organizations for improving the overall quality of their software development processes. However, very small entities (VSEs) avoid them by the lack of required financial and other organizational resources. In contrast, VSEs use agile software development methodologies (ASDMs), but these ASDMs do not foster adherence to best scholastic practices promoted by SPI. Furthermore, while a new ISO/IEC standard (29110) has been recently released for VSEs, it was not designed taking account the ASDM approaches. Thus, we investigate the extent of adherence of main ASDMs (two industrial and one academic type) with this new standard. Initial results provide evidence on the strong need to enhance the two industrial ASDMs (XP and SCRUM). In contrast, the academic ASDM (UPEDU) fits the standard very well but it is scarcely used by VSEs. Hence, it is concluded that there is a knowledge gap between the praxis with ASDMs and the recommended scholastic software processes like the ISO/IEC 29110 standard for VSEs.


Terminology ◽  
2013 ◽  
Vol 19 (2) ◽  
pp. 202-236 ◽  
Author(s):  
Mari Carmen Suárez-Figueroa ◽  
Guadalupe Aguado-de-Cea ◽  
Asunción Gómez-Pérez

This paper addresses the lack of an explicitly agreed and defined terminology in the ontology engineering field, and particularly, the need for a glossary, which consists of terms and definitions for actions when developing ontologies. The novelty of this paper lies in the precise description of a methodology for building a glossary with the processes and activities involved in ontology development as well as the relations between them (such as subtype, composition and synonym). The methodology proposed in this paper takes its inspiration from ideas taken from earlier research on methodological processes for creating multilingual terminological products and for defining a glossary in a particular domain as well as on domain knowledge organization. The description of our methodology includes the approach followed and the steps carried out, as well as the key issues that arise when the glossary was being created. So far as we are aware, this is the first attempt to normalize the terminology (denominations and definitions) of process and activities in ontology building.


2020 ◽  
Author(s):  
Yosi sinta deby

ABSTRAKPerkembangan teknologi pada computer sangatlah pesat seiring dengan perkembangan software nya yang sering digunakan. Salah satu ialah dalam bidang pendidikan , komputer ini sangatlah berperan penting. Sekarang banyak sekali software yang sudah tersedia untuk mendukung dan meningkatkan mutu kualitas pendidikan. Tulisan ini akan mengkaji bagaimana komputer digunakan sebagai media pembelajaran, metodologi perkembangan perangkat lunak.ABSTRACTThe development of technology on computers is very rapid along with the development of software that is often used. One is in the field of education, this computer is very important. Now a lot of software is available to support and improve the quality of education quality. This paper will examine how computers are used as learning media, software development methodologies.


Author(s):  
Sampada G.C ◽  
Tende Ivo Sake ◽  
Amrita

Background: With the advancement in the field of software development, software poses threats and risks to customers’ data and privacy. Most of these threats are persistent because security is mostly considered as a feature or a non-functional requirement, not taken into account during the software development life cycle (SDLC). Introduction: In order to evaluate the security performance of a software system, it is necessary to integrate the security metrics during the SDLC. The appropriate security metrics adopted for each phase of SDLC aids in defining the security goals and objectives of the software as well as quantify the security in the software. Methods: This paper presents systematic review and catalog of security metrics that can be adopted during the distinguishable phases of SDLC, security metrics for vulnerability and risk assessment reported in the literature for secure development of software. The practices of these metrics enable software security experts to improve the security characteristics of the software being developed. The critical analysis of security metrics of each phase and their comparison are also discussed. Results: Security metrics obtained during the development processes help to improve the confidentiality, integrity, and availability of software. Hence, it is imperative to consider security during the development of the software, which can be done with the use of software security metrics. Conclusion: This paper reviews the various security metrics that are meditated in the copious phases during the progression of the SDLC in order to provide researchers and practitioners with substantial knowledge for adaptation and further security assessment.


Sign in / Sign up

Export Citation Format

Share Document