A Visual Approach For Requirement Traceability
Requirement traceability is a significant method of tracing and identifying the life of requirement in forward and backward directions during software development lifecycle. It is used to support impact analysis, requirement change, maintenance, verification, and validation of a software system. Vis...
| Main Author: | Madaki, Abdulkadir Ahmad |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2022
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/60417/ |
| Abstract | Abstract here |
Similar Items
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018)
by: Bokhare, Siti Fatimah
Published: (2018)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Cancer Diet System: User Requirement Analysis
by: Saludin, Farhana Aini
Published: (2010)
by: Saludin, Farhana Aini
Published: (2010)
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010)
by: Basim Obaid N, Althagfi
Published: (2010)
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
A Real Time Visual Monitoring Module For Traffic Conditions Based On A Modified Auto-Associative Memory
by: Kareem, Emad Issa Abdul
Published: (2012)
by: Kareem, Emad Issa Abdul
Published: (2012)
Smartal (Student Management Portal): Functional Requirement Analysis To Develop The English Language Diagnosis Module.
by: Rajamanicam, Roshini
Published: (2010)
by: Rajamanicam, Roshini
Published: (2010)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
A New Approach To Public-Key Cryptosystem Based On Mandelbrot And Julia Fractal Sets.
by: A. Alia, Mohammad Ahmad
Published: (2008)
by: A. Alia, Mohammad Ahmad
Published: (2008)
Enhancing Control Flow Comprehension Using Zoom Visual Flow (ZViF) Technique To Represent Control Structures
by: Kadar, Rozita
Published: (2011)
by: Kadar, Rozita
Published: (2011)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
A Machine Learning Approach To Evaluate The Security Of Ultra-lightweight Block Ciphers
by: Lee, Ting Rong
Published: (2021)
by: Lee, Ting Rong
Published: (2021)
Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
by: Alkhafaji, Ali Fawzi Mohammed Ali
Published: (2024)
A new approach based on honeybee guarding system to improve intrusion detection system.
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
A New Approach Based On Honeybee Guarding
System To Improve Intrusion Detection System
by: Ahmed Ali, Ghassan
Published: (2011)
by: Ahmed Ali, Ghassan
Published: (2011)
The Impact Of Gender And Gender
Composition On Occupational
Wage Inequality In Palestine: A
Multilevel Modeling Approach
by: Ayyash, Mohsen H.H.
Published: (2021)
by: Ayyash, Mohsen H.H.
Published: (2021)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Assessing Malaysia’s Manufactured Exports Competitiveness In The East Asian Region: A Shift-Share And Simulation Approach.
by: Leow, Ghin Yin
Published: (2010)
by: Leow, Ghin Yin
Published: (2010)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Multi Criteria Decision Making Approach For Product Aspect Extraction And Ranking In Aspect-Based Sentiment Analysis
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
by: Alrababah, Saif Addeen Ahmad Ali
Published: (2018)
A Machine Learning Classification Approach To Detect Tls-Based Malware Using Entropy-Based Flow Set Features
by: Keshkeh, Kinan
Published: (2022)
by: Keshkeh, Kinan
Published: (2022)
An Ontology And Constraint-based Approach For Dynamic Personalised Planning In Healthcare
by: Mahiddin , Normadiah
Published: (2009)
by: Mahiddin , Normadiah
Published: (2009)
Bounded Box-Zoning Integrated Approach For Children Handwriting Recognition
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
by: Qausbee, Nik Nur Adlin Nik
Published: (2024)
Similarity Segmentation Approach For Sensor-Based Human Activity Recognition
by: Baraka, Abdulrahman M. A.
Published: (2024)
by: Baraka, Abdulrahman M. A.
Published: (2024)
Profiling Ict Academics At Malaysian
Research Universities (Rus) On Their
Commercialization Approaches
Based On Personal Attributes: A
Grounded Theory Study
by: Othman, Hafizul
Published: (2015)
by: Othman, Hafizul
Published: (2015)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Flow-Representation Approach For ICMPV6-Based Ddos Attacks Detection
by: Elejla, Omar E. O.
Published: (2018)
by: Elejla, Omar E. O.
Published: (2018)
Approach for solving active perturbation attack problem in stepping stone detection.
by: Omar, Mohd Nizam
Published: (2011)
by: Omar, Mohd Nizam
Published: (2011)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
Feature Selection Method Based On Hybrid Filter-Metaheuristic Wrapper Approach
by: Jothi, Neesha
Published: (2020)
by: Jothi, Neesha
Published: (2020)
An expansionary approach for the allocation of next generation ipv6 internet addresses.
by: Murugesan, Raja Kumar
Published: (2011)
by: Murugesan, Raja Kumar
Published: (2011)
Multimodal Sentiment Analysis Of Social Media Through Deep Learning Approach
by: An, Jieyu
Published: (2024)
by: An, Jieyu
Published: (2024)
Medical Image Modality Classification using Feature Weighted Clustering Approach.
by: Chandra, Bhavik Anil
Published: (2010)
by: Chandra, Bhavik Anil
Published: (2010)
Behavioural Factors Based Crowd
Evacuation Modelling Using
Fuzzy-Neural Approach
by: Zakaria, Wahida
Published: (2020)
by: Zakaria, Wahida
Published: (2020)
Multi-View Retrieval Of Software Design Specifications Using Similarity Assessment Approach
by: Adamu, Alhassan
Published: (2017)
by: Adamu, Alhassan
Published: (2017)
Software Model Checking For Distributed Applications Using Hybridization Of Centralization And Cache Approaches
by: Hing, Ratana
Published: (2024)
by: Hing, Ratana
Published: (2024)
Anchor Point Approach For Initial
Population Of Bat Algorithm For
Protein Multiple Sequence Alignment
by: Boraik Ali, Aziz Nasser
Published: (2016)
by: Boraik Ali, Aziz Nasser
Published: (2016)
Heuristic Based Planning Approach For
Improving Wireless Network Coverage Of Multi-Storey Building
by: Yeong, Shoa Yei
Published: (2011)
by: Yeong, Shoa Yei
Published: (2011)
White-Matter Lesion Segmentation In Brain Mri Using Adaptive Trimmed Mean Approach
by: Ong , Kok Haur
Published: (2011)
by: Ong , Kok Haur
Published: (2011)
Similar Items
-
Genogram Visualization Using Social Network Approach For Medical Family Tree
by: Bokhare, Siti Fatimah
Published: (2018) -
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011) -
Cancer Diet System: User Requirement Analysis
by: Saludin, Farhana Aini
Published: (2010) -
Smart Child Portal: User Requirements For Children‟S Portal
by: Basim Obaid N, Althagfi
Published: (2010) -
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
by: Jaafar, Abdullah Mohammed Abdo Ali
Published: (2011)
