Risk-Based Testing: A Case Study
|
|
- Gavin Gaines
- 6 years ago
- Views:
Transcription
1 2010 Seventh International Conference on Information Technology Risk-Based Testing: A Case Study Ellen Souza Information Systems Bachelor Federal Rural University of Pernambuco Fazenda Saco, S/N C.P. 063, Serra Talhada PE, Brazil Cristine Gusmão, Júlio Venâncio Department of Systems and Computing University of Pernambuco Rua Benfica, 455, Madalena, Recife PE, Brazil Abstract This paper describes the application of risk-based testing for a software product evaluation in a real case study. Risk-based testing consists of a set of activities regarding risk factors identification related to software requirements. Once identified, the risks are prioritized according to their likelihood and impact and test cases are designed based on the strategies for treatment of the identified risk factors. Thus, test efforts are continuously adjusted according to risk monitoring. The paper also briefly reviews available risk-based es, describes the benefits that are likely to accrue from the growing body of work in this area and provides a set of problems, challenges and future work. Keywords: Case Study, Risk-Based Testing, Risk Management, Software Testing, Testing Process. 1. Introduction Software testing activity aims to improve the quality of software products through checking compliance of software products with its specification. However, software testing requires significant efforts. Testing activity may cost up to forty percent of the initial software development value [1]. Also, because the growth is exponential, the later a defect is found, the more expensive it is to correct [2]. In the delivery of software products, the test activity commonly does not receive the appropriate attention, because of restrictions of time, resources and cost. On the other hand, organizations do not want to miss clients due to bad product quality. In this context, it is fundamental to find a way to prioritize efforts and allocate resources to the software components that need to be tested carefully. Risk-Based Testing (RBT) aims to minimize some of these problems by risk factors identification related to software requirements [3]. Once identified, requirements are prioritized through risk analysis and the test cases are designed based on the strategies for treatment of the identified risks factors. Thus, test efforts are continually adjusted according to risk control and monitoring. This article presents a practical use of an RBT (RBTProcess) [4] during a software development project. The main objectives of this case study are to: (i) check if RBT can find defects faster than a non RBT ; and (ii) check whether the discovered defects are the ones with high severity. After this introduction, this paper is organized as follows: Section 2 presents the related work, showing some practical uses of RBT, results and restrictions; Section 3 gives an overview about the RBT process applied in this case study RBTProcess; Section 4 describes the case study execution flow and also the observed results; and finally, Section 5 draws some conclusions and points the way to further studies. 2. Related Work Traditional testers deal with risks and software testing, but commonly in an ad hoc fashion based on personal judgment [5]. Risk-based Testing concept addresses the explicit use of risk management activities inside the testing process. RBT justifies the testing efforts, focusing the testing activities where the probability of failure and loss are higher in the software. There are several RBT es in the literature. Some authors did not only propose, but also validate their es through empirical studies. Amland [5] proposes a set of metrics for risk analysis in order to support the RBT. The metrics consider that functionalities that are new, complex, with bad quality, are more likely to fail. The author proposes: (i) a functionality prioritization technique according to the risk exposure value obtained through /10 $ IEEE DOI /ITNG
2 defined metrics; (ii) some metrics to control and monitor the test activity and (iii) performed a case study in a financial application where the results were satisfactory as the time spent to test and the number of used resources suffered a considerable reduction comparing with a non RBT. Chen [6] proposes a method for test case and scenario selection based on risk for regression testing. The strategy for test cases and scenarios prioritization is based on Amland [5], presented previously. The author performed a case study in an industrial software product and its method was also considered very effective. Rosenberg and other authors [7] provide an for the object oriented paradigm, where classes that are more prone to fail are identified. The authors assume that the more complex is the code, higher is the incidence of failures in the software. They defined a set of object oriented software metrics which help to find classes with more probability to failure. These metrics were applied for three years at NASA (National Aeronautics and Space Administration) projects and they provided a good basis for test planning, allowing developers to find important defects as soon as possible. Stallbaum and other authors [8] propose an automated technique for risk-based test case prioritization using activity diagrams as test models. The authors implemented a prototype with the proposed and they applied it in a software product developed by the German Federal Ministry of Finance. According to the authors, their enables the early detection of critical faults during the development process. Next Section presents the RBTProcess, a complete RBT software testing process with well defined phases, activities, artifacts, roles, and metrics. 3. RBT Approach This Section briefly presents the RBTProcess, a testing process model based on risks. Figure 1 shows the process structure, where the activities in dark gray are the ones from risk management included in the test process (the activities in white). Further information about RBTProcess organization can be found in [3, 4]. Risk Identification: its main objective is to identify only technical risks that are commonly related to software functionalities or requirements. It includes a review of risks sources and categories to adapt the Taxonomy Based Questionnaire (TBQ) [9] and/or a risk checklist. The TBQ is answered by the project members, followed by a brainstorming meeting to validate the identified risks. Figure 1. RBTProcess activities, roles and phases Risk Analysis: in this activity, the software functionalities are prioritized by an heuristic risk analysis where the software engineers, together with the risk analyst, inform values to metrics like complexity, cost, size, quality, and others in order to find the Risk Exposure (RE) value for each functionality. Test Planning: the test manager defines the test, as well as the strategy and the number of test cycles based on the RE value. Using the RBT, the manager has more information about the software quality due to risk identification and analysis, making better use of time and resources. Test Design: the test cases are designed to mitigate the identified risks. For each risk, at least, one test case is designed. When software engineers answer the TBQ, they state the kind of risk and how that functionality can fail, so this information is used by the test design to project the risk-based test cases. Test Execution: the designed RBT test cases are executed in the RE order. The idea is to test first the functionalities that are more likely to fail. Test Evaluation and Risk Control: these activities monitor, respectively, the progress of test cases and the identified risks. A risk is mitigated when all test cases designed to assess it have been executed and passed. The test efforts are continuously adjusted according to risk monitoring. A set of metrics were proposed by the authors for risk monitoring in [3]. 1033
3 4. Case Study This section presents the case study characteristics by providing its purpose, the tool used to evaluate the called MPhyScas (Section 4.1), the performed steps to execute the case study (Section 4.2) and, finally, the observed results (Section 4.3). The MPhyScas team, together with the authors, performed the RBTProcess activities, explained in previous section, and a group of undergraduate students in computer engineering, with basic software testing knowledge, executed the designed RBT and non RBT test cases. 4.1 MPhyScaS: Evaluated Tool The RBTProcess was applied to the MPhyScaS (Multi-Physics and Multi-Scales Solver Environment) [10] tool development. MPhyScaS is an Eclipse RCP [11] environment dedicated to the automatic development of simulators based on Finite Element Method (FEM). MPhyScas is divided in four modules: (1) Components Repository with scientific software; (2) Executable Simulator, an interface for data input and executable simulator; (3) Interface for modeling and simulators builder and (4) Builder Module is the simulator framework. The Interface for modeling and simulators builder module was considered in this case study. It reads the simulator.xml file to present the simulation structure. After that, the user can model and build their own simulation by inputting values to the tree structure simulator. Therefore, the tool validates the inputted values at the beginning of the simulation. The tested functionalities are presented at Table 2 and Case Study Execution Flow Figure 2 shows the performed steps in the case study and they are detailed as follows. (1) The MPhyScas team members and the volunteers received four hours training about the RBTProcess and basic software testing knowledge. After that, the authors, together with MPhyScas team leader instantiated RBTProcess, creating the TBQ, explained in step three, and defining the process roles, as shown below: Risk Analyst: one of the authors Test Manager: one of the authors Test Design: one of the authors (risk-based) and an MPhyScas team member (non risk-based) Tester: Five computer engineering students Other Software Process Roles: MPhyScas team members (1) RBTProcess and basic software test training (7) (6) Cycle 1 (2) MPhyScas training (5) Test Planning Non-Risk based Test Case Risk-based Cycle 2 Non Riskbased Test Design Test Execution Non Riskbased Hybrid (8) Test Evaluation Risk-based Test Case Hybrid Risk based Figure 2. Case study execution flow (3) Risk Identification (4) Risk Analysis (2) Volunteers received two hours training about MPhyScas functionalities. (3) After requirement elicitation phase, MPhyScas members performed the RPTProcess Risk Identification activity. They answered the TBQ for each one of the software functionalities. An example of a question included in the TBQ is shown in Figure 3. The answers of MPhyScas members for the FUNC10 - GroupTasks functionality is also presented in this figure. (Q1) Is this functionality completely defined? If the answer is NO, which part is not defined? Answer 1: No. The types of state are missing for the Assembler Group Task. Answer 2: No. It is not clear the way Custom Group Task works. Figure 3. Example of TBQ questions At the end, the Risk Analyst summarizes the answers, removing also the inconsistencies. This questionnaire is the primary requirement for the test design, as it contains the risk to be tested for each functionality. 1034
4 (4) In this step, the MPhyScas members gave values to metrics related to requirement dependency, complexity, costs, size, quality, and others, to calculate the Risk Exposure (RE) for each functionality. The RE is used to classify, prioritize and define the sequence that functionalities are tested. (5) In this activity, the Test Manager defined the amount of test and cycles that are necessary to test the tool based on the number of identified risks. In the RBTProcess, the functionalities are classified as high, medium and low priority. Only functionalities classified as high and medium were tested in this case study. (6) Two types of test cases were designed: non riskbased (functional) and risk-based test cases. Risk-based: one of the authors designed riskbased test cases for the most important functionalities. For each identified risk a test case was created. As shown in Figure 3, the Group Task functionality is not completely defined, so riskbased test cases could be designed to evaluate only the Assembler and the Custom Group Tasks, which are the undefined parts informed by MPhyScas members. It is important to note that functional test cases would check all Group Tasks. Also, in order to keep the same number of non risk-based test cases, eleven test cases were designed to mitigate the eleven most important risks. Non Risk-based: an MPhyScas member with test design training designed functional test cases for each one of the software functionalities, resulting in a suite with eleven test cases. (7) For the test execution, the volunteers were divided in three groups. In each cycle, a group performed different type of test case, as shown in Figure 2. The three test execution es are explained below: Risk-based : test cases based on risks, designed according to RBTProcess Test Design activity and executed in the order specified by RE. Non risk-based : functional test cases projected by an MPhyScas team member and executed in an order that represents the users way of use. Hybrid : non risk-based test cases executed in the RE order. (8) After the test execution, the Test Manager and the MPhyScas team leader analyzed all test cases results, removing inconsistencies and false defects, and summarizing the results. 4.3 Observed Results Table 1 and Table 2 present the metrics related to the risks identification using the Taxonomy Based Questionnaire (TBQ) technique. Table 1. Time spent to identify risks in minutes M1 Time spent to identify risks per functionality 2.41 M2 Time spent to identify risks per person M3 Total time to identify risks 106 M1 presents the average time to identify a risk per functionality, while M2 presents the average time to identify risks for all functionalities per person (M2 = M1 * number of functionalities = 2.41 * 11). M3 is the total time spent to identify the risks associated to all functionalities (M3 = M2 * number of participants = * 4). Table 2. Quantity and types of the identified risks M4 Quantity of identified risks 49 M5 Quantity of different risks 30 M6 Quantity of different risks per functionality FUNC01-Simulator Properties 3 FUNC02-Kernel Configuration 3 FUNC03-Global States 0 FUNC04-Blocks 1 FUNC05-Create Group 1 FUNC06-Local States 0 FUNC07-Create Phenomenon 7 FUNC08-Phenomenon-State Relation 1 FUNC09-Quantity Tasks 1 FUNC10-Group Tasks 5 FUNC11-Search 8 M7 Quantity of different risks per person 7.5 M8 Quantity of different risks per type Stability 2 Completeness 11 Validity 8 Feasibility 8 Clarity 1 M4 is the quantity of risks identified by all participants, M5 is the quantity of risks identified by all participants, removing the repeated ones (M5 = M4 Number of Repeated Risks = 49-19) and M6 shows the quantity of identified risks per functionality. Functionalities seven, eleven and ten are the ones that appear to have more risks. M7 is the average quantity of different risks identified per person (M7 = M5 / number of participants = 30 / 4) and M8 shows the number of risks identified per type. Most identified risks are related to completeness, which indicates that functionalities are not completely defined and it was confirmed by all MPhyScas members. Table 3 presents the metrics related to the risks analysis using RBTProcess metrics. M9 presents the average time to analyze a risk per functionality, while M10 presents the average time to analyze risks for all 1035
5 functionalities per person (M10 = M9 * number of functionalities = 11). M11 is the total time spent to analyze all functionalities (M11 = M10 * number of participants = * 4). Table 3. Time spent to analyze risks in minutes M9 Time spent to analyze risks per functionality 1.05 M10 Time spent to analyze risks per person M11 Total time to analyze risks 46.2 Another key point is that the time spent for risk analysis and identification were collected to check if the risk management activities executed do not overload the testing process. The Risk Exposure (RE) value for each functionality is shown in Table 4. Table 4. Risk exposure value M11 Risk Exposure Value High FUNC10-Group Tasks 1.74 High FUNC02-Kernel Configuration 1.64 High FUNC11-Search 1.44 High FUNC07-Create Phenomenon 1.21 Medium FUNC04-Blocks 1.10 Medium FUNC05-Create Group 1.10 Medium FUNC03-Global States 1.04 Low FUNC09-Quantity Tasks 0.84 Low FUNC08-Phenomenon-State Relation 0.81 Low FUNC06-Local States 0.75 Low FUNC01-Simulator Properties 0.65 They were classified as high, medium and low priority. Functionalities classified as high and medium were tested in this case study. For the ones classified with low priority, test cases were created only if they had a risk associated to and test cases were executed if there was enough time. The risk-based and hybrid test cases run following the RE value order. Table 5 presents a general test execution result for the three es explained in Section 4, where Non RBT means Non risk-based and RBT means riskbased. Table 5. General test execution results Tester Cycle Approach Executed Test Cases Reported Defects Severity H M L One One Non RBT Three Two Non RBT Four One Non RBT Total Two One RBT Three One RBT Five Two RBT Total Five One Hybrid One Two Hybrid Four Two Hybrid Total Five volunteers executed different test es in two test cycles with approximately two hours duration. As an example, the tester called one performed non risk-based test cases in cycle one and hybrid test cases in cycle two. Regarding severity, column H means High, M is Medium and L is Low. This table also demonstrates that the risk-based found more defects than the others and what is interesting is that the hybrid the Non RBT test cases order by RE value, had also a result near to RBT. Analyzing now the severity, again, RBT had a better result, proving that the focus on the functionalities that are more likely to fail. Table 6 shows the defect concentration per test cases. Table 6. Defect found by test case Tester Cycle Approach Test Case Number Three Two Non RBT One One Non RBT 1 1 Four One Non RBT 1 Total Five Two RBT 8 2 Two One RBT 4 Three One RBT 4 Total Four Two Hybrid Five One Hybrid One Two Hybrid 1 Total While RBT found more defects in the first test cases, the Non RBT found more defects in the last ones. We could see also that the RBT was more effective than the hybrid as it found more than eight percent of the defects after the first test cases execution. It is worthwhile to say that RBT test case one explores the same functionality as Non RBT test case eleven. Table 7 completes the results from Table 6. It shows that, because of the execution order, the RBT and the hybrid es found most defects after 30 minutes execution. Table 7. Time to find a defect in minutes Tester Cycle Approach Time to find a defect in minutes Three Two Non RBT One One Non RBT 1 1 Four One Non RBT 1 Total Two One RBT Three One RBT Five Two RBT Total Five One Hybrid One Two Hybrid 1 Four Two Hybrid Total Table 8 shows the number of defects found per software functionality. 1036
6 Table 8. Defects found per functionality Tester Cycle Approach Functionalities One One Non RBT 1 1 Three Two Non RBT Four One Non RBT 1 Total Five Two RBT 8 2 Two One RBT 4 Three One RBT 4 Total Five One Hybrid One Two Hybrid 1 Four Two Hybrid Total The main finding here is that, the functionality that appears in this table with most defects is the one that had the greater risk exposure value in the risk analysis shown in Table Conclusion and Ongoing Work For this case study, through RBTProcess, we could prove that RBT really focuses on the parts of the software that are more likely to fail. This helps test managers to make better user of their limited time and resources. Therefore, we could prove also that RBT finds the most important defects earlier than functional, so they can be fixed earlier and consequently the software quality is improved faster and thus we can demonstrate cost benefit. As shown in Table 1 and Table 3, the time spent, respectively, to identify and analyze risks is not time consuming, confirming the adoption viability for most organizations that develop software. Also, the MPhyScas members did not find it difficult to perform these activities and externalized that the really attacked the correct functionalities, saving project time and resources. However, we cannot generalize those results, and other case studies and experiments needed to be performed to confirm those benefits. Therefore, some of the RBTProcess activities were performed by the authors due to an unavailability of human resources. Also, the MPhyScas members suggested a review in the risk analysis guide as they found it confusing to give values to some of the metrics. Another problem is that the results were summarized manually by the authors, taking a long to conclude. To minimize this problem, a tool, called RBTTool [12], is under development to provide support to RBT activities, especially to the ones related to risk management, which test engineers find more difficult to perform. Concluding, we can state that, although having some limitations, the RBT has a great potential applicability and it is also a cost saving. 6. References [1] Pressman, R. Engenharia de Software. 1st ed. Makron Books, São Paulo, Brazil, [2] Graham, D., van Veenendaal, E., Evans, I., Black, R. Foundations of Software Testing: ISTQB Certification. Thomson Learning, [3] Souza, E., Gusmão, C., Alves, K., Venâncio, J., Melo, R. Measurement and Control for Risk-based Test Cases and Activities. 10th IEEE Latin American Test Workshop - LATW, [4] Souza, E. RBTProcess: Modelo de Processo de Teste de Software baseado em Riscos. Master Thesis, University of Pernambuco, Recife/Brazil, [5] Amland, S., Risk Based Testing and Metrics: Risk analysis fundamentals and metrics for software testing. 5o International Conference EuroSTAR 99, [6] Chen, Y. Specification-based Regression Testing Measurement with Risk Analysis. Master Thesis, University of Ottawa/Canada, [7] Rosenberg, L. H., Stapko, R., Gallo. A. Risk-based object oriented testing. 24o Annual Software Engineering Workshop, NASA SEW24, [8] Stallbaum, H., Metzger, A., Pohl, K. An Automated Technique for Risk-based Test Case Generation and Prioritization. 3rd Workshop on Automation of Software Test, [9] Carr, M. J., Konda, S.L., Monarch, I., Ulrich, F. C., Walker, C. Taxonomy Based Risk Identification. Technical Report CMU/SEI-93-TR-6. Software Engineering Institute, [10] Oliveira, C., Rocha, F., Medeiros, R. W., Lima, R., Soares, S., Santos, F., Santos, I. H. S. Dynamic Interface for Multi-physics Simulators. International Journal of Modeling and Simulation for the Petroleum Industry, v. 2, p , [11] Burnette, E. Rich Client Platform (RCP) Tutorial One. Available at 1/tutorial1.html, 2006 [12] Venâncio, J., Gusmão, C., Mendes, E., Souza, E. RBTTool - Uma Ferramenta de Apoio à Abordagem de Teste de Software baseado em Riscos. 23o Brazilian Symposium on Software Engineering,
IT4305: Rapid Software Development Part 2: Structured Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2014/2015 2 nd Year Examination Semester 4 IT4305: Rapid
More informationVisit us at:
White Paper Integrating Six Sigma and Software Testing Process for Removal of Wastage & Optimizing Resource Utilization 24 October 2013 With resources working for extended hours and in a pressurized environment,
More informationImplementing a tool to Support KAOS-Beta Process Model Using EPF
Implementing a tool to Support KAOS-Beta Process Model Using EPF Malihe Tabatabaie Malihe.Tabatabaie@cs.york.ac.uk Department of Computer Science The University of York United Kingdom Eclipse Process Framework
More informationSoftware Maintenance
1 What is Software Maintenance? Software Maintenance is a very broad activity that includes error corrections, enhancements of capabilities, deletion of obsolete capabilities, and optimization. 2 Categories
More informationTowards a Collaboration Framework for Selection of ICT Tools
Towards a Collaboration Framework for Selection of ICT Tools Deepak Sahni, Jan Van den Bergh, and Karin Coninx Hasselt University - transnationale Universiteit Limburg Expertise Centre for Digital Media
More informationActivities, Exercises, Assignments Copyright 2009 Cem Kaner 1
Patterns of activities, iti exercises and assignments Workshop on Teaching Software Testing January 31, 2009 Cem Kaner, J.D., Ph.D. kaner@kaner.com Professor of Software Engineering Florida Institute of
More informationRequirements-Gathering Collaborative Networks in Distributed Software Projects
Requirements-Gathering Collaborative Networks in Distributed Software Projects Paula Laurent and Jane Cleland-Huang Systems and Requirements Engineering Center DePaul University {plaurent, jhuang}@cs.depaul.edu
More informationIBM Software Group. Mastering Requirements Management with Use Cases Module 6: Define the System
IBM Software Group Mastering Requirements Management with Use Cases Module 6: Define the System 1 Objectives Define a product feature. Refine the Vision document. Write product position statement. Identify
More informationTEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD *
TEACHING IN THE TECH-LAB USING THE SOFTWARE FACTORY METHOD * Alejandro Bia 1, Ramón P. Ñeco 2 1 Centro de Investigación Operativa, Universidad Miguel Hernández 2 Depto. de Ingeniería de Sistemas y Automática,
More informationSummary BEACON Project IST-FP
BEACON Brazilian European Consortium for DTT Services www.beacon-dtt.com Project reference: IST-045313 Contract type: Specific Targeted Research Project Start date: 1/1/2007 End date: 31/03/2010 Project
More informationAn Automated Data Fusion Process for an Air Defense Scenario
16 th ICCRTS 2011, June An Automated Data Fusion Process for an Air Defense Scenario André Luís Maia Baruffaldi [andre_baruffaldi@yahoo.com.br] José Maria P. de Oliveira [parente@ita.br] Alexandre de Barros
More informationUniversity of Groningen. Systemen, planning, netwerken Bosman, Aart
University of Groningen Systemen, planning, netwerken Bosman, Aart IMPORTANT NOTE: You are advised to consult the publisher's version (publisher's PDF) if you wish to cite from it. Please check the document
More informationModule 12. Machine Learning. Version 2 CSE IIT, Kharagpur
Module 12 Machine Learning 12.1 Instructional Objective The students should understand the concept of learning systems Students should learn about different aspects of a learning system Students should
More informationMultimedia Courseware of Road Safety Education for Secondary School Students
Multimedia Courseware of Road Safety Education for Secondary School Students Hanis Salwani, O 1 and Sobihatun ur, A.S 2 1 Universiti Utara Malaysia, Malaysia, hanisalwani89@hotmail.com 2 Universiti Utara
More informationThe IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs. 20 April 2011
The IDN Variant Issues Project: A Study of Issues Related to the Delegation of IDN Variant TLDs 20 April 2011 Project Proposal updated based on comments received during the Public Comment period held from
More informationExperience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory
Experience and Innovation Factory: Adaptation of an Experience Factory Model for a Research and Development Laboratory Full Paper Attany Nathaly L. Araújo, Keli C.V.S. Borges, Sérgio Antônio Andrade de
More informationDocument number: 2013/ Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering
Document number: 2013/0006139 Programs Committee 6/2014 (July) Agenda Item 42.0 Bachelor of Engineering with Honours in Software Engineering Program Learning Outcomes Threshold Learning Outcomes for Engineering
More informationWhat is beautiful is useful visual appeal and expected information quality
What is beautiful is useful visual appeal and expected information quality Thea van der Geest University of Twente T.m.vandergeest@utwente.nl Raymond van Dongelen Noordelijke Hogeschool Leeuwarden Dongelen@nhl.nl
More informationTU-E2090 Research Assignment in Operations Management and Services
Aalto University School of Science Operations and Service Management TU-E2090 Research Assignment in Operations Management and Services Version 2016-08-29 COURSE INSTRUCTOR: OFFICE HOURS: CONTACT: Saara
More informationProblem Solving for Success Handbook. Solve the Problem Sustain the Solution Celebrate Success
Problem Solving for Success Handbook Solve the Problem Sustain the Solution Celebrate Success Problem Solving for Success Handbook Solve the Problem Sustain the Solution Celebrate Success Rod Baxter 2015
More informationMaximizing Learning Through Course Alignment and Experience with Different Types of Knowledge
Innov High Educ (2009) 34:93 103 DOI 10.1007/s10755-009-9095-2 Maximizing Learning Through Course Alignment and Experience with Different Types of Knowledge Phyllis Blumberg Published online: 3 February
More informationWhat is PDE? Research Report. Paul Nichols
What is PDE? Research Report Paul Nichols December 2013 WHAT IS PDE? 1 About Pearson Everything we do at Pearson grows out of a clear mission: to help people make progress in their lives through personalized
More informationGuidelines for Writing an Internship Report
Guidelines for Writing an Internship Report Master of Commerce (MCOM) Program Bahauddin Zakariya University, Multan Table of Contents Table of Contents... 2 1. Introduction.... 3 2. The Required Components
More informationA Pipelined Approach for Iterative Software Process Model
A Pipelined Approach for Iterative Software Process Model Ms.Prasanthi E R, Ms.Aparna Rathi, Ms.Vardhani J P, Mr.Vivek Krishna Electronics and Radar Development Establishment C V Raman Nagar, Bangalore-560093,
More informationKnowledge Elicitation Tool Classification. Janet E. Burge. Artificial Intelligence Research Group. Worcester Polytechnic Institute
Page 1 of 28 Knowledge Elicitation Tool Classification Janet E. Burge Artificial Intelligence Research Group Worcester Polytechnic Institute Knowledge Elicitation Methods * KE Methods by Interaction Type
More informationSoftware Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum
Software Security: Integrating Secure Software Engineering in Graduate Computer Science Curriculum Stephen S. Yau, Fellow, IEEE, and Zhaoji Chen Arizona State University, Tempe, AZ 85287-8809 {yau, zhaoji.chen@asu.edu}
More informationDifferent Requirements Gathering Techniques and Issues. Javaria Mushtaq
835 Different Requirements Gathering Techniques and Issues Javaria Mushtaq Abstract- Project management is now becoming a very important part of our software industries. To handle projects with success
More informationSuccess Factors for Creativity Workshops in RE
Success Factors for Creativity s in RE Sebastian Adam, Marcus Trapp Fraunhofer IESE Fraunhofer-Platz 1, 67663 Kaiserslautern, Germany {sebastian.adam, marcus.trapp}@iese.fraunhofer.de Abstract. In today
More informationThe open source development model has unique characteristics that make it in some
Is the Development Model Right for Your Organization? A roadmap to open source adoption by Ibrahim Haddad The open source development model has unique characteristics that make it in some instances a superior
More informationIntroduction of Open-Source e-learning Environment and Resources: A Novel Approach for Secondary Schools in Tanzania
Introduction of Open-Source e- Environment and Resources: A Novel Approach for Secondary Schools in Tanzania S. K. Lujara, M. M. Kissaka, L. Trojer and N. H. Mvungi Abstract The concept of e- is now emerging
More informationReducing Features to Improve Bug Prediction
Reducing Features to Improve Bug Prediction Shivkumar Shivaji, E. James Whitehead, Jr., Ram Akella University of California Santa Cruz {shiv,ejw,ram}@soe.ucsc.edu Sunghun Kim Hong Kong University of Science
More informationUsing Team-based learning for the Career Research Project. Francine White. LaGuardia Community College
Team Based Learning and Career Research 1 Using Team-based learning for the Career Research Project Francine White LaGuardia Community College Team Based Learning and Career Research 2 Discussion Paper
More informationNATIONAL CENTER FOR EDUCATION STATISTICS RESPONSE TO RECOMMENDATIONS OF THE NATIONAL ASSESSMENT GOVERNING BOARD AD HOC COMMITTEE ON.
NATIONAL CENTER FOR EDUCATION STATISTICS RESPONSE TO RECOMMENDATIONS OF THE NATIONAL ASSESSMENT GOVERNING BOARD AD HOC COMMITTEE ON NAEP TESTING AND REPORTING OF STUDENTS WITH DISABILITIES (SD) AND ENGLISH
More informationPlatform for the Development of Accessible Vocational Training
Platform for the Development of Accessible Vocational Training Executive Summary January/2013 Acknowledgment Supported by: FINEP Contract 03.11.0371.00 SEL PUB MCT/FINEP/FNDCT/SUBV ECONOMICA A INOVACAO
More informationExecution Plan for Software Engineering Education in Taiwan
2012 19th Asia-Pacific Software Engineering Conference Execution Plan for Software Engineering Education in Taiwan Jonathan Lee 1, Alan Liu 2, Yu Chin Cheng 3, Shang-Pin Ma 4, and Shin-Jie Lee 1 1 Department
More informationSoftware Development Plan
Version 2.0e Software Development Plan Tom Welch, CPC Copyright 1997-2001, Tom Welch, CPC Page 1 COVER Date Project Name Project Manager Contact Info Document # Revision Level Label Business Confidential
More information4th Term MBA-2016 ½ credit
4th Term MBA-2016 ½ credit Prof. Carlos García Pont MBA Program Academic Director Second Year Prof. Paulo Rocha e Oliveira E-mail: paulo@iese.edu Brazil Projects Introduction The IESE Brazil Field Project
More informationIncluding the Microsoft Solution Framework as an agile method into the V-Modell XT
Including the Microsoft Solution Framework as an agile method into the V-Modell XT Marco Kuhrmann 1 and Thomas Ternité 2 1 Technische Universität München, Boltzmann-Str. 3, 85748 Garching, Germany kuhrmann@in.tum.de
More informationPRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN PROGRAM AT THE UNIVERSITY OF TWENTE
INTERNATIONAL CONFERENCE ON ENGINEERING AND PRODUCT DESIGN EDUCATION 6 & 7 SEPTEMBER 2012, ARTESIS UNIVERSITY COLLEGE, ANTWERP, BELGIUM PRODUCT COMPLEXITY: A NEW MODELLING COURSE IN THE INDUSTRIAL DESIGN
More informationBeyond the Blend: Optimizing the Use of your Learning Technologies. Bryan Chapman, Chapman Alliance
901 Beyond the Blend: Optimizing the Use of your Learning Technologies Bryan Chapman, Chapman Alliance Power Blend Beyond the Blend: Optimizing the Use of Your Learning Infrastructure Facilitator: Bryan
More informationOn-Line Data Analytics
International Journal of Computer Applications in Engineering Sciences [VOL I, ISSUE III, SEPTEMBER 2011] [ISSN: 2231-4946] On-Line Data Analytics Yugandhar Vemulapalli #, Devarapalli Raghu *, Raja Jacob
More informationInstitutionen för datavetenskap. Hardware test equipment utilization measurement
Institutionen för datavetenskap Department of Computer and Information Science Final thesis Hardware test equipment utilization measurement by Denis Golubovic, Niklas Nieminen LIU-IDA/LITH-EX-A 15/030
More informationCOURSE LISTING. Courses Listed. Training for Cloud with SAP SuccessFactors in Integration. 23 November 2017 (08:13 GMT) Beginner.
Training for Cloud with SAP SuccessFactors in Integration Courses Listed Beginner SAPHR - SAP ERP Human Capital Management Overview SAPHRE - SAP ERP HCM Overview Advanced HRH00E - SAP HCM/SAP SuccessFactors
More informationA Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique
A Coding System for Dynamic Topic Analysis: A Computer-Mediated Discourse Analysis Technique Hiromi Ishizaki 1, Susan C. Herring 2, Yasuhiro Takishima 1 1 KDDI R&D Laboratories, Inc. 2 Indiana University
More informationUCEAS: User-centred Evaluations of Adaptive Systems
UCEAS: User-centred Evaluations of Adaptive Systems Catherine Mulwa, Séamus Lawless, Mary Sharp, Vincent Wade Knowledge and Data Engineering Group School of Computer Science and Statistics Trinity College,
More informationGenerating Test Cases From Use Cases
1 of 13 1/10/2007 10:41 AM Generating Test Cases From Use Cases by Jim Heumann Requirements Management Evangelist Rational Software pdf (155 K) In many organizations, software testing accounts for 30 to
More informationM55205-Mastering Microsoft Project 2016
M55205-Mastering Microsoft Project 2016 Course Number: M55205 Category: Desktop Applications Duration: 3 days Certification: Exam 70-343 Overview This three-day, instructor-led course is intended for individuals
More informationPRINCE2 Practitioner Certification Exam Training - Brochure
PRINCE2 Practitioner Certification Exam Training - Brochure The Credential that makes you a Project Management Specialist Course Name : PRINCE2_P Version : INVL_PRINCE2P_BR_02_035_1.2 Course ID : PMGT
More informationNearing Completion of Prototype 1: Discovery
The Fit-Gap Report The Fit-Gap Report documents how where the PeopleSoft software fits our needs and where LACCD needs to change functionality or business processes to reach the desired outcome. The report
More informationIntroduction to CRC Cards
Softstar Research, Inc Methodologies and Practices White Paper Introduction to CRC Cards By David M Rubin Revision: January 1998 Table of Contents TABLE OF CONTENTS 2 INTRODUCTION3 CLASS4 RESPONSIBILITY
More informationGrade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand
Grade 2: Using a Number Line to Order and Compare Numbers Place Value Horizontal Content Strand Texas Essential Knowledge and Skills (TEKS): (2.1) Number, operation, and quantitative reasoning. The student
More informationTHEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY
THEORY OF PLANNED BEHAVIOR MODEL IN ELECTRONIC LEARNING: A PILOT STUDY William Barnett, University of Louisiana Monroe, barnett@ulm.edu Adrien Presley, Truman State University, apresley@truman.edu ABSTRACT
More informationDeveloping Students Research Proposal Design through Group Investigation Method
IOSR Journal of Research & Method in Education (IOSR-JRME) e-issn: 2320 7388,p-ISSN: 2320 737X Volume 7, Issue 1 Ver. III (Jan. - Feb. 2017), PP 37-43 www.iosrjournals.org Developing Students Research
More informationNote: Principal version Modification Amendment Modification Amendment Modification Complete version from 1 October 2014
Note: The following curriculum is a consolidated version. It is legally non-binding and for informational purposes only. The legally binding versions are found in the University of Innsbruck Bulletins
More informationHawai i Pacific University Sees Stellar Response Rates for Course Evaluations
Improvement at heart. CASE STUDY Hawai i Pacific University Sees Stellar Response Rates for Course Evaluations From my perspective, the company has been incredible. Without Blue, we wouldn t be able to
More informationAutomating the E-learning Personalization
Automating the E-learning Personalization Fathi Essalmi 1, Leila Jemni Ben Ayed 1, Mohamed Jemni 1, Kinshuk 2, and Sabine Graf 2 1 The Research Laboratory of Technologies of Information and Communication
More informationUnit 3. Design Activity. Overview. Purpose. Profile
Unit 3 Design Activity Overview Purpose The purpose of the Design Activity unit is to provide students with experience designing a communications product. Students will develop capability with the design
More informationA cognitive perspective on pair programming
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 A cognitive perspective on pair programming Radhika
More informationIntegrating simulation into the engineering curriculum: a case study
Integrating simulation into the engineering curriculum: a case study Baidurja Ray and Rajesh Bhaskaran Sibley School of Mechanical and Aerospace Engineering, Cornell University, Ithaca, New York, USA E-mail:
More informationModule Title: Managing and Leading Change. Lesson 4 THE SIX SIGMA
Module Title: Managing and Leading Change Lesson 4 THE SIX SIGMA Learning Objectives: At the end of the lesson, the students should be able to: 1. Define what is Six Sigma 2. Discuss the brief history
More informationA GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING
A GENERIC SPLIT PROCESS MODEL FOR ASSET MANAGEMENT DECISION-MAKING Yong Sun, a * Colin Fidge b and Lin Ma a a CRC for Integrated Engineering Asset Management, School of Engineering Systems, Queensland
More informationMajor Milestones, Team Activities, and Individual Deliverables
Major Milestones, Team Activities, and Individual Deliverables Milestone #1: Team Semester Proposal Your team should write a proposal that describes project objectives, existing relevant technology, engineering
More informationFragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing
Fragment Analysis and Test Case Generation using F- Measure for Adaptive Random Testing and Partitioned Block based Adaptive Random Testing D. Indhumathi Research Scholar Department of Information Technology
More informationUtilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant Sudheer Takekar 1 Dr. D.N. Raut 2
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 04, 2014 ISSN (online): 2321-0613 Utilizing Soft System Methodology to Increase Productivity of Shell Fabrication Sushant
More informationNotes on The Sciences of the Artificial Adapted from a shorter document written for course (Deciding What to Design) 1
Notes on The Sciences of the Artificial Adapted from a shorter document written for course 17-652 (Deciding What to Design) 1 Ali Almossawi December 29, 2005 1 Introduction The Sciences of the Artificial
More informationCONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS
CONSULTATION ON THE ENGLISH LANGUAGE COMPETENCY STANDARD FOR LICENSED IMMIGRATION ADVISERS Introduction Background 1. The Immigration Advisers Licensing Act 2007 (the Act) requires anyone giving advice
More informationWHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING AND TEACHING OF PROBLEM SOLVING
From Proceedings of Physics Teacher Education Beyond 2000 International Conference, Barcelona, Spain, August 27 to September 1, 2000 WHY SOLVE PROBLEMS? INTERVIEWING COLLEGE FACULTY ABOUT THE LEARNING
More informationJust in Time to Flip Your Classroom Nathaniel Lasry, Michael Dugdale & Elizabeth Charles
Just in Time to Flip Your Classroom Nathaniel Lasry, Michael Dugdale & Elizabeth Charles With advocates like Sal Khan and Bill Gates 1, flipped classrooms are attracting an increasing amount of media and
More informationStacks Teacher notes. Activity description. Suitability. Time. AMP resources. Equipment. Key mathematical language. Key processes
Stacks Teacher notes Activity description (Interactive not shown on this sheet.) Pupils start by exploring the patterns generated by moving counters between two stacks according to a fixed rule, doubling
More informationOilSim. Talent Management and Retention in the Oil and Gas Industry. Global network of training centers and technical facilities
NExT Oil & Gas Training and Competency Development Global network of training centers and technical facilities Talent Management and Retention in the Oil and Gas Industry Regional Offices Build multidisciplinary
More informationChamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform
Chamilo 2.0: A Second Generation Open Source E-learning and Collaboration Platform doi:10.3991/ijac.v3i3.1364 Jean-Marie Maes University College Ghent, Ghent, Belgium Abstract Dokeos used to be one of
More informationMotivation to e-learn within organizational settings: What is it and how could it be measured?
Motivation to e-learn within organizational settings: What is it and how could it be measured? Maria Alexandra Rentroia-Bonito and Joaquim Armando Pires Jorge Departamento de Engenharia Informática Instituto
More informationOperational Knowledge Management: a way to manage competence
Operational Knowledge Management: a way to manage competence Giulio Valente Dipartimento di Informatica Universita di Torino Torino (ITALY) e-mail: valenteg@di.unito.it Alessandro Rigallo Telecom Italia
More informationInitial English Language Training for Controllers and Pilots. Mr. John Kennedy École Nationale de L Aviation Civile (ENAC) Toulouse, France.
Initial English Language Training for Controllers and Pilots Mr. John Kennedy École Nationale de L Aviation Civile (ENAC) Toulouse, France Summary All French trainee controllers and some French pilots
More informationLen Lundstrum, Ph.D., FRM
, Ph.D., FRM Professor of Finance Department of Finance College of Business Office: 815 753-0317 Northern Illinois University Fax: 815 753-0504 Dekalb, IL 60115 llundstrum@niu.edu Education Indiana University
More informationUsing Virtual Manipulatives to Support Teaching and Learning Mathematics
Using Virtual Manipulatives to Support Teaching and Learning Mathematics Joel Duffin Abstract The National Library of Virtual Manipulatives (NLVM) is a free website containing over 110 interactive online
More informationAn OO Framework for building Intelligence and Learning properties in Software Agents
An OO Framework for building Intelligence and Learning properties in Software Agents José A. R. P. Sardinha, Ruy L. Milidiú, Carlos J. P. Lucena, Patrick Paranhos Abstract Software agents are defined as
More informationRadius STEM Readiness TM
Curriculum Guide Radius STEM Readiness TM While today s teens are surrounded by technology, we face a stark and imminent shortage of graduates pursuing careers in Science, Technology, Engineering, and
More informationDesigning a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses
Designing a Rubric to Assess the Modelling Phase of Student Design Projects in Upper Year Engineering Courses Thomas F.C. Woodhall Masters Candidate in Civil Engineering Queen s University at Kingston,
More informationSimulation in Maritime Education and Training
Simulation in Maritime Education and Training Shahrokh Khodayari Master Mariner - MSc Nautical Sciences Maritime Accident Investigator - Maritime Human Elements Analyst Maritime Management Systems Lead
More informationTA Script of Student Test Directions
TA Script of Student Test Directions SMARTER BALANCED PAPER-PENCIL Spring 2017 ELA Grade 6 Paper Summative Assessment School Test Coordinator Contact Information Name: Email: Phone: ( ) Cell: ( ) Visit
More informationWhite Paper. The Art of Learning
The Art of Learning Based upon years of observation of adult learners in both our face-to-face classroom courses and using our Mentored Email 1 distance learning methodology, it is fascinating to see how
More informationOn the Combined Behavior of Autonomous Resource Management Agents
On the Combined Behavior of Autonomous Resource Management Agents Siri Fagernes 1 and Alva L. Couch 2 1 Faculty of Engineering Oslo University College Oslo, Norway siri.fagernes@iu.hio.no 2 Computer Science
More informationUsing interactive simulation-based learning objects in introductory course of programming
Available online at www.sciencedirect.com Procedia - Social and Behavioral Sciences 46 ( 2012 ) 2276 2280 WCES 2012 Using interactive simulation-based learning objects in introductory course of programming
More informationSpecification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments
Specification and Evaluation of Machine Translation Toy Systems - Criteria for laboratory assignments Cristina Vertan, Walther v. Hahn University of Hamburg, Natural Language Systems Division Hamburg,
More informationOCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SYSTEMS ANALYSIS K/505/5481 LEVEL 3 UNIT 34 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SYSTEMS ANALYSIS K/505/5481 LEVEL
More informationPROGRAM HANDBOOK. for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES. by the HEALTH PHYSICS SOCIETY
REVISION 1 was approved by the HPS BOD on 7/15/2004 Page 1 of 14 PROGRAM HANDBOOK for the ACCREDITATION OF INSTRUMENT CALIBRATION LABORATORIES by the HEALTH PHYSICS SOCIETY 1 REVISION 1 was approved by
More informationStrategy and Design of ICT Services
Strategy and Design of IT Services T eaching P lan Telecommunications Engineering Strategy and Design of ICT Services Teaching guide Activity Plan Academic year: 2011/12 Term: 3 Project Name: Strategy
More informationBrainstorming Tools Literature Review and Introduction to Code Development
Brainstorming Tools Literature Review and Introduction to Code Development K. Nordland August 28, 2006 1 Contents 1 Definition 3 2 Alex Osborn 3 3 Brainstorming and Stage-Gate 4 4 Recent Developments 4
More informationEvaluation of Teach For America:
EA15-536-2 Evaluation of Teach For America: 2014-2015 Department of Evaluation and Assessment Mike Miles Superintendent of Schools This page is intentionally left blank. ii Evaluation of Teach For America:
More informationComprehensive Program Review Report (Narrative) College of the Sequoias
Program Review - Child Development Comprehensive Program Review Report (Narrative) College of the Sequoias Program Review - Child Development Prepared by: San Dee Hodges, Rebecca Griffith, Gwenette Aytman
More informationE-Learning project in GIS education
E-Learning project in GIS education MARIA KOULI (1), DIMITRIS ALEXAKIS (1), FILIPPOS VALLIANATOS (1) (1) Department of Natural Resources & Environment Technological Educational Institute of Grete Romanou
More informationLeveraging MOOCs to bring entrepreneurship and innovation to everyone on campus
Paper ID #9305 Leveraging MOOCs to bring entrepreneurship and innovation to everyone on campus Dr. James V Green, University of Maryland, College Park Dr. James V. Green leads the education activities
More informationWeb-based Learning Systems From HTML To MOODLE A Case Study
Web-based Learning Systems From HTML To MOODLE A Case Study Mahmoud M. El-Khoul 1 and Samir A. El-Seoud 2 1 Faculty of Science, Helwan University, EGYPT. 2 Princess Sumaya University for Technology (PSUT),
More informationECE-492 SENIOR ADVANCED DESIGN PROJECT
ECE-492 SENIOR ADVANCED DESIGN PROJECT Meeting #3 1 ECE-492 Meeting#3 Q1: Who is not on a team? Q2: Which students/teams still did not select a topic? 2 ENGINEERING DESIGN You have studied a great deal
More informationSESSION III: Training on Conducting the Informed Consent Process
SESSION III: Training on Conducting the Informed Consent Process Jennifer Lentz, Eli Lilly & Co. March 10, 2015 Session III Objectives! Present examples of innovative informed consent training programs!
More informationBUILD-IT: Intuitive plant layout mediated by natural interaction
BUILD-IT: Intuitive plant layout mediated by natural interaction By Morten Fjeld, Martin Bichsel and Matthias Rauterberg Morten Fjeld holds a MSc in Applied Mathematics from Norwegian University of Science
More informationPrince2 Foundation and Practitioner Training Exam Preparation
Prince2 Foundation and Practitioner Training Exam Preparation Prince2 is the UK Government Best Practice standard and is widely recognized and used for effective Project management methodology and tools.
More informationAbstract. Janaka Jayalath Director / Information Systems, Tertiary and Vocational Education Commission, Sri Lanka.
FEASIBILITY OF USING ELEARNING IN CAPACITY BUILDING OF ICT TRAINERS AND DELIVERY OF TECHNICAL, VOCATIONAL EDUCATION AND TRAINING (TVET) COURSES IN SRI LANKA Janaka Jayalath Director / Information Systems,
More informationSchool Leadership Rubrics
School Leadership Rubrics The School Leadership Rubrics define a range of observable leadership and instructional practices that characterize more and less effective schools. These rubrics provide a metric
More information