A Comparative Analysis of BRIDGE and Some Other Well Known Software Development Life Cycle Models
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 3
Abstract
The existing Software Development Life Cycle Models (SDLC) models were quite successful earlier, but are rarely used in modern software development because of their limitations and non suitability for modern projects. To cater with the present software crisis, Mandal [13] proposed a SDLC model named BRIDGE for modern software development. In this paper we have outlined the BRIDGE process model. Further we performed a comparative analysis of the existing well know models and BRIDGE. Then, we discussed the results of the comparative analysis. Finally we conclude by recommending the BRIDGE process model to be the best generic process model for software development suitable for modern software development projects.
Authors and Affiliations
Ardhendu Mandal , S. C. Pal
Implementation of Vehicle License Plate Recognition Using Canny Edge Detection
Vehicle number plate identification based on digital image processing is a vital area of research ongoing in present scenario. It offers various applications expanding through many fields. This technique may be used for...
AN ENHANCED PRIVACY RULE BASED MODEL FOR FILTERING UNPREFERRED MESSAGES
The online social networks (OSN) offers proficient message controls that are posted on their private space in order to avoid un-preferred content displayed to users. But, OSN provides a low supportive and flexibility to...
TOWARDS DEVELOPMENT OF CLOUD OPERATING SYSTEMS
Cloud operating system provides the abstraction of complex physical datacenter infrastructure by providing different interfaces for local and remote users. It manages the interaction between aplications and their interfa...
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
The main goal of this paper is to embed a watermark in the speech signal, using the three techniques such as Discrete Cosine Transform (DCT) along with Singular Value Decomposition (SVD) and Discrete Wavelet Transform (D...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...