Abrupt Software Cost Estimation Technique Based on Basic Requirement
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
Software cost estimation is the process to measure the required effort and cost to build system. In the project management still it is one of the most difficult tasks. There is a lack of reliable estimation technique and remains on going challenge to software developer. Trustworthy estimation techniques give proper schedule, budget, effort, risk, resource. Software cost estimation more challenging to IT industry because of continuous changing resources and involvement of different customer. Both software project management and customer are suffering in this issue. In many cases it is necessary to estimate cost urgent for customer without advance requirements. Most of the estimation techniques develop based on details requirement. In reality customer wants to know the cost of the system immediately before giving them full requirement of the system. We are going to propose an Abrupt Software cost estimation technique based on basic requirement. The main focus of this model to calculate primary cost to solve immediate problem of cost needed to develop system. Our model calculates cost by considering parameters like feasibility study, basic requirement, time duration, risk management, project analysis and others. This model is flexible because estimated cost varies with change of requirement.
Authors and Affiliations
Md. MijanurRahman, Md. NazimUddin, Sujan Chandra Sarker
Detection & Prevention of Unauthorized User through Policy Server for a Network
Now a day’s Accessing the information all over the world is very fast & quick. Accessing the information is done over the internet. Industry & various organizations are facing access management problems that require n...
Advanced Home Security System.
Domestic security recently has started making a significant mark in the life of people throughout the globe. And hence more and more advanced systems are developed each day to enhance domestic security. But most of t...
THE SECURED ANTI PHISHING APPROACH USING IMAGE BASED VALIDATION
Anti-phishing schemes in the websites presently work on helping users to confirm whether a web site is honest or not. Phishing on the web pages is an attempt by an individual or a group to threats/hackers seeking to...
Performance evaluation of different Segmentation techniques for Underwater and Arial images
The quality of underwater images is directly affected by water medium, atmosphere medium, pressure and Temperature. Arial images are affected by space temperature and solar noise. The segmentation is the most challen...
A Comparitive Study of Cloud Computing Models for Academic Environment
Cloud computing is becoming main computing paradigm. The use of cloud computing has been increased exponentially. It has various characteristics and advantages of on-demand computing, shared infrastructure, pay-per-u...