Validating Utility of TEIM: A Comparative Analysis
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 1
Abstract
Concrete efforts to integrate Software Engineering and Human Computer Interaction exist in the form of models by many researchers. An unconventional model called TEIM (The Evolved Integrated Model) of Software Engineering and Human Computer Interaction was proposed by us. There is a need to establish correlation with prior models as well validate utility of TEIM. In this paper product PS designed using SE-HCI integration model TEIM is evaluated by making a comparative analysis. For evaluation UGAM and IOI tools designed by DR.Anirudha Joshi are used. Our analysis showed that correlation of TEIM exists with prior models. Regression analysis showed that high correlation exists between TEIM and prior model.
Authors and Affiliations
Rajesh Kulkarni , P. Padmanabham
DETECTING LINKEDIN SPAMMERS AND ITS SPAM NETS
Spam is one of the main problems of the WWW. Many studies exist about characterising and detecting several types of Spam (mainly Web Spam, Email Spam, Forum/Blob Spam and Social Networking Spam). Nevertheless, to the bes...
Combination of Neural Networks and Fuzzy Clustering Algorithm to Evalution Training Simulation-Based Training
With the advancement of computer technology, computer simulation in the field of education are more realistic and more effective. The definition of simulation is to create a virtual environment that accurately and real e...
Permanent Relocation and Self-Route Recovery in Wireless Sensor and Actor Networks
Wireless sensor and actor network’s connectivity and coverage plays a significant role in mission-critical applications, whereas sensors and actors respond immediately to the detected events in an organized and coordinat...
A Real-Time Street Actions Detection
Human action detection in real time is one of the most important and challenging problems in computer vision. Nowadays, CCTV cameras exist everywhere in our lives. However, the contents of these cameras are monitored and...
A Novel approach for Implementing Security over Vehicular Ad hoc network using Signcryption through Network Grid
Security over Vehicular ad hoc network and identifying accurate vehicle location has always been a major challenge over VANET. Even though GPS system can be used to identify the location of the vehicle they too suf...