International journal of agile and extreme software development


















New research published in the International Journal of Mathematics in Operational Research plots a new route for viral propagation in a computer network.

Anis Rezgui of Ecole Polytechnique de Tunisie and Carthage University in Tunisia has examined an earlier approach to studying the way a virus spreads through a network and found that approaches based on stochastic ordinary differential equations. A second approach, a microscopic approach based on a Markov chain has many similarities with SODEs but can take into account the interconnections between nodes in the network and so provide a clear picture of propagation. Computer security is a multi-billion dollar industry but money aside it is such an important part of the modern world that it must be the focus of much research out of necessity.

Rezgui explains that modelling viral propagation through a computer network has been modelled historically in the same way that we model biological viruses, epidemiologically, in other words. There have been two major types of model used, deterministic and stochastic ones each with pros and cons. This new work focuses on the latter but introduces a novel approach based on the aforementioned Markov chain, which offers a rigorous way to model viral propagation mathematically.

It allows researchers to understand the global behaviour of the network when exposed to malware infection but homes in on the dynamics occurring at each node in the network alone. Such modelling is critical to understanding how a virus spreads and so offers insights into how it might be stopped in its tracks through network analysis. Incorporating a model into an antivirus system might ultimately be able to halt a novel, or zero-day, infection when the viral signatures are not known beforehand and the virus is starting to spread.

It is perhaps a whimsical notion that such modelling when applied to human society might allow biologists and epidemiologists to spot a new and emerging pathogen, such as a coronavirus, before it spreads widely and to stop infection of social nodes that would otherwise lead to a pandemic, for instance.

Rezgui, A. Mathematics in Operational Research, Vol. Can small to medium-sized enterprises SMEs across Africa address the cybersecurity risk adequately? New research from Christopher A. Moturi, Nabihah R. Abdulrahim, and Daniel O. The team suggests that SMEs are key to economic growth in Africa but as many companies become increasingly entrenched in digital and online operations and services, the risks they face from malware and hackers increases.

The team has the National Institute of Standards and Technology NIST cybersecurity framework to undertake an in-depth study of selected SMEs to identify the critical issues that are causing those companies problems and to help find solutions that might be applicable to many other SMEs. In Kenya alone, cybercrime is costing SMEs there the equivalent of millions of dollars every year.

Their work could help guide those very companies to a more secure future but also provide e a roadmap for governments and regulatory bodies. Importantly, the study could be used to raise awareness and instil a security-aware culture across SMEs where that culture does not yet exist.

Given that cybersecurity has no unique definition across companies and regulators, it is important that agreement on meaning be made so that risks can be identified and security implemented. This definition must encompass evolving social media, mobile computing, big data, cloud computing, and the internet of things to ensure cybersecurity measures are in place that stay one step ahead of the many threats facing companies. The NIST framework can offer SMEs a strategic approach that may cost them money initially but will save them money in the long term by reducing the risk of them succumbing to security breaches and cybercrime.

Moturi, C. Business Continuity and Risk Management, Vol. The lockdowns, travel restrictions, and remote working and remote learning that became obligatory for many people around the world during the COVID pandemic may have been inconvenient for some of them but they also represented a lesson we might learn regarding how well we can cope without the daily commute.

Such a lesson could point us to new ways of working and learning that might even have a reduced carbon footprint, suggests work published in the International Journal of Global Warming. Indeed at the height of the lockdown and enforced remote activity, during the second and third quarters of , carbon emissions fell enormously.

Aseel A. They explain how the various restrictions implemented in efforts to curtail the spread of the coronavirus may have altered our perceptions of effective climate change actions. The team has now surveyed environmental students to see how their perceptions have changed and through their statistical analysis of the results have found four discourses that emerge.

The first sits well with the notion that we ought to learn the lessons of the so-called new normal and that this could benefit us in slowing climate change. The second is more pessimistic but suggests that we should at least endeavour to not return to pre-pandemic habits.

The third discourse from the survey analysis demonstrates that many think economic recovery will have precedence over any consideration of the huge problem of climate change.

The team suggests that, in the UEA, at least, projections for lowering carbon emissions could be achieved if the government implements a 'green' economic recovery in parallel with more stringent climate policies, such as abolishing any carbon-intensive investments.

They add that adaptation will, of course, be a shared responsibility between governments, communities, and individuals. There is now a need to undertake similar surveys in other nations to determine whether or not similar discourses emerge and to measure the temper of environmental students elsewhere. Takshe, A. Global Warming, Vol. This methodology provides a pragmatic way of adapting to changing requirements at any point during the lifecycle of a software project.

Agile methodologies have drawn significant attention in the software industry in recent years, and are also moving into new industries, such as embedded systems, safety-critical products and other complex development environments. The objectives of IJAESD are to bring together both industrial practitioners and researchers and to promote the research and practice of agile methodologies and extreme software development. The topics will stress practical applications and implications of agile methodologies, new openings, domains and insights.

IJAESD is a forum to help professionals, academics, researchers and practitioners working in the field of software development to discuss important ideas, concepts, methodologies, and to disseminate information and learn from each other's work. IJAESD publishes original papers, review papers, technical reports, case studies, conference reports, and management reports.

Special issues devoted to important topics in software development methodologies will occasionally be published. Editor in Chief Dr.

Extreme programming is governed by the five key values of courage, respect, feedback, simplicity and communication. Foremost, strong communication between the various members of the software development team is necessary to ensure that knowledge is shared freely and any roadblocks or bottlenecks in the software development process are addressed in a timely manner. Thirdly, extreme programming requires constant feedback from the different software development teams and customers.

Fourthly, courage is necessary to ensure that any bottlenecks or roadblocks are raised quickly in an action-oriented approach, and to discard efforts which are not working.

The process of extreme programming has five key stages of planning, designing, coding, testing and listening. Foremost, planning is necessary for the customer requirements to be adequately addressed in a software development plan, with the requirements formulated into stories that characterise the end result. Spikes can be introduced at this stage to flag out key unanswered questions that require further research.

Next, designing ensures that a suitable structure and logic of the system is identified, which streamlines any redundancies or inefficiencies in the software development process. Thirdly, coding involves the programming of the designed system, using specific extreme programming practices such as continuous integration, collective code ownership, and pair programming. Finally, the listening stage involves receiving further customer feedback and advice on areas for improvement, in order to fix any issues with the software.

The whole process requires the constant and active engagement of customers, programmers, developers and managers in an active cycle of feedback and reiteration. Extreme programming enjoys the following advantages. Foremost, if implemented correctly, extreme programming provides clear code and a stable system. Extreme programming also ensures active collaboration and communication without the need for cumbersome documentation, while a minimalist and iterative approach ensures that only the most feasible results are used and quickly moved to the next stage of development.

Extreme programming also involves a number of specific work practices that distinguish it from other agile methodologies in enabling more efficient program development. Foremost, feedback should be acquired through planning games, pair programming, on-site customer interviews and test-driven development Gopaul, In particular, pair programming ensures active engagement with the programming process, and provides a check and balance in the form of a secondary programmer who ensures that the code is sound.

Next, continual processes of code refactoring, continuous integration and small releases must be implemented to ensure that issues in each of the software releases can be quickly addressed and iterated upon Gopaul, Thirdly, code understanding processes should be implemented in the areas of collective code ownership, coding standards and simple design to ensure a strong basis of simple, efficient and high quality coding. In particular, code factoring ensures that unnecessary redundancies and functions are eliminated to increase the efficiency and coherency of the code.



0コメント

  • 1000 / 1000