Match!
Irum Inayat
National University of Computer and Emerging Sciences
Agile software developmentSystems engineeringAgile usability engineeringComputer scienceAgile Unified Process
38Publications
7H-index
267Citations
What is this?
Publications 44
Newest
#1Maryam Zahid (National University of Computer and Emerging Sciences)
#2Irum Inayat (CU: Capital University)
Last. Zahid Mehmood (UOL: University of Lahore)
view all 4 authors...
Cyber physical systems (CPSs) are safety-critical, be it weapon systems, smart medical devices, or grid stations. This makes ensuring security of all the components constituting a CPS unavoidable. The rise in the demand of interconnectedness has made such systems vulnerable to attacks, ie, cyberattacks. Over 170 cases of cyber-security breaches in CPS were reported over the past two decades. An increase in the number of cyberattack incidents on CPS makes them more exposed and less trustworthy. H...
Source
#1Muhammad Hammad (National University of Computer and Emerging Sciences)
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Last. Maryam Zahid (CU: Capital University)
view all 3 authors...
In agile software development, some of the formal project management activities are neglected due to heavy documentation and planning. Agile methodologies usually focus on rapid development over hefty documentation which is contrary to the nature of the risk management process. Literature studies show agile methods are used for the development safety critical systems as well. For that ignoring risk management process is inevitable. This intrigued us to explore more on the risk management practic...
Source
#1Muhammad Abbas (Research Institutes of Sweden)
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Last. Daniel Sundmark (MDH: Mälardalen University College)H-Index: 14
view all 6 authors...
Requirements prioritization plays an important role in driving project success during software development. Literature reveals that existing requirements prioritization approaches ignore vital factors such as interdependency between requirements. Existing requirements prioritization approaches are also generally time-consuming and involve substantial manual effort. Besides, these approaches show substantial limitations in terms of the number of requirements under consideration. There is some evi...
Source
#1Kanwal Batool (National University of Computer and Emerging Sciences)H-Index: 1
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Requirements engineering is the key process of software development. Effectively dealing with change in requirements is a challenge. Agile methods are flexible and accept change effectively. The question arises in our mind that which requirements change management practices are the utmost to follow? Through a questionnaire-based survey, we explored the Pakistani software development industry to identify the processes, methods, practices being followed by the agile practitioners for requirements ...
Source
#1Saad Shafiq (National University of Computer and Emerging Sciences)
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Last. Muhammad Abbas (Research Institutes of Sweden)
view all 3 authors...
Software development industry is growing rapidly and so are the time and budget constraints getting stringent. After Scrum, the widely adopted agile method, agile practitioners are now shifting towards Kanban due to its effective communication facilitation, transparency and limited work in progress traits. Since, the industry is in transition from scrum to Kanban therefore we don't find many empirical studies yielding results of adopting Kanban. Therefore, in this study we aim to explore more on...
Source
#2Irum InayatH-Index: 7
Last. Faiza Allah Bukhsh (UT: University of Twente)H-Index: 2
view all 3 authors...
Continuous delivery and rapidly changing requirements in agile environments force the developers to put non-functional requirements (NFRs) on halt till maintenance phase. However, neglecting NFRs during prioritization phase may lead to inaccurate estimations for software projects resulting in high maintenance cost and failures. The subjective and uncertain nature of non-functional requirements makes them unfit to be prioritized using conventional prioritization methods. Although the existing lit...
Source
#1Rooh ul Amin (NPU: Northwestern Polytechnical University)H-Index: 4
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Last. Li Ai Jun (NPU: Northwestern Polytechnical University)H-Index: 1
view all 3 authors...
Abstract In this work, finite time position and heading control based on backstepping based fast terminal sliding mode control is proposed for coaxial octorotor subjected to external wind disturbances. First, mathematical model of the coaxial octorotor is developed and then a new learning-based technique, an extended inverse multi-quadratic radial basis function network (EIMRBFN) is proposed to estimate the unmodeled dynamics of the octorotor. The external disturbance observer is also designed t...
1 CitationsSource
#1Muhammad Abbas (Research Institutes of Sweden)
#2Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
Last. Naila Jan (National University of Computer and Emerging Sciences)
view all 4 authors...
The use of requirements' information in testing is a well-recognized practice in the software development life cycle. Literature reveals that existing tests prioritization and selection approaches neglected vital factors affecting tests priorities, like interdependencies between requirement specifications. We believe that models may play a positive role in specifying these inter-dependencies and prioritizing tests based on these inter-dependencies. However, till date, few studies can be found th...
Source
#2Irum InayatH-Index: 7
view all 4 authors...
#1Shafiq ur Rehman (University of Duisburg-Essen)H-Index: 4
#2Volker Gruhn (University of Duisburg-Essen)H-Index: 22
Last. Irum Inayat (National University of Computer and Emerging Sciences)H-Index: 7
view all 4 authors...
Since the world is moving towards secure systems which makes security a primary concern and not an afterthought in software development. Secure software development involves security at each step of development lifecycle from requirements phase to testing. With surging focus on security requirements, we can see an increase in frameworks/methods/techniques proposed to deal with security requirements for variable applications. However, to summarise the literature findings till date and to propose ...
Source
12345