-
Evaluating the Impact of Pair Documentation on Requirements Quality and Team Productivity
Authors:
Nosheen Qamar,
Nosheen Sabahat,
Amir Mashmool,
Amir Mosavi
Abstract:
The most important deliverable of the requirements engineering process is the software requirements specification(SRS)document. Requirements documentation is important during the complete software development lifecycle to share the vision and effective communication between major stakeholders. The Standish Group reported that the top factors behind project failures are related to requirements. By…
▽ More
The most important deliverable of the requirements engineering process is the software requirements specification(SRS)document. Requirements documentation is important during the complete software development lifecycle to share the vision and effective communication between major stakeholders. The Standish Group reported that the top factors behind project failures are related to requirements. By giving the right level of attention to key requirements good quality software can be produced. Therefore, more research is needed in this area and this study is trying to fill this gap. This empirical study aims to examine the importance of pair documentation. Unconventional documentation refers to the approach when two persons work on the same document's requirements collaboratively just like pair programming on the requirements quality and team productivity. Twenty pairs of documentation writers worked into two groups. one group using pair documentation, i.e., the experimental group, and the other one using conventional documentation, i.e., the control group. the resultant requirement's documents for the same project, produced by both groups were then compared. It is observed that there is a significant improvement in the quality and productivity of the experimental group using pair documentation. The findings of this study may assist requirement engineers in forming efficient teams that can create high-quality SRS documents.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
ServeNet: A Deep Neural Network for Web Services Classification
Authors:
Yilong Yang,
Nafees Qamar,
Peng Liu,
Katarina Grolinger,
Weiru Wang,
Zhi Li,
Zhifang Liao
Abstract:
Automated service classification plays a crucial role in service discovery, selection, and composition. Machine learning has been widely used for service classification in recent years. However, the performance of conventional machine learning methods highly depends on the quality of manual feature engineering. In this paper, we present a novel deep neural network to automatically abstract low-lev…
▽ More
Automated service classification plays a crucial role in service discovery, selection, and composition. Machine learning has been widely used for service classification in recent years. However, the performance of conventional machine learning methods highly depends on the quality of manual feature engineering. In this paper, we present a novel deep neural network to automatically abstract low-level representation of both service name and service description to high-level merged features without feature engineering and the length limitation, and then predict service classification on 50 service categories. To demonstrate the effectiveness of our approach, we conduct a comprehensive experimental study by comparing 10 machine learning methods on 10,000 real-world web services. The result shows that the proposed deep neural network can achieve higher accuracy in classification and more robust than other machine learning methods.
△ Less
Submitted 6 August, 2020; v1 submitted 14 June, 2018;
originally announced June 2018.
-
MedShare: Medical Resource Sharing among Autonomous Healthcare Providers
Authors:
Yilong Yang,
Xiaoshan Li,
Nafees Qamar,
Wei Ke,
Zhiming Liu
Abstract:
Legacy Electronic Health Records (EHRs) systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources. Large hospitals are less likely to share their data with external hospitals due to economic and political reasons. Motivated by these facts…
▽ More
Legacy Electronic Health Records (EHRs) systems were not developed with the level of connectivity expected from them nowadays. Therefore, interoperability weakness inherent in the legacy systems can result in poor patient care and waste of financial resources. Large hospitals are less likely to share their data with external hospitals due to economic and political reasons. Motivated by these facts, we aim to provide a set of software implementation guidelines, i.e., MedShare to deal with interoperability issues among disconnected healthcare systems. The proposed integrated architecture includes: 1) a data extractor to fetch legacy medical data from a hemodialysis center, 2) converting it to a common data model, 3) indexing patient information using the HashMap technique, and 4) a set of services and tools that can be installed as a coherent environment on top of stand-alone EHRs systems. Our work enabled three cooperating but autonomous hospitals to mutually exchange medical data and helped them develop a common reference architecture. It lets stakeholders retain control over their patient data, winning the trust and confidence much needed towards a successful deployment of MedShare. Security concerns were effectively addressed that also included patient consent in the data exchange process. Thereby, the implemented toolset offered a collaborative environment to share EHRs by the healthcare providers.
△ Less
Submitted 14 March, 2018;
originally announced March 2018.
-
Anonymously Analyzing Clinical Datasets
Authors:
Nafees Qamar,
Yilong Yang,
Andras Nadas,
Zhiming Liu,
Janos Sztipanovits
Abstract:
This paper takes on the problem of automatically identifying clinically-relevant patterns in medical datasets without compromising patient privacy. To achieve this goal, we treat datasets as a black box for both internal and external users of data that lets us handle clinical data queries directly and far more efficiently. The novelty of the approach lies in avoiding the data de-identification pro…
▽ More
This paper takes on the problem of automatically identifying clinically-relevant patterns in medical datasets without compromising patient privacy. To achieve this goal, we treat datasets as a black box for both internal and external users of data that lets us handle clinical data queries directly and far more efficiently. The novelty of the approach lies in avoiding the data de-identification process often used as a means of preserving patient privacy. The implemented toolkit combines software engineering technologies such as Java EE and RESTful web services, to allow exchanging medical data in an unidentifiable XML format as well as restricting users to the need-to-know principle. Our technique also inhibits retrospective processing of data, such as attacks by an adversary on a medical dataset using advanced computational methods to reveal Protected Health Information (PHI). The approach is validated on an endoscopic reporting application based on openEHR and MST standards. From the usability perspective, the approach can be used to query datasets by clinical researchers, governmental or non-governmental organizations in monitoring health care services to improve quality of care.
△ Less
Submitted 19 November, 2014;
originally announced January 2015.
-
Social Networks and Collective Intelligence: A Return to the Agora
Authors:
Manuel Mazzara,
Luca Biselli,
Pier Paolo Greco,
Nicola Dragoni,
Antonio Marraffa,
Nafees Qamar,
Simona de Nicola
Abstract:
Nowadays, acquisition of trustable information is increasingly important in both professional and private contexts. However, establishing what information is trustable and what is not, is a very challenging task. For example, how can information quality be reliably assessed? How can sources? credibility be fairly assessed? How can gatekee** processes be found trustworthy when filtering out news…
▽ More
Nowadays, acquisition of trustable information is increasingly important in both professional and private contexts. However, establishing what information is trustable and what is not, is a very challenging task. For example, how can information quality be reliably assessed? How can sources? credibility be fairly assessed? How can gatekee** processes be found trustworthy when filtering out news and deciding ranking and priorities of traditional media? An Internet-based solution to a human-based ancient issue is being studied, and it is called Polidoxa, from Greek "poly", meaning "many" or "several" and "doxa", meaning "common belief" or "popular opinion". This old problem will be solved by means of ancient philosophies and processes with truly modern tools and technologies. This is why this work required a collaborative and interdisciplinary joint effort from researchers with very different backgrounds and institutes with significantly different agendas. Polidoxa aims at offering: 1) a trust-based search engine algorithm, which exploits stigmergic behaviours of users? network, 2) a trust-based social network, where the notion of trust derives from network activity and 3) a holonic system for bottom-up self-protection and social privacy. By presenting the Polidoxa solution, this work also describes the current state of traditional media as well as newer ones, providing an accurate analysis of major search engines such as Google and social network (e.g., Facebook). The advantages that Polidoxa offers, compared to these, are also clearly detailed and motivated. Finally, a Twitter application (Polidoxa@twitter) which enables experimentation of basic Polidoxa principles is presented.
△ Less
Submitted 11 November, 2013;
originally announced November 2013.
-
An experimental evaluation of de-identification tools for electronic health records
Authors:
Jie Qian,
Nafees Qamar
Abstract:
The robust development of Electronic Health Records (EHRs) causes a significant growth in sharing EHRs for clinical research. However, such a sharing makes it difficult to protect patient's privacy. A number of automated de-identification tools have been developed to reduce the re-identification risk of published data, while preserving its statistical meaning. In this paper, we focus on the experi…
▽ More
The robust development of Electronic Health Records (EHRs) causes a significant growth in sharing EHRs for clinical research. However, such a sharing makes it difficult to protect patient's privacy. A number of automated de-identification tools have been developed to reduce the re-identification risk of published data, while preserving its statistical meaning. In this paper, we focus on the experimental evaluation of existing automated de-identification tools, as applied to our EHR database, to assess which tool performs better with each quasi-identifiers defined in our paper. Performance of each tool is analyzed wrt. two aspects: individual disclosure risk and information loss. Through this experiment, the generalization method has better performance on reducing risk and lower degree of information loss than suppression, which validates it as more appropriate de-identification technique for EHR databases.
△ Less
Submitted 16 November, 2012;
originally announced November 2012.