SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
DOI : 10.5121/ijpla.2013.3202 11
EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT
TOOL FOR REENGINEERING PROCESS OF LEGACY
SOFTWARE SYSTEM
Er. Anand Rajavat1
and Dr. (Mrs.) Vrinda Tokekar2
1
Department of Computer Science & Engineering, Shri Vaishnav Institute of Technology
and Science, Indore, M. P., India
anandrajavat@yahoo.co.in
2
Department of Information Technology, Institute of Engineering and Technology
(DAVV), Indore, M. P., India
Vrindatokaker@yahoo.co.in
ABSTRACT
EReeRisk (Efficient Reengineering Risk) is a risk impact measurement tool which automatically identifies
and measure impact of various risk components involve in reengineering process of legacy software system.
EReeRisk takes data directly from users of legacy system and establishes various risk measurement metrics
according to different risk measurement scheme of ReeRisk framework [1]. Furthermore EReeRisk present
a variety of statistical quantities for project management to obtain decision concerning at what time
evolution of a legacy system through reengineering is successful. Its enhanced user interface greatly
simplifies the risk assessment procedures and the usage reaming time. The tool can perform the following
tasks to support decision concern with the selection of reengineering as a system evolution strategy.
[1] To establish promising risk measurement models for legacy system under evaluation.
[2] To measure risk impact of specific risk component of legacy system under evaluation
[3] To identity& establish various risk measurement index for risk impact measurement.
[4] To establish and measure perspective and domain specific risk impact of legacy system.
[5] To identify the source of risks and indicates how they affect impact of particular risk component.
[6] To determine the validity of risk measurement models from field data.
KEYWORDS
ReeRisk, Risk engineering, Reengineering
1. INTRODUCTION
Now a day’s legacy systems [2-5] are continuously maintained to accommodate changing
business and user requirements. Legacy systems and the data they process are vital assets for the
organization that use them. On the other side most of the legacy systems we use have difficult
design structure have unproductive coding and imperfect documentation. All over the world
software organizations are facing tremendous pressure to evolve their legacy systems to satisfy
current market needs and rapidly changing technologies [6].
Maintenance of legacy system to satisfy changing user and business requirement is difficult.
However many organizations are planning to modernize their legacy system to remain viable.
Legacy system evolution strategy depends on some important factors such as its technical
condition, its managerial significance and the type of the organization involved in maintaining
and operating the system. Many solutions are available for legacy system modernization.
Continued maintenance, reengineering [7] and replacement are the common modernization
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
12
strategies of which one or a combination may be an appropriate way to modernize a legacy
system [8] .Reaching a decision about how to evolve a legacy system cannot be made
impulsively; rather it requires understanding the strengths and weaknesses of each evolution
technique. Over the past few years reengineering emerged as a popular modernization technique.
Software re-engineering is gaining attention as the base of installed software ages and need
replacement. Software re-engineering takes a legacy software system and generates from it a new
system that has the same quality as software created by modern software engineering practices.
software re-engineering is defined by Chikofsky and Cross as the assessment and modification of
a software system to reconstitute it in a new form and the subsequent implementation of the new
form [9].Empirical results of reengineering shows that re-engineering can really improve existing
software [10].Reengineering analyze, design and implement existing legacy system and apply
modern techniques and methods to redesign and reshape that system into more suitable software.
On the other hand software re-engineering process is complex because many variations of the
reengineering process are possible. A broad range of issues and concerns must be considered to
understand and model the re-engineering process. Just as engineering implies a disciplined
process supported by engineering methods and automated tools, reengineering practice also
requires a disciplined process supported by methods and tools. We can define reengineering as an
engineering problem that requires a quantitative analysis of the problem and consideration of
reengineering risk in its solution. Effective redevelopment of legacy systems through
reengineering requires attention to various aspects of reengineering process. Reengineering of
legacy system into new improved target system is a challenge due to the various risk components
and their impact on software quality. Successful reengineering process requires to identify and
measure various risk components emerged from three distinctive but connected areas of interest
i.e. system domain, managerial domain and technical domain. [11]
The goal of software risk management [12] [13] focuses on identification and controlling of cost,
schedule and quality risk within the software development process. Now a day’s certain goals
such as risk identification and risk assessment of legacy system to support system modernization
activities have gained importance recently. Decision concerning when to evolve a legacy system
through reengineering requires risk assessment of legacy application from system, managerial and
technical point of view.
In this paper we give emphasis on design and development of an EReeRisk tool to support outline
process of ReeRisk framework [14-16]. ReeRisk framework is a risk assessment modal that
shows links between domains, perspectives, risk components and factors of legacy system by
considering required state of target system. The ReeRisk framework illustrates important risk
issues involve in the development cycle. Framework provide developing and implanting risk
engineering mechanism focussed on system, managerial and technical aspects of legacy and
target system and support to achieve successful reengineering effort.
Proposed EReeRisk tool helps to identify and measure impact of system, managerial and
technical risk components of legacy system in concern with requirements of target system.
EReeRisk result can be used to take decision about reengineering of legacy system. The main
focus is to identify and categories various risk components for system, managerial and technical
domain of legacy system to support decision making process. The purpose is to identify important
risk factors and develop an efficient set of risk measurement metrics for planning and evaluating
various risk components from three different aspects of legacy system.
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
13
2. EREERISK (EFFICIENT REENGINEERING RISK IMPACT MEASUREMENT
TOOL)
This section presents the main objectives, features, architecture, and the information content of
the EReeRisk tool.
2.1 Objective of EReeRisk Tool
Following are the key objectives of EReeRisk tool to support decision concern with the selection
of reengineering as a system evolution strategy.
1. To access and compute legacy software data deem pertinent to reengineering
characteristics. EReeRisk accesses three major dimensions of legacy application: System
dimension, managerial dimension and technical dimensions.
2. To measure risk impact automatically whenever possible by measuring the various
measures related to particular risk component of legacy system.
3. To perform risk assessment in a user-friendly and user-flexible fashion
4. To display specific as well as comprehensive risk impact of legacy application.
2.2 EReeRisk Context
To date there is a lake of automated software risk measurement tools and systematic approaches
to measure specific and comprehensive impact of different risk components. EReeRisk is a risk
measurement tool which automatically measure overall impact of different reengineering risk
emerged from system, managerial and technical domain of legacy system.
The EReeRisk application has been developed to support the use of the ReeRisk framework by
project manager to take decision about evolution of legacy system. It is an Internet browser-based
application that supports users in all steps of the ReeRisk framework by computing specific and
overall impact of different reengineering risk emerged from system, managerial and technical
domain of legacy system.
The EReeRisk tool provides support to understand different measurement metrics used to
measure risk impact of legacy application. The EReeRisk has been developed to run on the
Intranet and support standard Internet browser. The user interface metaphor is similar to web
pages and users can access the application without installing any special software on their
workstation.
EReeRisk measurement tool takes data from existing stakeholders of legacy system, calculate
impact of each risk components according to established risk measurement metrics of ReeRisk
framework and display various options using established mean opinion score board for project
manager to take decision about when evolution of legacy system through reengineering is
successful.
Enhanced user interface of EReeRisk make simpler the risk measurement process and support
management decision about legacy system evolution through reengineering.
2.3 Functional Overview of EReeRisk
The EReeRisk, risk measurement tool can perform the following task to support the evolution
process of legacy system.
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
14
 Establish ReeRisk pentagram model to measure overall impact of all risk
components emerged from system managerial and technical domain of legacy
system.
 Measure specific and comprehensive impact of all risk components of system
domain.
 Measure specific and comprehensive impact of all risk components of managerial
domain.
 Measure specific and comprehensive impact of all risk components of technical
domain.
 Identify sources of risk components using Rcause model [17]
 Provide help for the measurement of individual risk components using
established risk measurement metrics.
The EReeRisk allows the tracking status of risk impact information. Summary reports for specific
and comprehensive status of risk impact for system managerial and technical domain can be
printed or viewed as required. The EReeRisk tool has functionality to measure risk impact of
individual risk component, risk impact of specific perspective of each domain of ReeRisk
framework, risk impact of each domain of ReeRisk framework and finally a comprehensive risk
impact of all the domain of ReeRisk framework.
2.4 Selecting Scope of EReeRisk tool
Users have available to them three Scope operations which allow them to determine the scope to
which risk impact measurement is performed. These are:
 Domain
We characterize domain as a field of study which includes a set of common
perspectives, risk cluster, and relative risk factors to identify and measure cumulative
risk impact in reengineering process of legacy system. Domain represents a subset of
ReeRisk framework.
 Perspective Model
Perspective can be express as a viewpoint to which different risk clusters are identified
and measured using different risk measurement model.
 Risk Component
We define risk component to incorporate different types of negative outcomes from
system, managerial and technical domain of legacy system.
2.4.1 Select Domain criterion of ReeRisk Framework
The screen in Figure 1 shows the selection of domain of ReeRisk framework. ReeRisk framework
is a risk impact assessment modal that shows links between different domains, perspectives, risk
components and factors of legacy system.
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
15
Figure: 1 Domain criterion of ReeRisk
ReeRisk Framework gives focus on developing and implanting risk engineering by concentrating
system, managerial and technical area of legacy and target system to realize successful
reengineering effort. The enterprise ReeRisk framework represents a starting point for assessing
risk components for a synergistic set of system, managerial and technical aspects of legacy
system and achieving a disciplined and successful reengineering approach for system evolution.
A link is appears for the users to choose the specific as well as comprehensive impact
measurement of reengineering risk. The selections of ReeRisk domain criteria are easily
controlled by separate link buttons.
2.4.2 Select Perspective Criteria of ReeRisk Framework
The screen in Figure 2, 3 and 4 shows the selection of various perspectives for different domain
of ReeRisk framework. The purpose is to identify important risk factors and develop an efficient
set of risk measurement metrics for planning and evaluating various risk components from three
different aspects of legacy system.
 System Domain
In ReeRisk framework risk engineering begins with system domain. The term “System domain”
denotes a structural unit that is responsible for maintaining a system that provides products and
services to its customers. In system domain two types of perspective model i.e. infrastructure
perspective model and stakeholder perspective model is developed by analyzing existing states of
legacy system and desired state of target system.[14]
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
16
Figure: 2 Perspective criterion of ReeRisk System Domain
 Managerial Domain
Managerial domain of ReeRisk framework covers managerial issues related to system evolution
process .Impact of market factors and effect of competitive products, on quality [16] & cost of
target system are measured within the context of managerial domain. The elements of managerial
domain consist of business perspective model and economic perspective model. [15]
Figure: 3 Perspective criterion of ReeRisk Managerial Domain
 Technical Domain
Technical domain of ReeRisk framework has a significant impact on software functionality and
software quality. The elements of the technical domain consist of functional perspective model
and quality perspective model. [16]
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
17
Figure: 4 Perspective criterion of ReeRisk Technical Domain
2.4.3 Select Risk components Criteria of ReeRisk Framework
Figure: 5 Infrastructure Perspective Risk Components
Figure: 6 Stakeholder Perspective Risk Components
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
18
Figure: 7 Business & Economic Perspective Risk Components
Figure: 8 Functional Perspective Risk Components
Figure: 9 Quality Perspective Risk Components
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
19
Figure: 10 Quality Perspective Risk Components
Figure: 11 Quality Perspective Risk Components
The screens in Figure 5-10 show the selection of various risk components for different
perspectives from system, managerial and technical domain of ReeRisk framework. The
enterprise ReeRisk framework consists of three domains that are building blocks for a successful
decision making process to select reengineering as a system modernization technique. Each
domain covers different perspectives of software development process that are essential for
developing risk engineering framework. For each perspective one or more risk components are
identified .The perspective models and respective risk components of ReeRisk framework to
measure total risk impact (TRI) are presented in Table 7.1.
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
20
Table 1 ReeRisk framework Total Risk Impact (TRI) Index
Perspective
Model
Pentagram
Model
Risk Components Total Risk
Impact Index
System
Domain
Infrastructure
Perspective
Model
P1
1. Organizational
Risk component
TIOR
2. Resource Risk
component
TIRR
3. Deployment Risk
component
TIDR
4. Development
Process Risk
component
TIDPR
5. Personal Risk
component
TIPR
Stakeholder
Perspective
Model
P2
1. Communication
Strategy Risk
component
TICSR
2. Personal Risk
component
TIPR
3. Specialization
Risk component
TISR
4. User Risk
component
TIUR
5. Team Risk
component
TITR
Managerial
Domain
Economic
Perspective
Model
&
Business
Perspective
Model
P3
1. Development
Process Risk
component
TIDPR
2. Marketing strategy
Risk component
TIMR
3. Product
competition Risk
component
TIPCR
4. Financial Risk
component
TIFR
5. Operational Risk
component
TIOR
1. Availability Risk
component
TIAR
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
21
Technical
Domain
Quality
Perspective
Model
P4
P 4.1+P 4.2
2. Reliability Risk
component
TIRR
3. Modular Risk
component
TIMR
4. Usability Risk
component
TIUR
5. Performance Risk
component
TIPR
6. Software
Architecture Risk
component
TISAR
7. Project complexity
Risk component
TIPCR
8. Maintainability
Risk component
TIMR
9. Training Risk
component
TITR
10. Security Risk
component
TISR
Functional
Perspective
Model
P5
1. User Risk
component
TIUR
2. Technology Risk
component
TITR
3. Performance Risk
component
TIPR
4. Project complexity
Risk component
TIPCR
5. Resource Risk
component
TIRR
3 TECHNOLOGY USED
Development of EReeRisk measurement tool use NetbeansIDE7.2 to produce the output with the
help of tomcat server7.0 version and for the design of pages in the tool used JSP and CSS code
.All the experiments of tools will be performed on a 2.40GHz Intel(R) Core(TM) i5-2430 MB
memory, 4GB RAM running on the Windows XP Professional OS. Programs will be coded in
java.
Technologies used in EReeRisk measurement tool are:
• Tomcat server: - Tomcat application server provides services such as security, data
services, transaction support, load balancing, and management of large distributed
systems. Apache Tomcat is an open source web server. Tomcat implements the Java
Servlet and the Java Server Pages (JSP) specifications from Oracle Corporation, and
provides a "pure Java" HTTP web server environment for Java code to run.
• JSP: - Java Server Pages (JSP) is a technology that helps software developers create
dynamically generated web pages based on HTML, XML, or other document types.
Deployment of Java Server Pages requires a compatible web server with a server
container, such as Apache Tomcat or Jetty.
• CSS: - Cascading Style Sheets (CSS) is a style sheet language used for describing the
presentation semantics (the look and formatting) of a document written in a markup
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
22
language. It’s most common application is to style web pages written in HTML and
XHTML, but the language can also be applied to any kind of XML document, including
plain XML, SVG and XUL.
• JAVA SCRIPT: - JavaScript is a prototype-based scripting language that is dynamic,
weakly typed and has first-class functions. JavaScript copies many names and naming
conventions from Java, but the two languages are otherwise unrelated and have very
different semantics. The key design principles within JavaScript are taken from the self
and Scheme programming languages. It is a multi-paradigm language, supporting object-
oriented, imperative, and functional programming styles.
4 CONCLUSION
In order to assist managers to take decision about when evolution of a legacy system through
reengineering are likely to succeed and when they are likely to fail a quantitative risk-assessment
tool is needed. Since managers have limited tools to assess risks and no formal tools are available
to measure impact of various risk components. Developed tool can be used by any organization
contemplating reengineering and estimate the impact of various risks associated with system
managerial and technical domain of legacy system. The Three domain section of EReeRisk has
been applied to any legacy software system for the impact measurement of various risk
components from system, managerial and technical domain of legacy system.
Upon its full implementation, EReeRisk will provide extensive support to risk measurement in a
flexible and friendly user interface. EReeRisk is designed as a tool that is easy to learn and to use.
In addition, EReeRisk display various statistical quantities for project management to support
decision with reference to the evolution of a legacy system through reengineering.
REFERENCES
[1] Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “ReeRisk –A Decisional Risk Engineering Framework for
Legacy System Rejuvenation through Reengineering”, Published in Proceedings of Second
International Conference on Recent Trends in Information, Telecommunication and Computing – ITC
2011 by Springer LNCS-CCIS, March 10-11, 2011 in Bangalore, India, CNC 2011, CCIS 142, pp. 152
– 158, 2011, © Springer-Verlag Berlin Heidelberg 2011.
[2] Dajsuren, Y.,” Modernizing legacy software using a System Grokking technology”, published in IEEE
International Conference on Software Maintenance (ICSM), 2010.
[3] Pérez-Castillo, R.,” Process mining through dynamic analysis for modernizing legacy systems”, paper
appears in Software, IET, Volume: 5, Issue: 3, PP: 304 – 319, June 2011.
[4] Clarke, J.,” Reformulating software engineering as a search problem”, appears in Software, IEEE
Proceedings - Volume: 150, Issue: 3 PP: 161 - 175, June 2003.
[5] Mills, H. D.,” The management of software engineering, Part I: Principles of software engineering”,
appears in: IBM Systems Journal, Volume: 19, Issue: 4, PP: 414 – 420, 1980.
[6] John K. Bergey, Linda M. Northrop, Dennis B. Smith, “Enterprise Framework for the Disciplined
Evolution of Legacy Systems”, Technical Report, CMU/SEI-97-TR-007, ESC-TR-97-007, October-
1997.
[7] Sneed, H.M.: Risks Involved in Reengineering Projects. In: WCRE: Proceedings of the 6th IEEE
Conference on Reverse Engineering, p. 204 (1999).
[8] Ransom, J., Somerville, I., Warren, I.: A Method for assessing legacy systems for evolution. In:
Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering (1998)
ISBN: 0-8186- 8421-6, doi:10.1109/CSMR
[9] Chikofsky, E.J.,Cross, J.H., ”Reverse engineering and design recovery: a taxonomy”, appears in:
Software, IEEE,Volume: 7, Issue: 1, PP:13 – 17,1990.
[10] Sneed, H.M., Kaposi, A.,” A study on the effect of reengineering upon software maintainability”,
appears in: Proceedings. Conference on Software Maintenance, PP: 91 - 99 1990.
International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013
23
[11] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “Quantitative Evaluation Of Managerial Risk
Components In Reengineering Process Of Legacy System”, Published in International Journal of
Software Engineering (IJSE) International Research Publication , ISSN 0974-3162, Volume 3,
Number 1 (2012), pp. 35-47.
[12] Pu Tianyin, ”Development of software project risk management model review”, appears in 2nd
International Conference on Artificial Intelligence, Management Science and Electronic Commerce
(AIMSEC), PP : 2979 - 2982 ,2011
[13] Avdoshin,S.M, ”Software risk management”, appears in: 7th Central and Eastern European Software
Engineering Conference in Russia (CEE-SECR), PP :1 - 6 2011
[14] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “SysRisk –A Decisional Framework to Measure System
Dimensions of Legacy Application for Rejuvenation through Reengineering”, Published in
International Journal of Computer Applications (IJCA), 16(2):16–19, February 2011, ISBN: 978-93-
80747-56-8, Doi 10.5120/1985-2674, PP: 16-19.
[15] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “TechRisk –A Decisional Framework to Measure
Technical Dimensions of Legacy Application for Rejuvenation Through Reengineering”, Published in
International Journal of Software Engineering & Applications (IJSEA), Vol.2, No.3, July 2011, DOI :
10.5121/ijsea.2011.2309,ISSN: 0975-9018 (Online); 0976-2221 (Print) ,PP:120-128.
[16] Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “MngRisk-A Decisional Framework to Measure
Managerial Dimensions of Legacy Application for Rejuvenation Through Reengineering”, Published
in 3rd IEEE International Conference on Electronics Computer Technology (ICECT), 2011
Kanyakumari. Issue Date: 8-10 April 2011, Print ISBN: 978-1-4244-8678-6, Digital Object Identifier:
10.1109/ICECTECH.2011.5942048,PP:48-51.
[17] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “Rcause – A Root Cause Analysis Model to Identify
The Root Causes of Software Reengineering Problems”, Published in International Journal of
Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 ,DOI :
10.5121/ijcsit.2011.3319, ISSN: 0975-3826 (Online); 0975-4660 (Print), PP: 265-273.
Authors
Er. Anand Rajavat
Assistant professor
Department of Computer Science & Engineering
Shri Vaishnav Institute of Technology and Science Indore, M. P., India
B.E. (Computer Science and Engineering)
M.E. (Software Engineering)
Ph.D (Pursuing) (Computer Engineering)
Areas of Interest:
Object Oriented Analysis and Design Software Engineering, Computer Architecture
Dr. (Mrs.) Vrinda Tokekar
Professor & Head,
Department of Information & Technology,
Institute of Engineering & Technology,
Devi Ahilya University, Indore (M.P.) India
Ph. D. (Computer Engg.) in 2007 from DAVV, Indore
M.E. (Computer Engg.) in 1992 from DAVV, Indore
B.E. (Hons.) EEE, BITS Pilani in 1984,
Areas of Interest:
Distributed Computing, Multimedia Communication, Security in Wireless Networks, e-Governance,
, Software Engineering, Computer Networks

Más contenido relacionado

La actualidad más candente

Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9Ian Sommerville
 
SE18_Lec 13_ Project Planning
SE18_Lec 13_ Project PlanningSE18_Lec 13_ Project Planning
SE18_Lec 13_ Project PlanningAmr E. Mohamed
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3Siddharth Ayer
 
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyZainab Nayyar
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...ijseajournal
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...journalBEEI
 
Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18koolkampus
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering JayaKamal
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to qualityDhanashriAmbre
 
Software Engineering
Software Engineering Software Engineering
Software Engineering JayaKamal
 
Software evolution and maintenance basic concepts and preliminaries
Software evolution and maintenance   basic concepts and preliminariesSoftware evolution and maintenance   basic concepts and preliminaries
Software evolution and maintenance basic concepts and preliminariesMoutasm Tamimi
 

La actualidad más candente (18)

Ch11 reliability engineering
Ch11 reliability engineeringCh11 reliability engineering
Ch11 reliability engineering
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
Ch8-Software Engineering 9
Ch8-Software Engineering 9Ch8-Software Engineering 9
Ch8-Software Engineering 9
 
SE18_Lec 13_ Project Planning
SE18_Lec 13_ Project PlanningSE18_Lec 13_ Project Planning
SE18_Lec 13_ Project Planning
 
Software Engineering - Ch3
Software Engineering - Ch3Software Engineering - Ch3
Software Engineering - Ch3
 
1841 1843
1841 18431841 1843
1841 1843
 
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_SurveyPaper_19-Software_Architecture_Reconstruction_Method_a_Survey
Paper_19-Software_Architecture_Reconstruction_Method_a_Survey
 
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
EVALUATION OF SOFTWARE DEGRADATION AND FORECASTING FUTURE DEVELOPMENT NEEDS I...
 
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
VTrace-A Tool for Visualizing Traceability Links among Software Artefacts for...
 
Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18Dependable Software Development in Software Engineering SE18
Dependable Software Development in Software Engineering SE18
 
Software Engineering
 Software Engineering  Software Engineering
Software Engineering
 
Ch19 systems engineering
Ch19 systems engineeringCh19 systems engineering
Ch19 systems engineering
 
Ch14 resilience engineering
Ch14 resilience engineeringCh14 resilience engineering
Ch14 resilience engineering
 
Software testing and introduction to quality
Software testing and introduction to qualitySoftware testing and introduction to quality
Software testing and introduction to quality
 
Software Engineering
Software Engineering Software Engineering
Software Engineering
 
Chap1 RE Introduction
Chap1 RE IntroductionChap1 RE Introduction
Chap1 RE Introduction
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Software evolution and maintenance basic concepts and preliminaries
Software evolution and maintenance   basic concepts and preliminariesSoftware evolution and maintenance   basic concepts and preliminaries
Software evolution and maintenance basic concepts and preliminaries
 

Similar a EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF LEGACY SOFTWARE SYSTEM

Investigation of quality and functional risk
Investigation of quality and functional riskInvestigation of quality and functional risk
Investigation of quality and functional riskijpla
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materialssmruti sarangi
 
Contributors to Reduce Maintainability Cost at the Software Implementation Phase
Contributors to Reduce Maintainability Cost at the Software Implementation PhaseContributors to Reduce Maintainability Cost at the Software Implementation Phase
Contributors to Reduce Maintainability Cost at the Software Implementation PhaseWaqas Tariq
 
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...ijeei-iaes
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ijseajournal
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsIAESIJAI
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsIAEME Publication
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class qualityIAEME Publication
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models Satya P. Joshi
 
ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfVijayakumarKadumbadi
 
Software engineering
Software engineeringSoftware engineering
Software engineeringAnanthiP8
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Ra'Fat Al-Msie'deen
 
7.significance of software layered technology on size of projects (2)
7.significance of software layered technology on size of projects (2)7.significance of software layered technology on size of projects (2)
7.significance of software layered technology on size of projects (2)EditorJST
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkIJERA Editor
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresIOSR Journals
 
Software project management - Chapter 2
Software project management - Chapter 2Software project management - Chapter 2
Software project management - Chapter 2Munazza-Mah-Jabeen
 

Similar a EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF LEGACY SOFTWARE SYSTEM (20)

Investigation of quality and functional risk
Investigation of quality and functional riskInvestigation of quality and functional risk
Investigation of quality and functional risk
 
using LPP
using LPPusing LPP
using LPP
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
Software engineering study materials
Software engineering study materialsSoftware engineering study materials
Software engineering study materials
 
Contributors to Reduce Maintainability Cost at the Software Implementation Phase
Contributors to Reduce Maintainability Cost at the Software Implementation PhaseContributors to Reduce Maintainability Cost at the Software Implementation Phase
Contributors to Reduce Maintainability Cost at the Software Implementation Phase
 
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
Dynamic Value Engineering Method Optimizing the Risk on Real Time Operating S...
 
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
ITERATIVE AND INCREMENTAL DEVELOPMENT ANALYSIS STUDY OF VOCATIONAL CAREER INF...
 
A survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methodsA survey of predicting software reliability using machine learning methods
A survey of predicting software reliability using machine learning methods
 
Cm24585587
Cm24585587Cm24585587
Cm24585587
 
Class quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecardsClass quality evaluation using class quality scorecards
Class quality evaluation using class quality scorecards
 
Class quality evaluation using class quality
Class quality evaluation using class qualityClass quality evaluation using class quality
Class quality evaluation using class quality
 
Software Engineering Process Models
Software Engineering Process Models Software Engineering Process Models
Software Engineering Process Models
 
ccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdfccs356-software-engineering-notes.pdf
ccs356-software-engineering-notes.pdf
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation Visualizing Object-oriented Software for Understanding and Documentation
Visualizing Object-oriented Software for Understanding and Documentation
 
7.significance of software layered technology on size of projects (2)
7.significance of software layered technology on size of projects (2)7.significance of software layered technology on size of projects (2)
7.significance of software layered technology on size of projects (2)
 
DESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance FrameworkDESQA a Software Quality Assurance Framework
DESQA a Software Quality Assurance Framework
 
Relational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality AssuresRelational Analysis of Software Developer’s Quality Assures
Relational Analysis of Software Developer’s Quality Assures
 
Software project management - Chapter 2
Software project management - Chapter 2Software project management - Chapter 2
Software project management - Chapter 2
 

Más de ijpla

International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)ijpla
 
A study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point ErrorsA study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point Errorsijpla
 
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)ijpla
 
International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)ijpla
 
International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...ijpla
 
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...ijpla
 
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...ijpla
 
2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)ijpla
 
International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )ijpla
 
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling ProblemsA Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problemsijpla
 
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)ijpla
 
International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )ijpla
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...ijpla
 
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...ijpla
 
Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...ijpla
 
Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...ijpla
 
SELFLESS INHERITANCE
SELFLESS INHERITANCESELFLESS INHERITANCE
SELFLESS INHERITANCEijpla
 
Research Paper Submission- International Conference on Computer Science, Info...
Research Paper Submission- International Conference on Computer Science, Info...Research Paper Submission- International Conference on Computer Science, Info...
Research Paper Submission- International Conference on Computer Science, Info...ijpla
 
Research Paper Submission-3rd International Conference on Computing and Infor...
Research Paper Submission-3rd International Conference on Computing and Infor...Research Paper Submission-3rd International Conference on Computing and Infor...
Research Paper Submission-3rd International Conference on Computing and Infor...ijpla
 
Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...ijpla
 

Más de ijpla (20)

International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)
 
A study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point ErrorsA study of the Behavior of Floating-Point Errors
A study of the Behavior of Floating-Point Errors
 
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
 
International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)International Journal of Programming Languages and Applications (IJPLA)
International Journal of Programming Languages and Applications (IJPLA)
 
International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...International Conference on Antennas, Microwave and Microelectronics Engineer...
International Conference on Antennas, Microwave and Microelectronics Engineer...
 
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...
INVESTIGATION OF ATTITUDES TOWARDS COMPUTER PROGRAMMING IN TERMS OF VARIOUS V...
 
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...
Research Paper Submission..!!! Free Publication for Extended papers 3rd Inter...
 
2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)2nd International Conference on Computing and Information Technology (CITE 2024)
2nd International Conference on Computing and Information Technology (CITE 2024)
 
International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )
 
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling ProblemsA Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems
A Hybrid Bacterial Foraging Algorithm For Solving Job Shop Scheduling Problems
 
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
5th International Conference on Machine Learning and Soft Computing (MLSC 2024)
 
International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )International Journal of Programming Languages and Applications ( IJPLA )
International Journal of Programming Languages and Applications ( IJPLA )
 
3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...3rd International Conference on Computing and Information Technology Trends (...
3rd International Conference on Computing and Information Technology Trends (...
 
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...
HIGH-LEVEL LANGUAGE EXTENSIONS FOR FAST EXECUTION OF PIPELINE-PARALLELIZED CO...
 
Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...Research Paper Submission- 5th International Conference on Machine Learning a...
Research Paper Submission- 5th International Conference on Machine Learning a...
 
Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...
 
SELFLESS INHERITANCE
SELFLESS INHERITANCESELFLESS INHERITANCE
SELFLESS INHERITANCE
 
Research Paper Submission- International Conference on Computer Science, Info...
Research Paper Submission- International Conference on Computer Science, Info...Research Paper Submission- International Conference on Computer Science, Info...
Research Paper Submission- International Conference on Computer Science, Info...
 
Research Paper Submission-3rd International Conference on Computing and Infor...
Research Paper Submission-3rd International Conference on Computing and Infor...Research Paper Submission-3rd International Conference on Computing and Infor...
Research Paper Submission-3rd International Conference on Computing and Infor...
 
Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...Submit Your Articles- International Journal of Programming Languages and Appl...
Submit Your Articles- International Journal of Programming Languages and Appl...
 

Último

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Último (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF LEGACY SOFTWARE SYSTEM

  • 1. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 DOI : 10.5121/ijpla.2013.3202 11 EReeRisk- EFFICIENT RISK IMPACT MEASUREMENT TOOL FOR REENGINEERING PROCESS OF LEGACY SOFTWARE SYSTEM Er. Anand Rajavat1 and Dr. (Mrs.) Vrinda Tokekar2 1 Department of Computer Science & Engineering, Shri Vaishnav Institute of Technology and Science, Indore, M. P., India anandrajavat@yahoo.co.in 2 Department of Information Technology, Institute of Engineering and Technology (DAVV), Indore, M. P., India Vrindatokaker@yahoo.co.in ABSTRACT EReeRisk (Efficient Reengineering Risk) is a risk impact measurement tool which automatically identifies and measure impact of various risk components involve in reengineering process of legacy software system. EReeRisk takes data directly from users of legacy system and establishes various risk measurement metrics according to different risk measurement scheme of ReeRisk framework [1]. Furthermore EReeRisk present a variety of statistical quantities for project management to obtain decision concerning at what time evolution of a legacy system through reengineering is successful. Its enhanced user interface greatly simplifies the risk assessment procedures and the usage reaming time. The tool can perform the following tasks to support decision concern with the selection of reengineering as a system evolution strategy. [1] To establish promising risk measurement models for legacy system under evaluation. [2] To measure risk impact of specific risk component of legacy system under evaluation [3] To identity& establish various risk measurement index for risk impact measurement. [4] To establish and measure perspective and domain specific risk impact of legacy system. [5] To identify the source of risks and indicates how they affect impact of particular risk component. [6] To determine the validity of risk measurement models from field data. KEYWORDS ReeRisk, Risk engineering, Reengineering 1. INTRODUCTION Now a day’s legacy systems [2-5] are continuously maintained to accommodate changing business and user requirements. Legacy systems and the data they process are vital assets for the organization that use them. On the other side most of the legacy systems we use have difficult design structure have unproductive coding and imperfect documentation. All over the world software organizations are facing tremendous pressure to evolve their legacy systems to satisfy current market needs and rapidly changing technologies [6]. Maintenance of legacy system to satisfy changing user and business requirement is difficult. However many organizations are planning to modernize their legacy system to remain viable. Legacy system evolution strategy depends on some important factors such as its technical condition, its managerial significance and the type of the organization involved in maintaining and operating the system. Many solutions are available for legacy system modernization. Continued maintenance, reengineering [7] and replacement are the common modernization
  • 2. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 12 strategies of which one or a combination may be an appropriate way to modernize a legacy system [8] .Reaching a decision about how to evolve a legacy system cannot be made impulsively; rather it requires understanding the strengths and weaknesses of each evolution technique. Over the past few years reengineering emerged as a popular modernization technique. Software re-engineering is gaining attention as the base of installed software ages and need replacement. Software re-engineering takes a legacy software system and generates from it a new system that has the same quality as software created by modern software engineering practices. software re-engineering is defined by Chikofsky and Cross as the assessment and modification of a software system to reconstitute it in a new form and the subsequent implementation of the new form [9].Empirical results of reengineering shows that re-engineering can really improve existing software [10].Reengineering analyze, design and implement existing legacy system and apply modern techniques and methods to redesign and reshape that system into more suitable software. On the other hand software re-engineering process is complex because many variations of the reengineering process are possible. A broad range of issues and concerns must be considered to understand and model the re-engineering process. Just as engineering implies a disciplined process supported by engineering methods and automated tools, reengineering practice also requires a disciplined process supported by methods and tools. We can define reengineering as an engineering problem that requires a quantitative analysis of the problem and consideration of reengineering risk in its solution. Effective redevelopment of legacy systems through reengineering requires attention to various aspects of reengineering process. Reengineering of legacy system into new improved target system is a challenge due to the various risk components and their impact on software quality. Successful reengineering process requires to identify and measure various risk components emerged from three distinctive but connected areas of interest i.e. system domain, managerial domain and technical domain. [11] The goal of software risk management [12] [13] focuses on identification and controlling of cost, schedule and quality risk within the software development process. Now a day’s certain goals such as risk identification and risk assessment of legacy system to support system modernization activities have gained importance recently. Decision concerning when to evolve a legacy system through reengineering requires risk assessment of legacy application from system, managerial and technical point of view. In this paper we give emphasis on design and development of an EReeRisk tool to support outline process of ReeRisk framework [14-16]. ReeRisk framework is a risk assessment modal that shows links between domains, perspectives, risk components and factors of legacy system by considering required state of target system. The ReeRisk framework illustrates important risk issues involve in the development cycle. Framework provide developing and implanting risk engineering mechanism focussed on system, managerial and technical aspects of legacy and target system and support to achieve successful reengineering effort. Proposed EReeRisk tool helps to identify and measure impact of system, managerial and technical risk components of legacy system in concern with requirements of target system. EReeRisk result can be used to take decision about reengineering of legacy system. The main focus is to identify and categories various risk components for system, managerial and technical domain of legacy system to support decision making process. The purpose is to identify important risk factors and develop an efficient set of risk measurement metrics for planning and evaluating various risk components from three different aspects of legacy system.
  • 3. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 13 2. EREERISK (EFFICIENT REENGINEERING RISK IMPACT MEASUREMENT TOOL) This section presents the main objectives, features, architecture, and the information content of the EReeRisk tool. 2.1 Objective of EReeRisk Tool Following are the key objectives of EReeRisk tool to support decision concern with the selection of reengineering as a system evolution strategy. 1. To access and compute legacy software data deem pertinent to reengineering characteristics. EReeRisk accesses three major dimensions of legacy application: System dimension, managerial dimension and technical dimensions. 2. To measure risk impact automatically whenever possible by measuring the various measures related to particular risk component of legacy system. 3. To perform risk assessment in a user-friendly and user-flexible fashion 4. To display specific as well as comprehensive risk impact of legacy application. 2.2 EReeRisk Context To date there is a lake of automated software risk measurement tools and systematic approaches to measure specific and comprehensive impact of different risk components. EReeRisk is a risk measurement tool which automatically measure overall impact of different reengineering risk emerged from system, managerial and technical domain of legacy system. The EReeRisk application has been developed to support the use of the ReeRisk framework by project manager to take decision about evolution of legacy system. It is an Internet browser-based application that supports users in all steps of the ReeRisk framework by computing specific and overall impact of different reengineering risk emerged from system, managerial and technical domain of legacy system. The EReeRisk tool provides support to understand different measurement metrics used to measure risk impact of legacy application. The EReeRisk has been developed to run on the Intranet and support standard Internet browser. The user interface metaphor is similar to web pages and users can access the application without installing any special software on their workstation. EReeRisk measurement tool takes data from existing stakeholders of legacy system, calculate impact of each risk components according to established risk measurement metrics of ReeRisk framework and display various options using established mean opinion score board for project manager to take decision about when evolution of legacy system through reengineering is successful. Enhanced user interface of EReeRisk make simpler the risk measurement process and support management decision about legacy system evolution through reengineering. 2.3 Functional Overview of EReeRisk The EReeRisk, risk measurement tool can perform the following task to support the evolution process of legacy system.
  • 4. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 14  Establish ReeRisk pentagram model to measure overall impact of all risk components emerged from system managerial and technical domain of legacy system.  Measure specific and comprehensive impact of all risk components of system domain.  Measure specific and comprehensive impact of all risk components of managerial domain.  Measure specific and comprehensive impact of all risk components of technical domain.  Identify sources of risk components using Rcause model [17]  Provide help for the measurement of individual risk components using established risk measurement metrics. The EReeRisk allows the tracking status of risk impact information. Summary reports for specific and comprehensive status of risk impact for system managerial and technical domain can be printed or viewed as required. The EReeRisk tool has functionality to measure risk impact of individual risk component, risk impact of specific perspective of each domain of ReeRisk framework, risk impact of each domain of ReeRisk framework and finally a comprehensive risk impact of all the domain of ReeRisk framework. 2.4 Selecting Scope of EReeRisk tool Users have available to them three Scope operations which allow them to determine the scope to which risk impact measurement is performed. These are:  Domain We characterize domain as a field of study which includes a set of common perspectives, risk cluster, and relative risk factors to identify and measure cumulative risk impact in reengineering process of legacy system. Domain represents a subset of ReeRisk framework.  Perspective Model Perspective can be express as a viewpoint to which different risk clusters are identified and measured using different risk measurement model.  Risk Component We define risk component to incorporate different types of negative outcomes from system, managerial and technical domain of legacy system. 2.4.1 Select Domain criterion of ReeRisk Framework The screen in Figure 1 shows the selection of domain of ReeRisk framework. ReeRisk framework is a risk impact assessment modal that shows links between different domains, perspectives, risk components and factors of legacy system.
  • 5. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 15 Figure: 1 Domain criterion of ReeRisk ReeRisk Framework gives focus on developing and implanting risk engineering by concentrating system, managerial and technical area of legacy and target system to realize successful reengineering effort. The enterprise ReeRisk framework represents a starting point for assessing risk components for a synergistic set of system, managerial and technical aspects of legacy system and achieving a disciplined and successful reengineering approach for system evolution. A link is appears for the users to choose the specific as well as comprehensive impact measurement of reengineering risk. The selections of ReeRisk domain criteria are easily controlled by separate link buttons. 2.4.2 Select Perspective Criteria of ReeRisk Framework The screen in Figure 2, 3 and 4 shows the selection of various perspectives for different domain of ReeRisk framework. The purpose is to identify important risk factors and develop an efficient set of risk measurement metrics for planning and evaluating various risk components from three different aspects of legacy system.  System Domain In ReeRisk framework risk engineering begins with system domain. The term “System domain” denotes a structural unit that is responsible for maintaining a system that provides products and services to its customers. In system domain two types of perspective model i.e. infrastructure perspective model and stakeholder perspective model is developed by analyzing existing states of legacy system and desired state of target system.[14]
  • 6. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 16 Figure: 2 Perspective criterion of ReeRisk System Domain  Managerial Domain Managerial domain of ReeRisk framework covers managerial issues related to system evolution process .Impact of market factors and effect of competitive products, on quality [16] & cost of target system are measured within the context of managerial domain. The elements of managerial domain consist of business perspective model and economic perspective model. [15] Figure: 3 Perspective criterion of ReeRisk Managerial Domain  Technical Domain Technical domain of ReeRisk framework has a significant impact on software functionality and software quality. The elements of the technical domain consist of functional perspective model and quality perspective model. [16]
  • 7. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 17 Figure: 4 Perspective criterion of ReeRisk Technical Domain 2.4.3 Select Risk components Criteria of ReeRisk Framework Figure: 5 Infrastructure Perspective Risk Components Figure: 6 Stakeholder Perspective Risk Components
  • 8. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 18 Figure: 7 Business & Economic Perspective Risk Components Figure: 8 Functional Perspective Risk Components Figure: 9 Quality Perspective Risk Components
  • 9. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 19 Figure: 10 Quality Perspective Risk Components Figure: 11 Quality Perspective Risk Components The screens in Figure 5-10 show the selection of various risk components for different perspectives from system, managerial and technical domain of ReeRisk framework. The enterprise ReeRisk framework consists of three domains that are building blocks for a successful decision making process to select reengineering as a system modernization technique. Each domain covers different perspectives of software development process that are essential for developing risk engineering framework. For each perspective one or more risk components are identified .The perspective models and respective risk components of ReeRisk framework to measure total risk impact (TRI) are presented in Table 7.1.
  • 10. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 20 Table 1 ReeRisk framework Total Risk Impact (TRI) Index Perspective Model Pentagram Model Risk Components Total Risk Impact Index System Domain Infrastructure Perspective Model P1 1. Organizational Risk component TIOR 2. Resource Risk component TIRR 3. Deployment Risk component TIDR 4. Development Process Risk component TIDPR 5. Personal Risk component TIPR Stakeholder Perspective Model P2 1. Communication Strategy Risk component TICSR 2. Personal Risk component TIPR 3. Specialization Risk component TISR 4. User Risk component TIUR 5. Team Risk component TITR Managerial Domain Economic Perspective Model & Business Perspective Model P3 1. Development Process Risk component TIDPR 2. Marketing strategy Risk component TIMR 3. Product competition Risk component TIPCR 4. Financial Risk component TIFR 5. Operational Risk component TIOR 1. Availability Risk component TIAR
  • 11. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 21 Technical Domain Quality Perspective Model P4 P 4.1+P 4.2 2. Reliability Risk component TIRR 3. Modular Risk component TIMR 4. Usability Risk component TIUR 5. Performance Risk component TIPR 6. Software Architecture Risk component TISAR 7. Project complexity Risk component TIPCR 8. Maintainability Risk component TIMR 9. Training Risk component TITR 10. Security Risk component TISR Functional Perspective Model P5 1. User Risk component TIUR 2. Technology Risk component TITR 3. Performance Risk component TIPR 4. Project complexity Risk component TIPCR 5. Resource Risk component TIRR 3 TECHNOLOGY USED Development of EReeRisk measurement tool use NetbeansIDE7.2 to produce the output with the help of tomcat server7.0 version and for the design of pages in the tool used JSP and CSS code .All the experiments of tools will be performed on a 2.40GHz Intel(R) Core(TM) i5-2430 MB memory, 4GB RAM running on the Windows XP Professional OS. Programs will be coded in java. Technologies used in EReeRisk measurement tool are: • Tomcat server: - Tomcat application server provides services such as security, data services, transaction support, load balancing, and management of large distributed systems. Apache Tomcat is an open source web server. Tomcat implements the Java Servlet and the Java Server Pages (JSP) specifications from Oracle Corporation, and provides a "pure Java" HTTP web server environment for Java code to run. • JSP: - Java Server Pages (JSP) is a technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types. Deployment of Java Server Pages requires a compatible web server with a server container, such as Apache Tomcat or Jetty. • CSS: - Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup
  • 12. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 22 language. It’s most common application is to style web pages written in HTML and XHTML, but the language can also be applied to any kind of XML document, including plain XML, SVG and XUL. • JAVA SCRIPT: - JavaScript is a prototype-based scripting language that is dynamic, weakly typed and has first-class functions. JavaScript copies many names and naming conventions from Java, but the two languages are otherwise unrelated and have very different semantics. The key design principles within JavaScript are taken from the self and Scheme programming languages. It is a multi-paradigm language, supporting object- oriented, imperative, and functional programming styles. 4 CONCLUSION In order to assist managers to take decision about when evolution of a legacy system through reengineering are likely to succeed and when they are likely to fail a quantitative risk-assessment tool is needed. Since managers have limited tools to assess risks and no formal tools are available to measure impact of various risk components. Developed tool can be used by any organization contemplating reengineering and estimate the impact of various risks associated with system managerial and technical domain of legacy system. The Three domain section of EReeRisk has been applied to any legacy software system for the impact measurement of various risk components from system, managerial and technical domain of legacy system. Upon its full implementation, EReeRisk will provide extensive support to risk measurement in a flexible and friendly user interface. EReeRisk is designed as a tool that is easy to learn and to use. In addition, EReeRisk display various statistical quantities for project management to support decision with reference to the evolution of a legacy system through reengineering. REFERENCES [1] Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “ReeRisk –A Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering”, Published in Proceedings of Second International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2011 by Springer LNCS-CCIS, March 10-11, 2011 in Bangalore, India, CNC 2011, CCIS 142, pp. 152 – 158, 2011, © Springer-Verlag Berlin Heidelberg 2011. [2] Dajsuren, Y.,” Modernizing legacy software using a System Grokking technology”, published in IEEE International Conference on Software Maintenance (ICSM), 2010. [3] Pérez-Castillo, R.,” Process mining through dynamic analysis for modernizing legacy systems”, paper appears in Software, IET, Volume: 5, Issue: 3, PP: 304 – 319, June 2011. [4] Clarke, J.,” Reformulating software engineering as a search problem”, appears in Software, IEEE Proceedings - Volume: 150, Issue: 3 PP: 161 - 175, June 2003. [5] Mills, H. D.,” The management of software engineering, Part I: Principles of software engineering”, appears in: IBM Systems Journal, Volume: 19, Issue: 4, PP: 414 – 420, 1980. [6] John K. Bergey, Linda M. Northrop, Dennis B. Smith, “Enterprise Framework for the Disciplined Evolution of Legacy Systems”, Technical Report, CMU/SEI-97-TR-007, ESC-TR-97-007, October- 1997. [7] Sneed, H.M.: Risks Involved in Reengineering Projects. In: WCRE: Proceedings of the 6th IEEE Conference on Reverse Engineering, p. 204 (1999). [8] Ransom, J., Somerville, I., Warren, I.: A Method for assessing legacy systems for evolution. In: Proceedings of the Second Euromicro Conference on Software Maintenance and Reengineering (1998) ISBN: 0-8186- 8421-6, doi:10.1109/CSMR [9] Chikofsky, E.J.,Cross, J.H., ”Reverse engineering and design recovery: a taxonomy”, appears in: Software, IEEE,Volume: 7, Issue: 1, PP:13 – 17,1990. [10] Sneed, H.M., Kaposi, A.,” A study on the effect of reengineering upon software maintainability”, appears in: Proceedings. Conference on Software Maintenance, PP: 91 - 99 1990.
  • 13. International Journal of Programming Languages and Applications ( IJPLA ) Vol.3, No.2, April 2013 23 [11] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “Quantitative Evaluation Of Managerial Risk Components In Reengineering Process Of Legacy System”, Published in International Journal of Software Engineering (IJSE) International Research Publication , ISSN 0974-3162, Volume 3, Number 1 (2012), pp. 35-47. [12] Pu Tianyin, ”Development of software project risk management model review”, appears in 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), PP : 2979 - 2982 ,2011 [13] Avdoshin,S.M, ”Software risk management”, appears in: 7th Central and Eastern European Software Engineering Conference in Russia (CEE-SECR), PP :1 - 6 2011 [14] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “SysRisk –A Decisional Framework to Measure System Dimensions of Legacy Application for Rejuvenation through Reengineering”, Published in International Journal of Computer Applications (IJCA), 16(2):16–19, February 2011, ISBN: 978-93- 80747-56-8, Doi 10.5120/1985-2674, PP: 16-19. [15] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “TechRisk –A Decisional Framework to Measure Technical Dimensions of Legacy Application for Rejuvenation Through Reengineering”, Published in International Journal of Software Engineering & Applications (IJSEA), Vol.2, No.3, July 2011, DOI : 10.5121/ijsea.2011.2309,ISSN: 0975-9018 (Online); 0976-2221 (Print) ,PP:120-128. [16] Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “MngRisk-A Decisional Framework to Measure Managerial Dimensions of Legacy Application for Rejuvenation Through Reengineering”, Published in 3rd IEEE International Conference on Electronics Computer Technology (ICECT), 2011 Kanyakumari. Issue Date: 8-10 April 2011, Print ISBN: 978-1-4244-8678-6, Digital Object Identifier: 10.1109/ICECTECH.2011.5942048,PP:48-51. [17] Er.Anand Rajavat, Dr. (Mrs.) Vrinda Tokekar, “Rcause – A Root Cause Analysis Model to Identify The Root Causes of Software Reengineering Problems”, Published in International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 2011 ,DOI : 10.5121/ijcsit.2011.3319, ISSN: 0975-3826 (Online); 0975-4660 (Print), PP: 265-273. Authors Er. Anand Rajavat Assistant professor Department of Computer Science & Engineering Shri Vaishnav Institute of Technology and Science Indore, M. P., India B.E. (Computer Science and Engineering) M.E. (Software Engineering) Ph.D (Pursuing) (Computer Engineering) Areas of Interest: Object Oriented Analysis and Design Software Engineering, Computer Architecture Dr. (Mrs.) Vrinda Tokekar Professor & Head, Department of Information & Technology, Institute of Engineering & Technology, Devi Ahilya University, Indore (M.P.) India Ph. D. (Computer Engg.) in 2007 from DAVV, Indore M.E. (Computer Engg.) in 1992 from DAVV, Indore B.E. (Hons.) EEE, BITS Pilani in 1984, Areas of Interest: Distributed Computing, Multimedia Communication, Security in Wireless Networks, e-Governance, , Software Engineering, Computer Networks