Research Title in the Field of Software System Development
Research Title in the Field of Software System Development
Proposed Title from Mner Stanley DS Karouw, ST, MTI.
No | Research Topic | Research Title (suggestion) | Method |
1 | Estimated Information System Development | Software Project and Process Metrics | (recommended) using survey methods, action research or case studies, no programming skills required except in certain titles |
Software Project Estimation | |||
Software Project Scheduling | |||
Software Project Risk Management | |||
Software Maintenance | |||
Software reengineering | |||
2 | Requirements Engineering (RE) in Information System Development | Software Project Feasibility Study | (recommended) using survey methods, action research or case studies, no programming skills required except in certain titles |
RE Documentation (Vision, SRS, SAD) | |||
Traceability RE, SDC and ST | |||
Elicitation RE | |||
RE Modeling | |||
Analysis, Validation & Verification RE | |||
Management RE | |||
RE Teknik technique | |||
3 | Information System Modeling and Design | Software Design and Construction Process | (recommended) using the Experiment method, requires basic programming skills |
Concept of Design and Implementation in Programming (abstraction, patterns, modularity) | |||
Concept of Design and Implementation in Object-Oriented Programming (component-level) | |||
Software Architecture | |||
Object-oriented level-component design (cohesion – coupling) | |||
Software Interface Design | |||
Patterns .based software design | |||
Web-based application design | |||
Mobile-based application design | |||
Service-based application design | |||
Cloud-based application design | |||
IoT application design | |||
Embedded application design | |||
Game app design | |||
Multimedia application design | |||
Learning application design | |||
4. | Software Process Improvement (SPI) | Comparative Study of the SPI Framework | (recommended) using survey methods, action research or case studies, no programming skills required except in certain titles |
Software Process Improvement Model | |||
Software Process Improvement Techniques | |||
SPI on Software Development Organizations | |||
SPI and Assessment Maturity Level (CMMI, CMMI-DEV, AEFI) | |||
Risk Management for SPI | |||
SPI ROI | |||
5. | Quality Assurance and Information System Testing | Concept and Implementation of Software Quality Assurance (quality standards, risks, methods and techniques) | (recommended) using the Experiment method, requires basic programming skills |
Software Quality Measurement (method, technique, review and post-mortem review) | |||
Software Quality Assurance Process | |||
Software Testing Strategy | |||
Verification Testing – Validation for Object-oriented, Web-based and Mobile-based Software | |||
System level testing for object-oriented, web-based and mobile-based software | |||
Debugging techniques in object-oriented, web-based and mobile-based software testing | |||
Conventional Application Testing (white-box, black-box, base path, control structure) | |||
Real-time Application Testing | |||
Software Testing Patterns | |||
Object-oriented Software Testing | |||
Corretness Testing – Object Oriented Model Consistency | |||
Fault-based and Scenario-based testing for Object-oriented Software | |||
Random-testing and Partition-testing for Object-Oriented Class Levels | |||
Interclass-case testing with multiple-class technique | |||
Web-based Software Testing Planning and Process | |||
Web-based Software Testing, Interface, Software Navigation | |||
Component-Level Testing, Configuration, Performance of Web-based Software | |||
Security Testing for Web-based Software | |||
Mobile-based Software Testing Strategy | |||
Testing Techniques for Test Matrix, Stress Testing and Testing Production Environment for Mobile-based Software | |||
User-Interaction Testing Techniques for Mobile-based Software | |||
Testing Security Requirements on Software | |||
Security and Privacy Guarantee on Social Media, Cloud Computing and IoT Applications | |||
Security Engineering Analysis on Software | |||
Security Quality Assurance in Software (Process, Risk Analysis and Governance) | |||
Formal Modeling and Verification in Software | |||
6
|
Software Defect Prediction (SDP) | Estimating the Number of Defects | (recommended) using the Experiment method, requires basic programming skills |
Classifying Software Components as Defect-prone and Non-defect prone | |||
Mining Reveal Software Defect Associations | |||
Method of Estimating Software Defects with a Statistical Approach | |||
Method of Estimating Software Defects with Capture-Recapture (CR) Models | |||
Software Defects Estimation Method with Detection Profile Methods | |||
Method of Estimating Software Defects with Association Rules | |||
Software Defects Estimation Method with Classification Methods (Naïve-Bayes, Decision Tree, Nearest Neighbor, Neural Network, Support Vector Machine, Ensemble Classifiers) | |||
7 | Secured-software Programming | Applications (Anonymity, eVoting, Blockchain-based, SAM-based authentication, Malware and anti-malware, Secure Software Development Lifecycle) | |
Software Implementation (implementation of equations or algorithms into program code) | |||
Protocols (Modeling, Formalizing and Verification, Secure DNS) | |||
Cryptography and Steganography (Stegocrypto and Visual Cryptography) | |||
Mathematics and Structures (Algebra, Finite Fields and Elliptical Curves) | |||
8 | Algorithm Strategy Implementation | Brute Force Algorithm | (recommended) Experiments and Case Studies. Specific title references can be found at: http://informatika.stei.itb.ac.id/~rinaldi.munir/Stmik/2016-2017/Makalah2017.htm. Requires programming skills in certain programming languages |
Greedy Algorithm | |||
Divide and Conquer Algorithm | |||
Decrease and Conquer Algoritma Algorithm | |||
DFS and BFS Algorithms | |||
Backtracking Algorithm | |||
Branch and Bound Algorithm | |||
Route/Path Planning Using A Star and UCS | |||
Dynamic Programming | |||
String Math with Regex | |||
Computational Theory | |||
9 | Information Systems for Data Mining and Big Data | Software Implementation for Estimation (using neural network, multiple linear regression, etc.) | |
Software Implementation for Prediction (using neural network, multiple linear regression, SVM etc.) | |||
Software Implementation for Classification (using CART, K-NN, ID3, C4.5 etc.) | |||
Software Implementation for Clustering (using K-means, Fuzzy C-means, SOM, K-Medoids, etc.) | |||
Software Implementation for Association (using Apriori, FP-Growth, etc.) |
This information is good