Software Reliability and Maintainability Prof. K.K. Aggarwal Vice Chancellor G.G.S. Indraprastha University Kashmere Gate, Delhi, India
|
|
- Virginia Carpenter
- 5 years ago
- Views:
Transcription
1 Software Reliability and Maintainability Prof. K.K. Aggarwal Vice Chancellor G.G.S. Indraprastha University Kashmere Gate, Delhi, India Page 1 of 87
2 USES OF SOFTWARE ENGINEERING STUDIES 1. To evaluate software engineering technology quantitatively. 2. To evaluate development status during the test phases. 3. To monitor the operational performance of software. 4. To enrich the insight into the software product and software development process. Page 2 of 87
3 INTRODUCTION Three most significant needs of Software are : Time of delivery, and Level of quality required Cost While it is easy to quantify schedule and cost, quantification of quality has been more difficult. Reliability is the most important characteristic of Software Quality. Reliability is the probability that the software will work without failure for a specified period of time in a specified environment. Page 3 of 87
4 RELIABILITY APPROACHES The Developer oriented approach Attempting to count the faults found by counting either failures or repairs. Even correct enumeration of faults is not a good status indicator. Page 4 of 87
5 The User Oriented Approach Software reliability Relates to operation rather than design of the program Dynamic rather than static Easily associated with costs Suitable for examining the significance of trends, for setting of objectives, and the schedule for meeting these objectives. Page 5 of 87
6 FAULT A fault is the defect in the program that, when executed under particular conditions, causes a Failure. A fault can cause more than one failure It is a property of the program Created when a programmer makes an error A fault can be defined as a defective, missing, or extra instruction or set of related instructions that is the cause of one or more actual or potential failures. Page 6 of 87
7 The number of faults in the software is the difference between the number introduced and the number removed. Faults are introduced when the code is being developed by programmers. The process of fault removal introduces some new faults. The fault removal resulting from execution depends on the occurrence of the associated failure. Faults can also be found without execution. Page 7 of 87
8 FAILURE Defined as departure of operations from requirements. A software failure must occur during execution of a program. Potential failures do not count. Documentation faults are not to be counted. Requirements are somewhat subject to interpretation. Requirements and failures can be considered as positive and negative specifications. Page 8 of 87
9 The definition of failure is really project specific and must be established in consultation with customer. The process of establishing the requirements for a system involves a consideration of the operational profile also. The failure process and hence software reliability is directly dependent on the environment or the operational profile. Operational Profile is the set of input states that the program can execute along with the probabilities with which they will occur. Page 9 of 87
10 * Input state A (P A =0.12) * Input state B (P B =0.08) Input Space Probability of occurrence Probability of occurrence A B Input State Portion of operational profile Input state Operational profile Page 10 of 87
11 It is affected by : FAILURE BEHAVIOUR 1. The number of faults in the software being executed, and 2. The execution environment or operational profile of execution Failures occurrence in time can be characterized by : i) time of failure, ii) time interval between failures, iii) cumulative failures experienced upto a give time, and iv) failures experienced in a time interval All the foregoing four quantities are random variables. Page 11 of 87
12 Probability Distribution at Two Different Times Value of random variable (failures in time period) Probability of Elapsed Time Time=1 hour Time=5 hours Mean failures Page 12 of 87
13 10 Mean value function 10 Mean failures 5 Time =5 hr Failure Intensity (failures/hr) 5 Time =1 hr Failure Intensity 5 10 Time (hrs) The variation can be expressed as : Mean Value Function represents the average cumulative failures association with each time point. Failure Intensity Function represents the rate of change of the mean value function. Page 13 of 87
14 Example Program : 1. read (a,b,c); 2. if a <> 0 then begin 3. d : = b*b 5 *a*c; 4. X:=0 5. if d>0 then 6. X : = (-b + trunc (sqrt (d))) div (2*a) end else 7. X: = -c div b; 8. if (a*x*x+ b*x+c = 0) then 9. writeln (X, is an integer solution ) else 10. writeln( There is no integer solution ) Page 14 of 87
15 This program displays an integral solution to the quadratic equation ax 2 + bx + c = 0 for integral values of a, b and c. Assume the range of a : 0 to 10 (11) b : -5 to 5 (11) c: -20to20 (41) Even then the total number of states, T = 4,961 The program has a fault at line 3. Page 15 of 87
16 Set 1 : Location a b c d x Output ** ** 7 ** -2 8 ** -2 9 ** -2-2 is an integer solution The value of a = 0 causes the selection of a path that does not include location 3. No failure possible. Page 16 of 87
17 Set 2 : Location a b c d x Output ** ** 2 ** ** 3 4 ** isaninteger solution The fault is reached, but the computation proceeds just as there were no fault because c = 0. No infection. Page 17 of 87
18 Set. 3 : Location a b c d x Output ** ** 2 ** ** 3 61 ** is an integer solution The fault infects the succeeding data state. D = 61 insetad of 49. Error propagates to location 6 where it is cancelled by the integer square root calculation where correct answer, 7 is computed. No failure again. Page 18 of 87
19 Set. 4 : Location a b c d x Output ** ** 2 ** ** ** ** There is no integer solution Here fault is executed. It infects the data state. Also, the data state error propagates to output. Page 19 of 87
20 Each computation falls into one of the four categories. the fault is not executed the fault is executed but does not infect any data state some data states are infected, but the output is nonetheless correct data infection does cause an incorrect output Page 20 of 87
21 COST IMPACT OF SOFTWARE DEFECTS The obvious benefits of formal technical reviews is the early discovery of software defects so that each defect is corrected prior to the next step. It is indicated that design activities introduce between 50 and 65 percent of all errors. FTRs have been shown to be up to 75 percent effective. Page 21 of 87
22 The review process thus substantially reduces the cost of subsequent steps in the development and maintenance phases. If an error uncovered during design costs 1.0 monetary unit to correct, the same error just before testing commences may cost 6.5 units; during testing, 15 units; and after release, 67 units. Page 22 of 87
23 DEFECT AMPLIFICATION & REMOVAL Development step Defects Detection Errors from previous step Errors passed through Amplified errors 1: x Newly generated errors Percent efficiency for error detection Errors passed to next step Defect Amplification Model Page 23 of 87
24 Preliminary Design Detailed Design Code/Unit test Integration Test Validation Test System Test Defect Amplification No Reviews Page 24 of 87
25 Defect Amplification Reviews Conducted Preliminary Design Detailed Design Code/Unit test Integration Test Validation Test System Test Page 25 of 87
26 COST COMPARISONS Errors found Number Unit Cost Total Reviews conducted During design Before test During test After release No reviews conducted 793 Before test During test After release Page 26 of 87
27 OPERATIONAL PROFILE & TEST Operational Profile PROFILE It is desirable to use the concept of operational profile even if we can draw it only approximately. In the absence of the use of operational profile, we are using flat operational profile. The environment or operational profile of a program is established by enumerating the possible input states and their probabilities of occurrence. Page 27 of 87
28 It is possible to perform a grouping or equivalence partitioning of the input space and select only one input state from each group with a probability equal to the probability (total) of occurrence of all states in the group. Some systems operate in several characteristic operational profiles. The proportion of time spent in each mode varies from installation to installation. Here it may be desirable to determine the reliability for each mode. An example is a Telephone Switching System which may operate in either a business customer mode or a residential customer mode. Page 28 of 87
29 Operational mode A has a wide variety of types of calls such as conference calls, credit card calls and international calls. Operational mode B has fewer of the special calls, hence the operational profile shows more of a peak. Probability of occurence Pk Op. mode B Op. mode A Input State k Page 29 of 87
30 TEST PROFILE Software systems are subjected to extensive testing prior to release. The testing phase of the software development life cycle requires a judicious choice of a test suite. Exhaustive Testing is practically impossible even for most trivial applications. We suggest using an operational profile approach for designing an optimal testing strategy. If M is the total number of all possible inputs, let us assume we can choose only T < < M test cases for cost considerations. Page 30 of 87
31 The optimum test strategy is the one that yields the greatest reduction in failure intensity per unit of test cost. This would be accomplished if we select these T inputs such that the failure intensity reduces most rapidly with respect to text execution time. By a Knowledge of operational Profile & Test Profile, we can quantify Test Effectiveness. Probability of Occurence Op. Profile Test Profile T M Input State Page 31 of 87
32 SOFTWARE RELIABILITY MODELS General Characteristics A software reliability model has the form of a random process that describes the behaviour of failures with time. Specification of the model generally includes specification of a function of time such as the mean value function or failure intensity. A software reliability model describes software failures as a random process, which is characterized in either times of failure or the number of failures at fixed times. Page 32 of 87
33 Let M(t) be a random process representing the number of failures experienced by time t. The μ(t), the mean value function is defined as : μ (t) = E [M(T)] The failure intensity function is then defined as : λ(t) = d/dt[μ(t)] Page 33 of 87
34 GOOD MODEL Good software reliability model has several important characteristics : 1. Gives good predictions of future failure behaviour 2. Is easy for measuring parameters 3. Is based on sound assumptions 4. Is widely applicable 5. Is simple 6. Is insensitive to noise Page 34 of 87
35 A good model considerably enhances communication on a project. The advantages are significant even if the projections are made only with a limited accuracy. Developing a practically useful model may require several person years but its application requires a small fraction of project resources. For research investigations, a range of models may be applied but for real projects, application of more than one or two models is conceptually and economically impractical. Page 35 of 87
36 RELIABILITY MODELS Model Criteria Results 1 Jelinski Moranda y y - y y y y 2 Weibull y n y y n n n 3 Duane Model - y y y y y y 4 Rayleigh Model n y n - y n n 5 Shick-Wolverton n y n n y n n 6 Musa Basic Model y y - y y y y 7 Goel-Okumoto y y - y y y y 8 Bayesian Jelinski Moranda y n y y n y - 9 Littlewood Model y n y y n y - 10 Bayesian Littlewood y n y y n y - 11 Keiller-Littlewood y n y y n y - 12 Littlewood-Verrall y n y y n y - 13 Schneidewind Model y y - y y y y 14 Musa-Okumoto (LP) y y y y y y y 15 Littlewood NHPP y n y y n y - Page 36 of 87
37 Musa s MODEL λ(μ) =λ 0 [1-μ/γ 0 ] EXAMPLE Assume that a program will experience 100 failures in infinite time. It has now experienced 50. The initial failure intensity was 10 failures/cpu hr. - the current failure intensity? 10 (1-50/100) = 5 failures/cpu hr - the decrement of failure intensity per failure? dλ/dμ =-(λ 0 /γ 0 ) = -0.1/cpu hr Page 37 of 87
38 Mean failures experienced, μ Failure Intensity function OBSERVING THE RELATIONSHIP BETWEEN THE FAILURES AND FAILURE INTENSITY, WE CAN DERIVE: μ (τ) = γ ο (1 Exp (- (λ ο / γ ο ) τ)) Page 38 of 87
39 Mean failures experienced versus execution time Page 39 of 87
40 The failure Intensity as a function of execution time can now be expressed as λ (τ) =λ ο Exp ( - λ ο / γ ο ) τ EXAMPLE (CONTD.) The failure intensity at 10 cpu hr? λ(10) = 3.68 failures/ cpu hr. At 100 cpu hr? λ(100) = failures/cpu hr. Page 40 of 87
41 Derived Quantities Assume that you have chosen a failure intensity objective for the software product being developed. Suppose some portion of the failures are being removed through correction of their associated faults. Then we can use the objective & the present value of failure intensity to determine the additional expected number of failures that must be experienced to reach that objective. For basic model, μ = (γ 0 /λ 0 ) (λ P - λ f ) Page 41 of 87
42 Mean failures experienced Additional failures to failure intensity Objective The expected number of failures that will be experienced between a present failure intensity of 3.68 failures/cpu hr and an objective of failures/cpu hr? μ = 100/10 ( ) = 37 failures. Page 42 of 87
43 Similarly, we can determine the additional execution time required to reach the failure intensity objective. Δτ = γ 0 /λ 0 In (λ p /λ f ) Example (Contd.) Calculate the cpu time required to reach a failure intensity objective of failures/cpu hr if the present value of failure intensity is 3.68 failures/cpu hr. Δτ = 100/10 In (3.68/ ) = 90 cpu hr. Page 43 of 87
44 APPLICATION OF MUSA MODEL Regarding evaluating the cost effectiveness of a design review. 50,000 source instructions. Previous experience indicates 8 faults/1000 instructions and an initial failure intensity of 10 failures/hour. Required failure intensity is 1 failure/10 hr. We need 5 per hour of effort/hour of computer time and a total of 8 per hour for failure identification and correction per failure. In addition to testing time, computer is required for ½ hour per failure. Page 44 of 87
45 Loaded salary is $100/hour. Computer time is priced at $1000/hour. It is found that design reviews reduce the fault figure to 6. Design reviews require 5 meetings attended by 6 persons on the average for 10 hours. Page 45 of 87
46 λ λ oa λ ob λ f μ B γ ob μ A γ oa Page 46 of 87
47 λ λ OA λ OB λ f Time t B t A Page 47 of 87
48 CASE A (WITHOUT REVIEWS) λ OA = 10 failures/hr ν OA = 50,000 x 8/1000 = 400 failures μ A = 396 failures t A = 184 hrs. Total person hrs. = 8 x x 184 = = 4088 hrs. Total Comp. hrs. = ½ (396) = 382 comp. hrs. Total Cost = $4088 x x 1000 = $790,800 Page 48 of 87
49 CASE B (WITHOUT REVIEWS) λ OB = 50,000 X 6/1000 = 300 failure ν OB = 10 x ¾ = 7.5 failures/hr. μ A = 296 failures t A = 173 hrs. Total person hrs. = 8 x x 173 = = 3233 hrs. Total Comp. hrs. = ½ (296) = 321 comp. hrs. Total Cost = $3233 x x 1000 = $644,300 Page 49 of 87
50 Total Review effort = 5 x 6 x 10 = 300 per-hr Review Cost = $300 x 100 = $30,000 Total Cost = $644, ,000 = $674,300 EFFICACY OF REVIEWS IS ESTABLISHED Page 50 of 87
51 LIFE CYCLE COST OPTIMISATION The basis for optimization is the assumption that reliability improvement is obtained by more extensive testing, which of course affects costs and schedules. Costs and Schedules for other phases are assumed to be constant. The part of development cost due to testing decreases with higher F.I. objectives, while operational cost increases. Thus total cost has a minimum. Page 51 of 87
52 Cost Total Operation System Test Failure Intensity Start of System Test Life Cycle Cost Optimization Page 52 of 87
53 Software Maintenance Maintenance of every software is a must To correct errors, if any To adapt s/w in ever changing environment To improve the efficiency Page 53 of 87
54 CATEGORIES 1) CORRECTIVE MAINTENANCE Refers to modification initiated by the defects in the software. Emergency fixings are known as: PATCHING INCREASED PROGRAM COMPLEXITY UNFORSEEN RIPPLE EFFECTS Page 54 of 87
55 2) ADAPTIVE MAINTENANCE It includes changing the software to match changes in the ever changing environment. Business Rules H/W Platform Govt. Policies S/W Platform Work patterns Page 55 of 87
56 3) PERFECTIVE MAINTENANCE It means improving processing efficiency or performance, or restructuring the software to improve changeability. EXPANSION Enhancement in existing system functionality Improvement in computational efficiency Page 56 of 87
57 Distribution of Efforts among Three Categories 17% 18% 65% Corrective Adaptive Perfective Page 57 of 87
58 Distribution of efforts among various causes Emergency Debugging Routine Debugging Data Env. Adaption H/W, O.S. Change Enhancements for Users Documentation Improvement Code Efficiency Improvement Others Page 58 of 87
59 Factors affecting Maintainability 1. Average Cyclomatic Complexity (ACC) CC= e-n + 2P ACC= Average of CC of all modules 2. Readability of Source Code(RSC) CR = LOC/LOM 3. Documentation Quality (DOQ) Judged through Fog Index 4. Understandability of Software (UOS) Based on use of symbols in source code and other supporting documents Page 59 of 87
60 Proposed Fuzzy Model Knowledge Base Data Base Rule Base ACC RSC DOQ UOS Fuzzification Module Inference Engine DeFuzzification Module Maintain -ability Page 60 of 87
61 Input Variable ACC 1 low av high Page 61 of 87
62 Input Variable RSC 1 good avg poor CR Page 62 of 87
63 Input Variable DOQ FOG =0.4 * [(# of words/# of sentences) + %age of words with 3 or more syllables] 1 high med low Fog Index Page 63 of 87
64 Input Variable UOS 1 more moderate less Number of symbols Page 64 of 87
65 Output Variable Maintainability 1 very_good good avg poor v_poor Page 65 of 87
66 Rule Base for Fuzzy Model high med low DOQ Rule 1 v_good Rule10 v_good Rule19 good Rule 2 v_good Rule 3 Rule11 Rule12 good Rule20 Rule21 avg more Rule 5 Rule 4 Rule 6 avg good v_good good Rule 9 avg Rule 8 Rule 7 avg good Rule14 Rule13 Rule15 avg avg good avg Rule18 poor Rule17 Rule16 avg avg Rule23 Rule22 Rule24 poor avg avg avg Rule27 v_poor Rule26 Rule25 poor avg Rule28 v_good Rule37 good R ule46 good Rule29 Rule30 good Rule38 Rule39 good Rule47 Rule48 avg moderate Rule32 Rule31 Rule33 avg good good good Rule36 poor Rule35 Rule34 avg good Rule41 Rule40 Rule42 poor avg good avg Rule45 poor Rule44 Rule43 poor avg Rule49 Rule50 Rule51 poor poor avg poor Rule54 v_poor Rule53 Rule52 poor poor Rule55 good Rule64 good Rule73 avg less Rule56 Rule57 good Rule65 Rule66 avg Rule74 Rule75 avg UOS Rule59 Rule58 Rule60 avg avg good avg Rule63 poor Rule62 Rule61 avg avg Rule68 Rule67 Rule69 poor avg avg avg Rule72 v_poor Rule71 Rule70 poor avg Rule76 Rule77 Rule78 v_poor poor avg poor Rule81 v_poor Rule80 Rule79 v_poor v_poor ACC is low ACC is av ACC is high This area corresponds to RSC as good This area corresponds to RSC as avg This area corresponds to RSC as poor Page 66 of 87
67 Rule Base Representation Whenever a fuzzy model is to be simulated, the rule base is usually stored as If (ACC is low) and (RSC is good) and (DOQ is high) and (UOS is more) then (maintainability is v_good) If (ACC is av) and (RSC is good) and (DOQ is high) and (UOS is more) then (maintainability is v_good) If (ACC is high) and (RSC is poor) and (DOQ is high) and (UOS is more) then (maintainability is good) Page 67 of 87
68 Problems with Existing Representation Takes lot of storage space Takes more time in finding the rules, which get fired based on a set of inputs Page 68 of 87
69 New Representation of Rule Base No need to store membership function of each input in the rule Only output membership function is stored A relation is established between every combination of membership functions of inputs and corresponding applicable rule number with the help of weightages Outputs must be stored in a specific order of rule numbers Page 69 of 87
70 Working of New Representation Total _ Rules = N i= 1 M Weightages of each of membership functions of every input are defined as : W 1, 1 =1 W i,j =W i,(j-1) + W i,1 if j > 1 W i,1 =W (i-1),mi-1 if i >1 Here i represents i- th input and j represents j th membership function of i th input. i Page 70 of 87
71 How to Find Rule Numbers (getting fired) For a particular combination of membership functions of each input, the rule number, which will get fired, is found as: Rule _ number N i= 1 N = Wi, k Wi,1 + 1 i= 1 Page 71 of 87
72 Fuzzy Model of S/W Maintainability R.No O/p R.No O/p R.No O/p 1 v_good 2 v_good 3 good 4 v_good 5 good 6 avg 7 avg 8 Avg 9 poor 10 good 11 Avg 12 Avg 79 v_poor 80 v_poor 81 v_poor Page 72 of 87
73 Fuzzy Model of S/w Maintainability Consider the values of inputs such that ACC belongs to low, RSC belongs to avg and poor, DOQ belongs to med, and UOS belongs to more and moderate. Total number of rules, which will get fired corresponding to this input set, will be 4. Page 73 of 87
74 Fuzzy Model of S/w Maintainability Rule _Number 1 = 1 (weightage of low of ACC) + 6 (weightage of avg of RSC) + 18(weightage of med of DOQ) + 27(weightage of more of UOS) - 40 ( ) + 1= 13 Rule_Number2= =16 Rule_Number3= =40 Rule_Number4= =43 Page 74 of 87
75 Fuzzy Model of S/w Maintainability Membership Function 1 Membership Function 2 Membership Function 3 ACC RSC DOQ UOS Page 75 of 87
76 Fuzzy Model of S/w Maintainability Assume ACC= 2, RSC= 5.5, DOQ=15, UOS= 350. ACC = 2 belongs to fuzzy set low with membership grade of 1 RSC = 5.5 belongs to fuzzy set good with membership grade of 0.25 and to fuzzy set avg with membership grade of 0.5 DOQ = 5 belongs to fuzzy set med with membership grade of 1 UOS = 350 belongs to fuzzy set more with membership grade of 1 Page 76 of 87
77 Fuzzy Model of S/w Maintainability With these input values we find that rule numbers 10 and 13 fire. During composition of these rules we get the following Min (0.25, 1, 1) = 0.25 Min (0.5,1, 1) = 0.5 When these two rules are implicated, first rule gives maintainability value v_good to an extent of 0.25 and second rule gives the maintainability value good to the extent 0.5 Page 77 of 87
78 Output Computation 1 v_good good Page 78 of 87
79 Defuzzification = 3.2 Page 79 of 87
80 Maintenance Time for Typical Projects Project Number ACC RSC DOQ UOS Maintainability Average Corrective maint-time Page 80 of 87
81 ACC ACC maint-time Project Number maint-tim e Plot of ACC versus maint-time Page 81 of 87
82 10 RSC maint-time RSC maint-time Project Number Plot of RSC versus maint-time Page 82 of 87
83 DOQ DOQ maint-time Project Number maint-time Plot of DOQ versus maint-time Page 83 of 87
84 UOS UOS maint-time Project Number maint-time Plot of UOS versus maint-time Page 84 of 87
85 maintainability maintainability maint-time Project Number maint-time Plot of values of maintainability versus maint-time Page 85 of 87
86 CONCLUSION Model measures software maintainability based on four important aspects of software ACC, RSC, DOQ, and UOS Fuzzy approach used to integrate these four aspects A new efficient representation of a rule base has been proposed Output can advise the software project managers in judging the maintenance efforts of the software Page 86 of 87
87 Thank you Page 87 of 87
Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement
Tian: Software Quality Engineering Slide (Ch.22) 1 Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement Jeff Tian, tian@engr.smu.edu www.engr.smu.edu/ tian/sqebook Chapter
More informationSoftware Reliability Models: Failure rate estimation
Software Reliability Models: Failure rate estimation Animesh Kumar Rai M.Tech Student, Department of information Technology Amity School of Engineering and Technology Amity University, Noida, Uttar Pradesh
More informationKeywords: Software reliability, Logistic Growth, Curve Model, Software Reliability Model, Mean Value Function, Failure Intensity Function.
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Software Reliability
More informationB.H. Far
SENG 521 Software Reliability & Quality Software Reliability Tools (Chapter 12) Department t of Electrical l & Computer Engineering, i University it of Calgary B.H. Far (far@ucalgary.ca) http://www.enel.ucalgary.ca/people/far/lectures/seng521
More informationSlides 11: Verification and Validation Models
Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.
More informationModeling and Performance Analysis with Discrete-Event Simulation
Simulation Modeling and Performance Analysis with Discrete-Event Simulation Chapter 10 Verification and Validation of Simulation Models Contents Model-Building, Verification, and Validation Verification
More informationBasic Concepts of Reliability
Basic Concepts of Reliability Reliability is a broad concept. It is applied whenever we expect something to behave in a certain way. Reliability is one of the metrics that are used to measure quality.
More informationChapter 13 Strong Scaling
Chapter 13 Strong Scaling Part I. Preliminaries Part II. Tightly Coupled Multicore Chapter 6. Parallel Loops Chapter 7. Parallel Loop Schedules Chapter 8. Parallel Reduction Chapter 9. Reduction Variables
More informationDOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA
Chapter 1 : BioMath: Transformation of Graphs Use the results in part (a) to identify the vertex of the parabola. c. Find a vertical line on your graph paper so that when you fold the paper, the left portion
More informationDinwiddie County Public Schools Subject: Math 7 Scope and Sequence
Dinwiddie County Public Schools Subject: Math 7 Scope and Sequence GRADE: 7 Year - 2013-2014 9 WKS Topics Targeted SOLS Days Taught Essential Skills 1 ARI Testing 1 1 PreTest 1 1 Quadrilaterals 7.7 4 The
More informationSoftware Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 07 Special Value Testing Welcome to this session. So far we had looked
More informationM. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability
M. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability Engineering International, Vol.13, pp. 247-353, 1997. 1
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationSoftware Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives
Software Testing Fundamentals Software Testing Techniques Peter Lo Software Testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding.
More informationCHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS
CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)
More informationM. Xie, G. Y. Hong and C. Wohlin, "Modeling and Analysis of Software System Reliability", in Case Studies on Reliability and Maintenance, edited by
M. Xie, G. Y. Hong and C. Wohlin, "Modeling and Analysis of Software System Reliability", in Case Studies on Reliability and Maintenance, edited by W. Blischke and P. Murthy, Wiley VHC Verlag, Germany,
More informationSatisfactory Peening Intensity Curves
academic study Prof. Dr. David Kirk Coventry University, U.K. Satisfactory Peening Intensity Curves INTRODUCTION Obtaining satisfactory peening intensity curves is a basic priority. Such curves will: 1
More informationM. Xie, G. Y. Hong and C. Wohlin, "A Practical Method for the Estimation of Software Reliability Growth in the Early Stage of Testing", Proceedings
M. Xie, G. Y. Hong and C. Wohlin, "A Practical Method for the Estimation of Software Reliability Growth in the Early Stage of Testing", Proceedings IEEE 7th International Symposium on Software Reliability
More informationYou ve already read basics of simulation now I will be taking up method of simulation, that is Random Number Generation
Unit 5 SIMULATION THEORY Lesson 39 Learning objective: To learn random number generation. Methods of simulation. Monte Carlo method of simulation You ve already read basics of simulation now I will be
More informationAerospace Software Engineering
16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated
More informationChapter 6: DESCRIPTIVE STATISTICS
Chapter 6: DESCRIPTIVE STATISTICS Random Sampling Numerical Summaries Stem-n-Leaf plots Histograms, and Box plots Time Sequence Plots Normal Probability Plots Sections 6-1 to 6-5, and 6-7 Random Sampling
More informationCHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP
31 CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP 3.1 INTRODUCTION Evaluation of maintenance strategies is a complex task. The typical factors that influence the selection of maintenance strategy
More informationDarshan Institute of Engineering & Technology for Diploma Studies
CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations
More information7 Fractions. Number Sense and Numeration Measurement Geometry and Spatial Sense Patterning and Algebra Data Management and Probability
7 Fractions GRADE 7 FRACTIONS continue to develop proficiency by using fractions in mental strategies and in selecting and justifying use; develop proficiency in adding and subtracting simple fractions;
More informationSoftware Complexity Factor in Software Reliability Assessment
Software Complexity Factor in Software Reliability Assessment Meng-Lai Yin, Ph.D., ECE department, California Polytechnic University, Pomona Jon Peterson, Raytheon Company, Fullerton Rafael R. Arellano,
More informationFuzzy based Excitation system for Synchronous Generator
Fuzzy based Excitation system for Synchronous Generator Dr. Pragya Nema Professor, Netaji Subhash Engineering College, Kolkata, West Bangal. India ABSTRACT- Power system stability is essential requirement
More informationFlexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data
Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data B. Sumudu U. Mendis Department of Computer Science The Australian National University Canberra, ACT 0200,
More informationMaximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks
1 Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks Avinash Sridharan and Bhaskar Krishnamachari {asridhar,bkrishna}@usc.edu Department of Electrical Engineering University
More informationChapter - 2 : IMAGE ENHANCEMENT
Chapter - : IMAGE ENHANCEMENT The principal objective of enhancement technique is to process a given image so that the result is more suitable than the original image for a specific application Image Enhancement
More informationDesign of Experiments for Coatings
1 Rev 8/8/2006 Design of Experiments for Coatings Mark J. Anderson* and Patrick J. Whitcomb Stat-Ease, Inc., 2021 East Hennepin Ave, #480 Minneapolis, MN 55413 *Telephone: 612/378-9449 (Ext 13), Fax: 612/378-2152,
More informationFUZZY INFERENCE SYSTEMS
CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can
More informationGeneralized Network Flow Programming
Appendix C Page Generalized Network Flow Programming This chapter adapts the bounded variable primal simplex method to the generalized minimum cost flow problem. Generalized networks are far more useful
More informationDinner for Two, Reprise
Fuzzy Logic Toolbox Dinner for Two, Reprise In this section we provide the same two-input, one-output, three-rule tipping problem that you saw in the introduction, only in more detail. The basic structure
More informationLecture 15 Software Testing
Lecture 15 Software Testing Includes slides from the companion website for Sommerville, Software Engineering, 10/e. Pearson Higher Education, 2016. All rights reserved. Used with permission. Topics covered
More informationSOFTWARE MAINTENANCE: A
SOFTWARE MAINTENANCE: A TUTORIAL BY KEITH H. BENNETT 2008.10.13 소프트웨어 200310612 조보경 Software Engineering Field Main problem of software engineering Scale and Complexity of the software Goal of software
More informationQuantitative Analysis of Domain Testing Effectiveness.
East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations 5-200 Quantitative Analysis of Domain Testing Effectiveness. Narendra Koneru East Tennessee
More informationFuzzy Reasoning. Linguistic Variables
Fuzzy Reasoning Linguistic Variables Linguistic variable is an important concept in fuzzy logic and plays a key role in its applications, especially in the fuzzy expert system Linguistic variable is a
More informationChapter 9. Software Testing
Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of
More informationCHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES
70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically
More informationError Analysis, Statistics and Graphing
Error Analysis, Statistics and Graphing This semester, most of labs we require us to calculate a numerical answer based on the data we obtain. A hard question to answer in most cases is how good is your
More informationMicroscopic Traffic Simulation
Microscopic Traffic Simulation Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents Overview 2 Traffic Simulation Models 2 2. Need for simulation.................................
More informationCS 4387/5387 SOFTWARE V&V LECTURE 4 BLACK-BOX TESTING
1 CS 4387/5387 SOFTWARE V&V LECTURE 4 BLACK-BOX TESTING Outline 2 Quiz Black-Box Testing Equivalence Class Testing (Equivalence Partitioning) Boundary value analysis Decision Table Testing 1 3 Quiz - 1
More information1 Introduction Testing seeks to reveal software faults by executing a program and comparing the output expected to the output produced. Exhaustive tes
Using Dynamic Sensitivity Analysis to Assess Testability Jerey Voas, Larry Morell y, Keith Miller z Abstract: This paper discusses sensitivity analysis and its relationship to random black box testing.
More informationStatistical Testing of Software Based on a Usage Model
SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer
More informationMTAT : Software Testing
MTAT.03.159: Software Testing Lecture 03: White-Box Testing (Textbook Ch. 5) Spring 2013 Dietmar Pfahl email: dietmar.pfahl@ut.ee Lecture Chapter 5 White-box testing techniques (Lab 3) Structure of Lecture
More informationUNIT 8: SOLVING AND GRAPHING QUADRATICS. 8-1 Factoring to Solve Quadratic Equations. Solve each equation:
UNIT 8: SOLVING AND GRAPHING QUADRATICS 8-1 Factoring to Solve Quadratic Equations Zero Product Property For all numbers a & b Solve each equation: If: ab 0, 1. (x + 3)(x 5) = 0 Then one of these is true:
More informationOptimal Clustering and Statistical Identification of Defective ICs using I DDQ Testing
Optimal Clustering and Statistical Identification of Defective ICs using I DDQ Testing A. Rao +, A.P. Jayasumana * and Y.K. Malaiya* *Colorado State University, Fort Collins, CO 8523 + PalmChip Corporation,
More informationCT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015
Q.1 a. What is the role of software engineering? (4) Role of software engineering with reference to producing good quality software, maintainable software, and on time within budget. b. Differentiate between
More informationCHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER
60 CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 4.1 INTRODUCTION Problems in the real world quite often turn out to be complex owing to an element of uncertainty either in the parameters
More informationData Representation Type of Data Representation Integers Bits Unsigned 2 s Comp Excess 7 Excess 8
Data Representation At its most basic level, all digital information must reduce to 0s and 1s, which can be discussed as binary, octal, or hex data. There s no practical limit on how it can be interpreted
More informationFirst Nine Weeks Grade: 8 Subject: Math Year: IN PROGRESS # Days SOL Student Essential Knowledge and Skills 1 Computation and
First Nine Weeks Grade: 8 Subject: Math Year: 2017-2018 IN PROGRESS # Days SOL Student Essential Knowledge and Skills 1 Computation and Identify the perfect squares from 0 Estimation to 400. determine
More informationLecture notes. Com Page 1
Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation
More informationRaymond P.L. Buse and Westley R. Weimer. Presenter: Rag Mayur Chevuri
Raymond P.L. Buse and Westley R. Weimer {buse,weimer}@cs.virginia.edu Presenter: Rag Mayur Chevuri Maintenance consumes 70% of total life cycle cost Reading code Most time-consuming component of maintenance
More informationStatistics: Normal Distribution, Sampling, Function Fitting & Regression Analysis (Grade 12) *
OpenStax-CNX module: m39305 1 Statistics: Normal Distribution, Sampling, Function Fitting & Regression Analysis (Grade 12) * Free High School Science Texts Project This work is produced by OpenStax-CNX
More informationFuzzy Intrusion Detection
Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu
More informationSTRUCTURE-BASED software reliability analysis techniques
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 31, NO. 8, AUGUST 2005 1 A Simulation Approach to Structure-Based Software Reliability Analysis Swapna S. Gokhale, Member, IEEE, and Michael R. Lyu, Fellow,
More informationPractical Design of Experiments: Considerations for Iterative Developmental Testing
Practical Design of Experiments: Considerations for Iterative Developmental Testing Best Practice Authored by: Michael Harman 29 January 2018 The goal of the STAT COE is to assist in developing rigorous,
More informationSoftware Testing. 1. Testing is the process of demonstrating that errors are not present.
What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program
More informationBuilding Intelligent Learning Database Systems
Building Intelligent Learning Database Systems 1. Intelligent Learning Database Systems: A Definition (Wu 1995, Wu 2000) 2. Induction: Mining Knowledge from Data Decision tree construction (ID3 and C4.5)
More information* The terms used for grading are: - bad - good
Hybrid Neuro-Fuzzy Systems or How to Combine German Mechanics with Italian Love by Professor Michael Negnevitsky University of Tasmania Introduction Contents Heterogeneous Hybrid Systems Diagnosis of myocardial
More informationVerification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process
Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1
More informationDistinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules
Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules Sridevi.Ravada Asst.professor Department of Computer Science and Engineering
More informationHashing. Hashing Procedures
Hashing Hashing Procedures Let us denote the set of all possible key values (i.e., the universe of keys) used in a dictionary application by U. Suppose an application requires a dictionary in which elements
More informationCHAPTER 4 MAINTENANCE STRATEGY SELECTION USING TOPSIS AND FUZZY TOPSIS
59 CHAPTER 4 MAINTENANCE STRATEGY SELECTION USING TOPSIS AND FUZZY TOPSIS 4.1 INTRODUCTION The development of FAHP-TOPSIS and fuzzy TOPSIS for selection of maintenance strategy is elaborated in this chapter.
More informationBootstrapping Method for 14 June 2016 R. Russell Rhinehart. Bootstrapping
Bootstrapping Method for www.r3eda.com 14 June 2016 R. Russell Rhinehart Bootstrapping This is extracted from the book, Nonlinear Regression Modeling for Engineering Applications: Modeling, Model Validation,
More informationPerformance Estimation and Regularization. Kasthuri Kannan, PhD. Machine Learning, Spring 2018
Performance Estimation and Regularization Kasthuri Kannan, PhD. Machine Learning, Spring 2018 Bias- Variance Tradeoff Fundamental to machine learning approaches Bias- Variance Tradeoff Error due to Bias:
More informationOPTIMISATION OF PIN FIN HEAT SINK USING TAGUCHI METHOD
CHAPTER - 5 OPTIMISATION OF PIN FIN HEAT SINK USING TAGUCHI METHOD The ever-increasing demand to lower the production costs due to increased competition has prompted engineers to look for rigorous methods
More informationAgile Mind Mathematics 6 Scope and Sequence, Indiana Academic Standards for Mathematics
In the three years prior Grade 6, students acquired a strong foundation in numbers and operations, geometry, measurement, and data. Students are fluent in multiplication of multi-digit whole numbers and
More informationAlgebra II Chapter 4: Quadratic Functions and Factoring Part 1
Algebra II Chapter 4: Quadratic Functions and Factoring Part 1 Chapter 4 Lesson 1 Graph Quadratic Functions in Standard Form Vocabulary 1 Example 1: Graph a Function of the Form y = ax 2 Steps: 1. Make
More informationSupport Vector Regression for Software Reliability Growth Modeling and Prediction
Support Vector Regression for Software Reliability Growth Modeling and Prediction 925 Fei Xing 1 and Ping Guo 2 1 Department of Computer Science Beijing Normal University, Beijing 100875, China xsoar@163.com
More informationStudents will understand 1. that numerical expressions can be written and evaluated using whole number exponents
Grade 6 Expressions and Equations Essential Questions: How do you use patterns to understand mathematics and model situations? What is algebra? How are the horizontal and vertical axes related? How do
More informationC E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations I
T H E U N I V E R S I T Y of T E X A S H E A L T H S C I E N C E C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S Image Operations I For students of HI 5323
More informationChapter 6 Continued: Partitioning Methods
Chapter 6 Continued: Partitioning Methods Partitioning methods fix the number of clusters k and seek the best possible partition for that k. The goal is to choose the partition which gives the optimal
More informationProblem Set 3 CMSC 426 Due: Thursday, April 3
Problem Set 3 CMSC 426 Due: Thursday, April 3 Overview: This problem set will work a little different. There will be a standard part, and an advanced part. Students may choose to do either part. Alternately,
More informationCHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY
23 CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 3.1 DESIGN OF EXPERIMENTS Design of experiments is a systematic approach for investigation of a system or process. A series
More informationObject Oriented Programming Using C++ Mathematics & Computing IET, Katunayake
Assigning Values // Example 2.3(Mathematical operations in C++) float a; cout > a; cout
More informationChapter 4. The Classification of Species and Colors of Finished Wooden Parts Using RBFNs
Chapter 4. The Classification of Species and Colors of Finished Wooden Parts Using RBFNs 4.1 Introduction In Chapter 1, an introduction was given to the species and color classification problem of kitchen
More informationAnalytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.
Glossary of data mining terms: Accuracy Accuracy is an important factor in assessing the success of data mining. When applied to data, accuracy refers to the rate of correct values in the data. When applied
More information2014, IJARCSSE All Rights Reserved Page 1084
Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Classification
More informationDepartment Curriculum Map (new GCSE)
Department Curriculum Map 2014-15 (new GCSE) Department Mathematics required in Year 11 Foundation 1. Structure and calculation: N1 to N9 Fractions, decimals and percentages: N10 to N12 Measure and accuracy:
More informationThe Comparative Software Reliability Cost Model based on Generalized Goel-NHPP Model
Vol.67 (Software 204), pp.96-00 http://dx.doi.org/0.4257/astl.204.67.23 The Comparative Software Reliability Cost Model based on Generalized Goel-NHPP Model Hee-Cheul Kim, Jeong-Beom Kim 2 Department of
More informationCHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION
CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant
More informationYear 8 Review 1, Set 1 Number confidence (Four operations, place value, common indices and estimation)
Year 8 Review 1, Set 1 Number confidence (Four operations, place value, common indices and estimation) Place value Digit Integer Negative number Difference, Minus, Less Operation Multiply, Multiplication,
More informationChapter 10 Verification and Validation of Simulation Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation
Chapter 10 Verification and Validation of Simulation Models Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Purpose & Overview The goal of the validation process is: To produce a model that
More informationExploring Econometric Model Selection Using Sensitivity Analysis
Exploring Econometric Model Selection Using Sensitivity Analysis William Becker Paolo Paruolo Andrea Saltelli Nice, 2 nd July 2013 Outline What is the problem we are addressing? Past approaches Hoover
More informationDiocese of Boise Math Curriculum 6 th grade
Diocese of Boise Math Curriculum 6 th grade compute fractions? When do we use Roman Numerals? Numbers, Operations Algebraic Thinking Know use number names the count sequence Use properties of multiplicatio
More informationSELECTION OF A MULTIVARIATE CALIBRATION METHOD
SELECTION OF A MULTIVARIATE CALIBRATION METHOD 0. Aim of this document Different types of multivariate calibration methods are available. The aim of this document is to help the user select the proper
More informationDLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR
DLD UNIT III Combinational Circuits (CC), Analysis procedure, Design Procedure, Combinational circuit for different code converters and other problems, Binary Adder- Subtractor, Decimal Adder, Binary Multiplier,
More informationDESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES
DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall
More informationSoftware reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment.
SOFTWARE ENGINEERING SOFTWARE RELIABILITY Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. LEARNING OBJECTIVES
More informationChapter 8 Software Testing. Chapter 8 Software testing
Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.
More informationMiddle School Math Course 3
Middle School Math Course 3 Correlation of the ALEKS course Middle School Math Course 3 to the Texas Essential Knowledge and Skills (TEKS) for Mathematics Grade 8 (2012) (1) Mathematical process standards.
More informationMiddle School Math Course 3 Correlation of the ALEKS course Middle School Math 3 to the Illinois Assessment Framework for Grade 8
Middle School Math Course 3 Correlation of the ALEKS course Middle School Math 3 to the Illinois Assessment Framework for Grade 8 State Goal 6: Number Sense 6.8.01: 6.8.02: 6.8.03: 6.8.04: 6.8.05: = ALEKS
More informationScientific Computing: An Introductory Survey
Scientific Computing: An Introductory Survey Chapter 13 Random Numbers and Stochastic Simulation Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright
More informationCHAPTER 9: Quadratic Equations and Functions
Notes # CHAPTER : Quadratic Equations and Functions -: Exploring Quadratic Graphs A. Intro to Graphs of Quadratic Equations: = ax + bx + c A is a function that can be written in the form = ax + bx + c
More informationMODEL FOR DELAY FAULTS BASED UPON PATHS
MODEL FOR DELAY FAULTS BASED UPON PATHS Gordon L. Smith International Business Machines Corporation Dept. F60, Bldg. 706-2, P. 0. Box 39 Poughkeepsie, NY 12602 (914) 435-7988 Abstract Delay testing of
More informationVerification and Validation. Verification and validation
Verification and Validation Verification and validation Verification and Validation (V&V) is a whole life-cycle process. V&V has two objectives: Discovery of defects, Assessment of whether or not the system
More informationD-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview
Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,
More informationTesting! Prof. Leon Osterweil! CS 520/620! Spring 2013!
Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More information