Software Reliability and Maintainability Prof. K.K. Aggarwal Vice Chancellor G.G.S. Indraprastha University Kashmere Gate, Delhi, India

Size: px
Start display at page:

Download "Software Reliability and Maintainability Prof. K.K. Aggarwal Vice Chancellor G.G.S. Indraprastha University Kashmere Gate, Delhi, India"

Transcription

1 Software Reliability and Maintainability Prof. K.K. Aggarwal Vice Chancellor G.G.S. Indraprastha University Kashmere Gate, Delhi, India Page 1 of 87

2 USES OF SOFTWARE ENGINEERING STUDIES 1. To evaluate software engineering technology quantitatively. 2. To evaluate development status during the test phases. 3. To monitor the operational performance of software. 4. To enrich the insight into the software product and software development process. Page 2 of 87

3 INTRODUCTION Three most significant needs of Software are : Time of delivery, and Level of quality required Cost While it is easy to quantify schedule and cost, quantification of quality has been more difficult. Reliability is the most important characteristic of Software Quality. Reliability is the probability that the software will work without failure for a specified period of time in a specified environment. Page 3 of 87

4 RELIABILITY APPROACHES The Developer oriented approach Attempting to count the faults found by counting either failures or repairs. Even correct enumeration of faults is not a good status indicator. Page 4 of 87

5 The User Oriented Approach Software reliability Relates to operation rather than design of the program Dynamic rather than static Easily associated with costs Suitable for examining the significance of trends, for setting of objectives, and the schedule for meeting these objectives. Page 5 of 87

6 FAULT A fault is the defect in the program that, when executed under particular conditions, causes a Failure. A fault can cause more than one failure It is a property of the program Created when a programmer makes an error A fault can be defined as a defective, missing, or extra instruction or set of related instructions that is the cause of one or more actual or potential failures. Page 6 of 87

7 The number of faults in the software is the difference between the number introduced and the number removed. Faults are introduced when the code is being developed by programmers. The process of fault removal introduces some new faults. The fault removal resulting from execution depends on the occurrence of the associated failure. Faults can also be found without execution. Page 7 of 87

8 FAILURE Defined as departure of operations from requirements. A software failure must occur during execution of a program. Potential failures do not count. Documentation faults are not to be counted. Requirements are somewhat subject to interpretation. Requirements and failures can be considered as positive and negative specifications. Page 8 of 87

9 The definition of failure is really project specific and must be established in consultation with customer. The process of establishing the requirements for a system involves a consideration of the operational profile also. The failure process and hence software reliability is directly dependent on the environment or the operational profile. Operational Profile is the set of input states that the program can execute along with the probabilities with which they will occur. Page 9 of 87

10 * Input state A (P A =0.12) * Input state B (P B =0.08) Input Space Probability of occurrence Probability of occurrence A B Input State Portion of operational profile Input state Operational profile Page 10 of 87

11 It is affected by : FAILURE BEHAVIOUR 1. The number of faults in the software being executed, and 2. The execution environment or operational profile of execution Failures occurrence in time can be characterized by : i) time of failure, ii) time interval between failures, iii) cumulative failures experienced upto a give time, and iv) failures experienced in a time interval All the foregoing four quantities are random variables. Page 11 of 87

12 Probability Distribution at Two Different Times Value of random variable (failures in time period) Probability of Elapsed Time Time=1 hour Time=5 hours Mean failures Page 12 of 87

13 10 Mean value function 10 Mean failures 5 Time =5 hr Failure Intensity (failures/hr) 5 Time =1 hr Failure Intensity 5 10 Time (hrs) The variation can be expressed as : Mean Value Function represents the average cumulative failures association with each time point. Failure Intensity Function represents the rate of change of the mean value function. Page 13 of 87

14 Example Program : 1. read (a,b,c); 2. if a <> 0 then begin 3. d : = b*b 5 *a*c; 4. X:=0 5. if d>0 then 6. X : = (-b + trunc (sqrt (d))) div (2*a) end else 7. X: = -c div b; 8. if (a*x*x+ b*x+c = 0) then 9. writeln (X, is an integer solution ) else 10. writeln( There is no integer solution ) Page 14 of 87

15 This program displays an integral solution to the quadratic equation ax 2 + bx + c = 0 for integral values of a, b and c. Assume the range of a : 0 to 10 (11) b : -5 to 5 (11) c: -20to20 (41) Even then the total number of states, T = 4,961 The program has a fault at line 3. Page 15 of 87

16 Set 1 : Location a b c d x Output ** ** 7 ** -2 8 ** -2 9 ** -2-2 is an integer solution The value of a = 0 causes the selection of a path that does not include location 3. No failure possible. Page 16 of 87

17 Set 2 : Location a b c d x Output ** ** 2 ** ** 3 4 ** isaninteger solution The fault is reached, but the computation proceeds just as there were no fault because c = 0. No infection. Page 17 of 87

18 Set. 3 : Location a b c d x Output ** ** 2 ** ** 3 61 ** is an integer solution The fault infects the succeeding data state. D = 61 insetad of 49. Error propagates to location 6 where it is cancelled by the integer square root calculation where correct answer, 7 is computed. No failure again. Page 18 of 87

19 Set. 4 : Location a b c d x Output ** ** 2 ** ** ** ** There is no integer solution Here fault is executed. It infects the data state. Also, the data state error propagates to output. Page 19 of 87

20 Each computation falls into one of the four categories. the fault is not executed the fault is executed but does not infect any data state some data states are infected, but the output is nonetheless correct data infection does cause an incorrect output Page 20 of 87

21 COST IMPACT OF SOFTWARE DEFECTS The obvious benefits of formal technical reviews is the early discovery of software defects so that each defect is corrected prior to the next step. It is indicated that design activities introduce between 50 and 65 percent of all errors. FTRs have been shown to be up to 75 percent effective. Page 21 of 87

22 The review process thus substantially reduces the cost of subsequent steps in the development and maintenance phases. If an error uncovered during design costs 1.0 monetary unit to correct, the same error just before testing commences may cost 6.5 units; during testing, 15 units; and after release, 67 units. Page 22 of 87

23 DEFECT AMPLIFICATION & REMOVAL Development step Defects Detection Errors from previous step Errors passed through Amplified errors 1: x Newly generated errors Percent efficiency for error detection Errors passed to next step Defect Amplification Model Page 23 of 87

24 Preliminary Design Detailed Design Code/Unit test Integration Test Validation Test System Test Defect Amplification No Reviews Page 24 of 87

25 Defect Amplification Reviews Conducted Preliminary Design Detailed Design Code/Unit test Integration Test Validation Test System Test Page 25 of 87

26 COST COMPARISONS Errors found Number Unit Cost Total Reviews conducted During design Before test During test After release No reviews conducted 793 Before test During test After release Page 26 of 87

27 OPERATIONAL PROFILE & TEST Operational Profile PROFILE It is desirable to use the concept of operational profile even if we can draw it only approximately. In the absence of the use of operational profile, we are using flat operational profile. The environment or operational profile of a program is established by enumerating the possible input states and their probabilities of occurrence. Page 27 of 87

28 It is possible to perform a grouping or equivalence partitioning of the input space and select only one input state from each group with a probability equal to the probability (total) of occurrence of all states in the group. Some systems operate in several characteristic operational profiles. The proportion of time spent in each mode varies from installation to installation. Here it may be desirable to determine the reliability for each mode. An example is a Telephone Switching System which may operate in either a business customer mode or a residential customer mode. Page 28 of 87

29 Operational mode A has a wide variety of types of calls such as conference calls, credit card calls and international calls. Operational mode B has fewer of the special calls, hence the operational profile shows more of a peak. Probability of occurence Pk Op. mode B Op. mode A Input State k Page 29 of 87

30 TEST PROFILE Software systems are subjected to extensive testing prior to release. The testing phase of the software development life cycle requires a judicious choice of a test suite. Exhaustive Testing is practically impossible even for most trivial applications. We suggest using an operational profile approach for designing an optimal testing strategy. If M is the total number of all possible inputs, let us assume we can choose only T < < M test cases for cost considerations. Page 30 of 87

31 The optimum test strategy is the one that yields the greatest reduction in failure intensity per unit of test cost. This would be accomplished if we select these T inputs such that the failure intensity reduces most rapidly with respect to text execution time. By a Knowledge of operational Profile & Test Profile, we can quantify Test Effectiveness. Probability of Occurence Op. Profile Test Profile T M Input State Page 31 of 87

32 SOFTWARE RELIABILITY MODELS General Characteristics A software reliability model has the form of a random process that describes the behaviour of failures with time. Specification of the model generally includes specification of a function of time such as the mean value function or failure intensity. A software reliability model describes software failures as a random process, which is characterized in either times of failure or the number of failures at fixed times. Page 32 of 87

33 Let M(t) be a random process representing the number of failures experienced by time t. The μ(t), the mean value function is defined as : μ (t) = E [M(T)] The failure intensity function is then defined as : λ(t) = d/dt[μ(t)] Page 33 of 87

34 GOOD MODEL Good software reliability model has several important characteristics : 1. Gives good predictions of future failure behaviour 2. Is easy for measuring parameters 3. Is based on sound assumptions 4. Is widely applicable 5. Is simple 6. Is insensitive to noise Page 34 of 87

35 A good model considerably enhances communication on a project. The advantages are significant even if the projections are made only with a limited accuracy. Developing a practically useful model may require several person years but its application requires a small fraction of project resources. For research investigations, a range of models may be applied but for real projects, application of more than one or two models is conceptually and economically impractical. Page 35 of 87

36 RELIABILITY MODELS Model Criteria Results 1 Jelinski Moranda y y - y y y y 2 Weibull y n y y n n n 3 Duane Model - y y y y y y 4 Rayleigh Model n y n - y n n 5 Shick-Wolverton n y n n y n n 6 Musa Basic Model y y - y y y y 7 Goel-Okumoto y y - y y y y 8 Bayesian Jelinski Moranda y n y y n y - 9 Littlewood Model y n y y n y - 10 Bayesian Littlewood y n y y n y - 11 Keiller-Littlewood y n y y n y - 12 Littlewood-Verrall y n y y n y - 13 Schneidewind Model y y - y y y y 14 Musa-Okumoto (LP) y y y y y y y 15 Littlewood NHPP y n y y n y - Page 36 of 87

37 Musa s MODEL λ(μ) =λ 0 [1-μ/γ 0 ] EXAMPLE Assume that a program will experience 100 failures in infinite time. It has now experienced 50. The initial failure intensity was 10 failures/cpu hr. - the current failure intensity? 10 (1-50/100) = 5 failures/cpu hr - the decrement of failure intensity per failure? dλ/dμ =-(λ 0 /γ 0 ) = -0.1/cpu hr Page 37 of 87

38 Mean failures experienced, μ Failure Intensity function OBSERVING THE RELATIONSHIP BETWEEN THE FAILURES AND FAILURE INTENSITY, WE CAN DERIVE: μ (τ) = γ ο (1 Exp (- (λ ο / γ ο ) τ)) Page 38 of 87

39 Mean failures experienced versus execution time Page 39 of 87

40 The failure Intensity as a function of execution time can now be expressed as λ (τ) =λ ο Exp ( - λ ο / γ ο ) τ EXAMPLE (CONTD.) The failure intensity at 10 cpu hr? λ(10) = 3.68 failures/ cpu hr. At 100 cpu hr? λ(100) = failures/cpu hr. Page 40 of 87

41 Derived Quantities Assume that you have chosen a failure intensity objective for the software product being developed. Suppose some portion of the failures are being removed through correction of their associated faults. Then we can use the objective & the present value of failure intensity to determine the additional expected number of failures that must be experienced to reach that objective. For basic model, μ = (γ 0 /λ 0 ) (λ P - λ f ) Page 41 of 87

42 Mean failures experienced Additional failures to failure intensity Objective The expected number of failures that will be experienced between a present failure intensity of 3.68 failures/cpu hr and an objective of failures/cpu hr? μ = 100/10 ( ) = 37 failures. Page 42 of 87

43 Similarly, we can determine the additional execution time required to reach the failure intensity objective. Δτ = γ 0 /λ 0 In (λ p /λ f ) Example (Contd.) Calculate the cpu time required to reach a failure intensity objective of failures/cpu hr if the present value of failure intensity is 3.68 failures/cpu hr. Δτ = 100/10 In (3.68/ ) = 90 cpu hr. Page 43 of 87

44 APPLICATION OF MUSA MODEL Regarding evaluating the cost effectiveness of a design review. 50,000 source instructions. Previous experience indicates 8 faults/1000 instructions and an initial failure intensity of 10 failures/hour. Required failure intensity is 1 failure/10 hr. We need 5 per hour of effort/hour of computer time and a total of 8 per hour for failure identification and correction per failure. In addition to testing time, computer is required for ½ hour per failure. Page 44 of 87

45 Loaded salary is $100/hour. Computer time is priced at $1000/hour. It is found that design reviews reduce the fault figure to 6. Design reviews require 5 meetings attended by 6 persons on the average for 10 hours. Page 45 of 87

46 λ λ oa λ ob λ f μ B γ ob μ A γ oa Page 46 of 87

47 λ λ OA λ OB λ f Time t B t A Page 47 of 87

48 CASE A (WITHOUT REVIEWS) λ OA = 10 failures/hr ν OA = 50,000 x 8/1000 = 400 failures μ A = 396 failures t A = 184 hrs. Total person hrs. = 8 x x 184 = = 4088 hrs. Total Comp. hrs. = ½ (396) = 382 comp. hrs. Total Cost = $4088 x x 1000 = $790,800 Page 48 of 87

49 CASE B (WITHOUT REVIEWS) λ OB = 50,000 X 6/1000 = 300 failure ν OB = 10 x ¾ = 7.5 failures/hr. μ A = 296 failures t A = 173 hrs. Total person hrs. = 8 x x 173 = = 3233 hrs. Total Comp. hrs. = ½ (296) = 321 comp. hrs. Total Cost = $3233 x x 1000 = $644,300 Page 49 of 87

50 Total Review effort = 5 x 6 x 10 = 300 per-hr Review Cost = $300 x 100 = $30,000 Total Cost = $644, ,000 = $674,300 EFFICACY OF REVIEWS IS ESTABLISHED Page 50 of 87

51 LIFE CYCLE COST OPTIMISATION The basis for optimization is the assumption that reliability improvement is obtained by more extensive testing, which of course affects costs and schedules. Costs and Schedules for other phases are assumed to be constant. The part of development cost due to testing decreases with higher F.I. objectives, while operational cost increases. Thus total cost has a minimum. Page 51 of 87

52 Cost Total Operation System Test Failure Intensity Start of System Test Life Cycle Cost Optimization Page 52 of 87

53 Software Maintenance Maintenance of every software is a must To correct errors, if any To adapt s/w in ever changing environment To improve the efficiency Page 53 of 87

54 CATEGORIES 1) CORRECTIVE MAINTENANCE Refers to modification initiated by the defects in the software. Emergency fixings are known as: PATCHING INCREASED PROGRAM COMPLEXITY UNFORSEEN RIPPLE EFFECTS Page 54 of 87

55 2) ADAPTIVE MAINTENANCE It includes changing the software to match changes in the ever changing environment. Business Rules H/W Platform Govt. Policies S/W Platform Work patterns Page 55 of 87

56 3) PERFECTIVE MAINTENANCE It means improving processing efficiency or performance, or restructuring the software to improve changeability. EXPANSION Enhancement in existing system functionality Improvement in computational efficiency Page 56 of 87

57 Distribution of Efforts among Three Categories 17% 18% 65% Corrective Adaptive Perfective Page 57 of 87

58 Distribution of efforts among various causes Emergency Debugging Routine Debugging Data Env. Adaption H/W, O.S. Change Enhancements for Users Documentation Improvement Code Efficiency Improvement Others Page 58 of 87

59 Factors affecting Maintainability 1. Average Cyclomatic Complexity (ACC) CC= e-n + 2P ACC= Average of CC of all modules 2. Readability of Source Code(RSC) CR = LOC/LOM 3. Documentation Quality (DOQ) Judged through Fog Index 4. Understandability of Software (UOS) Based on use of symbols in source code and other supporting documents Page 59 of 87

60 Proposed Fuzzy Model Knowledge Base Data Base Rule Base ACC RSC DOQ UOS Fuzzification Module Inference Engine DeFuzzification Module Maintain -ability Page 60 of 87

61 Input Variable ACC 1 low av high Page 61 of 87

62 Input Variable RSC 1 good avg poor CR Page 62 of 87

63 Input Variable DOQ FOG =0.4 * [(# of words/# of sentences) + %age of words with 3 or more syllables] 1 high med low Fog Index Page 63 of 87

64 Input Variable UOS 1 more moderate less Number of symbols Page 64 of 87

65 Output Variable Maintainability 1 very_good good avg poor v_poor Page 65 of 87

66 Rule Base for Fuzzy Model high med low DOQ Rule 1 v_good Rule10 v_good Rule19 good Rule 2 v_good Rule 3 Rule11 Rule12 good Rule20 Rule21 avg more Rule 5 Rule 4 Rule 6 avg good v_good good Rule 9 avg Rule 8 Rule 7 avg good Rule14 Rule13 Rule15 avg avg good avg Rule18 poor Rule17 Rule16 avg avg Rule23 Rule22 Rule24 poor avg avg avg Rule27 v_poor Rule26 Rule25 poor avg Rule28 v_good Rule37 good R ule46 good Rule29 Rule30 good Rule38 Rule39 good Rule47 Rule48 avg moderate Rule32 Rule31 Rule33 avg good good good Rule36 poor Rule35 Rule34 avg good Rule41 Rule40 Rule42 poor avg good avg Rule45 poor Rule44 Rule43 poor avg Rule49 Rule50 Rule51 poor poor avg poor Rule54 v_poor Rule53 Rule52 poor poor Rule55 good Rule64 good Rule73 avg less Rule56 Rule57 good Rule65 Rule66 avg Rule74 Rule75 avg UOS Rule59 Rule58 Rule60 avg avg good avg Rule63 poor Rule62 Rule61 avg avg Rule68 Rule67 Rule69 poor avg avg avg Rule72 v_poor Rule71 Rule70 poor avg Rule76 Rule77 Rule78 v_poor poor avg poor Rule81 v_poor Rule80 Rule79 v_poor v_poor ACC is low ACC is av ACC is high This area corresponds to RSC as good This area corresponds to RSC as avg This area corresponds to RSC as poor Page 66 of 87

67 Rule Base Representation Whenever a fuzzy model is to be simulated, the rule base is usually stored as If (ACC is low) and (RSC is good) and (DOQ is high) and (UOS is more) then (maintainability is v_good) If (ACC is av) and (RSC is good) and (DOQ is high) and (UOS is more) then (maintainability is v_good) If (ACC is high) and (RSC is poor) and (DOQ is high) and (UOS is more) then (maintainability is good) Page 67 of 87

68 Problems with Existing Representation Takes lot of storage space Takes more time in finding the rules, which get fired based on a set of inputs Page 68 of 87

69 New Representation of Rule Base No need to store membership function of each input in the rule Only output membership function is stored A relation is established between every combination of membership functions of inputs and corresponding applicable rule number with the help of weightages Outputs must be stored in a specific order of rule numbers Page 69 of 87

70 Working of New Representation Total _ Rules = N i= 1 M Weightages of each of membership functions of every input are defined as : W 1, 1 =1 W i,j =W i,(j-1) + W i,1 if j > 1 W i,1 =W (i-1),mi-1 if i >1 Here i represents i- th input and j represents j th membership function of i th input. i Page 70 of 87

71 How to Find Rule Numbers (getting fired) For a particular combination of membership functions of each input, the rule number, which will get fired, is found as: Rule _ number N i= 1 N = Wi, k Wi,1 + 1 i= 1 Page 71 of 87

72 Fuzzy Model of S/W Maintainability R.No O/p R.No O/p R.No O/p 1 v_good 2 v_good 3 good 4 v_good 5 good 6 avg 7 avg 8 Avg 9 poor 10 good 11 Avg 12 Avg 79 v_poor 80 v_poor 81 v_poor Page 72 of 87

73 Fuzzy Model of S/w Maintainability Consider the values of inputs such that ACC belongs to low, RSC belongs to avg and poor, DOQ belongs to med, and UOS belongs to more and moderate. Total number of rules, which will get fired corresponding to this input set, will be 4. Page 73 of 87

74 Fuzzy Model of S/w Maintainability Rule _Number 1 = 1 (weightage of low of ACC) + 6 (weightage of avg of RSC) + 18(weightage of med of DOQ) + 27(weightage of more of UOS) - 40 ( ) + 1= 13 Rule_Number2= =16 Rule_Number3= =40 Rule_Number4= =43 Page 74 of 87

75 Fuzzy Model of S/w Maintainability Membership Function 1 Membership Function 2 Membership Function 3 ACC RSC DOQ UOS Page 75 of 87

76 Fuzzy Model of S/w Maintainability Assume ACC= 2, RSC= 5.5, DOQ=15, UOS= 350. ACC = 2 belongs to fuzzy set low with membership grade of 1 RSC = 5.5 belongs to fuzzy set good with membership grade of 0.25 and to fuzzy set avg with membership grade of 0.5 DOQ = 5 belongs to fuzzy set med with membership grade of 1 UOS = 350 belongs to fuzzy set more with membership grade of 1 Page 76 of 87

77 Fuzzy Model of S/w Maintainability With these input values we find that rule numbers 10 and 13 fire. During composition of these rules we get the following Min (0.25, 1, 1) = 0.25 Min (0.5,1, 1) = 0.5 When these two rules are implicated, first rule gives maintainability value v_good to an extent of 0.25 and second rule gives the maintainability value good to the extent 0.5 Page 77 of 87

78 Output Computation 1 v_good good Page 78 of 87

79 Defuzzification = 3.2 Page 79 of 87

80 Maintenance Time for Typical Projects Project Number ACC RSC DOQ UOS Maintainability Average Corrective maint-time Page 80 of 87

81 ACC ACC maint-time Project Number maint-tim e Plot of ACC versus maint-time Page 81 of 87

82 10 RSC maint-time RSC maint-time Project Number Plot of RSC versus maint-time Page 82 of 87

83 DOQ DOQ maint-time Project Number maint-time Plot of DOQ versus maint-time Page 83 of 87

84 UOS UOS maint-time Project Number maint-time Plot of UOS versus maint-time Page 84 of 87

85 maintainability maintainability maint-time Project Number maint-time Plot of values of maintainability versus maint-time Page 85 of 87

86 CONCLUSION Model measures software maintainability based on four important aspects of software ACC, RSC, DOQ, and UOS Fuzzy approach used to integrate these four aspects A new efficient representation of a rule base has been proposed Output can advise the software project managers in judging the maintenance efforts of the software Page 86 of 87

87 Thank you Page 87 of 87

Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement

Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement Tian: Software Quality Engineering Slide (Ch.22) 1 Software Quality Engineering: Testing, Quality Assurance, and Quantifiable Improvement Jeff Tian, tian@engr.smu.edu www.engr.smu.edu/ tian/sqebook Chapter

More information

Software Reliability Models: Failure rate estimation

Software Reliability Models: Failure rate estimation Software Reliability Models: Failure rate estimation Animesh Kumar Rai M.Tech Student, Department of information Technology Amity School of Engineering and Technology Amity University, Noida, Uttar Pradesh

More information

Keywords: Software reliability, Logistic Growth, Curve Model, Software Reliability Model, Mean Value Function, Failure Intensity Function.

Keywords: Software reliability, Logistic Growth, Curve Model, Software Reliability Model, Mean Value Function, Failure Intensity Function. Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Software Reliability

More information

B.H. Far

B.H. Far SENG 521 Software Reliability & Quality Software Reliability Tools (Chapter 12) Department t of Electrical l & Computer Engineering, i University it of Calgary B.H. Far (far@ucalgary.ca) http://www.enel.ucalgary.ca/people/far/lectures/seng521

More information

Slides 11: Verification and Validation Models

Slides 11: Verification and Validation Models Slides 11: Verification and Validation Models Purpose and Overview The goal of the validation process is: To produce a model that represents true behaviour closely enough for decision making purposes.

More information

Modeling and Performance Analysis with Discrete-Event Simulation

Modeling and Performance Analysis with Discrete-Event Simulation Simulation Modeling and Performance Analysis with Discrete-Event Simulation Chapter 10 Verification and Validation of Simulation Models Contents Model-Building, Verification, and Validation Verification

More information

Basic Concepts of Reliability

Basic Concepts of Reliability Basic Concepts of Reliability Reliability is a broad concept. It is applied whenever we expect something to behave in a certain way. Reliability is one of the metrics that are used to measure quality.

More information

Chapter 13 Strong Scaling

Chapter 13 Strong Scaling Chapter 13 Strong Scaling Part I. Preliminaries Part II. Tightly Coupled Multicore Chapter 6. Parallel Loops Chapter 7. Parallel Loop Schedules Chapter 8. Parallel Reduction Chapter 9. Reduction Variables

More information

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA

DOWNLOAD PDF BIG IDEAS MATH VERTICAL SHRINK OF A PARABOLA Chapter 1 : BioMath: Transformation of Graphs Use the results in part (a) to identify the vertex of the parabola. c. Find a vertical line on your graph paper so that when you fold the paper, the left portion

More information

Dinwiddie County Public Schools Subject: Math 7 Scope and Sequence

Dinwiddie County Public Schools Subject: Math 7 Scope and Sequence Dinwiddie County Public Schools Subject: Math 7 Scope and Sequence GRADE: 7 Year - 2013-2014 9 WKS Topics Targeted SOLS Days Taught Essential Skills 1 ARI Testing 1 1 PreTest 1 1 Quadrilaterals 7.7 4 The

More information

Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur

Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Software Testing Prof. Rajib Mall Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 07 Special Value Testing Welcome to this session. So far we had looked

More information

M. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability

M. Xie, G. Y. Hong and C. Wohlin, A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction, Quality and Reliability M. Xie, G. Y. Hong and C. Wohlin, "A Study of Exponential Smoothing Technique in Software Reliability Growth Prediction", Quality and Reliability Engineering International, Vol.13, pp. 247-353, 1997. 1

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

Software Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives

Software Testing Fundamentals. Software Testing Techniques. Information Flow in Testing. Testing Objectives Software Testing Fundamentals Software Testing Techniques Peter Lo Software Testing is a critical element of software quality assurance and represents the ultimate review of specification, design and coding.

More information

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS

CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS CHAPTER 4 FUZZY LOGIC, K-MEANS, FUZZY C-MEANS AND BAYESIAN METHODS 4.1. INTRODUCTION This chapter includes implementation and testing of the student s academic performance evaluation to achieve the objective(s)

More information

M. Xie, G. Y. Hong and C. Wohlin, "Modeling and Analysis of Software System Reliability", in Case Studies on Reliability and Maintenance, edited by

M. Xie, G. Y. Hong and C. Wohlin, Modeling and Analysis of Software System Reliability, in Case Studies on Reliability and Maintenance, edited by M. Xie, G. Y. Hong and C. Wohlin, "Modeling and Analysis of Software System Reliability", in Case Studies on Reliability and Maintenance, edited by W. Blischke and P. Murthy, Wiley VHC Verlag, Germany,

More information

Satisfactory Peening Intensity Curves

Satisfactory Peening Intensity Curves academic study Prof. Dr. David Kirk Coventry University, U.K. Satisfactory Peening Intensity Curves INTRODUCTION Obtaining satisfactory peening intensity curves is a basic priority. Such curves will: 1

More information

M. Xie, G. Y. Hong and C. Wohlin, "A Practical Method for the Estimation of Software Reliability Growth in the Early Stage of Testing", Proceedings

M. Xie, G. Y. Hong and C. Wohlin, A Practical Method for the Estimation of Software Reliability Growth in the Early Stage of Testing, Proceedings M. Xie, G. Y. Hong and C. Wohlin, "A Practical Method for the Estimation of Software Reliability Growth in the Early Stage of Testing", Proceedings IEEE 7th International Symposium on Software Reliability

More information

You ve already read basics of simulation now I will be taking up method of simulation, that is Random Number Generation

You ve already read basics of simulation now I will be taking up method of simulation, that is Random Number Generation Unit 5 SIMULATION THEORY Lesson 39 Learning objective: To learn random number generation. Methods of simulation. Monte Carlo method of simulation You ve already read basics of simulation now I will be

More information

Aerospace Software Engineering

Aerospace Software Engineering 16.35 Aerospace Software Engineering Verification & Validation Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Would You...... trust a completely-automated nuclear power plant?... trust a completely-automated

More information

Chapter 6: DESCRIPTIVE STATISTICS

Chapter 6: DESCRIPTIVE STATISTICS Chapter 6: DESCRIPTIVE STATISTICS Random Sampling Numerical Summaries Stem-n-Leaf plots Histograms, and Box plots Time Sequence Plots Normal Probability Plots Sections 6-1 to 6-5, and 6-7 Random Sampling

More information

CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP

CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP 31 CHAPTER 3 MAINTENANCE STRATEGY SELECTION USING AHP AND FAHP 3.1 INTRODUCTION Evaluation of maintenance strategies is a complex task. The typical factors that influence the selection of maintenance strategy

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies CODING Good software development organizations normally require their programmers to follow some welldefined and standard style of coding called coding standards. Most software development organizations

More information

7 Fractions. Number Sense and Numeration Measurement Geometry and Spatial Sense Patterning and Algebra Data Management and Probability

7 Fractions. Number Sense and Numeration Measurement Geometry and Spatial Sense Patterning and Algebra Data Management and Probability 7 Fractions GRADE 7 FRACTIONS continue to develop proficiency by using fractions in mental strategies and in selecting and justifying use; develop proficiency in adding and subtracting simple fractions;

More information

Software Complexity Factor in Software Reliability Assessment

Software Complexity Factor in Software Reliability Assessment Software Complexity Factor in Software Reliability Assessment Meng-Lai Yin, Ph.D., ECE department, California Polytechnic University, Pomona Jon Peterson, Raytheon Company, Fullerton Rafael R. Arellano,

More information

Fuzzy based Excitation system for Synchronous Generator

Fuzzy based Excitation system for Synchronous Generator Fuzzy based Excitation system for Synchronous Generator Dr. Pragya Nema Professor, Netaji Subhash Engineering College, Kolkata, West Bangal. India ABSTRACT- Power system stability is essential requirement

More information

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data

Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data Flexibility and Robustness of Hierarchical Fuzzy Signature Structures with Perturbed Input Data B. Sumudu U. Mendis Department of Computer Science The Australian National University Canberra, ACT 0200,

More information

Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks

Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks 1 Maximizing Network Utilization with Max-Min Fairness in Wireless Sensor Networks Avinash Sridharan and Bhaskar Krishnamachari {asridhar,bkrishna}@usc.edu Department of Electrical Engineering University

More information

Chapter - 2 : IMAGE ENHANCEMENT

Chapter - 2 : IMAGE ENHANCEMENT Chapter - : IMAGE ENHANCEMENT The principal objective of enhancement technique is to process a given image so that the result is more suitable than the original image for a specific application Image Enhancement

More information

Design of Experiments for Coatings

Design of Experiments for Coatings 1 Rev 8/8/2006 Design of Experiments for Coatings Mark J. Anderson* and Patrick J. Whitcomb Stat-Ease, Inc., 2021 East Hennepin Ave, #480 Minneapolis, MN 55413 *Telephone: 612/378-9449 (Ext 13), Fax: 612/378-2152,

More information

FUZZY INFERENCE SYSTEMS

FUZZY INFERENCE SYSTEMS CHAPTER-IV FUZZY INFERENCE SYSTEMS Fuzzy inference is the process of formulating the mapping from a given input to an output using fuzzy logic. The mapping then provides a basis from which decisions can

More information

Generalized Network Flow Programming

Generalized Network Flow Programming Appendix C Page Generalized Network Flow Programming This chapter adapts the bounded variable primal simplex method to the generalized minimum cost flow problem. Generalized networks are far more useful

More information

Dinner for Two, Reprise

Dinner for Two, Reprise Fuzzy Logic Toolbox Dinner for Two, Reprise In this section we provide the same two-input, one-output, three-rule tipping problem that you saw in the introduction, only in more detail. The basic structure

More information

Lecture 15 Software Testing

Lecture 15 Software Testing Lecture 15 Software Testing Includes slides from the companion website for Sommerville, Software Engineering, 10/e. Pearson Higher Education, 2016. All rights reserved. Used with permission. Topics covered

More information

SOFTWARE MAINTENANCE: A

SOFTWARE MAINTENANCE: A SOFTWARE MAINTENANCE: A TUTORIAL BY KEITH H. BENNETT 2008.10.13 소프트웨어 200310612 조보경 Software Engineering Field Main problem of software engineering Scale and Complexity of the software Goal of software

More information

Quantitative Analysis of Domain Testing Effectiveness.

Quantitative Analysis of Domain Testing Effectiveness. East Tennessee State University Digital Commons @ East Tennessee State University Electronic Theses and Dissertations 5-200 Quantitative Analysis of Domain Testing Effectiveness. Narendra Koneru East Tennessee

More information

Fuzzy Reasoning. Linguistic Variables

Fuzzy Reasoning. Linguistic Variables Fuzzy Reasoning Linguistic Variables Linguistic variable is an important concept in fuzzy logic and plays a key role in its applications, especially in the fuzzy expert system Linguistic variable is a

More information

Chapter 9. Software Testing

Chapter 9. Software Testing Chapter 9. Software Testing Table of Contents Objectives... 1 Introduction to software testing... 1 The testers... 2 The developers... 2 An independent testing team... 2 The customer... 2 Principles of

More information

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES

CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 70 CHAPTER 3 A FAST K-MODES CLUSTERING ALGORITHM TO WAREHOUSE VERY LARGE HETEROGENEOUS MEDICAL DATABASES 3.1 INTRODUCTION In medical science, effective tools are essential to categorize and systematically

More information

Error Analysis, Statistics and Graphing

Error Analysis, Statistics and Graphing Error Analysis, Statistics and Graphing This semester, most of labs we require us to calculate a numerical answer based on the data we obtain. A hard question to answer in most cases is how good is your

More information

Microscopic Traffic Simulation

Microscopic Traffic Simulation Microscopic Traffic Simulation Lecture Notes in Transportation Systems Engineering Prof. Tom V. Mathew Contents Overview 2 Traffic Simulation Models 2 2. Need for simulation.................................

More information

CS 4387/5387 SOFTWARE V&V LECTURE 4 BLACK-BOX TESTING

CS 4387/5387 SOFTWARE V&V LECTURE 4 BLACK-BOX TESTING 1 CS 4387/5387 SOFTWARE V&V LECTURE 4 BLACK-BOX TESTING Outline 2 Quiz Black-Box Testing Equivalence Class Testing (Equivalence Partitioning) Boundary value analysis Decision Table Testing 1 3 Quiz - 1

More information

1 Introduction Testing seeks to reveal software faults by executing a program and comparing the output expected to the output produced. Exhaustive tes

1 Introduction Testing seeks to reveal software faults by executing a program and comparing the output expected to the output produced. Exhaustive tes Using Dynamic Sensitivity Analysis to Assess Testability Jerey Voas, Larry Morell y, Keith Miller z Abstract: This paper discusses sensitivity analysis and its relationship to random black box testing.

More information

Statistical Testing of Software Based on a Usage Model

Statistical Testing of Software Based on a Usage Model SOFTWARE PRACTICE AND EXPERIENCE, VOL. 25(1), 97 108 (JANUARY 1995) Statistical Testing of Software Based on a Usage Model gwendolyn h. walton, j. h. poore and carmen j. trammell Department of Computer

More information

MTAT : Software Testing

MTAT : Software Testing MTAT.03.159: Software Testing Lecture 03: White-Box Testing (Textbook Ch. 5) Spring 2013 Dietmar Pfahl email: dietmar.pfahl@ut.ee Lecture Chapter 5 White-box testing techniques (Lab 3) Structure of Lecture

More information

UNIT 8: SOLVING AND GRAPHING QUADRATICS. 8-1 Factoring to Solve Quadratic Equations. Solve each equation:

UNIT 8: SOLVING AND GRAPHING QUADRATICS. 8-1 Factoring to Solve Quadratic Equations. Solve each equation: UNIT 8: SOLVING AND GRAPHING QUADRATICS 8-1 Factoring to Solve Quadratic Equations Zero Product Property For all numbers a & b Solve each equation: If: ab 0, 1. (x + 3)(x 5) = 0 Then one of these is true:

More information

Optimal Clustering and Statistical Identification of Defective ICs using I DDQ Testing

Optimal Clustering and Statistical Identification of Defective ICs using I DDQ Testing Optimal Clustering and Statistical Identification of Defective ICs using I DDQ Testing A. Rao +, A.P. Jayasumana * and Y.K. Malaiya* *Colorado State University, Fort Collins, CO 8523 + PalmChip Corporation,

More information

CT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015

CT41 (ALCCS) SOFTWARE ENGINEERING JUN 2015 Q.1 a. What is the role of software engineering? (4) Role of software engineering with reference to producing good quality software, maintainable software, and on time within budget. b. Differentiate between

More information

CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER

CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 60 CHAPTER 4 FREQUENCY STABILIZATION USING FUZZY LOGIC CONTROLLER 4.1 INTRODUCTION Problems in the real world quite often turn out to be complex owing to an element of uncertainty either in the parameters

More information

Data Representation Type of Data Representation Integers Bits Unsigned 2 s Comp Excess 7 Excess 8

Data Representation Type of Data Representation Integers Bits Unsigned 2 s Comp Excess 7 Excess 8 Data Representation At its most basic level, all digital information must reduce to 0s and 1s, which can be discussed as binary, octal, or hex data. There s no practical limit on how it can be interpreted

More information

First Nine Weeks Grade: 8 Subject: Math Year: IN PROGRESS # Days SOL Student Essential Knowledge and Skills 1 Computation and

First Nine Weeks Grade: 8 Subject: Math Year: IN PROGRESS # Days SOL Student Essential Knowledge and Skills 1 Computation and First Nine Weeks Grade: 8 Subject: Math Year: 2017-2018 IN PROGRESS # Days SOL Student Essential Knowledge and Skills 1 Computation and Identify the perfect squares from 0 Estimation to 400. determine

More information

Lecture notes. Com Page 1

Lecture notes. Com Page 1 Lecture notes Com Page 1 Contents Lectures 1. Introduction to Computational Intelligence 2. Traditional computation 2.1. Sorting algorithms 2.2. Graph search algorithms 3. Supervised neural computation

More information

Raymond P.L. Buse and Westley R. Weimer. Presenter: Rag Mayur Chevuri

Raymond P.L. Buse and Westley R. Weimer. Presenter: Rag Mayur Chevuri Raymond P.L. Buse and Westley R. Weimer {buse,weimer}@cs.virginia.edu Presenter: Rag Mayur Chevuri Maintenance consumes 70% of total life cycle cost Reading code Most time-consuming component of maintenance

More information

Statistics: Normal Distribution, Sampling, Function Fitting & Regression Analysis (Grade 12) *

Statistics: Normal Distribution, Sampling, Function Fitting & Regression Analysis (Grade 12) * OpenStax-CNX module: m39305 1 Statistics: Normal Distribution, Sampling, Function Fitting & Regression Analysis (Grade 12) * Free High School Science Texts Project This work is produced by OpenStax-CNX

More information

Fuzzy Intrusion Detection

Fuzzy Intrusion Detection Fuzzy Intrusion Detection John E. Dickerson, Jukka Juslin, Ourania Koukousoula, Julie A. Dickerson Electrical and Computer Engineering Department Iowa State University Ames, IA, USA {jedicker,juslin,koukouso,julied}@iastate.edu

More information

STRUCTURE-BASED software reliability analysis techniques

STRUCTURE-BASED software reliability analysis techniques IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 31, NO. 8, AUGUST 2005 1 A Simulation Approach to Structure-Based Software Reliability Analysis Swapna S. Gokhale, Member, IEEE, and Michael R. Lyu, Fellow,

More information

Practical Design of Experiments: Considerations for Iterative Developmental Testing

Practical Design of Experiments: Considerations for Iterative Developmental Testing Practical Design of Experiments: Considerations for Iterative Developmental Testing Best Practice Authored by: Michael Harman 29 January 2018 The goal of the STAT COE is to assist in developing rigorous,

More information

Software Testing. 1. Testing is the process of demonstrating that errors are not present.

Software Testing. 1. Testing is the process of demonstrating that errors are not present. What is Testing? Software Testing Many people understand many definitions of testing :. Testing is the process of demonstrating that errors are not present.. The purpose of testing is to show that a program

More information

Building Intelligent Learning Database Systems

Building Intelligent Learning Database Systems Building Intelligent Learning Database Systems 1. Intelligent Learning Database Systems: A Definition (Wu 1995, Wu 2000) 2. Induction: Mining Knowledge from Data Decision tree construction (ID3 and C4.5)

More information

* The terms used for grading are: - bad - good

* The terms used for grading are: - bad - good Hybrid Neuro-Fuzzy Systems or How to Combine German Mechanics with Italian Love by Professor Michael Negnevitsky University of Tasmania Introduction Contents Heterogeneous Hybrid Systems Diagnosis of myocardial

More information

Verification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process

Verification and Validation. Assuring that a software system meets a user s needs. Verification vs Validation. The V & V Process Verification and Validation Assuring that a software system meets a user s needs Ian Sommerville 1995/2000 (Modified by Spiros Mancoridis 1999) Software Engineering, 6th edition. Chapters 19,20 Slide 1

More information

Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules

Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules Distinguishing the Noise and image structures for detecting the correction term and filtering the noise by using fuzzy rules Sridevi.Ravada Asst.professor Department of Computer Science and Engineering

More information

Hashing. Hashing Procedures

Hashing. Hashing Procedures Hashing Hashing Procedures Let us denote the set of all possible key values (i.e., the universe of keys) used in a dictionary application by U. Suppose an application requires a dictionary in which elements

More information

CHAPTER 4 MAINTENANCE STRATEGY SELECTION USING TOPSIS AND FUZZY TOPSIS

CHAPTER 4 MAINTENANCE STRATEGY SELECTION USING TOPSIS AND FUZZY TOPSIS 59 CHAPTER 4 MAINTENANCE STRATEGY SELECTION USING TOPSIS AND FUZZY TOPSIS 4.1 INTRODUCTION The development of FAHP-TOPSIS and fuzzy TOPSIS for selection of maintenance strategy is elaborated in this chapter.

More information

Bootstrapping Method for 14 June 2016 R. Russell Rhinehart. Bootstrapping

Bootstrapping Method for  14 June 2016 R. Russell Rhinehart. Bootstrapping Bootstrapping Method for www.r3eda.com 14 June 2016 R. Russell Rhinehart Bootstrapping This is extracted from the book, Nonlinear Regression Modeling for Engineering Applications: Modeling, Model Validation,

More information

Performance Estimation and Regularization. Kasthuri Kannan, PhD. Machine Learning, Spring 2018

Performance Estimation and Regularization. Kasthuri Kannan, PhD. Machine Learning, Spring 2018 Performance Estimation and Regularization Kasthuri Kannan, PhD. Machine Learning, Spring 2018 Bias- Variance Tradeoff Fundamental to machine learning approaches Bias- Variance Tradeoff Error due to Bias:

More information

OPTIMISATION OF PIN FIN HEAT SINK USING TAGUCHI METHOD

OPTIMISATION OF PIN FIN HEAT SINK USING TAGUCHI METHOD CHAPTER - 5 OPTIMISATION OF PIN FIN HEAT SINK USING TAGUCHI METHOD The ever-increasing demand to lower the production costs due to increased competition has prompted engineers to look for rigorous methods

More information

Agile Mind Mathematics 6 Scope and Sequence, Indiana Academic Standards for Mathematics

Agile Mind Mathematics 6 Scope and Sequence, Indiana Academic Standards for Mathematics In the three years prior Grade 6, students acquired a strong foundation in numbers and operations, geometry, measurement, and data. Students are fluent in multiplication of multi-digit whole numbers and

More information

Algebra II Chapter 4: Quadratic Functions and Factoring Part 1

Algebra II Chapter 4: Quadratic Functions and Factoring Part 1 Algebra II Chapter 4: Quadratic Functions and Factoring Part 1 Chapter 4 Lesson 1 Graph Quadratic Functions in Standard Form Vocabulary 1 Example 1: Graph a Function of the Form y = ax 2 Steps: 1. Make

More information

Support Vector Regression for Software Reliability Growth Modeling and Prediction

Support Vector Regression for Software Reliability Growth Modeling and Prediction Support Vector Regression for Software Reliability Growth Modeling and Prediction 925 Fei Xing 1 and Ping Guo 2 1 Department of Computer Science Beijing Normal University, Beijing 100875, China xsoar@163.com

More information

Students will understand 1. that numerical expressions can be written and evaluated using whole number exponents

Students will understand 1. that numerical expressions can be written and evaluated using whole number exponents Grade 6 Expressions and Equations Essential Questions: How do you use patterns to understand mathematics and model situations? What is algebra? How are the horizontal and vertical axes related? How do

More information

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations I

C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S. Image Operations I T H E U N I V E R S I T Y of T E X A S H E A L T H S C I E N C E C E N T E R A T H O U S T O N S C H O O L of H E A L T H I N F O R M A T I O N S C I E N C E S Image Operations I For students of HI 5323

More information

Chapter 6 Continued: Partitioning Methods

Chapter 6 Continued: Partitioning Methods Chapter 6 Continued: Partitioning Methods Partitioning methods fix the number of clusters k and seek the best possible partition for that k. The goal is to choose the partition which gives the optimal

More information

Problem Set 3 CMSC 426 Due: Thursday, April 3

Problem Set 3 CMSC 426 Due: Thursday, April 3 Problem Set 3 CMSC 426 Due: Thursday, April 3 Overview: This problem set will work a little different. There will be a standard part, and an advanced part. Students may choose to do either part. Alternately,

More information

CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY

CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 23 CHAPTER 3 AN OVERVIEW OF DESIGN OF EXPERIMENTS AND RESPONSE SURFACE METHODOLOGY 3.1 DESIGN OF EXPERIMENTS Design of experiments is a systematic approach for investigation of a system or process. A series

More information

Object Oriented Programming Using C++ Mathematics & Computing IET, Katunayake

Object Oriented Programming Using C++ Mathematics & Computing IET, Katunayake Assigning Values // Example 2.3(Mathematical operations in C++) float a; cout > a; cout

More information

Chapter 4. The Classification of Species and Colors of Finished Wooden Parts Using RBFNs

Chapter 4. The Classification of Species and Colors of Finished Wooden Parts Using RBFNs Chapter 4. The Classification of Species and Colors of Finished Wooden Parts Using RBFNs 4.1 Introduction In Chapter 1, an introduction was given to the species and color classification problem of kitchen

More information

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset.

Analytical model A structure and process for analyzing a dataset. For example, a decision tree is a model for the classification of a dataset. Glossary of data mining terms: Accuracy Accuracy is an important factor in assessing the success of data mining. When applied to data, accuracy refers to the rate of correct values in the data. When applied

More information

2014, IJARCSSE All Rights Reserved Page 1084

2014, IJARCSSE All Rights Reserved Page 1084 Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Classification

More information

Department Curriculum Map (new GCSE)

Department Curriculum Map (new GCSE) Department Curriculum Map 2014-15 (new GCSE) Department Mathematics required in Year 11 Foundation 1. Structure and calculation: N1 to N9 Fractions, decimals and percentages: N10 to N12 Measure and accuracy:

More information

The Comparative Software Reliability Cost Model based on Generalized Goel-NHPP Model

The Comparative Software Reliability Cost Model based on Generalized Goel-NHPP Model Vol.67 (Software 204), pp.96-00 http://dx.doi.org/0.4257/astl.204.67.23 The Comparative Software Reliability Cost Model based on Generalized Goel-NHPP Model Hee-Cheul Kim, Jeong-Beom Kim 2 Department of

More information

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION

CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION CHAPTER 6 MODIFIED FUZZY TECHNIQUES BASED IMAGE SEGMENTATION 6.1 INTRODUCTION Fuzzy logic based computational techniques are becoming increasingly important in the medical image analysis arena. The significant

More information

Year 8 Review 1, Set 1 Number confidence (Four operations, place value, common indices and estimation)

Year 8 Review 1, Set 1 Number confidence (Four operations, place value, common indices and estimation) Year 8 Review 1, Set 1 Number confidence (Four operations, place value, common indices and estimation) Place value Digit Integer Negative number Difference, Minus, Less Operation Multiply, Multiplication,

More information

Chapter 10 Verification and Validation of Simulation Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation

Chapter 10 Verification and Validation of Simulation Models. Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Chapter 10 Verification and Validation of Simulation Models Banks, Carson, Nelson & Nicol Discrete-Event System Simulation Purpose & Overview The goal of the validation process is: To produce a model that

More information

Exploring Econometric Model Selection Using Sensitivity Analysis

Exploring Econometric Model Selection Using Sensitivity Analysis Exploring Econometric Model Selection Using Sensitivity Analysis William Becker Paolo Paruolo Andrea Saltelli Nice, 2 nd July 2013 Outline What is the problem we are addressing? Past approaches Hoover

More information

Diocese of Boise Math Curriculum 6 th grade

Diocese of Boise Math Curriculum 6 th grade Diocese of Boise Math Curriculum 6 th grade compute fractions? When do we use Roman Numerals? Numbers, Operations Algebraic Thinking Know use number names the count sequence Use properties of multiplicatio

More information

SELECTION OF A MULTIVARIATE CALIBRATION METHOD

SELECTION OF A MULTIVARIATE CALIBRATION METHOD SELECTION OF A MULTIVARIATE CALIBRATION METHOD 0. Aim of this document Different types of multivariate calibration methods are available. The aim of this document is to help the user select the proper

More information

DLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR

DLD VIDYA SAGAR P. potharajuvidyasagar.wordpress.com. Vignana Bharathi Institute of Technology UNIT 3 DLD P VIDYA SAGAR DLD UNIT III Combinational Circuits (CC), Analysis procedure, Design Procedure, Combinational circuit for different code converters and other problems, Binary Adder- Subtractor, Decimal Adder, Binary Multiplier,

More information

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES

DESIGN AND ANALYSIS OF ALGORITHMS. Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES DESIGN AND ANALYSIS OF ALGORITHMS Unit 1 Chapter 4 ITERATIVE ALGORITHM DESIGN ISSUES http://milanvachhani.blogspot.in USE OF LOOPS As we break down algorithm into sub-algorithms, sooner or later we shall

More information

Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment.

Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. SOFTWARE ENGINEERING SOFTWARE RELIABILITY Software reliability is defined as the probability of failure-free operation of a software system for a specified time in a specified environment. LEARNING OBJECTIVES

More information

Chapter 8 Software Testing. Chapter 8 Software testing

Chapter 8 Software Testing. Chapter 8 Software testing Chapter 8 Software Testing 1 Topics covered Introduction to testing Stages for testing software system are: Development testing Release testing User testing Test-driven development as interleave approach.

More information

Middle School Math Course 3

Middle School Math Course 3 Middle School Math Course 3 Correlation of the ALEKS course Middle School Math Course 3 to the Texas Essential Knowledge and Skills (TEKS) for Mathematics Grade 8 (2012) (1) Mathematical process standards.

More information

Middle School Math Course 3 Correlation of the ALEKS course Middle School Math 3 to the Illinois Assessment Framework for Grade 8

Middle School Math Course 3 Correlation of the ALEKS course Middle School Math 3 to the Illinois Assessment Framework for Grade 8 Middle School Math Course 3 Correlation of the ALEKS course Middle School Math 3 to the Illinois Assessment Framework for Grade 8 State Goal 6: Number Sense 6.8.01: 6.8.02: 6.8.03: 6.8.04: 6.8.05: = ALEKS

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 13 Random Numbers and Stochastic Simulation Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright

More information

CHAPTER 9: Quadratic Equations and Functions

CHAPTER 9: Quadratic Equations and Functions Notes # CHAPTER : Quadratic Equations and Functions -: Exploring Quadratic Graphs A. Intro to Graphs of Quadratic Equations: = ax + bx + c A is a function that can be written in the form = ax + bx + c

More information

MODEL FOR DELAY FAULTS BASED UPON PATHS

MODEL FOR DELAY FAULTS BASED UPON PATHS MODEL FOR DELAY FAULTS BASED UPON PATHS Gordon L. Smith International Business Machines Corporation Dept. F60, Bldg. 706-2, P. 0. Box 39 Poughkeepsie, NY 12602 (914) 435-7988 Abstract Delay testing of

More information

Verification and Validation. Verification and validation

Verification and Validation. Verification and validation Verification and Validation Verification and validation Verification and Validation (V&V) is a whole life-cycle process. V&V has two objectives: Discovery of defects, Assessment of whether or not the system

More information

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,

More information

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013!

Testing! Prof. Leon Osterweil! CS 520/620! Spring 2013! Testing Prof. Leon Osterweil CS 520/620 Spring 2013 Relations and Analysis A software product consists of A collection of (types of) artifacts Related to each other by myriad Relations The relations are

More information

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching

Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota

More information