• Title/Summary/Keyword: Software Size

Search Result 1,518, Processing Time 0.028 seconds

A Fuzzy Logic Based Software Development Cost Estimation Model with improved Accuracy

  • Shrabani Mallick;Dharmender Singh Kushwaha
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.17-22
    • /
    • 2024
  • Software cost and schedule estimation is usually based on the estimated size of the software. Advanced estimation techniques also make use of the diverse factors viz, nature of the project, staff skills available, time constraints, performance constraints, technology required and so on. Usually, estimation is based on an estimation model prepared with the help of experienced project managers. Estimation of software cost is predominantly a crucial activity as it incurs huge economic and strategic investment. However accurate estimation still remains a challenge as the algorithmic models used for Software Project planning and Estimation doesn't address the true dynamic nature of Software Development. This paper presents an efficient approach using the contemporary Constructive Cost Model (COCOMO) augmented with the desirable feature of fuzzy logic to address the uncertainty and flexibility associated with the cost drivers (Effort Multiplier Factor). The approach has been validated and interpreted by project experts and shows convincing results as compared to simple algorithmic models.

Maximum Stack Memory Usage Estimation Through Target Binary File Analysis in Microcontroller Environment (마이크로컨트롤러 환경에서 타깃 바이너리 파일 분석을 통한 최대 스택 메모리 사용량 예측 기법)

  • Choi, Kiho;Kim, Seongseop;Park, Daejin;Cho, Jeonghun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.3
    • /
    • pp.159-167
    • /
    • 2017
  • Software safety is a key issue in embedded system of automotive and aviation industries. Various software testing approaches have been proposed to achieve software safety like ISO26262 Part 6 in automotive environment. In spite of one of the classic and basic approaches, stack memory is hard to estimating exactly because of uncertainty of target code generated by compiler and complex nested interrupt. In this paper, we propose an approach of analyzing the maximum stack usage statically from target binary code rather than the source code that also allows nested interrupts for determining the exact stack memory size. In our approach, determining maximum stack usage is divided into three steps: data extraction from ELF file, construction of call graph, and consideration of nested interrupt configurations for determining required stack size from the ISR (Interrupt Service Routine). Experimental results of the estimation of the maximum stack usage shows proposed approach is helpful for optimizing stack memory size and checking the stability of the program in the embedded system that especially supports nested interrupts.

An Approach to Promote the Public Sector System Integration Market in Korea (공공 System Integration 시장의 활성화 방안)

  • Choi, Se-Ill
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1725-1732
    • /
    • 2013
  • This paper deals with an approach to boost the public sector SI market in Korea. In order to promote competition powers of the software industry in Korea, a software industry promotion law has been issued, which restricts large SI companies from competing in the public sector system integration market. However, naturally many SI projects in public sectors are too large and complicated to be carried by small and medium size companies. This paper proposes an approach to reform the SI market for those small and medium size SI companies.

Bridging the Gap: Follow-up Strategies for Effective Software Architecture Implementation

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.1-10
    • /
    • 2024
  • Software architecture are High-level design decisions shaping a software system's components, structure, and interactions. It can be a blueprint for development, evolution, and ongoing maintenance. This research investigates the communication practices employed by software architects and developers to ensure adherence to the designed software architecture. It explores the factors influencing the selection of follow-up methods and the impact of follow-up frequency on successful implementation. Findings reveal that formalized follow-up procedures are not yet a ubiquitous element within the software development lifecycle. While electronic communication, particularly email, appears to be the preferred method for both architects and developers, physical and online meetings are utilized less frequently. Interestingly, the study suggests a potential confidence gap, with architects expressing concerns about developers' ability to faithfully implement the architecture. This may lead to architects providing additional clarification. Conversely, while most developers reported confidence in their software knowledge, overly detailed architecture documentation may pose challenges, highlighting the need for architects to consider alternative communication strategies. A key limitation of this study is the sample size, restricting the generalizability of the conclusions. However, the research offers valuable preliminary insights into the communication practices employed for architecture implementation, paving the way for further investigation with a larger and more diverse participant pool.

Software Bundling for Competitive Advantage: Vendor Strategies and Public Policy Implications

  • Kim, Tae-Ha;Shin, Hyung-Deok;Dutta, Amitava
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.39-62
    • /
    • 2010
  • As an engineered product, a software package has multiple dimensions that must be designed judiciously to enhance its competitive viability. Functionality, reliability and price are three such common dimensions. However, many software products are sold as bundles of individual components and the competitive impact of bundling has received less attention in the research literature. In this paper, we examine the implications of software vendors using bundling as an element of competitive strategy. A game theoretic model of the actions of an incumbent and a new entrant is developed and the impact on vendor and consumer welfare is analyzed. Numerical experiments with the model show that (i) increasing bundle size is an effective strategy for the incumbent to increase its payoff at the cost of the entrant's payoff and consumer surplus, especially when the entrant's quality is low (ii) in the presence of bundling, the entrant can still increase its own payoff and consumer surplus at the cost of the incumbent's payoff, by increasing product quality up to the level that best segments market demand with the incumbent and (iii) an increase in bundle size by the incumbent, or an increase in quality by the entrant, can both result in an increase of total surplus. Similar results are observed in a related case where the entrant offers free software bundles. Our results provide insights into how software vendors may strategically use bundling and quality as additional product dimensions in order to stay competitive in the market. These results also inform the competing vendors of the impact of bundling related public policy actions on their respective payoffs.

Use Case Points Estimation for the Software Cost Appraisal (소프트웨어 개발비 감정을 위한 유스케이스 점수 추정)

  • Kwon, Ki-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.27-36
    • /
    • 2020
  • The software development cost appraisal is treated as a part of the program completion appraisal, and the software engineering methodology is applied. In particular, software cost estimation techniques have been actively applied. For more information about the software development costs calculation, we can refer to the "SW cost estimation guide". Although successful appraisal of a number of development costs based on the guide has been processed, but a number of cases requiring discussion of appraisal results have been discovered. In this study, we propose a use case-based size estimation method to maintain the accuracy and consistency of size estimation. As a result of performing performance evaluation of the proposed method in an environment similar to the development cost appraisal case, it was proved that the accuracy was improved over the existing function points method.

A Study on Lean-SMAIS Methodology for Field Work Improvement - By using ProEye Software - (현장작업 개선을 위한 Lean-SMAIS 방법론 연구 -프로아이(ProEye) 소프트웨어 활용 중심으로-)

  • Park, Chang-Do;Ree, Sang-Bok
    • Journal of Korean Society for Quality Management
    • /
    • v.40 no.2
    • /
    • pp.166-175
    • /
    • 2012
  • Enterprises are continuously trying management innovation activities for survival. Among representative management innovation activities in domestic manufacture enterprise, which are TPS, 6 sigma, Lean 6 sigma etc. Many enterprises through these reform activity have gotten good result. However, these techniques have merits and demerits according to circumstance of enterprise. Specially, there are a lot of difficulties in medium and small size enterprises. In this research, We introduce Lean-SMAIS Method for medium and small size enterprises that is consists of the merit of lean 6 sigma and software(which is called ProEye). We prove Lean-SMAIS method is useful by applying medium and small size enterprise A company.

Country Clustering Based on Environmental Factors Influencing on Software Piracy (소프트웨어 불법복제에 영향을 미치는 환경 요인에 기반한 국가 분류)

  • Suh, Bomil;Shim, Junho
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.227-246
    • /
    • 2017
  • Purpose: As the importance of software has been emphasized recently, the size of the software market is continuously expanding. The development of the software market is being adversely affected by software piracy. In this study, we try to classify countries around the world based on the macro environmental factors, which influence software piracy. We also try to identify the differences in software piracy for each classified type. Design/methodology/approach: The data-driven approach is used in this study. From the BSA, the World Bank, and the OECD, we collect data from 1990 to 2015 for 127 environmental variables of 225 countries. Cronbach's ${\alpha}$ analysis, item-to-total correlation analysis, and exploratory factor analysis derive 15 constructs from the data. We apply two-step approach to cluster analysis. The number of clusters is determined to be 5 by hierarchical cluster analysis at the first step, and the countries are classified by the K-means clustering at the second step. We conduct ANOVA and MANOVA in order to verify the differences of the environmental factors and software piracy among derived clusters. Findings: The five clusters are identified as underdeveloped countries, developing countries, developed countries, world powers, and developing country with large market. There are statistically significant differences in the environmental factors among the clusters. In addition, there are statistically significant differences in software piracy rate, pirated value, and legal software sales among the clusters.

An Optimized CLBP Descriptor Based on a Scalable Block Size for Texture Classification

  • Li, Jianjun;Fan, Susu;Wang, Zhihui;Li, Haojie;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.288-301
    • /
    • 2017
  • In this paper, we propose an optimized algorithm for texture classification by computing a completed modeling of the local binary pattern (CLBP) instead of the traditional LBP of a scalable block size in an image. First, we show that the CLBP descriptor is a better representative than LBP by extracting more information from an image. Second, the CLBP features of scalable block size of an image has an adaptive capability in representing both gross and detailed features of an image and thus it is suitable for image texture classification. This paper successfully implements a machine learning scheme by applying the CLBP features of a scalable size to the Support Vector Machine (SVM) classifier. The proposed scheme has been evaluated on Outex and CUReT databases, and the evaluation result shows that the proposed approach achieves an improved recognition rate compared to the previous research results.

Development of a Computer Software System for Improving Chick Breeder (우량종계 육종을 위한 컴퓨터 소프트웨어 시스템 개발에 관한 연구)

  • 최연호;조상문;장종준
    • Korean Journal of Poultry Science
    • /
    • v.22 no.1
    • /
    • pp.15-31
    • /
    • 1995
  • This study was carried out to develop a computer software system for poultry breeding by using microcomputer(PC). Through this study, SPPB(Statistical Package for Poultry Breeding) was designed and developed, which can help poultry breeder collect and analyse the chick records. A main feature of the system was the application of user-oriented procedure, for example, choice of the flock file, selection of the family size and the desired traits. Creation of the data files and the breeding files. calculation of the elementary statistics, estimation of the heritability and the genetic and phenotypic correlation coefficients can be obtained by user's choice of the sire and dam family size. Also, it is possible to estimate the various selection indices through this system. Easiness of using this system and the flexibility of the file management could help increasing the efficiency of related practical poultry breeding jobs. Correctness and relationships between the unit programs in the system were proved through the run-test of the SPPB using sample data. Because it wasn't able to collect breeding records at the commercial breeding farm, effectiveness of the system was not proved totally. Also. it will be necessary to develop the integrated software system which make possible to computerize the general works at breeding farm and the genetic analyses of the records from chick breeders.

  • PDF