Schedule Risk Analysis Simulator using Beta Distribution
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
This paper describes an application of simulation and Modelling in Software risk management. This paper describes a simulation based software risk management tool which helps manager to identify high risk areas of software process. In this paper an endeavour has been made to build up a Stochastic Simulator which helps in decision making to identify the critical activities which are given due priorities during the development of Software Project. In response to new information or revised estimates, it may be necessary to reassign resources, cancel optional tasks, etc. Project management tools that make projections while treating decisions about tasks and resource assignments as static will not yield realistic results. The usual PERT procedure may lead to overly optimistic results as many pass which are not critical but slightly shorter than critical on the basis of estimated activity duration or average durations. Due to randomness of durations, these pass under some combination of activity durations, could become longer than the average longest path. Such paths would be ignored while using the PERT technique on the basis of the average durations. In order to overcome this problem and be more reasonable, the said Stochastic Simulator has been designed by generating random samples from a specific probability distribution associated with that particular activity of SPM. The said simulator is also not bugged with overly estimated results.
Authors and Affiliations
Isha Sharma , Dr. P. K. Suri
Identification and Removal of Impulsive noise using Hypergraph Model
Image noise is unwanted information of an image. Noise can occur during image capture, transmission, or processing and it may depend or may not depend on image content.. In order to remove the noise from the noisy image,...
Preserving the Privacy and Sharing the Data using Classification on Perturbed Data
Data mining is a powerful tool which supports automatic extraction of unknown patterns from large amounts of data. The knowledge extracted by data mining process support a variety of domains like marketing, weather forec...
MRI Brain Image Segmentation Algorithm Using Watershed Transform and Kernel Fuzzy C-Means Clustering on Level Set Method
A new method for image segmentation is proposed in this paper, which combines the watershed transform, KFCM and level set method. The watershed transform is first used to presegment the image so as to get the initial par...
An Efficient Autoadaptive Edge Detection Approach for Flame and Fire Images
The determination of flame or fire edges is the process of identifying a boundary between the area where there is thermo-chemical reaction and those without. It is a precursor to image-based flame monitoring, early fire...
Analysis and Simulations of Routing Protocols with Different Load Conditions of MANETs
In this paper, we have compared important characteristics of MANET proactive routing protocol (DSDV), reactive protocols (AODV, DSR and TORA) and hybrid protocol (ZRP). Extensive simulations are being carried out with di...