Schedule Risk Analysis Simulator using Beta Distribution
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 6
Abstract
This paper describes an application of simulation and Modelling in Software risk management. This paper describes a simulation based software risk management tool which helps manager to identify high risk areas of software process. In this paper an endeavour has been made to build up a Stochastic Simulator which helps in decision making to identify the critical activities which are given due priorities during the development of Software Project. In response to new information or revised estimates, it may be necessary to reassign resources, cancel optional tasks, etc. Project management tools that make projections while treating decisions about tasks and resource assignments as static will not yield realistic results. The usual PERT procedure may lead to overly optimistic results as many pass which are not critical but slightly shorter than critical on the basis of estimated activity duration or average durations. Due to randomness of durations, these pass under some combination of activity durations, could become longer than the average longest path. Such paths would be ignored while using the PERT technique on the basis of the average durations. In order to overcome this problem and be more reasonable, the said Stochastic Simulator has been designed by generating random samples from a specific probability distribution associated with that particular activity of SPM. The said simulator is also not bugged with overly estimated results.
Authors and Affiliations
Isha Sharma , Dr. P. K. Suri
An Analysis of Irregularities in Devanagari Script Writing – A Machine Recognition Perspective
Abstract— This paper deals with the theoretical analysis of Devanagari script according to machine recognition perspective. An individual having good knowledge of the script of a language can easily read some words writt...
Dynamic Signature Verification System Using Statistics Analysis
In this paper, a new technique for dynamic signature modeling and classification framework is proposed. Raw dynamic data obtained from a digitizer are analyzed using statistic tools. The variation within the same person...
A Survey on the Applications of Bee Colony Optimization Techniques
In this paper an overview of the areas where the Bee Colony Optimization (BCO) and its variants are applied have been given. Bee System was identified by Sato and Hagiwara in 1997 and the Bee Colony Optimization (BCO) wa...
Justified Cross-Site Scripting Attacks Prevention from Client-Side
Web apps are fetching towards the overriding way to offer access to web services. In parallel, vulnerabilities of web application are being revealed and unveiled at an frightening rate. Web apps frequently make JavaScrip...
Analyzing security of Authenticated Routing Protocol (ARAN)
Ad hoc network allow nodes to communicate beyond their irect wireless transmission range by introducing cooperation in mobile computer (nodes). Many proposed routing protocol or ad hoc network operate in an ad hoc fashio...