The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on study of risk assessment models on domestic and foreign countries' software projects, this paper adopted Fuzzy Analytic Hierarchy Process to establish the risk assessment model for software projects, so as to realize the effective risk assessment on software projects.
In order to effectively control the risk of software project and overcome the effect of lack data and human subjective factors in the traditional evaluation, the transformation of quantification and reduction of natural language is realized, so a new evaluation model is put forward. Based on the concepts of risk weight, expert trust, risk consequence and so on, we use the correlation coefficient to...
This paper studies a sensitivity analysis of the software project risk assessment model based on data envelopment analysis. Some sufficient conditions and necessary conditions are provided which can hold the efficiency of decision making units, when positive index data and reverse index data of decision making units are changed simultaneously. Finally, a numerical example is presented to give an illustration...
Focus on the risk management for the modern weapon equipment development projects, the intuitionistic fuzzy group decision-making ranking process is proposed in this paper to achieve a further risk ranking for the risks with the same risk exponent, making the ranking results more accurate and scientific. In this process, assessments are made on the risks' occurring possibility and the consequences...
For the reason of the complexity of software projects and the uncertainty of software risk factors, it is difficult to use a mathematical expression to represent the model of risk assessment. It belongs to the classification of nonlinear. In this paper, we established the evaluation model of software project risk based on BP neural network. Firstly, an evaluation index system of software project risk...
the safety assessment index system is established on the elements of mobile payment system and hierarchical structure of software risk assessment. In order to make up for the deficiencies of traditional risk methods and adapt to fuzzy description in mobile payment system, the hierarchical safety assessment model is developed with the extension theory as the core. The extension method converts the...
Recently, software functional size becomes larger, and consequently, not only a software developer but also a software purchaser suffers considerable losses by software project failure. So avoiding project failure is also important for purchasers. Project supervision (monitoring and control) is expected for the purchaser to suppress risk of project failure. It is performed by sharing software metrics...
According to the diversity of software development risk, the complication of evaluation indexes and the comprehensive evaluation hardly with the present evaluation method, the software development risk was divided into three grade indexes. 13 risk evaluation indexes were constructed based on the different stage of real situation in the course of software development. Based on the grey decision-making...
In the development of complex systems the requirements for the system will almost always remain uncertain late into the software development. In gas turbine engine control systems at Rolls-Royce, typically 50% of requirements will change between Critical Design Review and Entry into Service. Ignoring or not planning for requirements uncertainty will cause scrap and rework that will manifest later...
Due to its adaptation to environmental change and market competition, the organizational form of dynamic alliance has been developing rapidly in recent years, but it also brings significant risk to enterprises. Taking into account the interaction and feedback relationships between criteria/indices, an index system for evaluating the risk of dynamic alliance is presented. Considering the vagueness...
Currently, information appears on the business environment as an active creator of value and benefits [8]. The heavy use of computing resources to process and store the information has heightened the dependency of organizations regarding to their IT infrastructure. This becomes critical when we know that all systems have vulnerabilities that could jeopardize the entire business activity. So, despite...
This paper discusses how evaluate effectiveness of investment concerning safety protection measures from the aspect of the total life cycle cost of machine and manufacturing system. From an economic perspective, protection measures have been treated as a cost traditionally, rather than an investment. To have Enterprise management motivated to move forward to execute investment for safety protection...
With the development of the country and the acceleration of information technology, the information security issues is highly growing. In order to efficiently evaluate the information security risk, the information system security risk assessment model based on Fuzzy AHP method is proposed. In this paper, firstly, we use multi-layer structure and elation matrix is introduced to describe the interrelationship...
One major objective of maintenance management activities in electrical distribution systems is to find the right level of investments. Within an MSc thesis project at KTH, the probabilistic reliability software RACalc has been developed to support the decision making in the distribution system maintenance planning and risk analysis. This paper describes the algorithms in RACalc and shows on present...
The existence and orientation of risks in a software development life cycle is a fundamental truth despite the effort that we incur in eliminating them. Having known that, risks can be reduced but can't be eliminated completely; gives strength yields the thinking to focus on the avoidance and mitigation in software development. The mitigation and avoidance both: require the risk factors to be identified...
With the rapid development of urbanization, the importance of city power grids safety has been gradually recognized. Given a full consideration for the characteristics of city power grids, we design a complete set of risk evaluation index system based on probability theory by employing risk theory and analytic hierarchy process (AHP) in power system online static security risk assessment. Further,...
Operating room (OR) sessions planning is often critical, due to potential clinical consequences of errors, while access to surgery often follows non transparent prioritization. In previous projects we designed the Surgical Waiting List InfoSystem (SWALIS) model to prioritize elective waiting lists. In the present study we present further modeling work, aiming at building instruments to plan OR session...
The power construction project is characterized by long period and a large sum of investment as well as its investment effect is likely to be confined by considerable conditions. Consequently, the power construction project is the project of high risk, without any doubt. This thesis analyses the risk factors in the power construction projects with making the assessment of the power construction projects...
The paper establishes a framework for software project risk management and presents a method for risk priority management as a module in the system on the basis of Risk Management Information System. It provides a possible framework for the construction of a concrete database including a possible list of risks and fields of risk description as well as an empirical research on the identification of...
A model of risk assessment is introduced to the estimation of software project. The model combines AHP method and entropy method to confirm the risk weight of software project, and then use the combined weight and grey correlation analysis method to calculate the improved grey correlation degree. Finally, through introducing preference coefficient, grey approach degree of the risk of software project...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.