Abstract
Purpose
This paper attempts to put forward a convincing and flexible grey cluster method that can be used in confirming credibility level of trustworthy software development process.
Design/methodology/approach
Determination on credibility level in the software development process is dynamic, as credibility of the results may be different at different times and under different project requirements. Qualitative methods are not entirely convincing, and most quantitative methods are not flexible enough. Grey cluster based on nonlinear grey whitening weight function put forward in this paper is both convincing and flexible. Finally eight projects from the ISBSG database are used for empirical analysis, which confirm that the method put forward in this paper is available and credible.
Findings
The results are convincing: not only that grey cluster based on nonlinear grey whitening weight function put forward in this paper is both convincing and flexible, but it can be used in confirming credibility level of trustworthy software development process.
Practical implications
Eight projects from the ISBSG database are used for empirical analysis, which confirms that the method put forward in this paper is available and credible.
Originality/value
Nonlinear grey whitening weight function is derivable except endpoint. Grey cluster based on nonlinear grey whitening weight function put forward in this paper is both convincing and flexible.
Keywords
Citation
Mi, C., Tian, M. and Li, X. (2012), "Study on credibility level of trustworthy software development process based on grey nonlinear cluster", Kybernetes, Vol. 41 No. 7/8, pp. 908-919. https://doi.org/10.1108/03684921211257757
Publisher
:Emerald Group Publishing Limited
Copyright © 2012, Emerald Group Publishing Limited
1 Introduction
With software functional requirements and increasing level of improvement, software systems become increasingly complex and large. Therefore, what are bound to increase are the loopholes and flaws. In the development process, the developer will bring some risk of loss, in the course, users can also assume that failure to bring the risk of loss. The international software design and use of defects as a result of accidents and loss are common. Thus, credibility in use and the process of software development have become a widespread international concern. Analysis of credibility in the process of software development and use is particularly important.
There are many researchers who have researched risk in software. Chittister and Haimes (1993) studied software development risk using holographic modeling from function, source and process three dimensions. Bannerman (2008) studied risk and risk management in software from a reassessment point of view. Huang et al. (2008) presented a software reliability index model based on Bayesian network. Shi et al. (2010) proposed a fuzzy AHP and fuzzy multi‐attribute decision making model for assessment of the model. Lang et al. (2010) established software credible evidence reference model. Cheng et al. (2010) analyzed China's credibility of software industry and puts forward strategies for promoting China's software industry development. Houmb et al. (2010) studied a quantifying method to security risk level from CVSS estimates of frequency and impact.
Grey cluster is an important part of grey system theory, and it is used in assessment and decision analysis commonly. Grey whiting weight function cluster, which is used widely, is a kind of grey cluster. Determination of the whitening weight function is mainly based on expertise's experience, and there is a little existing research on whitening weight function. Wang (1987) proposed a new grey relational analysis mode (B‐mode). Tang (1996) put forward experience value method and mean value method, and examples ware used to prove that average method is superior to experience. Experience value method's downside is it can be influenced by human factors. Zhang and Liu (2007) examined the turning point in albino choice of weight function. Dong et al. (2010) researched the determination of the whitening weight function and gave the general steps. Mi et al. (2007) studied grey cluster with two‐tuple linguistic assessment method.
In this paper, nonlinear whitening weight function is built by nonlinear function. Grey clustering method steps are given and are applied into software development process.
2 Nonlinear grey whitening weight function
Let n Clustering objects, m clustering indexes, s grey types. According to the observation data xij(i=1, 2, … , n, j=1, 2, … , m) about jth (j=1, 2, … , m) index of ith (i=1, 2, … , n) object, classify ith object into kth (k∈{1, 2, … , s}) grey type. This is called grey clustering.
Definition 1
Classify jth (j=1, 2, … , m) index of n clustering objects into s grey types. This is subclasses of jth (j=1, 2, … , m) index. Whitening weight function for jth index belonging into kth (k∈{1, 2, … , s}) grey type is fjk(x).
Definition 2. (typical nonlinear grey whitening weight function)
Let whitening weight function for jth index belonging into kth (k∈{1, 2, … , s}) grey type is fjk(x) which is typical nonlinear grey whitening weight function (Figure 1).
xjk(1), xjk(2), xjk(3), xjk(4) are turning points of fjk(x). Typical nonlinear grey whitening weight function notes for fjk[xjk(1),xjk(2),xjk(3),xjk(4)], whose formula is: Equation 1
Definition 3.
- •
If nonlinear grey whitening weight function fjk(x) does not have the first and second turning points xjk(1), xjk(2) (Figure 2), then fjk(x) is called nonlinear lower measure whitening weight function and notes for fjk[–,–,xjk(3),xjk(4)].
- •
If nonlinear grey whitening weight function fjk(x)'s second and third turning points xjk(2), xjk(3) are same (Figure 3), then fjk(x) is called nonlinear moderate measure whitening weight function and notes for fjk[xjk(1),xjk(2),−,xjk(4)].
- •
If nonlinear grey whitening weight function fjk(x) does not have the third and forth turning points xjk(3), xjk(4) (Figure 4), then fjk(x) is called nonlinear upper measure whitening weight function and notes for fjk[xjk(1),xjk(2),–,–].
Proposition 1
Formula of nonlinear lower measure whitening weight function is: Equation 2 Formula of nonlinear moderate measure whitening weight function is: Equation 3 Formula of nonlinear upper measure whitening weight function is: Equation 4
Proposition 2
Nonlinear grey whitening weight function is derivable except endpoint.
Prove
For typical nonlinear grey whitening weight function (formula (1)).
If x∉[xjk(1),xjk(4)] or x∈(xjk(2),xjk(3)): Equation 5 If x∈(xjk(1),xjk(2)): Equation 6 If x∈(xjk(3),xjk(4)): Equation 7 If x=xjk(2): Equation 8 If x=xjk(3): Equation 9 So, typical nonlinear grey whitening weight function is derivable except endpoints xjk(1),xjk(4).
We can certificate from same reason that, nonlinear lower measure whitening weight function is derivable except endpoint xjk(4), nonlinear moderate measure whitening weight function is derivable except endpoint xjk(1),xjk(4), nonlinear upper measure whitening weight function is derivable except endpoint xjk(1). So nonlinear whitening weight function is derivable except endpoint.
In summary, Proposition 2 is proved.
3 Grey clustering method given the right based on nonlinear whitening weight function
xij (i=1, 2, … , n, j=1, 2, … , m) are the observation date about jth index of ith (i=1, 2, … , n) object. fjk(x) is the whitening weight function for jth index belonging into kth (k∈{1, 2, … , s}) grey type ηjk is the weight for jth index belonging into kth (k∈{1, 2, … , s}) grey type and it is nothing with k. Then ηjk=ηj(j=1,2, … ,m).
Clustering coefficient for i object belongs to kth grey type is σi k=∑j=1mfjk(xij) · ηj.
Definition 4
Classify the object according to clustering coefficient based on nonlinear whitening weight function is call grey clustering method given the right based on nonlinear whitening weight function.
The steps of grey clustering method given the right based on nonlinear whitening weight function are:
- 1.
Determine fjk(x) which is the whitening weight function for jth index belonging into kth (k∈{1, 2, … , s}) grey type.
- 2.
Determine ηj(j=1, 2, … , m) which is the weight for jth index belonging into kth (k∈{1, 2, … , s}) grey type.
- 3.
Calculate σi k=∑j=1mfjk(xij) · ηj.
- 4.
Determine i (i=1, 2, … , n) object belonging to k* grey type according to max1≤k≤s{σi k}=σi k*.
4 Application for determining the credible risk of software development process
4.1 Index selection of determining the credible risk of software development process
We determine complexity, reliability and availability three elements based on the property of software development process. We use expert investigation method to get ten weights of indicators in the final assessment. We have gotten ten weights including the second weight, in the following analysis the second weight will not be used, so, we delete the second weight and let the sum of other weights is 1. Then, we get Table I:
- 1.
Project elapsed time. The elapsed time of the project from the beginning to the end. It is usually on a monthly basis, including any items ending times (such as holidays, etc.): Equation 10
- 2.
Size attributes. Size of the project data based on function point according to IFPUG/NESMA standard measurement method.
- 3.
Max team size. The largest number of personnel of the project team.
- 4.
Normalized work effort. The total workload required to complete a specific project, that is, the workload of the sum of all individuals (such as customer representatives, IT staff workload, etc.), including overtime hours, regardless of whether the payment of overtime.
- 5.
Project delivery rate. It describes the relationship between functionality and the amount of work required of the project when delivering software to end‐users. It is ratio of the project effort (in number of man‐hours) and the software size (in function points indicated), that is the number of man‐hours (hours)/function point (FP) – a function for each point of delivery amount of work required.
- 6.
Total defects delivered. It describes the software quality – software defects found in the total number of test runs.
- 7.
Organization type.
- 8.
Development methodology used.
- 9.
CASE tool.
- 10.
The type of development.
4.2 Determining the credible risk of software development process
We obtain date of eight projects from ISBSG, and determine the credible risk of software development process. Original dates are as Table II.
The first six indexes are divided by the second indicator, respectively, and expand a certain multiple appropriately (100 or 1,000 times), then rounded. We get dates in Table III.
Trusted risk assessment in project development process is divided into three classes: credible, part credible, not credible.
Because significance of clustering indexes are different, so we use grey fixed weight cluster:
(1) Whitening weight function for j th index belonging into kth grey type is fjk(x) (j=1, 2, … , 10; k=1, 2, 3, 4), which are: Equation 11 Equation 12 Equation 13 Equation 14 Equation 15
(2) Weights of indexes are: Equation 16
(3) According to σik=∑j=1mfjk(xij) · ηj, original data and results of two steps before, we can obtain: Equation 17 Equation 18
(4) Judge the grey type which object belongs to. According to max1≤k≤3{σi k}=σi k*, we judge that object belongs to k* grey type: Equation 19
5 Conclusion
Determination on credibility level in the software development process is dynamic, as credibility of the results may be different with different time and project requirements. Qualitative methods are not entirely convincing, and total quantitative methods are not flexible enough. Grey cluster based on nonlinear grey whitening weight function put forward in this paper is both convincing and flexible. Finally eight projects from ISBSG database are used for empirical analysis, which confirms that the method put forward in this paper is available and credible.
About the authors
Dr Chuanmin Mi is Associate Professor of Software Engineering, Information Management, Grey Systems in Nanjing University of Aeronautics and Astronautics. He is Post‐doctor in the Institute of Policy and Management of Chinese Academy of Sciences. His scientific activity is appears in over 30 articles and scientific papers and three books in the fields of software engineering, information management, e‐commerce, grey systems, service science and business analytics. He is a member of the Institute of Electrical and Electronics Engineers (IEEE), Institute for Operations Research and the Management Sciences (INFORMS) and Chinese Society of Optimization, Overall Planning and Economical Mathematics (CSOOPEM). Chuanmin Mi is the corresponding author and can be contacted at: [email protected]
Min Tian is a PhD candidate in College of Management and Economics of Nanjing University of Aeronautics and Astronautics. His research interests include grey systems theory and commercial aircraft management.
Xuemei Li is a PhD student with Nanjing University of Aeronautics and Astronautics at the College of Economics and Management. She holds a degree in Systems Engineering from Nanjing University of Aeronautics and Astronautics, Nanjing (2011). Her research activity is in the area of grey modeling and forecasting and has included four articles, and an international IEEE Paper Award (IEEE GSIS Nanjing, China, 2009).
References
Bannerman, P.L. (2008), “Risk and risk management in software projects: a reassessment”, The Journal of Systems and Software, Vol. 81, pp. 2118‐33.
Cheng, P., Liu, W. and Chen, Y. (2010), “Current situation and countermeasures of trustworthy software industry in China”, Science & Technology Progress and Policy, Vol. 27 No. 3, pp. 51‐4.
Chittister, C. and Haimes, Y. (1993), “Risk associated with software development: a holistic framework for assessment and management”, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 23 No. 3, pp. 710‐23.
Dong, F.‐Y., Xiao, M.‐D. and Liu, B. (2010), “Construction method of whitenization weight function in grey system teaching”, Journal of North China Institute of Water Conservancy and Hydroelectric Power, Vol. 31 No. 3, pp. 97‐9.
Houmb, S.H., Franqueira, V.N.L. and Engum, E.A. (2010), “Quantifying security risk level from CVSS estimates of frequency and impact”, The Journal of Systems and Software, Vol. 83, pp. 1622‐34.
Huang, M.‐Y., Wang, Y.‐L. and Zhang, H.‐L. (2008), “The application of Bayesian network in evaluation index system of software dependability”, Information Technology and Informatization, No. 12, pp. 109‐10.
Lang, B., Liu, X., Wang, H., Xie, B. and Mao, X. (2010), “A classification model for software trustworthiness”, Journal of Frontiers of Computer Science & Technology, Vol. 4 No. 3, pp. 231‐9.
Mi, C., Liu, S. and Yuan, X. (2007), “Study on 2‐tuple linguistic assessment method based on grey cluster”, The Journal of Grey System, Vol. 19 No. 3, pp. 257‐68.
Shi, L., Yu, B.‐G. and Yang, Y. (2010), “Establishing evaluation model of software trustworthiness based on FAHP and FMCDM”, Application Research of Computers, Vol. 27 No. 3, pp. 933‐7.
Tang, Q. (1996), “Gray ash class clustering methods to determine the function of albino”, Journal of Sichuan Ordnance, Vol. 17 No. 4, pp. 4‐7.
Wang, Q.Y. (1987), “The grey relational analysis of B‐mode”, Huazhong University of Technology, Vol. 17 No. 6, pp. 77‐82.
Zhang, R. and Liu, S. (2007), “Extension of gray cluster evaluation methods”, Statistics and Decision, No. 9, pp. 24‐6.
Further Reading
Liu, S.‐F., Dang, Y.‐G. and Fang, Z.‐G. (2004), Grey System Theory and Its Applications, Science Press, Beijing.
Liu, S.‐F., Xie, N.‐M. and Forrest, J. (2011), “Novel models of grey relational analysis based on visual angle of similarity and nearness”, Grey Systems: Theory and Application, Vol. 1 No. 1, pp. 8‐18.
Liu, S.‐F., Zhao, L. and Wang, Z.‐Y. (2001), “A new method for venturous capital pricing”, Chinese Journal of Management Science, Vol. 9 No. 2, pp. 22‐6.
Rahimnia, F., Moghadasian, M. and Mashreghi, E. (2011), “Application of grey theory approach to evaluation of organizational vision”, Grey Systems: Theory and Application, Vol. 1 No. 1, pp. 33‐46.