Architecture-Oriented Comprehensive Risk Priority Number Calculation Method

A risk priority number and system structure technology, applied in the direction of calculation, electrical digital data processing, special data processing applications, etc., can solve inaccurate and other problems

Active Publication Date: 2017-12-15
SHANGHAI JIAOTONG UNIV
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The present invention utilizes the software architecture description language aimed at the network environment, adopts an evaluation method combining component complexity and expert experience to determine the occurrence frequency and detection index of the failure mode; through the fusion of subjective and objective information , the evaluation results are more accurate and credible than before; at the same time, the results of the three risk factors are expressed by triangular fuzzy numbers in fuzzy theory, which better avoids the problem of inaccurate subjective semantic description boundaries

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Architecture-Oriented Comprehensive Risk Priority Number Calculation Method
  • Architecture-Oriented Comprehensive Risk Priority Number Calculation Method
  • Architecture-Oriented Comprehensive Risk Priority Number Calculation Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0085] The present invention will be described in detail below with reference to specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that, for those skilled in the art, several modifications and improvements can be made without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0086] A comprehensive risk priority number calculation method considering entropy weight and fuzzy ideal closeness for architecture, by using fuzzy numbers at the software architecture level to pair three risk factors (occurrence frequency, severity and discovery index) in FMEA Evaluation; among them, the occurrence frequency and discovery index are determined by combining component complexity and expert experience, and at the same time, the concept of information entropy is used to disting...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a comprehensive risk priority number calculating method for architecture. Three risk factors (the appearance frequency, the severity degree and the discovery index) in FMEA are evaluated in the mode that fuzzy numbers are utilized in software architecture in a leveled mode; the appearance frequency and the discovery index are determined through component complexity and expertise, and the weights of different risk factors are distinguished through the conception of information entropy; through the conceptions of a positive ideal solution and a negative ideal solution in a TOPSIS method, a more reasonable and accurate risk priority number rank is obtained; in this way, a comprehensive software-failing mode risk factor evaluation technology for the architecture is achieved. By means of the comprehensive risk priority number calculating method, at the initial software design stage, developers are helped to find out potential design defects in a system, and therefore the subsequent software development quality is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of reliability engineering, in particular to the field of software architecture credibility analysis, and specifically relates to a failure mode and influence analysis method and a fuzzy computing theory. Background technique [0002] Among many trustworthy attributes, security is particularly important for the quality of software systems. FMEA, as an important security analysis method, has been paid more and more attention by people. The history of FMEA can be traced back to the late 1940s. In 1949, the US military first proposed the concept of FMEA in an article called "Procedure for performing afailure mode, effects and analysis". By the early 1960s, NASA was applying FMEA to aerospace engineering and first used FMEA on the Apollo missions. Since then, FMEA has developed into an effective method for providing failure information for risk management. However, the traditional FMEA method has two main pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F19/00
Inventor 黄林鹏付晓宇陈璐希苏冠男
Owner SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products