Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Software key function identification method based on complex network fault propagation

A technology of key functions and identification methods, applied in the direction of program control devices, etc., can solve problems such as too simple evaluation criteria, software system collapse, and inappropriate software system dynamic execution process.

Inactive Publication Date: 2015-11-11
ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This static index cannot characterize the dynamic process of the system, and the evaluation criteria are too simple, which is not suitable for the dynamic execution process of the software system.
There is a relationship between calling and being called between the functions of the software system. If a function A fails, the function B that calls it will also be affected and may fail; the failure of function B may cause the function B that calls it to fail. C failure; such a failure propagation process will produce cascading failures, which may lead to the collapse of the entire software system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software key function identification method based on complex network fault propagation
  • Software key function identification method based on complex network fault propagation
  • Software key function identification method based on complex network fault propagation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0038] The concrete example that the embodiment of the present invention is applied is a certain simple embedded program, for ease of use, only listed the statement that only includes sub-function in the program, as image 3 shown.

[0039] The software key function identification method based on the complex network of the present invention comprises the following steps:

[0040] Step 1, extract the sub-functions and calling relations of the program according to the source code, and abstract it into a structural network diagram of the software system, such as Figure 4 shown.

[0041] Figure 4 contains 15 nodes and 17 directed edges, where the nodes represent the sub-functions in the embedded software program, and the directed edges represent the calling relationship between the sub-functions, where the function pointed by the arr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software key function identification method based on complex network fault propagation. The software key function identification method comprises the following steps: 1) according to a source code, carrying out subfunction and calling relation extraction on a program, and carrying out abstraction to obtain a network chart of a software structure; 2) according to a probability of calling and executing each subfunction, endowing each side with a certain weight w, wherein the weight is a failure probability of inter-function cascading faults; 3) analyzing the topological structure characteristics of software, and calculating an in-degree value and an out-degree value of each node, wherein the in-degree value of the node is a frequency that the function is called by other functions, and the out-degree value of the node is the frequency that the function calls other functions; 4) carrying out a cascading failure simulation experiment on each node of a software network, and calculating the node numbers G, i.e., the criticality, of a maximum connected subgraph of the software network after each node is subjected to stable failure; and 5) sorting the G in an increasing sequence to obtain the criticality of each function. The software key function identification method is simple and reliable. Compared with a traditional method, the software key function identification method can precisely identify a software key function.

Description

technical field [0001] The invention relates to a software key function identification method, in particular to a software key function identification method based on complex network fault propagation. Background technique [0002] Defects exist in all stages of the software life cycle, which will cause errors and redundancy, lead to system or equipment failure, and even cause economic losses. With the continuous development of information and electronic technology, the complexity of software systems is getting higher and higher, and a tiny mistake may cause disastrous consequences. Therefore, improving software quality and ensuring reliable and stable operation of software has become one of the urgent problems that software engineering faces. [0003] Since the small-world effect and scale-free features were discovered in 1998 and 1999, complex network science has developed rapidly in the past ten years, setting off a research boom in understanding the laws and nature of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44
Inventor 黄友朋赵山肖勇许卓
Owner ELECTRIC POWER RES INST OF GUANGDONG POWER GRID
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products