SlideShare una empresa de Scribd logo
1 de 18
Whatprediction  model should be? Institute of Software Chinese Academy of Sciences Qing Wang
Why we use prediction model? Understand the past behavious of  process Control the present behavious of process  Predict the future behavious of process 2
How to understand the past behavious? Based on the historical data  which has been collected from relative processes Apply appropriate measure and analysis techniques to analyze the data quantitatively. Try to find some nature characteristics Is stable?Nature bounds? Does some quantitative relationship among process attributes? Can be stratified /segmented or composed further? 3
How to control the present behavious? Based on the nature bounds (baselines) to establish the desired objectives  of project Compare the present data to say if it is compliant with the nature bounds. Take proper action to correct the deviation Monitor and evaluate the effect of correct action  4
How to predict the future behavious? Based on the quantitative relationship which established depend on the understanding of past behavious. Predict the interim outcome and final outcome of project to know if the project is going well toward the project objectives. 5
What is the essential ? Differ from estimation model Deterministic,  uncertainty, …… Use past and present data to predict future Some dependent X factors,  predict independent  Y outcomes The measurement for Xs and Y make sense Data collection timely and frequently Dynamical  Statistical, probability, simulation-based 6
Must be careful when establish prediction model? Use real world and relevant data Align the necessary project objectives SMART principle Specific Measurable Attainable Relevant Time-bound Cost-benefit balance Feedback and refinement 7
Practical Case – A CMMI ML4 organization Issue: the organization found there are more than 90% projects delay is due to test and fix bugs need much more time than estimated Question: How to predict the effort and schedule of test process? Method:  Identify the factors which impact the effort and schedule of test process Establish a prediction model use these factors Measure and control these factors Predict the effort and schedule of test based on the factors when they were got
The process Each user case has been implemented by requirement analyze, design and coding reviews for each user case for each development activity were conducted respectively and defect data was recorded Each iteration has a unique testing and data was recorded The subsystem of each iteration was delivered to customer as a intermediate result, they must be on schedule and have good quality System testing was conducted when all iterations were completed (each release)
Process improvement objectives Goal G1: manage the schedule of each iteration and reduce the defect as soon as possible G2: manage the system test to detect and fix defects as many as possible
G1: in each iteration  All defect data related requirement analysis, design and coding were collected before testing Can we find some quantitative relationship between these data and the effort of testing process?  There are two primary activities in testing process Detect defects Fix defects
Get data from 16 history projects
Defect injection analysis - 1 13 Defect injected in requirement analysis Defect injected in design
Defect injection analysis - 2 Defect injected in coding The factor can be control , it can be used to establish prediction model Y is the effort of fix defects.       If the predicted effort beyond estimate, they should assign more engineers to assure on schedule deliver of each iteration.
G2: for system testing
Use controllable factor to predict 16 Similar prediction model for system testing can be established. The possible impact factors could be: The defects injected in requirement, design and coding The defects removed respectively The defects removed in integrated testing of each iteration ……
Summary  17 All data can be get The factors which used to establish prediction model are controllable and independent  Statistical techniques are used to do analysis Prediction object is relevant to the organization process improvement objectives The prediction model can be refined along with the using and more data was got
Thanks! 18

Más contenido relacionado

La actualidad más candente

Cost Estimation methods
Cost Estimation methodsCost Estimation methods
Cost Estimation methodsMRA7860
 
Risk and Testing
Risk and TestingRisk and Testing
Risk and TestingNolaCita
 
Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Adi Dancu
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysisjohnchuddle
 
Managing in the Presence of Uncertanty
Managing in the Presence of UncertantyManaging in the Presence of Uncertanty
Managing in the Presence of UncertantyGlen Alleman
 
6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verificationPaolo Croce
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information Systemtulipbiru64
 
Dylan Wiliam
Dylan WiliamDylan Wiliam
Dylan Wiliamservusuk
 
Bt0092, software project management
Bt0092, software project managementBt0092, software project management
Bt0092, software project managementsmumbahelp
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based TestingJeff Findlay
 
Parameter tuning or default values
Parameter tuning or default valuesParameter tuning or default values
Parameter tuning or default valuesVivek Nair
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriodlearnt
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of DefectsDavid Gevorgyan
 
Estimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsEstimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsAlex Tymokhovsky
 
Measurement Strategy for Software Companies
Measurement Strategy for Software CompaniesMeasurement Strategy for Software Companies
Measurement Strategy for Software Companiesnazlitemu
 
MSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMatt Hansen
 

La actualidad más candente (20)

Cost Estimation methods
Cost Estimation methodsCost Estimation methods
Cost Estimation methods
 
Default Credit Loss
Default Credit LossDefault Credit Loss
Default Credit Loss
 
Risk and Testing
Risk and TestingRisk and Testing
Risk and Testing
 
Software Estimation - part 1 of 2
Software Estimation - part 1 of 2Software Estimation - part 1 of 2
Software Estimation - part 1 of 2
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Managing in the Presence of Uncertanty
Managing in the Presence of UncertantyManaging in the Presence of Uncertanty
Managing in the Presence of Uncertanty
 
[Mush Honda] Metrics & Reports from Test Teams (QA)
[Mush Honda] Metrics & Reports from Test Teams (QA)[Mush Honda] Metrics & Reports from Test Teams (QA)
[Mush Honda] Metrics & Reports from Test Teams (QA)
 
6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification6 methods for CAPAs effectiveness verification
6 methods for CAPAs effectiveness verification
 
Multi-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information SystemMulti-factor Information Security Risk in Information System
Multi-factor Information Security Risk in Information System
 
Dylan Wiliam
Dylan WiliamDylan Wiliam
Dylan Wiliam
 
Bt0092, software project management
Bt0092, software project managementBt0092, software project management
Bt0092, software project management
 
Requirements Driven Risk Based Testing
Requirements Driven Risk Based TestingRequirements Driven Risk Based Testing
Requirements Driven Risk Based Testing
 
Parameter tuning or default values
Parameter tuning or default valuesParameter tuning or default values
Parameter tuning or default values
 
Quiz1FinalPeriod
Quiz1FinalPeriodQuiz1FinalPeriod
Quiz1FinalPeriod
 
forecasting
forecastingforecasting
forecasting
 
Root cause Analysis of Defects
Root cause Analysis of DefectsRoot cause Analysis of Defects
Root cause Analysis of Defects
 
C & E matrix
C & E matrixC & E matrix
C & E matrix
 
Estimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & TechnicsEstimations: hit the target. Tips & Technics
Estimations: hit the target. Tips & Technics
 
Measurement Strategy for Software Companies
Measurement Strategy for Software CompaniesMeasurement Strategy for Software Companies
Measurement Strategy for Software Companies
 
MSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSAMSA – Planning & Conducting the MSA
MSA – Planning & Conducting the MSA
 

Similar a What prediction model should be used

Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Prince Bhanwra
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsarah david
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingsadia butt
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsarah david
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsarah david
 
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Association for Project Management
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & cAmit Patil
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsarah david
 
Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)MuskanSony
 
Value Summary 2.0 Overview
Value Summary 2.0 OverviewValue Summary 2.0 Overview
Value Summary 2.0 Overviewbpatterson888
 
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ... Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...Seapine Software
 
Practical Software Measurement
Practical Software MeasurementPractical Software Measurement
Practical Software Measurementaliraza786
 
9.process improvement chapter 9
9.process improvement chapter 99.process improvement chapter 9
9.process improvement chapter 9Warui Maina
 
Fundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxFundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxMusaBashir9
 
What is Forecasting.pdf
What is Forecasting.pdfWhat is Forecasting.pdf
What is Forecasting.pdfPankaj Chandel
 
Data science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughData science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughTristan Wiggill
 
Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application tanveer ahmad
 
Demand Forecasting
Demand ForecastingDemand Forecasting
Demand ForecastingAnupam Basu
 

Similar a What prediction model should be used (20)

Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4Chap.9 the key process areas for level 4
Chap.9 the key process areas for level 4
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdf
 
Six sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison makingSix sigma,SIPOC, Fact based decison making
Six sigma,SIPOC, Fact based decison making
 
significance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdfsignificance_of_test_estimating_in_the_software_development.pdf
significance_of_test_estimating_in_the_software_development.pdf
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptx
 
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
Adam Suchley - Predictive Delivery Assurance - APM Assurance SIG Conference 2018
 
Demand forecasting
Demand forecastingDemand forecasting
Demand forecasting
 
Software development o & c
Software development o & cSoftware development o & c
Software development o & c
 
significance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptxsignificance_of_test_estimating_in_the_software_development.pptx
significance_of_test_estimating_in_the_software_development.pptx
 
Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)Bca 5th sem seminar(software measurements)
Bca 5th sem seminar(software measurements)
 
Value Summary 2.0 Overview
Value Summary 2.0 OverviewValue Summary 2.0 Overview
Value Summary 2.0 Overview
 
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ... Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
Use the Windshield, Not the Mirror Predictive Metrics that Drive Successful ...
 
Practical Software Measurement
Practical Software MeasurementPractical Software Measurement
Practical Software Measurement
 
9.process improvement chapter 9
9.process improvement chapter 99.process improvement chapter 9
9.process improvement chapter 9
 
1120 track1 grossman
1120 track1 grossman1120 track1 grossman
1120 track1 grossman
 
Fundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptxFundamentals_of_Software_testing.pptx
Fundamentals_of_Software_testing.pptx
 
What is Forecasting.pdf
What is Forecasting.pdfWhat is Forecasting.pdf
What is Forecasting.pdf
 
Data science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enoughData science in demand planning - when the machine is not enough
Data science in demand planning - when the machine is not enough
 
Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application Effectiveness of software product metrics for mobile application
Effectiveness of software product metrics for mobile application
 
Demand Forecasting
Demand ForecastingDemand Forecasting
Demand Forecasting
 

Más de CS, NcState

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdecCS, NcState
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringCS, NcState
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest linkCS, NcState
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...CS, NcState
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9CS, NcState
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).CS, NcState
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceCS, NcState
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits CS, NcState
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab templateCS, NcState
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUCS, NcState
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements EngineeringCS, NcState
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginiaCS, NcState
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software EngineeringCS, NcState
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)CS, NcState
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceCS, NcState
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1CS, NcState
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataCS, NcState
 

Más de CS, NcState (20)

Talks2015 novdec
Talks2015 novdecTalks2015 novdec
Talks2015 novdec
 
Future se oct15
Future se oct15Future se oct15
Future se oct15
 
GALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software EngineeringGALE: Geometric active learning for Search-Based Software Engineering
GALE: Geometric active learning for Search-Based Software Engineering
 
Big Data: the weakest link
Big Data: the weakest linkBig Data: the weakest link
Big Data: the weakest link
 
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...Three Laws of Trusted Data Sharing:(Building a Better Business Case for Dat...
Three Laws of Trusted Data Sharing: (Building a Better Business Case for Dat...
 
Lexisnexis june9
Lexisnexis june9Lexisnexis june9
Lexisnexis june9
 
Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).Welcome to ICSE NIER’15 (new ideas and emerging results).
Welcome to ICSE NIER’15 (new ideas and emerging results).
 
Icse15 Tech-briefing Data Science
Icse15 Tech-briefing Data ScienceIcse15 Tech-briefing Data Science
Icse15 Tech-briefing Data Science
 
Kits to Find the Bits that Fits
Kits to Find  the Bits that Fits Kits to Find  the Bits that Fits
Kits to Find the Bits that Fits
 
Ai4se lab template
Ai4se lab templateAi4se lab template
Ai4se lab template
 
Automated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSUAutomated Software Enging, Fall 2015, NCSU
Automated Software Enging, Fall 2015, NCSU
 
Requirements Engineering
Requirements EngineeringRequirements Engineering
Requirements Engineering
 
172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia172529main ken and_tim_software_assurance_research_at_west_virginia
172529main ken and_tim_software_assurance_research_at_west_virginia
 
Automated Software Engineering
Automated Software EngineeringAutomated Software Engineering
Automated Software Engineering
 
Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)Next Generation “Treatment Learning” (finding the diamonds in the dust)
Next Generation “Treatment Learning” (finding the diamonds in the dust)
 
Tim Menzies, directions in Data Science
Tim Menzies, directions in Data ScienceTim Menzies, directions in Data Science
Tim Menzies, directions in Data Science
 
Goldrush
GoldrushGoldrush
Goldrush
 
Dagstuhl14 intro-v1
Dagstuhl14 intro-v1Dagstuhl14 intro-v1
Dagstuhl14 intro-v1
 
Know thy tools
Know thy toolsKnow thy tools
Know thy tools
 
The Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software DataThe Art and Science of Analyzing Software Data
The Art and Science of Analyzing Software Data
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

What prediction model should be used

  • 1. Whatprediction model should be? Institute of Software Chinese Academy of Sciences Qing Wang
  • 2. Why we use prediction model? Understand the past behavious of process Control the present behavious of process Predict the future behavious of process 2
  • 3. How to understand the past behavious? Based on the historical data which has been collected from relative processes Apply appropriate measure and analysis techniques to analyze the data quantitatively. Try to find some nature characteristics Is stable?Nature bounds? Does some quantitative relationship among process attributes? Can be stratified /segmented or composed further? 3
  • 4. How to control the present behavious? Based on the nature bounds (baselines) to establish the desired objectives of project Compare the present data to say if it is compliant with the nature bounds. Take proper action to correct the deviation Monitor and evaluate the effect of correct action 4
  • 5. How to predict the future behavious? Based on the quantitative relationship which established depend on the understanding of past behavious. Predict the interim outcome and final outcome of project to know if the project is going well toward the project objectives. 5
  • 6. What is the essential ? Differ from estimation model Deterministic, uncertainty, …… Use past and present data to predict future Some dependent X factors, predict independent Y outcomes The measurement for Xs and Y make sense Data collection timely and frequently Dynamical Statistical, probability, simulation-based 6
  • 7. Must be careful when establish prediction model? Use real world and relevant data Align the necessary project objectives SMART principle Specific Measurable Attainable Relevant Time-bound Cost-benefit balance Feedback and refinement 7
  • 8. Practical Case – A CMMI ML4 organization Issue: the organization found there are more than 90% projects delay is due to test and fix bugs need much more time than estimated Question: How to predict the effort and schedule of test process? Method: Identify the factors which impact the effort and schedule of test process Establish a prediction model use these factors Measure and control these factors Predict the effort and schedule of test based on the factors when they were got
  • 9. The process Each user case has been implemented by requirement analyze, design and coding reviews for each user case for each development activity were conducted respectively and defect data was recorded Each iteration has a unique testing and data was recorded The subsystem of each iteration was delivered to customer as a intermediate result, they must be on schedule and have good quality System testing was conducted when all iterations were completed (each release)
  • 10. Process improvement objectives Goal G1: manage the schedule of each iteration and reduce the defect as soon as possible G2: manage the system test to detect and fix defects as many as possible
  • 11. G1: in each iteration All defect data related requirement analysis, design and coding were collected before testing Can we find some quantitative relationship between these data and the effort of testing process? There are two primary activities in testing process Detect defects Fix defects
  • 12. Get data from 16 history projects
  • 13. Defect injection analysis - 1 13 Defect injected in requirement analysis Defect injected in design
  • 14. Defect injection analysis - 2 Defect injected in coding The factor can be control , it can be used to establish prediction model Y is the effort of fix defects. If the predicted effort beyond estimate, they should assign more engineers to assure on schedule deliver of each iteration.
  • 15. G2: for system testing
  • 16. Use controllable factor to predict 16 Similar prediction model for system testing can be established. The possible impact factors could be: The defects injected in requirement, design and coding The defects removed respectively The defects removed in integrated testing of each iteration ……
  • 17. Summary 17 All data can be get The factors which used to establish prediction model are controllable and independent Statistical techniques are used to do analysis Prediction object is relevant to the organization process improvement objectives The prediction model can be refined along with the using and more data was got