SlideShare a Scribd company logo
1 of 41
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 1
Applying Deductive, Inductive, and Abductive
Reasoning to the System Development Life-Cycle
(SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 2
Didier Koffi
Principal Business Architect
Pragmatic Cohesion Consulting, LLC
didier@pragmaticohesion.com
Hosted by:
Jessica Dahbour
ITMPI
Jessica_Dahbour@compaid.com
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 3
About Presenter’s Firm
• Since 2010, Pragmatic Cohesion has provided state of the art
Business Architecture and Business Systems Analysis services that
take advantage of our cutting edge approach to Enterprise
Stakeholders’ collaboration and Business Model Assessment.
• Our latest product is named the EBMM-TRIADs™ 3-day
Assessment Workshop that measures your organization's ability to
deliver outcomes that properly respond to the expectations and
constraints imposed upon your business by its environment:
markets, customers, suppliers, partners, competitors, regulators,
shareholders, and various stakeholders. The assessment does so
by asking a comprehensive set of simple questions that only require
your familiarity with the various aspects of your business; NO books
of records or balance sheets needed!
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 4
CAI Achieves IT Operational Excellence
www.compaid.com
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 5
PDU Credits Available for this Webinar
• The PMI has approved this webinar with PDUs
• You will be eligible to receive 1.0 PDU credits
• Your PDU email will be sent to you
• This webinar is mapped to the TALENT TRIANGLE
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 6
Online Webinar Recordings
NOW AVAILABLE
• Anytime Access
• Hundreds of Topics
Visit:
www.ITMPI.org/library
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 7
Enjoy the benefits of ITMPI Membership
JOIN TODAY!
• UNLIMITED Free Webinar Recordings
• UNLIMITED Free PDU Credits
• Hundreds of Topics
Visit:
www.ITMPI.org/subscribe
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 8
Outline:
• Deductive Reasoning
• Inductive Reasoning
• Abductive Reasoning
• From Evidence to
Hypothesis
• From Solution System
Feature to User Need
• Requirements Validation
• System Verification
• Reasoning types across the
System Development Life
Cycle (SDLC)
• Illustrative Example
Applying Deductive, Inductive, and Abductive Reasoning to the System
Development Life-Cycle (SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 9
Deductive reasoning is a form of reasoning that
shows that certain conclusions follow
necessarily from true premises
Thale’s Theorem:
Wikipedia
In geometry, Thales'
theorem states that if A, B
and C are points on a circle
where the line AB is a
diameter of the circle,
then the angle ∠ACB is a
right angle
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 10
Deductive reasoning is Top-Down, from generalizations
to particulars or from hypothesis to evidence.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 11
Inductive reasoning asserts that something is
probably true given some evidence relevant to it.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 12
• With Inductive reasoning we consider a “mass of
evidence” that we believe is relevant to a set of
hypothesis H. The probabilistic nature of inductive
inference comes from the following characteristics of the
“mass of evidence”:
– It is incomplete
– It is inconclusive (It is consistent to some degree with the truth of
every hypothesis in H)
– It may be vague or imprecise
– It may be dissonant (some of it favors one hypothesis and some
favor others)
– Its sources may not be perfectly credible
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 13
Abductive reasoning is concern with imaginative reasoning, a
process through which new ideas or hypotheses come into existence
based on observations.
In deductive reasoning a
conclusion is already
embedded in its premises.
In inductive reasoning, a
hypothesis or idea already
exists and we are just
establishing probabilistic
grounds for it.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 14
Abductive reasoning is also used to generate inference
networks: the skillful combination of relevance and credibility
characteristics of evidence.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 15
Eco’s “Overcoded Abduction” according to Schum
• We observe clue E* (E* being evidence that
event E occurred)
• Based on our prior knowledge of contexts in
which things like event E have occurred, we
say: “Whenever something like H has
occurred, then something like E has also
occurred.” Rephrased, we might say: “If H
were true, then E would follow as a matter of
course.”
• Thus, there is reason to suspect that H may
explain the occurrence of clue E*. In other
words, clue E* points to H as a possible
explanation for its occurrence.
From Evidence to Hypothesis
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 16
From Evidence to Hypothesis Example
H=Hypothesis Set H=It rained overnight; Hc= It did not rain overnight
E=Event relevant in an Inference about H E=My lawn is wet; Ec=My lawn is not wet
E*=Evidence that E occurred E*:My hands were wet after touching a patch of grass
From E* to E : Credibility Stage
P(E*|E) Hit probability P(My hands were wet after touching a patch of
grass | My lawn is wet)
P(E*|Ec) False positive probability P(My hands were wet after touching a patch of
grass | My lawn is not wet)
From E to H : Relevance Stage
P(E|H) > P(E|Hc) E favors H over Hc If P(My lawn is wet | It rained overnight) >P(My
lawn is wet| It did not rain overnight) then ‘My
lawn is wet’ favors H ‘It rained overnight’
P(E|H) < P(E|Hc) E favors Hc over H If P(My lawn is wet | It rained overnight) <P(My
lawn is wet| It did not rain overnight) then ‘My
lawn is wet’ favors Hc ‘It did not rain overnight’
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 17
To go from Solution System Features to User Needs, we use Abductive
Reasoning through our imagination to generate an “Argument” much
similar to linking Evidence to Hypothesis.
From Solution System Features to User Needs
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 18
The Argument is
embedded in the
structure of a
Hierarchy of
Requirements: from
detailed Technical
Requirements and
Specifications, System
Requirements,
Business
Requirements, up to
Mission Requirements.
From Solution System Features to User Needs
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 19
Evidence to Hypothesis Solution System Feature to User Need
H: Hypothesis Set User Need = UN
E: Event relevant in an Inference about
H
Requirement= R : R satisfies UN
E*: Evidence that E occurred System Features = S : Evidence that R is
implemented
From E* to E : Credibility Stage From S to R : Verification Stage
P(E*|E) Hit probability P(S|R): is Requirement implemented?
P(E*|Ec) False positive probability P(S|Rc): is Requirement not
implemented?
From E to H : Relevance Stage From R to UN : Validation Stage
P(E|H) > P(E|Hc) E favors H over Hc P(R|UN) > P(R|UNc) : R satisfies UN over
UNc
P(E|H) < P(E|Hc) E favors Hc over H P(R|UN) < P(R|UNc) : R satisfies UNc
over UN
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 20
The Hierarchy of Requirements is
constructed to maximize:
P(R|UN) > P(R|UNc) : the
probability that the
Requirements Hierarchy (R)
satisfies User Needs (UN); which
is the primary index of
Requirements Validation
Requirements Validation
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 21
The Solution System Features
are crafted to maximize:
P(S|R) : the likelihood that
Requirements (R) are
implemented by the Solution
System Features (S); which is
the primary Index of System
Verification.
System Verification
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 22
Features included in Solution System = S
Features not included in Solution System = Sc
Current User Needs=UN
Not User Needs = UNc
Requirements Hierarchy= R
P(R|UN) > P(R|UNc) : R satisfies User Needs
P(R|UN) < P(R|UNc) : R does not satisfy User Needs
Validation Stage = Inductive Reasoning
P(S|R) : are Requirements implemented?
P(S|Rc) : are Requirements not implemented?
Verification Stage
Requirements Hierarchy is created through Abductive Reasoning
Deductive
Reasoning
Deductive
Reasoning
Reasoning types across the System Development
Life Cycle (SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 23
We recommend viewing
the LinkedIn presentation
titled “ 6-Dimension
Business Model”
for an in-depth coverage
on how to assemble a
linked set of credibility
and relevance evidence
to transform Customer
Demands and
Relationships (User
Needs) into appropriate
and profitable Product
and Service offerings.
class EBMM Framework
WHATWHY
Business Policy
Policy Type
Mission
Vision
Principle
Directive
Business
Initiative/Program
Driver
Business Goal
Capability Road
Map
Charter/Legislation
Business
Strategy/Objective
Success
Metric/Measure
Influencer
Business Rules
and Facts
Customer Demand
and Relationship
Value
Proposition
RegulationCompetitive
Pressure
Business Trend
Competitive
Opportunity
Business Model
Assessment
Business
Judgement
Potential ImpactPotential Reward
Risk
Issues
StrengthWeakness Recommendation
of Change
WHO
Stakeholder
Governance
Body
Business Unit Business Alliance
and Partnership
Influencing
Organization
Market Segment
Business
Capability
Required
Competency
Asset
Product and
Service
Business
Requirement
Use Case or User
Story
Data Object
WHERE
Geography/
Locale
Distribution
Channels
HOW
Business Process / Activity
Application
System Interaction
Point
Application
Feature
Assessment
Metric
Process MetricKey Performance
Indicator
Finance and Revenue Model
EBMM-TRIADS(TM) (c) 2013-2015
Pragmatic Cohesion Consulting LLC , All
Rights Reserved
requires
describes
governs use of
described in
responds to
input to
evaluates
performs
measures
describes changes to
provides impetus for
Operates from
targets
quantifies
responsible for
governs
tracks success of
delivered through
enforces
generates
provided by
affect and
demand
tracks
drives
packages
implemented through
produces and consumes
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 24
Reasoning Examples
• The User Needs are similar to the Hypothesis set.
• The highest level of the Requirements Hierarchy such as
Mission Requirements, correspond to the particulars or the
evidence that we can deduce from the User Needs.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 25
Reasoning Examples
• Example of AQUATIO drinking fountain:
– User Needs: A Drinking Fountain that does not splash water when
user drinks directly from it and that requires minimal bending of user’
s body when operated.
– Mission Requirements can de deduced from the formulation of use
cases describing the interaction of the user with the Drinking
Fountain in its expected operating environment(s).
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 26
Reasoning Examples
• In turn, the lowest level of the Requirements Hierarchy such
as the Technical Specifications resulting from design
activities, can be used to deduce the Solution System
Features.
”The fountain is shaped like a bowl and
can be pivoted up to four inches which
will considerably reduce the need to bend
over when drinking water from the
fountain. By pressing left side of the
fountain, cold water will start to flow and
pressing the right side will give you room
temperature water.”
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 27
• X has property G (we wish to know why)
• If entity A has particular relation R to any X, then that X has property G
• Thus, there is possibly some A that has relation R to X (which explains why
X has property G)
Reasoning Examples
Thagard’s “Existential Abduction” according to
Schum:
• System X has Goal G (we wish to know why)
• If entity A has particular relation R to any System X, then that
System X has Goal G
• Thus, there is possibly some A that has relation R to System X
(which explains why System X has Goal G)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 28
Reasoning Examples
Thagard’s “Existential Abduction” according to
Schum:
• System X has Goal G (we wish to know why)
• If entity A has particular relation R to any System X, then that
System X has Goal G
• Thus, there is possibly some A that has relation R to System X
(which explains why System X has Goal G)
• System X has Goal G (we wish to know why)
• If entity A is a System Rule for[relation] any System X, then that
System X has Goal G
• Thus, there is possibly some A that is a System Rule for[relation]
System X (which explains why System X has Goal G)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 29
Reasoning Examples
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals [C2] System Functions [C3] List of things
important to the
System
Conceptual
(Business
Model)
[C4] System Rules
P(C4|C1) > P(C4|C1c)
[C5] System Processes
P(C5|C2) > P(C5|C2c)
[C6] System
Entities
P(C6|C3) > P(C6|C3c)
Logical
(System model)
support support support
support
support
P(C2|C1) > P(C2|C1c) P(C3|C1) > P(C3|C1c)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 30
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] System
Functions
[C3] List of things
important to the
System
Conceptual
(Business Model)
[C4] System Rules [C5] System
Processes
[C6] System Entities
? ?
? ? ?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 31
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] [C3] List of things
important to the
System
Conceptual
(Business Model)
[C4] System Rules [C5] [C6]
drive
?
?
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 32
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] [C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off
flow
-A flow of water splashes
over a surface based on the
speed of the flow and the
angle with which it hits the
surface
-User drinks directly from
the fountain with his/her
mouth
[C5] [C6]
drive
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 33
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain Water
that does not splash water when
user requests drinking directly
from it and that requires minimal
bending of user’ s body when
operated.
[C2] System Functions [C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off flow
-A flow of water splashes over a
surface based on the speed of
the flow and the angle with
which it hits the surface
-User drinks directly from the
fountain with his/her mouth
[C5] [C6]
drive
used by
?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 34
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal bending
of user’ s body when
operated.
[C2]
-Dispense drinkable water
to user’s mouth when
requested
-Suppress water splashing
when operated by user
-Preserve user’s standing
body position during
operation
[C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off
flow
-A flow of water splashes over
a surface based on the speed
of the flow and the angle with
which it hits the surface
-User drinks directly from the
fountain with his/her mouth
[C5] [C6]
?
System Processes
are supported by
govern
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 35
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable
Fountain Water that does
not splash water when
user requests drinking
directly from it and that
requires minimal bending
of user’ s body when
operated.
[C2] System Functions
-Dispense drinkable water to user’s
mouth when requested
-Suppress water splashing when
operated by user
-Preserve user’s standing body
position during operation
[C3] things important to the
System
-Water trajectory from its source to
its consumption point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of users
Conceptual
(Business
Model)
[C4] System Rules
-User controls water
on/off flow
-A flow of water splashes
over a surface based on
the speed of the flow and
the angle with which it
hits the surface
-User drinks directly from
the fountain with his/her
mouth
[C5] System Processes
-Controlling water on/off flow
-Routing fountain water
-Controlling water temperature
-Controlling distance between
water flow trajectory and user’s
mouth with minimal body bending
-Controlling water flow shape,
speed and angle of impact on
receiving surface
[C6] System Entities
govern use of
?produce
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 36
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable
Fountain Water that does
not splash water when
user requests drinking
directly from it and that
requires minimal bending
of user’ s body when
operated.
[C2] System Functions
-Dispense drinkable water to user’s
mouth when requested
-Suppress water splashing when
operated by user
-Preserve user’s standing body
position during operation
[C3] Things important to the
System
-Water trajectory from its source to
its consumption point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of users
Conceptual
(Business
Model)
[C4] System Rules
-User controls water
on/off flow
-A flow of water splashes
over a surface based on
the speed of the flow and
the angle with which it
hits the surface
-User drinks directly from
the fountain with his/her
mouth
[C5] System Processes
-Controlling water on/off flow
-Routing fountain water
-Controlling water temperature
-Controlling distance between water
flow trajectory and user’s mouth
with minimal body bending
-Controlling water flow shape,
speed and angle of impact on
receiving surface
[C6] System Entities
-Users’ height range
-Water drinkable quality
-Water trajectories induced by water
flow shape and speed
-Angle between water flow and
receiving surface
-Water flow splash level
-Distances between water flow and
user’s mouth while standing
-User’s body bending angle per water
flow trajectories and user’s body
heights
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 37
References:
• “Enterprise Business Motivation Model (EBMM)
TRIADS™ –The Chemistry of Business Architecture
Alignment,” Koffi A.D., Journal of Enterprise
Architecture, volume 11, number 1, pp28-40 (2015)
• “A Model for Characterizing the Influence of the
Zachman Framework’s Enterprise Architecture
Perspectives,” Koffi A.D., Journal of Enterprise
Architecture, volume 6, number 2, pp30-47 (2010)
• “Structuring design Knowledge for Better Design
Synthesis”, Tomiyama T., International conference on
Engineering Design, August pp19-20 (2003)
• “Species of Abductive Reasoning in Fact
Investigation in Law," Schum D. ,Cardozo Law
Review, Vol 22, Nos 5 - 6, pp1645 -1681 (2001)
• “The engineering design of systems: models and
methods”, Buede D.M. , Wiley, New York (2000).
• "Probabilistic Reasoning and the Science of
Complexity," Shanteau, J., Mellors. B., Schum, D.
(Eds.) Decision Science and Technology, Kluwer
Academic Press, pp183-209 (1999)
• “Systems engineering and analysis” Blanchard B.S.
and Fabrycky W.J. , Prentice-Hall, Upper Saddle River,
NJ (1998)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 38
Questions?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 39
CAI Sponsors Proudly Sponsors
The IT Metrics & Productivity Institute
• Accelerating IT Success: News & Education: www.aits.org
• The Strategic CIO: www.thestrategiccio.com
• Calendar of LIVE daily webinars: www.itmpi.org/webinars
• HUGE repository of webinar recordings: www.itmpi.org/library
• Enjoy the Benefits of ITMPI Membership at: www.itmpi.org/subscribe
• Automatic Registration for Live Webinars
• Unlimited Free PDU and Recording Access for ONE YEAR
• Access to Over 1000+ PDUs for a Period of ONE YEAR
• Stay tuned for our awesome new mobile app, the Great IT Pro!
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 40
Easily Maintain Your PMP with
Unlimited Access To Over
1,000 PDU Approved Webinars
For One Low Yearly Price!
www.itmpi.org/subscribe
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 41
Hosted by:
Jessica Dahbour
ITMPI
Jessica_Dahbour@compaid.com
Didier Koffi
Principal Business Architect
Pragmatic Cohesion Consulting, LLC
didier@pragmaticohesion.com

More Related Content

What's hot

Data Collection and Analysis Tools
Data Collection and Analysis ToolsData Collection and Analysis Tools
Data Collection and Analysis ToolsCaren Gamboa
 
Types of Argument presentation
Types of Argument presentationTypes of Argument presentation
Types of Argument presentationAwais Ali
 
1.3 Deduction And Induction
1.3   Deduction And Induction1.3   Deduction And Induction
1.3 Deduction And InductionNicholas Lykins
 
Critical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsCritical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsHanis Razak
 
Deductive and Inductive Arguments
Deductive and Inductive ArgumentsDeductive and Inductive Arguments
Deductive and Inductive ArgumentsJanet Stemwedel
 
Analysis - Inductive and Deductive Arguments
Analysis - Inductive and Deductive ArgumentsAnalysis - Inductive and Deductive Arguments
Analysis - Inductive and Deductive ArgumentsAlwyn Lau
 
Critical thinking-basics-ppt
Critical thinking-basics-pptCritical thinking-basics-ppt
Critical thinking-basics-pptAndresBrutas
 
cfa in mplus
cfa in mplus cfa in mplus
cfa in mplus SadhakNK
 
Research methodology methods, methodology and techniques
Research methodology  methods, methodology and techniquesResearch methodology  methods, methodology and techniques
Research methodology methods, methodology and techniques8089707913
 
Scientific method powerpoint.php
Scientific method powerpoint.phpScientific method powerpoint.php
Scientific method powerpoint.phpaimorales
 
Scientific research
Scientific researchScientific research
Scientific researchSimon Chege
 

What's hot (20)

Data Collection and Analysis Tools
Data Collection and Analysis ToolsData Collection and Analysis Tools
Data Collection and Analysis Tools
 
Fallacy and types
Fallacy and typesFallacy and types
Fallacy and types
 
Types of Argument presentation
Types of Argument presentationTypes of Argument presentation
Types of Argument presentation
 
1.3 Deduction And Induction
1.3   Deduction And Induction1.3   Deduction And Induction
1.3 Deduction And Induction
 
Notes for logic
Notes for logicNotes for logic
Notes for logic
 
Introduction to critical thinking
Introduction to critical thinkingIntroduction to critical thinking
Introduction to critical thinking
 
Critical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsCritical Thinking Skills - Arguments
Critical Thinking Skills - Arguments
 
Ch 3.theory and research
Ch 3.theory and researchCh 3.theory and research
Ch 3.theory and research
 
Deductive and Inductive Arguments
Deductive and Inductive ArgumentsDeductive and Inductive Arguments
Deductive and Inductive Arguments
 
Analysis - Inductive and Deductive Arguments
Analysis - Inductive and Deductive ArgumentsAnalysis - Inductive and Deductive Arguments
Analysis - Inductive and Deductive Arguments
 
Advanced research methods
Advanced research methodsAdvanced research methods
Advanced research methods
 
Critical thinking-basics-ppt
Critical thinking-basics-pptCritical thinking-basics-ppt
Critical thinking-basics-ppt
 
Argument
ArgumentArgument
Argument
 
cfa in mplus
cfa in mplus cfa in mplus
cfa in mplus
 
Fallacies and its types
Fallacies and its types Fallacies and its types
Fallacies and its types
 
Research methodology methods, methodology and techniques
Research methodology  methods, methodology and techniquesResearch methodology  methods, methodology and techniques
Research methodology methods, methodology and techniques
 
Theory building (brm)
Theory building (brm)Theory building (brm)
Theory building (brm)
 
Scientific method powerpoint.php
Scientific method powerpoint.phpScientific method powerpoint.php
Scientific method powerpoint.php
 
Inductive vs deductive reasoning
Inductive vs deductive reasoningInductive vs deductive reasoning
Inductive vs deductive reasoning
 
Scientific research
Scientific researchScientific research
Scientific research
 

Viewers also liked

Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Rohan Byanjankar
 
Inductive and deductive reasoning
Inductive and deductive reasoningInductive and deductive reasoning
Inductive and deductive reasoningAbir Chaaban
 
Introduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningIntroduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningrbangerter
 
Different approaches and methods
Different approaches and methodsDifferent approaches and methods
Different approaches and methodsswitlu
 
Probabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsProbabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsFulvio Rotella
 
Introduction to Design Thinking
Introduction to Design ThinkingIntroduction to Design Thinking
Introduction to Design ThinkingLuca Lamera
 
Practical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningPractical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningGuido Governatori
 
Think again how to reason and argue (recovered)
Think again  how to reason and argue (recovered)Think again  how to reason and argue (recovered)
Think again how to reason and argue (recovered)SenthilKumar Selvaraj
 
Inductive reasoning
Inductive reasoningInductive reasoning
Inductive reasoningMoy Alotumi
 
Obj. 10 Deductive Reasoning
Obj. 10 Deductive ReasoningObj. 10 Deductive Reasoning
Obj. 10 Deductive Reasoningsmiller5
 
Writing essays guidelines
Writing essays guidelinesWriting essays guidelines
Writing essays guidelinesjsanchep
 
Deductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesDeductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesGrenada High School
 
Diagnostic Report for Your Business
Diagnostic Report for Your BusinessDiagnostic Report for Your Business
Diagnostic Report for Your BusinessRaeganPotter
 
Photography composition presentation
Photography composition presentationPhotography composition presentation
Photography composition presentationAnup Ghimire
 
Inductive and Deductive Reasoning
Inductive and Deductive ReasoningInductive and Deductive Reasoning
Inductive and Deductive ReasoningKirsten Mary Montes
 
1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoningsmiller5
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control managementIzzah Noah
 

Viewers also liked (20)

Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...
 
Analytical
AnalyticalAnalytical
Analytical
 
Inductive and deductive reasoning
Inductive and deductive reasoningInductive and deductive reasoning
Inductive and deductive reasoning
 
Introduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningIntroduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoning
 
Different approaches and methods
Different approaches and methodsDifferent approaches and methods
Different approaches and methods
 
Probabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsProbabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible Worlds
 
Introduction to Design Thinking
Introduction to Design ThinkingIntroduction to Design Thinking
Introduction to Design Thinking
 
Practical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningPractical Non-Monotonic Reasoning
Practical Non-Monotonic Reasoning
 
Think again how to reason and argue (recovered)
Think again  how to reason and argue (recovered)Think again  how to reason and argue (recovered)
Think again how to reason and argue (recovered)
 
Inductive reasoning
Inductive reasoningInductive reasoning
Inductive reasoning
 
What is composition?
What is composition?What is composition?
What is composition?
 
Ikon business diagnostics
Ikon business diagnosticsIkon business diagnostics
Ikon business diagnostics
 
Obj. 10 Deductive Reasoning
Obj. 10 Deductive ReasoningObj. 10 Deductive Reasoning
Obj. 10 Deductive Reasoning
 
Writing essays guidelines
Writing essays guidelinesWriting essays guidelines
Writing essays guidelines
 
Deductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesDeductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic Puzzles
 
Diagnostic Report for Your Business
Diagnostic Report for Your BusinessDiagnostic Report for Your Business
Diagnostic Report for Your Business
 
Photography composition presentation
Photography composition presentationPhotography composition presentation
Photography composition presentation
 
Inductive and Deductive Reasoning
Inductive and Deductive ReasoningInductive and Deductive Reasoning
Inductive and Deductive Reasoning
 
1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control management
 

Similar to Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets OperationsTim Sheiner
 
Modeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsModeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsMitul Tiwari
 
Rapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowsRapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowstheCodery
 
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapNext Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapHeadspring
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsWSO2
 
Towards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsTowards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsLadislav Peska
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSusanne Brøndberg
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Matthias Braunhofer
 
EvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source SoftwareEvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source Softwarebpupadhyaya
 
Chapter12
Chapter12Chapter12
Chapter12Izaham
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5Pini Cohen
 
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018] ASML's MDE Going SiriusObeo
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...Amazon Web Services
 
Information system development
Information system developmentInformation system development
Information system developmentDhani Ahmad
 
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Splunk
 
Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityAggregage
 
On building more human query answering systems
On building more human query answering systemsOn building more human query answering systems
On building more human query answering systemsINRIA-OAK
 

Similar to Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system (20)

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets Operations
 
Modeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsModeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systems
 
Rapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowsRapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce Flows
 
IISc Project Presentation
IISc Project PresentationIISc Project Presentation
IISc Project Presentation
 
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapNext Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and Apps
 
Towards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsTowards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender Systems
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelse
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelse
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
EvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source SoftwareEvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source Software
 
Chapter12
Chapter12Chapter12
Chapter12
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5
 
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
 
Information system development
Information system developmentInformation system development
Information system development
 
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
 
Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and Reliability
 
On building more human query answering systems
On building more human query answering systemsOn building more human query answering systems
On building more human query answering systems
 
Revolution R: 100% R and more
Revolution R: 100% R and moreRevolution R: 100% R and more
Revolution R: 100% R and more
 

More from Pragmatic Cohesion Consulting, LLC

Applying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsApplying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsPragmatic Cohesion Consulting, LLC
 
Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Pragmatic Cohesion Consulting, LLC
 
Framework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessFramework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessPragmatic Cohesion Consulting, LLC
 
The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...Pragmatic Cohesion Consulting, LLC
 
Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Pragmatic Cohesion Consulting, LLC
 
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Pragmatic Cohesion Consulting, LLC
 
The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...Pragmatic Cohesion Consulting, LLC
 
The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...Pragmatic Cohesion Consulting, LLC
 
Balancing software project drivers a rational quantitative approach
Balancing software project drivers   a rational quantitative approachBalancing software project drivers   a rational quantitative approach
Balancing software project drivers a rational quantitative approachPragmatic Cohesion Consulting, LLC
 
Effective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisEffective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisPragmatic Cohesion Consulting, LLC
 
About the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsAbout the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsPragmatic Cohesion Consulting, LLC
 
34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!Pragmatic Cohesion Consulting, LLC
 
Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Pragmatic Cohesion Consulting, LLC
 

More from Pragmatic Cohesion Consulting, LLC (20)

Applying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsApplying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triads
 
Viewers locations usa - 30000
Viewers locations usa - 30000Viewers locations usa - 30000
Viewers locations usa - 30000
 
Viewers locations outside USA - 30000
Viewers locations outside USA - 30000Viewers locations outside USA - 30000
Viewers locations outside USA - 30000
 
Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...
 
Obstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitationObstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitation
 
Viewers locations in the USA
Viewers locations in the USAViewers locations in the USA
Viewers locations in the USA
 
Viewers locations outside the USA
Viewers locations outside the USAViewers locations outside the USA
Viewers locations outside the USA
 
Framework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessFramework for assessing business analysts situational awareness
Framework for assessing business analysts situational awareness
 
The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...
 
Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...
 
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
 
The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...
 
The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...
 
Balancing software project drivers a rational quantitative approach
Balancing software project drivers   a rational quantitative approachBalancing software project drivers   a rational quantitative approach
Balancing software project drivers a rational quantitative approach
 
M theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowermentM theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowerment
 
Effective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisEffective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysis
 
About the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsAbout the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methods
 
34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!
 
Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2
 
Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 

Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system

  • 1. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 1 Applying Deductive, Inductive, and Abductive Reasoning to the System Development Life-Cycle (SDLC)
  • 2. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 2 Didier Koffi Principal Business Architect Pragmatic Cohesion Consulting, LLC didier@pragmaticohesion.com Hosted by: Jessica Dahbour ITMPI Jessica_Dahbour@compaid.com
  • 3. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 3 About Presenter’s Firm • Since 2010, Pragmatic Cohesion has provided state of the art Business Architecture and Business Systems Analysis services that take advantage of our cutting edge approach to Enterprise Stakeholders’ collaboration and Business Model Assessment. • Our latest product is named the EBMM-TRIADs™ 3-day Assessment Workshop that measures your organization's ability to deliver outcomes that properly respond to the expectations and constraints imposed upon your business by its environment: markets, customers, suppliers, partners, competitors, regulators, shareholders, and various stakeholders. The assessment does so by asking a comprehensive set of simple questions that only require your familiarity with the various aspects of your business; NO books of records or balance sheets needed!
  • 4. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 4 CAI Achieves IT Operational Excellence www.compaid.com
  • 5. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 5 PDU Credits Available for this Webinar • The PMI has approved this webinar with PDUs • You will be eligible to receive 1.0 PDU credits • Your PDU email will be sent to you • This webinar is mapped to the TALENT TRIANGLE
  • 6. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 6 Online Webinar Recordings NOW AVAILABLE • Anytime Access • Hundreds of Topics Visit: www.ITMPI.org/library
  • 7. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 7 Enjoy the benefits of ITMPI Membership JOIN TODAY! • UNLIMITED Free Webinar Recordings • UNLIMITED Free PDU Credits • Hundreds of Topics Visit: www.ITMPI.org/subscribe
  • 8. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 8 Outline: • Deductive Reasoning • Inductive Reasoning • Abductive Reasoning • From Evidence to Hypothesis • From Solution System Feature to User Need • Requirements Validation • System Verification • Reasoning types across the System Development Life Cycle (SDLC) • Illustrative Example Applying Deductive, Inductive, and Abductive Reasoning to the System Development Life-Cycle (SDLC)
  • 9. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 9 Deductive reasoning is a form of reasoning that shows that certain conclusions follow necessarily from true premises Thale’s Theorem: Wikipedia In geometry, Thales' theorem states that if A, B and C are points on a circle where the line AB is a diameter of the circle, then the angle ∠ACB is a right angle
  • 10. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 10 Deductive reasoning is Top-Down, from generalizations to particulars or from hypothesis to evidence.
  • 11. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 11 Inductive reasoning asserts that something is probably true given some evidence relevant to it.
  • 12. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 12 • With Inductive reasoning we consider a “mass of evidence” that we believe is relevant to a set of hypothesis H. The probabilistic nature of inductive inference comes from the following characteristics of the “mass of evidence”: – It is incomplete – It is inconclusive (It is consistent to some degree with the truth of every hypothesis in H) – It may be vague or imprecise – It may be dissonant (some of it favors one hypothesis and some favor others) – Its sources may not be perfectly credible
  • 13. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 13 Abductive reasoning is concern with imaginative reasoning, a process through which new ideas or hypotheses come into existence based on observations. In deductive reasoning a conclusion is already embedded in its premises. In inductive reasoning, a hypothesis or idea already exists and we are just establishing probabilistic grounds for it.
  • 14. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 14 Abductive reasoning is also used to generate inference networks: the skillful combination of relevance and credibility characteristics of evidence.
  • 15. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 15 Eco’s “Overcoded Abduction” according to Schum • We observe clue E* (E* being evidence that event E occurred) • Based on our prior knowledge of contexts in which things like event E have occurred, we say: “Whenever something like H has occurred, then something like E has also occurred.” Rephrased, we might say: “If H were true, then E would follow as a matter of course.” • Thus, there is reason to suspect that H may explain the occurrence of clue E*. In other words, clue E* points to H as a possible explanation for its occurrence. From Evidence to Hypothesis
  • 16. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 16 From Evidence to Hypothesis Example H=Hypothesis Set H=It rained overnight; Hc= It did not rain overnight E=Event relevant in an Inference about H E=My lawn is wet; Ec=My lawn is not wet E*=Evidence that E occurred E*:My hands were wet after touching a patch of grass From E* to E : Credibility Stage P(E*|E) Hit probability P(My hands were wet after touching a patch of grass | My lawn is wet) P(E*|Ec) False positive probability P(My hands were wet after touching a patch of grass | My lawn is not wet) From E to H : Relevance Stage P(E|H) > P(E|Hc) E favors H over Hc If P(My lawn is wet | It rained overnight) >P(My lawn is wet| It did not rain overnight) then ‘My lawn is wet’ favors H ‘It rained overnight’ P(E|H) < P(E|Hc) E favors Hc over H If P(My lawn is wet | It rained overnight) <P(My lawn is wet| It did not rain overnight) then ‘My lawn is wet’ favors Hc ‘It did not rain overnight’
  • 17. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 17 To go from Solution System Features to User Needs, we use Abductive Reasoning through our imagination to generate an “Argument” much similar to linking Evidence to Hypothesis. From Solution System Features to User Needs
  • 18. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 18 The Argument is embedded in the structure of a Hierarchy of Requirements: from detailed Technical Requirements and Specifications, System Requirements, Business Requirements, up to Mission Requirements. From Solution System Features to User Needs
  • 19. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 19 Evidence to Hypothesis Solution System Feature to User Need H: Hypothesis Set User Need = UN E: Event relevant in an Inference about H Requirement= R : R satisfies UN E*: Evidence that E occurred System Features = S : Evidence that R is implemented From E* to E : Credibility Stage From S to R : Verification Stage P(E*|E) Hit probability P(S|R): is Requirement implemented? P(E*|Ec) False positive probability P(S|Rc): is Requirement not implemented? From E to H : Relevance Stage From R to UN : Validation Stage P(E|H) > P(E|Hc) E favors H over Hc P(R|UN) > P(R|UNc) : R satisfies UN over UNc P(E|H) < P(E|Hc) E favors Hc over H P(R|UN) < P(R|UNc) : R satisfies UNc over UN
  • 20. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 20 The Hierarchy of Requirements is constructed to maximize: P(R|UN) > P(R|UNc) : the probability that the Requirements Hierarchy (R) satisfies User Needs (UN); which is the primary index of Requirements Validation Requirements Validation
  • 21. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 21 The Solution System Features are crafted to maximize: P(S|R) : the likelihood that Requirements (R) are implemented by the Solution System Features (S); which is the primary Index of System Verification. System Verification
  • 22. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 22 Features included in Solution System = S Features not included in Solution System = Sc Current User Needs=UN Not User Needs = UNc Requirements Hierarchy= R P(R|UN) > P(R|UNc) : R satisfies User Needs P(R|UN) < P(R|UNc) : R does not satisfy User Needs Validation Stage = Inductive Reasoning P(S|R) : are Requirements implemented? P(S|Rc) : are Requirements not implemented? Verification Stage Requirements Hierarchy is created through Abductive Reasoning Deductive Reasoning Deductive Reasoning Reasoning types across the System Development Life Cycle (SDLC)
  • 23. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 23 We recommend viewing the LinkedIn presentation titled “ 6-Dimension Business Model” for an in-depth coverage on how to assemble a linked set of credibility and relevance evidence to transform Customer Demands and Relationships (User Needs) into appropriate and profitable Product and Service offerings. class EBMM Framework WHATWHY Business Policy Policy Type Mission Vision Principle Directive Business Initiative/Program Driver Business Goal Capability Road Map Charter/Legislation Business Strategy/Objective Success Metric/Measure Influencer Business Rules and Facts Customer Demand and Relationship Value Proposition RegulationCompetitive Pressure Business Trend Competitive Opportunity Business Model Assessment Business Judgement Potential ImpactPotential Reward Risk Issues StrengthWeakness Recommendation of Change WHO Stakeholder Governance Body Business Unit Business Alliance and Partnership Influencing Organization Market Segment Business Capability Required Competency Asset Product and Service Business Requirement Use Case or User Story Data Object WHERE Geography/ Locale Distribution Channels HOW Business Process / Activity Application System Interaction Point Application Feature Assessment Metric Process MetricKey Performance Indicator Finance and Revenue Model EBMM-TRIADS(TM) (c) 2013-2015 Pragmatic Cohesion Consulting LLC , All Rights Reserved requires describes governs use of described in responds to input to evaluates performs measures describes changes to provides impetus for Operates from targets quantifies responsible for governs tracks success of delivered through enforces generates provided by affect and demand tracks drives packages implemented through produces and consumes
  • 24. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 24 Reasoning Examples • The User Needs are similar to the Hypothesis set. • The highest level of the Requirements Hierarchy such as Mission Requirements, correspond to the particulars or the evidence that we can deduce from the User Needs.
  • 25. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 25 Reasoning Examples • Example of AQUATIO drinking fountain: – User Needs: A Drinking Fountain that does not splash water when user drinks directly from it and that requires minimal bending of user’ s body when operated. – Mission Requirements can de deduced from the formulation of use cases describing the interaction of the user with the Drinking Fountain in its expected operating environment(s).
  • 26. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 26 Reasoning Examples • In turn, the lowest level of the Requirements Hierarchy such as the Technical Specifications resulting from design activities, can be used to deduce the Solution System Features. ”The fountain is shaped like a bowl and can be pivoted up to four inches which will considerably reduce the need to bend over when drinking water from the fountain. By pressing left side of the fountain, cold water will start to flow and pressing the right side will give you room temperature water.”
  • 27. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 27 • X has property G (we wish to know why) • If entity A has particular relation R to any X, then that X has property G • Thus, there is possibly some A that has relation R to X (which explains why X has property G) Reasoning Examples Thagard’s “Existential Abduction” according to Schum: • System X has Goal G (we wish to know why) • If entity A has particular relation R to any System X, then that System X has Goal G • Thus, there is possibly some A that has relation R to System X (which explains why System X has Goal G)
  • 28. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 28 Reasoning Examples Thagard’s “Existential Abduction” according to Schum: • System X has Goal G (we wish to know why) • If entity A has particular relation R to any System X, then that System X has Goal G • Thus, there is possibly some A that has relation R to System X (which explains why System X has Goal G) • System X has Goal G (we wish to know why) • If entity A is a System Rule for[relation] any System X, then that System X has Goal G • Thus, there is possibly some A that is a System Rule for[relation] System X (which explains why System X has Goal G)
  • 29. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 29 Reasoning Examples Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals [C2] System Functions [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules P(C4|C1) > P(C4|C1c) [C5] System Processes P(C5|C2) > P(C5|C2c) [C6] System Entities P(C6|C3) > P(C6|C3c) Logical (System model) support support support support support P(C2|C1) > P(C2|C1c) P(C3|C1) > P(C3|C1c)
  • 30. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 30 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules [C5] System Processes [C6] System Entities ? ? ? ? ?
  • 31. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 31 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules [C5] [C6] drive ? ? are supported by
  • 32. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 32 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] drive are supported by
  • 33. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 33 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] drive used by ?
  • 34. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 34 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] ? System Processes are supported by govern
  • 35. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 35 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] things important to the System -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] System Rules -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] System Processes -Controlling water on/off flow -Routing fountain water -Controlling water temperature -Controlling distance between water flow trajectory and user’s mouth with minimal body bending -Controlling water flow shape, speed and angle of impact on receiving surface [C6] System Entities govern use of ?produce are supported by
  • 36. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 36 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] Things important to the System -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] System Rules -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] System Processes -Controlling water on/off flow -Routing fountain water -Controlling water temperature -Controlling distance between water flow trajectory and user’s mouth with minimal body bending -Controlling water flow shape, speed and angle of impact on receiving surface [C6] System Entities -Users’ height range -Water drinkable quality -Water trajectories induced by water flow shape and speed -Angle between water flow and receiving surface -Water flow splash level -Distances between water flow and user’s mouth while standing -User’s body bending angle per water flow trajectories and user’s body heights
  • 37. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 37 References: • “Enterprise Business Motivation Model (EBMM) TRIADS™ –The Chemistry of Business Architecture Alignment,” Koffi A.D., Journal of Enterprise Architecture, volume 11, number 1, pp28-40 (2015) • “A Model for Characterizing the Influence of the Zachman Framework’s Enterprise Architecture Perspectives,” Koffi A.D., Journal of Enterprise Architecture, volume 6, number 2, pp30-47 (2010) • “Structuring design Knowledge for Better Design Synthesis”, Tomiyama T., International conference on Engineering Design, August pp19-20 (2003) • “Species of Abductive Reasoning in Fact Investigation in Law," Schum D. ,Cardozo Law Review, Vol 22, Nos 5 - 6, pp1645 -1681 (2001) • “The engineering design of systems: models and methods”, Buede D.M. , Wiley, New York (2000). • "Probabilistic Reasoning and the Science of Complexity," Shanteau, J., Mellors. B., Schum, D. (Eds.) Decision Science and Technology, Kluwer Academic Press, pp183-209 (1999) • “Systems engineering and analysis” Blanchard B.S. and Fabrycky W.J. , Prentice-Hall, Upper Saddle River, NJ (1998)
  • 38. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 38 Questions?
  • 39. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 39 CAI Sponsors Proudly Sponsors The IT Metrics & Productivity Institute • Accelerating IT Success: News & Education: www.aits.org • The Strategic CIO: www.thestrategiccio.com • Calendar of LIVE daily webinars: www.itmpi.org/webinars • HUGE repository of webinar recordings: www.itmpi.org/library • Enjoy the Benefits of ITMPI Membership at: www.itmpi.org/subscribe • Automatic Registration for Live Webinars • Unlimited Free PDU and Recording Access for ONE YEAR • Access to Over 1000+ PDUs for a Period of ONE YEAR • Stay tuned for our awesome new mobile app, the Great IT Pro!
  • 40. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 40 Easily Maintain Your PMP with Unlimited Access To Over 1,000 PDU Approved Webinars For One Low Yearly Price! www.itmpi.org/subscribe
  • 41. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 41 Hosted by: Jessica Dahbour ITMPI Jessica_Dahbour@compaid.com Didier Koffi Principal Business Architect Pragmatic Cohesion Consulting, LLC didier@pragmaticohesion.com