SlideShare ist ein Scribd-Unternehmen logo
1 von 41
Case Study
Presented by:
Prakash Poudel
Poudelprakash25@gmail.com
COCOMO Cost Estimation
Model
 It stand for Constructive Cost Model.
 COCOMO (Constructive Cost Model) is a cost estimation
model.
 COCOMO was developed by Barry Boehm.
 It applies on three classes of Software Project:
-Organic Projects
-Semi-Detach
-Embedded project
 Organic
- 2-50KLOC
- Small team
- Good Experience Developers
- Less rigid requirement
- Not tight Deadline
- Example: Payroll, Inventory System
 Semi-detached
- 50-300KLOC
- Medium team with mixed experience Developers
- Mixed rigidness
- Medium Deadline
- Example : Database System
 Embedded
- over 300KLOC
- Large Project
- Real time System
- Combination of organic and semi detached models
- Example : ATM, Air traffic control
Stages of COCOMO
BASIC COCOMO
 Approximate estimate of project parameters
 Software development effort is estimated
using Line of Code(LOC)
 Rough calculation of software cost
Formula of Basic COCOMO
 Effort applied(E) = ab(KLOC)bb
 Development Time(D) = cb(E)db
 People required(P) = E/D
Here a, b, c, d are the constraint.
Basic COCOMO Co-efficient
Intermediate
COCOMO
 Extension of Basic Cocomo
 Refines estimate obtained by Basic
Cocomo
 Improves the basic cocomo
Classification of Cost Drivers and their
attributes:
(i) Product attributes
 Size of the application database
 Required software reliability extent
 The complexity of the product
(ii) Hardware attributes
 Run-time performance constraints
 Memory constraints
 The volatility of the virtual machine
environment
 Required turnabout time
(iii) Personnel attributes
 Analyst capability
 Software engineering capability
 Applications experience
 Virtual machine experience
 Programming language experience
(iv) Project attributes
 Application of software engineering methods
 Use of software tools
 Required development schedule
Formula of Intermediate COCOMO
 Effort applied(E) = ai(KLOC)bi * (EAF)
 Development Time(D) = Ci(E)dd
 People required(P) = E/D
Here a, b, c, d are the constraint.
EAF stands for Effort Adjustment Factors
Typical values for EAF range from 0.9 to 1.4
There are 15 EAF in Intermediate Cocomo.
DETAILED COCOMO
 It is used for large sized projects.
 The cost drivers depend upon
requirements, analysis, design, testing
and maintenance.
 Team size is large.
 It refines Intermediate Cocomo.
The Six phases of detailed COCOMO
Are:
 Planning and requirements
 System design
 Detailed design
 Module code and test
 Integration and test
 Cost Constructive model
Each cost driver is broken down by phases
as in the example shown in table.
 Estimates for each module are combined into
subsystems and eventually an overall project estimate.
 Using the detailed cost drivers, an estimate is
determined for each phase of the lifecycle
 The Detailed COCOMO equations take
the form
E = ai (KLOC)bi * EAF
D = ci (E)di
Ep = µp*E
Dp = p*D
SS = E/D persons
P = KLOC/E
Example case
Consider a project to develop a full screen
editor. The major components identified are (1)
Screen edit, (2) Command Language
Interpreter, (3) File input and output, (4) Cursor
movement and (5) Screen movement. The
sizes for these are estimated to be 4K, 2K, 1K,
2K and 3K delivered source code lines. Use
COCOMO model to determine:
 Overall cost and schedule estimates
(assume values for different cost drivers,
with at least three of them being different
from 1.0).
Solution Size of 5 modules are
Screen edit = 4KLOC
Command Language Interpreter = 2KLOC File input
and output = 1KLOC
Cursor movement and = 2KLOC
Screen movement = 3KLOC
Total = 12KLOC
Let us assume that significant cost drivers are :
 Required software reliability is high i.e. 1.15
 Product complexity is high i.e. 1.15
 Analyst capability is high i.e. 0.86
 All other drivers are nominal i.e. 1.00
Hence
EAF = 1.15 * 1.15 * 0.86 = 1.1373
The initial effort estimate for the project
E = ai (KLOC)bi * EAF
=3.2(12)1.05 * 1.1373
= 49.449 PM (person-month)
D = ci (E)di
= 2.5(49.44)0.38
= 11.007 M(month)
Total person = E/D
= 44.449/11.007
= 4.038
That is total person = 4
CCPDS-R Case Study…..
Command center processing and display
system-replacement [CCPSS-R] project
was performed for the U.S. Air force by
technical review workgroup (TRW) space
and defense in Redondo Beach,
California. The entire project included
system engineering, hardware
procurement, and software development,
with each of these three major activities
consuming about one-third of the total
cost.
Key Points of CCPDS-R
 An objective case study is a true
indicator of a mature organization and a
mature project process. The software
industry needs more case studies like
CCPDS-R
 CCPDS-R was one of the pioneering
projects that practiced many modern
management approaches.
Usage areas of interest where
CCPDS-R mostly used:
Army
Defense
Intelligence
Ministry of defense
Force
Space
Discovery
Study
Software acquisitions
process:-
 Competitive Design phase [CD] Phase
 Full-scale Development phase[FSD]
Phase
Competitive Design phase [CD]
Phase
This Concept Definition Phase included following
activities:
• Analyze and specify the project requirements
• Define and develop the top-level architecture
• Plan FSD phase software development activities
• Configure the process and development
environment
• Establish trust and win-win relationships among
the stakeholder
Full-scale Development phase[FSD]
Phase
i. Software requirements review (SRR)
-Initial feasibility of the foundation components
-Basic use cases of Initialization
ii. Interim preliminary design review (IPDR)
-Feasibility of the architectural infrastructure under
riskiest use cases
iii. Preliminary design review (PDR)
-Adequate achievement of the peak load scenarios
iv. Critical design review (CDR)
-Update of the architectural baseline for test capability
of whole system
Project Organization &
Responsibilities
 Analyze and specify the project requirement
 Define and develop the top-level architecture
 Plan the FSD phase software development
activities
 Configure the process and development
environment
 Establish trust and win –win relationships
among the stakeholders.
CCPDS-R Life cycle
Overview
THE INCREMENTAL DESIGN
PROCESS
Well Defined sequence of walkthroughs took place:
i. Preliminary design walkthrough(PDW)
-Initial Prototyping and Design Work
ii. Critical design walkthrough(CDW)
- Build’s Design Work
iii. Code walkthrough(CW)
-Detailed Code Walkthrough
iv. Turnover review(TR)
-A one month activity including SAT, BIT ,
EST
The Incremental Test Process
i. Stand-alone test
-Corresponds to completeness and boundary condition
tests to the possible extent
ii. Build integration test
-To ensure previously demonstrated capabilities still
operated as expected
iii. Reliability test
-Help uncover potentially insipid, transient errors of major design
consequence
iv. Engineering string test
-Verifying specific subsets of requirements through demonstration
v. Final qualification test
-Represented a set of requirements which could not be verifying until whole system was present
Ex: a 50% reserve capacity requirement could not be verified until FQT, when whole system
was operational
Metrics
• Development Progress (% coded) vs time
• Requirements verified vs time
• Average hours per software change order (SCO)
• Cost/Effort Expenditure By Activity
• Mean time between failure (MTBF) vs total test
hours
• Cumulative SLOC vs budget
People Factors
• Core team concept
• Leverage skills of a few experts across the entire
team
• Avoid attrition
• Profit sharing of award fees
Introduction
 CMM was developed by the Software Engineering Institute
(SEI) at Carnegie Mellon University in 1987.
 It is a framework which is used to analyze the approach and
techniques followed by any organization to develop software
product.
 It also provides guidelines to further enhance the maturity of
those software products.
 5 different levels.
Capability Maturity Model
Five Levels
1. Level 1 – Initial
2. Level 2 – Repeatable
3. Level 3 – Defined
4. Level 4 – Managed
5. Level 5 - Optimized
Level-1: Initial
 Processes followed are immature and
are not well defined.
 No basis for predicting product quality,
time for completion, etc.
 No KPA’s defined.
Level-2: Repeatable
 Least documented and repeating same steps again and again.
 Experience with earlier projects is used for managing new similar natured projects.
KPA’s:
 Project Planning- It includes defining resources required, goals, constraints, etc. for the
project. It presents a detailed plan to be followed systematically for successful completion
of a good quality software.
 Configuration Management- The focus is on maintaining the performance of the software
product, including all its components, for the entire lifecycle.
 Requirements Management- It includes the management of customer reviews and
feedback which result in some changes in the requirement set.
 Subcontract Management- It focuses on the effective management of qualified software
contractors i.e. it manages the parts of the software which are developed by third parties.
 Software Quality Assurance- It guarantees a good quality software product by following
certain rules and quality standard guidelines while development.
Level-3: Defined
 At this level, documentation of the standard guidelines and
procedures takes place.
 Process are well defined and confirmed.
KPA’s:
 Peer Reviews- In this method, defects are removed by using a
number of review methods like demonstration, survey, etc.
 Intergroup Coordination- It consists of planned interactions
between different development teams to ensure efficient and
proper fulfillment of customer needs.
 Organization Process Definition- It’s key focus is on the
development and maintenance of the standard development
processes.
 Organization Process Focus- It includes activities and practices
that should be followed to improve the process capabilities of an
organization.
 Training Programs- It focuses on the enhancement of knowledge
and skills of the team members including the developers and
ensuring an increase in work efficiency.
Level-4: Managed
 At this stage, quantitative quality goals are set for
the organization for software products as well as
software processes.
KPA’s:
 Software Quality Management- It includes the
establishment of plans and strategies to develop a
quantitative analysis and understanding of the
product’s quality.
 Quantitative Management- It focuses on controlling
the project performance in a quantitative manner.
Level-5: Optimizing
 This is the highest level of process maturity in CMM and focuses on
continuous process improvement in the organization using quantitative
feedback.
 Use of new tools, techniques and evaluation of software processes is done to
prevent recurrence of known defects.
KPA’s:
 Process Change Management- Its focus is on the continuous improvement
of organization’s software processes to improve productivity, quality and
cycle time for the software product.
 Technology Change Management- It consists of identification and use of new
technologies to improve product quality and decrease the product
development time.
 Defect Prevention- It focuses on identification of causes of defects and to
prevent them from recurring in future projects by improving project defined
process.
Thank You!!

Weitere ähnliche Inhalte

Was ist angesagt?

Lecture5
Lecture5Lecture5
Lecture5soloeng
 
Effort estimation( software Engineering)
Effort estimation( software Engineering)Effort estimation( software Engineering)
Effort estimation( software Engineering)kiran Patel
 
Software cost estimation project
Software  cost estimation projectSoftware  cost estimation project
Software cost estimation projectShashank Puppala
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimationtumetr1
 
Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Bilal Hassan
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimationHaitham Ahmed
 
Issues in software cost estimation
Issues in software cost estimationIssues in software cost estimation
Issues in software cost estimationKashif Aleem
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimationdeep sharma
 
Software cost estimation techniques presentation
Software cost estimation techniques presentationSoftware cost estimation techniques presentation
Software cost estimation techniques presentationKudzai Rerayi
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimationNur Islam
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metricsIndu Sharma Bhardwaj
 
Software Estimation Part I
Software Estimation Part ISoftware Estimation Part I
Software Estimation Part Isslovepk
 
software cost factor
software cost factorsoftware cost factor
software cost factorAbinaya B
 
Software Cost Estimation
Software Cost EstimationSoftware Cost Estimation
Software Cost EstimationMirza Obaid
 
Software estimation techniques
Software estimation techniquesSoftware estimation techniques
Software estimation techniquesTan Tran
 

Was ist angesagt? (20)

Lecture5
Lecture5Lecture5
Lecture5
 
Effort estimation( software Engineering)
Effort estimation( software Engineering)Effort estimation( software Engineering)
Effort estimation( software Engineering)
 
Software cost estimation project
Software  cost estimation projectSoftware  cost estimation project
Software cost estimation project
 
Software effort estimation
Software effort estimationSoftware effort estimation
Software effort estimation
 
Decomposition technique In Software Engineering
Decomposition technique In Software Engineering Decomposition technique In Software Engineering
Decomposition technique In Software Engineering
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Issues in software cost estimation
Issues in software cost estimationIssues in software cost estimation
Issues in software cost estimation
 
Wideband Delphi Estimation
Wideband Delphi EstimationWideband Delphi Estimation
Wideband Delphi Estimation
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Software cost estimation techniques presentation
Software cost estimation techniques presentationSoftware cost estimation techniques presentation
Software cost estimation techniques presentation
 
Metrics for project size estimation
Metrics for project size estimationMetrics for project size estimation
Metrics for project size estimation
 
Software Cost Estimation
Software Cost EstimationSoftware Cost Estimation
Software Cost Estimation
 
COCOMO MODEL
COCOMO MODELCOCOMO MODEL
COCOMO MODEL
 
Software process and project metrics
Software process and project metricsSoftware process and project metrics
Software process and project metrics
 
Software cost estimation
Software cost estimationSoftware cost estimation
Software cost estimation
 
Software Estimation Part I
Software Estimation Part ISoftware Estimation Part I
Software Estimation Part I
 
COCOMO Model By Dr. B. J. Mohite
COCOMO Model By Dr. B. J. MohiteCOCOMO Model By Dr. B. J. Mohite
COCOMO Model By Dr. B. J. Mohite
 
software cost factor
software cost factorsoftware cost factor
software cost factor
 
Software Cost Estimation
Software Cost EstimationSoftware Cost Estimation
Software Cost Estimation
 
Software estimation techniques
Software estimation techniquesSoftware estimation techniques
Software estimation techniques
 

Ähnlich wie Cocomo ( cot constrictive model) and capability maturity model

COCOMO methods for software size estimation
COCOMO methods for software size estimationCOCOMO methods for software size estimation
COCOMO methods for software size estimationPramod Parajuli
 
Exp 02-COCOMO (1).pptx
Exp 02-COCOMO (1).pptxExp 02-COCOMO (1).pptx
Exp 02-COCOMO (1).pptxYagnaGummadi
 
Software Engineering Fundamentals in Computer Science
Software Engineering Fundamentals in Computer ScienceSoftware Engineering Fundamentals in Computer Science
Software Engineering Fundamentals in Computer ScienceArti Parab Academics
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5SIMONTHOMAS S
 
3wis_2.pdf
3wis_2.pdf3wis_2.pdf
3wis_2.pdfaustdali
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniqueskamal
 
MC0084 – Software Project Management & Quality Assurance - Master of Computer...
MC0084 – Software Project Management & Quality Assurance - Master of Computer...MC0084 – Software Project Management & Quality Assurance - Master of Computer...
MC0084 – Software Project Management & Quality Assurance - Master of Computer...Aravind NC
 
Testing material (1).docx
Testing material (1).docxTesting material (1).docx
Testing material (1).docxKVamshiKrishna5
 
Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation ApproachSabiha M
 
Estimation techniques and risk management
Estimation techniques and risk managementEstimation techniques and risk management
Estimation techniques and risk managementPurushottam Basnet
 
Pm soln9416141129710
Pm soln9416141129710Pm soln9416141129710
Pm soln9416141129710Nikhil Todkar
 
Project-Planning
Project-PlanningProject-Planning
Project-PlanningRon Drew
 
Essence of waterfall_model
Essence of waterfall_modelEssence of waterfall_model
Essence of waterfall_modelwanda31
 
Kelis king - requirements analysis and the unified process
Kelis king - requirements analysis and the unified processKelis king - requirements analysis and the unified process
Kelis king - requirements analysis and the unified processKelisKing
 

Ähnlich wie Cocomo ( cot constrictive model) and capability maturity model (20)

COCOMO methods for software size estimation
COCOMO methods for software size estimationCOCOMO methods for software size estimation
COCOMO methods for software size estimation
 
Exp 02-COCOMO (1).pptx
Exp 02-COCOMO (1).pptxExp 02-COCOMO (1).pptx
Exp 02-COCOMO (1).pptx
 
cost-estimation-tutorial
cost-estimation-tutorialcost-estimation-tutorial
cost-estimation-tutorial
 
Software Engineering Fundamentals in Computer Science
Software Engineering Fundamentals in Computer ScienceSoftware Engineering Fundamentals in Computer Science
Software Engineering Fundamentals in Computer Science
 
CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5CS8494 SOFTWARE ENGINEERING Unit-5
CS8494 SOFTWARE ENGINEERING Unit-5
 
Cost estamition
Cost estamitionCost estamition
Cost estamition
 
Cocomo model
Cocomo modelCocomo model
Cocomo model
 
3wis_2.pdf
3wis_2.pdf3wis_2.pdf
3wis_2.pdf
 
Spm unit 3
Spm unit 3Spm unit 3
Spm unit 3
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
5. COCOMO.pdf
5. COCOMO.pdf5. COCOMO.pdf
5. COCOMO.pdf
 
MC0084 – Software Project Management & Quality Assurance - Master of Computer...
MC0084 – Software Project Management & Quality Assurance - Master of Computer...MC0084 – Software Project Management & Quality Assurance - Master of Computer...
MC0084 – Software Project Management & Quality Assurance - Master of Computer...
 
Testing material (1).docx
Testing material (1).docxTesting material (1).docx
Testing material (1).docx
 
Metrics
MetricsMetrics
Metrics
 
Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation Approach
 
Estimation techniques and risk management
Estimation techniques and risk managementEstimation techniques and risk management
Estimation techniques and risk management
 
Pm soln9416141129710
Pm soln9416141129710Pm soln9416141129710
Pm soln9416141129710
 
Project-Planning
Project-PlanningProject-Planning
Project-Planning
 
Essence of waterfall_model
Essence of waterfall_modelEssence of waterfall_model
Essence of waterfall_model
 
Kelis king - requirements analysis and the unified process
Kelis king - requirements analysis and the unified processKelis king - requirements analysis and the unified process
Kelis king - requirements analysis and the unified process
 

Mehr von Prakash Poudel

Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threatsPrakash Poudel
 
Earliest Due Date Algorithm for Task scheduling for cloud computing
Earliest Due Date  Algorithm for Task scheduling for cloud computingEarliest Due Date  Algorithm for Task scheduling for cloud computing
Earliest Due Date Algorithm for Task scheduling for cloud computingPrakash Poudel
 
Recent and-future-trends spm
Recent and-future-trends spmRecent and-future-trends spm
Recent and-future-trends spmPrakash Poudel
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency controlPrakash Poudel
 
Maximum power transfer theorem
Maximum power transfer theoremMaximum power transfer theorem
Maximum power transfer theoremPrakash Poudel
 
Telephone call-simulation
Telephone call-simulationTelephone call-simulation
Telephone call-simulationPrakash Poudel
 
General Online Health Information System Proposed Application
General Online Health Information System Proposed ApplicationGeneral Online Health Information System Proposed Application
General Online Health Information System Proposed ApplicationPrakash Poudel
 
Nepal Doorsanchar Company Limited Internship Experience
Nepal Doorsanchar Company Limited Internship Experience Nepal Doorsanchar Company Limited Internship Experience
Nepal Doorsanchar Company Limited Internship Experience Prakash Poudel
 
Multimedia Technology in computer
Multimedia Technology in computerMultimedia Technology in computer
Multimedia Technology in computerPrakash Poudel
 
File permission in linux
File permission in linuxFile permission in linux
File permission in linuxPrakash Poudel
 
organization Management
organization Managementorganization Management
organization ManagementPrakash Poudel
 
Organization Management Concept
Organization Management Concept Organization Management Concept
Organization Management Concept Prakash Poudel
 
Java Programming concept
Java Programming concept Java Programming concept
Java Programming concept Prakash Poudel
 

Mehr von Prakash Poudel (20)

Web applications vulnerabilities and threats
Web applications vulnerabilities and threatsWeb applications vulnerabilities and threats
Web applications vulnerabilities and threats
 
Earliest Due Date Algorithm for Task scheduling for cloud computing
Earliest Due Date  Algorithm for Task scheduling for cloud computingEarliest Due Date  Algorithm for Task scheduling for cloud computing
Earliest Due Date Algorithm for Task scheduling for cloud computing
 
Recent and-future-trends spm
Recent and-future-trends spmRecent and-future-trends spm
Recent and-future-trends spm
 
Locking base concurrency control
  Locking base concurrency control  Locking base concurrency control
Locking base concurrency control
 
Microprocessor
Microprocessor Microprocessor
Microprocessor
 
Maximum power transfer theorem
Maximum power transfer theoremMaximum power transfer theorem
Maximum power transfer theorem
 
Linux technology
Linux technologyLinux technology
Linux technology
 
Java PU solution
Java PU solution Java PU solution
Java PU solution
 
System administration
System administrationSystem administration
System administration
 
Telephone call-simulation
Telephone call-simulationTelephone call-simulation
Telephone call-simulation
 
General Online Health Information System Proposed Application
General Online Health Information System Proposed ApplicationGeneral Online Health Information System Proposed Application
General Online Health Information System Proposed Application
 
Nepal Doorsanchar Company Limited Internship Experience
Nepal Doorsanchar Company Limited Internship Experience Nepal Doorsanchar Company Limited Internship Experience
Nepal Doorsanchar Company Limited Internship Experience
 
SQL & PLSQL
SQL & PLSQLSQL & PLSQL
SQL & PLSQL
 
Software engineering
Software engineeringSoftware engineering
Software engineering
 
Multimedia Technology in computer
Multimedia Technology in computerMultimedia Technology in computer
Multimedia Technology in computer
 
File permission in linux
File permission in linuxFile permission in linux
File permission in linux
 
organization Management
organization Managementorganization Management
organization Management
 
Organization Management Concept
Organization Management Concept Organization Management Concept
Organization Management Concept
 
Java Programming concept
Java Programming concept Java Programming concept
Java Programming concept
 
Letest
LetestLetest
Letest
 

Kürzlich hochgeladen

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Cocomo ( cot constrictive model) and capability maturity model

  • 1. Case Study Presented by: Prakash Poudel Poudelprakash25@gmail.com
  • 2. COCOMO Cost Estimation Model  It stand for Constructive Cost Model.  COCOMO (Constructive Cost Model) is a cost estimation model.  COCOMO was developed by Barry Boehm.  It applies on three classes of Software Project: -Organic Projects -Semi-Detach -Embedded project
  • 3.  Organic - 2-50KLOC - Small team - Good Experience Developers - Less rigid requirement - Not tight Deadline - Example: Payroll, Inventory System  Semi-detached - 50-300KLOC - Medium team with mixed experience Developers - Mixed rigidness - Medium Deadline - Example : Database System  Embedded - over 300KLOC - Large Project - Real time System - Combination of organic and semi detached models - Example : ATM, Air traffic control
  • 4.
  • 6. BASIC COCOMO  Approximate estimate of project parameters  Software development effort is estimated using Line of Code(LOC)  Rough calculation of software cost
  • 7. Formula of Basic COCOMO  Effort applied(E) = ab(KLOC)bb  Development Time(D) = cb(E)db  People required(P) = E/D Here a, b, c, d are the constraint.
  • 9. Intermediate COCOMO  Extension of Basic Cocomo  Refines estimate obtained by Basic Cocomo  Improves the basic cocomo
  • 10. Classification of Cost Drivers and their attributes: (i) Product attributes  Size of the application database  Required software reliability extent  The complexity of the product (ii) Hardware attributes  Run-time performance constraints  Memory constraints  The volatility of the virtual machine environment  Required turnabout time
  • 11. (iii) Personnel attributes  Analyst capability  Software engineering capability  Applications experience  Virtual machine experience  Programming language experience (iv) Project attributes  Application of software engineering methods  Use of software tools  Required development schedule
  • 12. Formula of Intermediate COCOMO  Effort applied(E) = ai(KLOC)bi * (EAF)  Development Time(D) = Ci(E)dd  People required(P) = E/D Here a, b, c, d are the constraint. EAF stands for Effort Adjustment Factors Typical values for EAF range from 0.9 to 1.4 There are 15 EAF in Intermediate Cocomo.
  • 13. DETAILED COCOMO  It is used for large sized projects.  The cost drivers depend upon requirements, analysis, design, testing and maintenance.  Team size is large.  It refines Intermediate Cocomo.
  • 14. The Six phases of detailed COCOMO Are:  Planning and requirements  System design  Detailed design  Module code and test  Integration and test  Cost Constructive model
  • 15. Each cost driver is broken down by phases as in the example shown in table.  Estimates for each module are combined into subsystems and eventually an overall project estimate.  Using the detailed cost drivers, an estimate is determined for each phase of the lifecycle
  • 16.  The Detailed COCOMO equations take the form E = ai (KLOC)bi * EAF D = ci (E)di Ep = µp*E Dp = p*D SS = E/D persons P = KLOC/E
  • 17. Example case Consider a project to develop a full screen editor. The major components identified are (1) Screen edit, (2) Command Language Interpreter, (3) File input and output, (4) Cursor movement and (5) Screen movement. The sizes for these are estimated to be 4K, 2K, 1K, 2K and 3K delivered source code lines. Use COCOMO model to determine:  Overall cost and schedule estimates (assume values for different cost drivers, with at least three of them being different from 1.0).
  • 18. Solution Size of 5 modules are Screen edit = 4KLOC Command Language Interpreter = 2KLOC File input and output = 1KLOC Cursor movement and = 2KLOC Screen movement = 3KLOC Total = 12KLOC Let us assume that significant cost drivers are :  Required software reliability is high i.e. 1.15  Product complexity is high i.e. 1.15  Analyst capability is high i.e. 0.86  All other drivers are nominal i.e. 1.00 Hence EAF = 1.15 * 1.15 * 0.86 = 1.1373
  • 19. The initial effort estimate for the project E = ai (KLOC)bi * EAF =3.2(12)1.05 * 1.1373 = 49.449 PM (person-month) D = ci (E)di = 2.5(49.44)0.38 = 11.007 M(month) Total person = E/D = 44.449/11.007 = 4.038 That is total person = 4
  • 20. CCPDS-R Case Study….. Command center processing and display system-replacement [CCPSS-R] project was performed for the U.S. Air force by technical review workgroup (TRW) space and defense in Redondo Beach, California. The entire project included system engineering, hardware procurement, and software development, with each of these three major activities consuming about one-third of the total cost.
  • 21. Key Points of CCPDS-R  An objective case study is a true indicator of a mature organization and a mature project process. The software industry needs more case studies like CCPDS-R  CCPDS-R was one of the pioneering projects that practiced many modern management approaches.
  • 22. Usage areas of interest where CCPDS-R mostly used: Army Defense Intelligence Ministry of defense Force Space Discovery Study
  • 23. Software acquisitions process:-  Competitive Design phase [CD] Phase  Full-scale Development phase[FSD] Phase
  • 24. Competitive Design phase [CD] Phase This Concept Definition Phase included following activities: • Analyze and specify the project requirements • Define and develop the top-level architecture • Plan FSD phase software development activities • Configure the process and development environment • Establish trust and win-win relationships among the stakeholder
  • 25. Full-scale Development phase[FSD] Phase i. Software requirements review (SRR) -Initial feasibility of the foundation components -Basic use cases of Initialization ii. Interim preliminary design review (IPDR) -Feasibility of the architectural infrastructure under riskiest use cases iii. Preliminary design review (PDR) -Adequate achievement of the peak load scenarios iv. Critical design review (CDR) -Update of the architectural baseline for test capability of whole system
  • 26. Project Organization & Responsibilities  Analyze and specify the project requirement  Define and develop the top-level architecture  Plan the FSD phase software development activities  Configure the process and development environment  Establish trust and win –win relationships among the stakeholders.
  • 28. THE INCREMENTAL DESIGN PROCESS Well Defined sequence of walkthroughs took place: i. Preliminary design walkthrough(PDW) -Initial Prototyping and Design Work ii. Critical design walkthrough(CDW) - Build’s Design Work iii. Code walkthrough(CW) -Detailed Code Walkthrough iv. Turnover review(TR) -A one month activity including SAT, BIT , EST
  • 29. The Incremental Test Process i. Stand-alone test -Corresponds to completeness and boundary condition tests to the possible extent ii. Build integration test -To ensure previously demonstrated capabilities still operated as expected iii. Reliability test -Help uncover potentially insipid, transient errors of major design consequence iv. Engineering string test -Verifying specific subsets of requirements through demonstration v. Final qualification test -Represented a set of requirements which could not be verifying until whole system was present Ex: a 50% reserve capacity requirement could not be verified until FQT, when whole system was operational
  • 30. Metrics • Development Progress (% coded) vs time • Requirements verified vs time • Average hours per software change order (SCO) • Cost/Effort Expenditure By Activity • Mean time between failure (MTBF) vs total test hours • Cumulative SLOC vs budget
  • 31. People Factors • Core team concept • Leverage skills of a few experts across the entire team • Avoid attrition • Profit sharing of award fees
  • 32. Introduction  CMM was developed by the Software Engineering Institute (SEI) at Carnegie Mellon University in 1987.  It is a framework which is used to analyze the approach and techniques followed by any organization to develop software product.  It also provides guidelines to further enhance the maturity of those software products.  5 different levels. Capability Maturity Model
  • 33. Five Levels 1. Level 1 – Initial 2. Level 2 – Repeatable 3. Level 3 – Defined 4. Level 4 – Managed 5. Level 5 - Optimized
  • 34.
  • 35. Level-1: Initial  Processes followed are immature and are not well defined.  No basis for predicting product quality, time for completion, etc.  No KPA’s defined.
  • 36. Level-2: Repeatable  Least documented and repeating same steps again and again.  Experience with earlier projects is used for managing new similar natured projects. KPA’s:  Project Planning- It includes defining resources required, goals, constraints, etc. for the project. It presents a detailed plan to be followed systematically for successful completion of a good quality software.  Configuration Management- The focus is on maintaining the performance of the software product, including all its components, for the entire lifecycle.  Requirements Management- It includes the management of customer reviews and feedback which result in some changes in the requirement set.  Subcontract Management- It focuses on the effective management of qualified software contractors i.e. it manages the parts of the software which are developed by third parties.  Software Quality Assurance- It guarantees a good quality software product by following certain rules and quality standard guidelines while development.
  • 37. Level-3: Defined  At this level, documentation of the standard guidelines and procedures takes place.  Process are well defined and confirmed. KPA’s:  Peer Reviews- In this method, defects are removed by using a number of review methods like demonstration, survey, etc.  Intergroup Coordination- It consists of planned interactions between different development teams to ensure efficient and proper fulfillment of customer needs.  Organization Process Definition- It’s key focus is on the development and maintenance of the standard development processes.  Organization Process Focus- It includes activities and practices that should be followed to improve the process capabilities of an organization.  Training Programs- It focuses on the enhancement of knowledge and skills of the team members including the developers and ensuring an increase in work efficiency.
  • 38. Level-4: Managed  At this stage, quantitative quality goals are set for the organization for software products as well as software processes. KPA’s:  Software Quality Management- It includes the establishment of plans and strategies to develop a quantitative analysis and understanding of the product’s quality.  Quantitative Management- It focuses on controlling the project performance in a quantitative manner.
  • 39. Level-5: Optimizing  This is the highest level of process maturity in CMM and focuses on continuous process improvement in the organization using quantitative feedback.  Use of new tools, techniques and evaluation of software processes is done to prevent recurrence of known defects. KPA’s:  Process Change Management- Its focus is on the continuous improvement of organization’s software processes to improve productivity, quality and cycle time for the software product.  Technology Change Management- It consists of identification and use of new technologies to improve product quality and decrease the product development time.  Defect Prevention- It focuses on identification of causes of defects and to prevent them from recurring in future projects by improving project defined process.
  • 40.