Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Enhanced Intelligent Risk Divination Using Added Quality Attributes Injected ATAM and Design Patterns
N.Sankar Ram, Paul Rodrigues
Pages - 27 - 34     |    Revised - 15-04-2008     |    Published - 30-04-2008
Volume - 2   Issue - 2    |    Publication Date - April 2008  Table of Contents
Architectural Tradeoff Analysis Method is a method for evaluation of architecture-level designs and identifies trade-off points between attributes, facilitates communication between stakeholders. ATAM has got the limitations like not a predictor of quality achievement, not deals more quality attributes, Efficiency always depends on the expertise and potential of stakeholders. In this paper we have proposed a system which uses ATAM to predict the risk analysis, with more possible quality attributes. We have used artificial intelligence to predict the risk of the SA based on the Knowledge base of the Stakeholder Experts.
CITED BY (1)  
1 Kalaivani, R., & Thangaraj, P. (2013). An effective technique to identify a river’s stage through satellite images by means of RBFNN. The Imaging Science Journal, 61(3), 279-291.
1 Google Scholar
2 Academic Journals Database
3 ScientificCommons
4 CiteSeerX
5 refSeek
7 Socol@r
8 ResearchGATE
9 Libsearch
10 Bielefeld Academic Search Engine (BASE)
11 Scribd
12 WorldCat
13 SlideShare
15 PdfSR
16 Chinese Directory Of Open Access
1 R. Kazman, M. Klein, M. Barbacci, T. Longstaff, H. Lipson, and J. Carriere, “The Architecture Tradeoff Analysis Method”, Proceedings of ICECCS'98, 8-1-1998.
2 R.L. Nord, M.R. Barbacci, P. Clements, R. Kazman, M. Klein, L. O'Brien, J.E. Tomayko, “Integrating the Architecture Tradeoff Analysis Method (ATAM) with the cost benefit analysis method (CBAM)”, CMU SEI Technical Note CMU/SEI-2003-TN-038, Software Engineering Institute, Pittsburgh, PA, 2003.
3 Houmb, Siv Hilde; Georg, Geri; Jürjens, Jan; France, Robert: “An Integrated Security Verification and Security Solution Design Trade-Off Analysis Approach”. Integrating Security and Software Engineering: Advances and Future Visions / Mouratidis, Haralambos; Giorgini, Paolo: Idea Group Inc, 2006, 190-219
4 Paul Clements, John Bergey and Dave Mason,” Using the SEI Architecture Tradeoff Analysis Method to Evaluate WIN-T: A Case Study” CMU SEI Technical Note CMU/SEI-2005-TN-027. Software Engineering Institute, Pittsburgh, PA, 2005.
5 Bate, I. and N. Audsley (2002): “Architecture Trade-off Analysis and the Influence on Component Design”. Proceedings of Workshop on Component-Based Software Engineering: Composing Systems from Components
6 Mildred N. Ambe, Frederick Vizeacoumar ” Evaluation of two architectures Using the Architecture Tradeoff Analysis Method (ATAM)”, 2002.
7 Arnon Rotem-Gal-Oz, “Architecture Tradeoff Analysis Method“ www.rgoarchitects.com/Files / ATAM.ppt.
8 “Software Architecture for Software-Intensive Systems” from www.sei.cmu.edu/architecture /ata_ method.html
9 Gamma Erich, Richard Helm, Ralph Johnson, and John Vlissides (1995). “Design Patterns: Elements of Reusable Object-Oriented Software”, hardcover, 395 pages, Addison-Wesley.
10 Gabriel Richard (1996). “Patterns of Software: Tales from the Software Community”. Oxford University Press.
11 Beck, K. “Implementation Patterns” Pearson Education, Proceedings of the 18th International Conference on Software Engineering. October 2007.
12 Freeman, Eric; Elisabeth Freeman, Kathy Sierra, and Bert Bates (2004). “Head First Design Patterns”. O'Reilly Media.
13 Zhou, Guozhong, McCalley, James D. and Honavar, Vasant (1997) “Power System Security Margin Prediction Using Radial Basis Function Networks”. Technical Report TR97-10, Department of Computer Science, Iowa State University.
14 Panda, Sudhanshu S., Chakraborty, Debabrata, and Pal, Surjya K., “Prediction of Drill Flank Wear Using Radial Basis Function Neural Network”, Proceedings of the National Conference on Soft Computing Techniques for Engineering Applications, NIT Rourkela, 2006, pp. 94-102.
15 Biffl S., Denger C., Elberzhager F., Winkler D.: "Quality Assurance Tradeoff Analysis Method (QATAM) - An Empirical Quality Assurance Planning and Evaluation Framework", Technische Universität Wien, Technical Report IFS-QSE-07/04, 2007
16 Sunyoung Lee, Sungzoon Cho, and Patrick Wong "Rainfall Prediction using Artificial Neural Networks", Journal of Geographic Information and Decision Analysis, Vol. 2, No. 2, pp. 253-264, 1998.
17 A. BinSubaih, S.C. Maddock (2006), "Using ATAM to Evaluate a Game-based Architecture", Workshop on Architecture-Centric Evolution (ACE 2006), Hosted at the 20th European Conference on Object-Oriented Programming ECOOP 2006, July 3-7, 2006, Nantes, France.
18 Femi G. Olumofin and Vojislav B. Mi?si´c ” Extending the ATAM Architecture Evaluation to Product Line Architectures” in Department of Computer Science, University of Manitoba Winnipeg, Manitoba, Canada R3T 2N2 June 2005.
19 Ali Babar, M., Kitchenham, B., “Assessment of a Framework for Comparing Software Architecture Analysis Methods”, in Proceedings of the 11th International Conference on Evaluation and Assessment in Software Engineering, 2007, Keele, England.
20 Liming Zhu, Muhammad Ali Babar, Ross Jeffery” Distilling Scenarios from Patterns for Software Architecture Evaluation – A Position Paper” EWSA 2004: 225-229.
21 Adrian G. Bors, “Introduction of the Radial Basis Function (RBF) Networks”, Department of Computer Science, University of York, UK.
22 Dongyun Liu “Mapping requirements to software architecture by feature-orientation” Hong Mei in Institute of Software, School of Electronics Engineering and Computer Science Peking University, Beijing 100871, P.R.China.
23 Haykin, S. (1994) “Neural Networks: A comprehensive Foundation”. Upper Saddle River, NJ; Prentice Hall.
24 Broomhead, D.S., Lowe, D. (1988) “Multivariable functional interpolation and adaptive networks," Complex Systems, vol.2, pp.321-355.
25 Wei, G.-Q., Hirzinger, G., (1997) " Parametric shape -from-shading by radial basis functions, " IEEE Trans. on Pattern Analysis and Machine Intelligence, vol. 19, no. 4, pp. 353-365.
26 Cha, I., Kassam, S.A., (1996) " RBFN restoration of nonlinearly degraded images," IEEE Trans. on Image Processing, vol. 5, no. 6, pp. 964-975.
27 Bors, A.G., Pitas, I., (1999) " Object classification in 3-D images using alpha-trimmed mean radial basis function network," IEEE Trans. on Image Processing, vol. 8, no. 12, pp. 1744-1756.
28 Chatzis, V., Bors, A. G., Pitas, I., (1999) "Multimodal decision-level fusion for person authentification," IEEE Trans. on Systems, Man, and Cybernetics, part A: Systems and Humans, vol. 29, no.6, pp. 674-680.
29 N. Sankar Ram And Dr.Paul Rodrigues " Intelligent Risk Prophecy Using More Quality Attributes Injected ATAM and Design Patterns" 7th WSEAS Int. Conf. on Software Engineering, Parallel And Distributed Systems (SEPADS '08),University of Cambridge, UK, Feb 20-22, 2008
30 Dulce Domingos et al., “Workflow Access Control from a Business Perspective” In Proceedings of the 6th International Conference on Enterprise Information Systems (ICEIS’ 04)
31 DEFSTAN 00-55, “The Procurement of Safety Critical Software in Defence Equipment: Part 1 Requirements & Part 2: Guidance.” UK Ministry of Defence, 1 August 1997.
Dr. N.Sankar Ram
Professor - India
Dr. Paul Rodrigues
Computer Science and Engineering - India