Development of a safety-critical software system

Assignment Help Software Engineering
Reference no: EM131448054


A software manager is in charge of the development of a safety-critical software system, which is designed to control a radiotherapy machine to treat patients suffering from cancer. This system is embedded in the machine and must run on a special-purpose processor with a fixed amount of memory (256 Mbytes). The machine communicates with a patient database system to obtain the details of the patient and, after treatment, automatically records the radiation dose delivered and other treatment details in the database. The COCOMO method is used to estimate the effort required to develop this system and an estimate of 26 person-months is computed. All cost driver multipliers were set to 1 when making this estimate.

Explain why this estimate should be adjusted to take project, personnel, product, and organizational factors into account. Suggest four factors that might have significant effects on the initial COCOMO estimate and propose possible values for these factors. Justify why you have included each factor.

Reference no: EM131448054

Pushdown automaton

A useless state in a pushdown automaton is never entered on any input string. Think about the problem of testing whether a pushdown automaton has any useless states.

Why should cdc software company implement a ppm

Why should CDC Software Company implement a PPM? You work for Holt consulting company, which has been asked to recommend organizational improvements for CDC Software Company.

Jrp a superior way to discover requirements

What makes JRP a superior way to discover requirements as compared to a regular company meeting? What do you think is the most important aspect of a JRP meeting

Differentiate between alpa and beta testing

Differentiate between alpa and beta testing, Consider a piece of an embedded software that is a part of a T.V. Which of the types of system testing would you choose to apply a

Describe method and show the compressed list

Devise a way to compress the following list of last names using a lossless technique similar to that shown in Table 8.6 for repeated terms. Describe your method and show the

Describe threats that specifically target confidentiality

Describe threats that specifically target confidentiality on a data system. Do not limit yourself to the textbook for answers, and use external resources to support your con

Create all the possible combinations of array a

The subset-sum problem is defined as follows: given a set B of n positive integers and an integer K, can you find a subset of B whose elements' summation is equal to K? Desi

Discuss when you think recursion should be used

Recursion is a double edged sword. It can be quite helpful and it can dramatically impact performance in a negative way and even cause runtime errors. Discuss when you think


Write a Review

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd