Application of Graph Theory to



Similar documents
DATA ANALYSIS II. Matrix Algorithms

Social Media Mining. Graph Essentials

V. Adamchik 1. Graph Theory. Victor Adamchik. Fall of 2005

Part 2: Community Detection

Discrete Mathematics & Mathematical Reasoning Chapter 10: Graphs

Zachary Monaco Georgia College Olympic Coloring: Go For The Gold

Network/Graph Theory. What is a Network? What is network theory? Graph-based representations. Friendship Network. What makes a problem graph-like?

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

Network (Tree) Topology Inference Based on Prüfer Sequence

NETZCOPE - a tool to analyze and display complex R&D collaboration networks

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*

How To Understand The Network Of A Network

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

USE OF EIGENVALUES AND EIGENVECTORS TO ANALYZE BIPARTIVITY OF NETWORK GRAPHS

Analysis of Algorithms, I

Finding and counting given length cycles

A REMARK ON ALMOST MOORE DIGRAPHS OF DEGREE THREE. 1. Introduction and Preliminaries

Analysis of Internet Topologies

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

Social Media Mining. Network Measures

Performance of Dynamic Load Balancing Algorithms for Unstructured Mesh Calculations

Analysis of Internet Topologies: A Historical View

arxiv: v1 [math.co] 7 Mar 2012

FUNCTIONAL ANALYSIS AND ALLOCATION

B490 Mining the Big Data. 2 Clustering

Walk-Based Centrality and Communicability Measures for Network Analysis

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

Network Analysis of Project Communication Based on Graph Theory

RF System Design and Analysis Software Enhances RF Architectural Planning

Dynamic Programming and Graph Algorithms in Computer Vision

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

Total colorings of planar graphs with small maximum degree

GigaSPEED X10D Solution How

Arrangements And Duality

Drawing a histogram using Excel

MATH APPLIED MATRIX THEORY

Chapter 1. Introduction

System Interconnect Architectures. Goals and Analysis. Network Properties and Routing. Terminology - 2. Terminology - 1

Triangulation by Ear Clipping

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

Module 10. Coding and Testing. Version 2 CSE IIT, Kharagpur

Social and Economic Networks: Lecture 1, Networks?

Juniper Networks QFabric: Scaling for the Modern Data Center

NAVAL POSTGRADUATE SCHOOL THESIS

Mining Social-Network Graphs

Chapter 7: Products and quotients

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Discrete Mathematics Problems

Number of hours in the semester L Ex. Lab. Projects SEMESTER I 1. Economy Philosophy Mathematical Analysis Exam

5 Directed acyclic graphs

COMBINATORIAL PROPERTIES OF THE HIGMAN-SIMS GRAPH. 1. Introduction

VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc.,

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Load balancing Static Load Balancing

1 Example of Time Series Analysis by SSA 1

Data Mining: Algorithms and Applications Matrix Math Review

Probability Using Dice

Lecture 16 : Relations and Functions DRAFT

Graph theoretic approach to analyze amino acid network

Statistical and computational challenges in networks and cybersecurity

Asking Hard Graph Questions. Paul Burkhardt. February 3, 2014

MATH 423 Linear Algebra II Lecture 38: Generalized eigenvectors. Jordan canonical form (continued).

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

3.1. Angle Pairs. What s Your Angle? Angle Pairs. ACTIVITY 3.1 Investigative. Activity Focus Measuring angles Angle pairs

MATHEMATICS. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences. Degree Requirements

QDA Q-Management A S I D A T A M Y T E S P E C S H E E T. From stand-alone applications to integrated solutions. Process optimization tool

SPANNING CACTI FOR STRUCTURALLY CONTROLLABLE NETWORKS NGO THI TU ANH NATIONAL UNIVERSITY OF SINGAPORE

Linear Algebra and TI 89

Graph Theory: Penn State Math 485 Lecture Notes. Christopher Griffin

Francesco Sorrentino Department of Mechanical Engineering

by the matrix A results in a vector which is a reflection of the given

RapidIO Network Management and Diagnostics

Linear algebra and the geometry of quadratic equations. Similarity transformations and orthogonal matrices

Introduction to Matrix Algebra

Linear Programming I

Complex Networks Analysis: Clustering Methods

Frequency Assignment in Mobile Phone Systems

High degree graphs contain large-star factors

Big Ideas in Mathematics

Midterm Practice Problems

Data Structure [Question Bank]

Discrete Mathematics. Hans Cuypers. October 11, 2007

Load Balancing and Termination Detection


LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu

Similarity and Diagonalization. Similar Matrices

A Fast Algorithm For Finding Hamilton Cycles

ALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite

Design of LDPC codes

Mathematics for Algorithm and System Analysis

CDMA TECHNOLOGY. Brief Working of CDMA

Orthogonal Diagonalization of Symmetric Matrices

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Transcription:

Application of Graph Theory to Requirements Traceability A methodology for visualization of large requirements sets Sam Brown L-3 Communications This presentation consists of L-3 STRATIS general capabilities information that does not contain controlled technical data as defined within the International Traffic in Arms (ITAR) Part 120.10 or Export Administration Regulations (EAR) Part 734.7-11.

Traceability in the Large Requirements Verification Events Level 2 Test traceability Project Level 3 System Level 4 SubSystem Requirement Traceability Level 5 Unit Traceability is key to both requirements development and requirements verification Each project has unique approaches to traceability and verification

Motivation for a Visualization Methodology Studying characteristics of information flow in large Requirements sets LMA Requirement FSW Requirement TLCM Requirement The flight system shall support the DOR tone capability in the SDST, The flight software shall command the transponder as defined The flight software shall configure the transponder telemetry inputs in accordance with the active FS side whenever the trnsponder is powered ON. Reference transponder ICD for selection table. including wideband DOR 387 tones at X-band. by the transponder 1317 documentation 706 The flight system shall accommodate PCM / PSK / PM modulation for the X 1997 band downlink. The flight software shall provide the capability to command an active telecom side which determines the active transponder in use and the uplink channel. 711 The flight software shall propagate the power state and configuration of the transponder 712 when changing the active telecom side. The flight software shall provide a default active telecom side upon initialization. The default active telecom side, in the absence of faults or obituary table entries, will be Side 713 1 (Telecom Side 1 uses SDST 1, and Telecom Side 2 uses SDST 2). The flight software shall only perform the necessary SDST initializations if a commanded 714 active telecom side is different from the currently active telecom side. The flight software, upon initial application of transponder power ON, shall provide for a configurable default state. Subsequent power ON transitions will default to last 725 commanded state. The flight software shall provide the capability to enable or disable the X-Band exciter for 1200 the active transponder. The flight software shall provide the capability to enable or disable c mode for the active 1201 transponder. The flight software shall provide the capability to enable or disable X-Band Ranging for the 1202 active transponder. The flight software shall provide the capability to set the Ranging Modulation Index for the 1203 active transponder. The flight software shall provide the capability to enable or disable X-Band Differential One- 1204 Way Ranging (DOR) Mode for the active transponder. The flight software shall provide the capability to command an X-Band convolutional 1205 encoding mode of TLM_OFF, rate 71/2, or BYPASS for the active transponder. The flight software shall provide the capability to to command the Ranging Mode to 1206 BASEBAND or EXTERNAL for the active transponder. The flight software shall provide the capability to command the X-Band Subcarrier for the active transponder to one of the following frequencies: 281.25 Khz squarewave, 281.25 Khz 1207 sinewave, 25 Khz squarewave, or 25Khz sinewave. The flight software shall provide the capability to command the X-Band Squarewave Telemetry Modulation Index to one of 128 discrete values (0x00 to 0x7F) for the active 1208 SDST. The flight software shall provide the capability to command the X-Band Sinewave 1209 Telemetry Modulation Index to one of 16 discrete values (0x0 to 0xF) for the active SDST. The flight software shall provide the capability to command the X-Band telemetry 1211 modulation mode to SUBCARRIER or BPSK for the active transponder. >20 documents 725 commanded state. >10,000 requirements >7,000 linkages Quickly communicate regarding patterns involving hundreds or thousands of requirements

Graph Theory History Leonhard Euler: The seven bridges problem Publication in 1736 as the first description of graph theory, and is generally regarded as the origin of topology Vanermonde: The knights tour problem Cauchy and L Hullier: Relationships between faces, edges, and vertices of convex polyhedrons Study of pair-wise relationships between objects Graphs are the parent family to a variety of topologies: directed graphs trees Cayley and differential calculus coloring problem

What is a graph? Graph theory is the study of mathematical structures used to model relationships between objects in finite collections. A graph is composed of nodes and edges Graphs can be classified as undirected, directed, tree, planar, etc depending upon the nature of the connections. edge node The Seven Bridges Problem Four nodes, seven edges

Graphs all around us PERT Chart Directed graph Acyclic (no loops)

Flow Charts as Graphs Directed graph Sometimes cyclic

Network Exploration Graphs Mapping Universities Cybermetrics Lab IEDCYT, Joaquin Costa Madrid Spain

Graphs of Requirements Sets Getting to the good stuff soon now Types of Graphs Simple graph nodes and edges Directed graph nodes and edges with direction (digraph) Acyclic graph no cycles (loops) Connected graph every node is reachable from any other node Tree connected acyclic graph Forest acyclic graph but unconnected In the general case, requirements traceability forms an acyclic digraph, or forest - Generally no single top-level node -Generally not connected - Almost always acyclic -Directed In the following examples of real system requirements graphs, the graphs are drawn as digraphs with the arrow pointing from the parent to the child. Untraced requirements are shown with red borders. We use boxes to denote the nodes simply because they fit the numbers better. These examples show a subnet of the full requirements net for clarity.

Device Traceability Topology 326 347* DEVCE ICD 808 377 384 396 318 309 783 322 334* 338 346 342 344 L-4 Requirements 1446 1447 1449 421 2410 2431 2397 348 Note traceability between ICD and Requirements 361 744 745 746 469 742 773 775 414 778 438 740 506 774 776 Requirements fan out dramatically from L-4 to L-5 2295 2296 1450 1451 2194 1445 Device ICD Requirements are traced to both L-4 and L-5 requirements. Two L-4 requirements are untraced to L-5, one is probably incorrect trace to the ICD L-5 Requirements 5545 2403 2440 2437 2433 1242 2428 2436 2432 2430 2406 2408 2445 2404 2443 2494 5551 2436 2434 2470 2429 2441 2442 2444 2445 2394 2446 2450 2405 2418 2419 2425 2427 2423 2422 2426 2424 2492 1370 1372 1373 1374 1375 1376 1377 1384 1385 1378 1379 1453 1380 1382 1383 1385 1453 1454 1490 1455 1456 1489 2493 2499 2416 2394 2448 2449 2395 2415 1505-1508 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1400 1401 1402 1399 1403 1404 2399 2418 2419 2420 2421 2417 2396

Traceability Patterns Large fan-out from parent to child suggest a large change in level of abstraction. One-to-one suggests under-specified lower-level requirements. Hour-glass traces seem to indicate serious problems in the intermediate requirements document; traceability event-horizon. May indicate verification difficulties.

Instrument ICD 306 314 318 319 Instrument ICD Traceability Topology 2282 2286 1153 2287 2290 2289 2288 2299 2298 338 342 2291-2293 2294 2295 344 346 348 740 421 712 717 719 445 446 453 2275 2276 1492 2370 2277-2279 2308-2313 2316-2317 2322 2300 2320 2332 2323 2327 2319 2372 2326 2329 2333 2334 2335 2373 2374 2375 2376 706 707 2371 2377 2378 469 714 L-4 FSW 2380-2382 2387 2567 478 737 1466 2452 2453 2454 2576 2568 738 506 2290 2574 2577 734 736 1467 1372-1385 L-3FSW parents 1489-1490 1468 1453-1456 2291 1458-1460 1469 1505-1508 2204 2579 2580 2578 1370 2571 1399-1406 1488 1386-1396 L-5 PYLD L-5 GNC 2248

ICD L-4 FSW 306 311 314 318 346 384 1540 1550 1552 1539 1531 1536 1557 1561 1562 1560 1571 1572 1574 1576 1577 1565 1569 1573 1575 1584 1578 1570 1579 1581 1582 1583 348 1580 1559 1606 1601 1602 1607 1608 1611 407 443 476 1618 1621 1632 1637 1649 421 469 1653 1619 1613 1654 1655 1656 1658 771 769 1665 1666 1667 1668 761 773 1669 1633 1674 1681 850 478 1801 1664 1670 1671 1680 484 827 1800 1603 1672 1678 816 817 1833 1834 L-5 IO 1737 1738 1800 L-5 GNC 2248 818 819 820 723 821 822 823 L-3 FS parent 830 Requirements fan out dramatically from L-4 to L-5 1471 2298 1437 1447 2206 1472 2270 2340 4333 2465 4336 2619 2623 2622 2339 2642 2337 2644 1372-1385 1370 1453-1456 1489-1490 1505-1508 1596-1599 1590-1594 1542-1544 1555-1556 1635-1636 1623-1624 1626-1627 1386-1388 1390-1406 1546-1549 1458-1460 1483-1484 1488 1492 1586-1588 1550-1551 1566-1570 1659-1660 1629-1630 1553-1554 L-5 PYLD A more complex topology

Instrument ICD FS L-3 227 228 230* 238 240 242 246 247 249 251 253 261 268 273 279 281 283 285 286 1997 387 620 626 Instrument Traceability Topology The flight software shall command the instrument as defined by the instrument documentation FSW L-4 Typical ICD philosophy descriptive and untraced to requirements 1317 64 children Instrument L-5 730 731 738 706 711 712 713 714 725 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1341 1342 1327 728 733-735 740-742 1989 2189 1319 1181 1182 1199 743 745 747-749 2339 1198 751-753 1184-1185 2384 1175

Graphs as Traceability Diagnostics Histograms of connection counts: Statistics of connection counts may suggest decomposition problems Distributions are typically exponential (Internet, Kevin Bacon movie graph) Conjecture: Exponent may be relatable to the overall degree of abstraction change between linked requirements: High values mean small change Trace Frequency 10000 1000 100 10 1 0 Common random graphs exhibit exponential probability distribution 0 20 40 60 80 100 120 Trace Count Example real project connection histogram

Automation of the Graphing Process PowerPoint is NOT the best tool for analysis Automatic graph generation from A matrix and specification of groups Numerous applications available VCG - http://rw4.cs.uni-sb.de/~sander/html/gsvcg1.html Graphviz http://www.graphviz.org/ Jgraph www.jgraph.com Guess - http://graphexploration.cond.org/

How Connected is a Graph? Separabilityof subnets -> modularity of requirements to limit propagation of change

Expressing Graphs as Mathematical Structures -Vocabulary Vertex: Endpoint (or connection point or node) Edge: Connection between vertices Incidence List : Array of pairs (tuples if directed) of vertices or connections Adjacency List: List of pairs of vertices as a list (2x n array) Incidence Matrix: Vertices by Edges matrix where each entry contains the endpoint data (1 = incident, 0 = not incident) Adjacency matrix (A): N by N matrix where N = the number of vertices in the graph. Entries are either 0 if not connected, 1 if connected. If there is an edge from vertex k to vertex j then A(j,k)=1 Degree: Matrix of connection counts on the diagonal (D) Laplacian matrix: L=D-A, where D= the diagonal degree matrix Danger: Math Ahead

Connectivity and Graphing Here comes the math Graph Fiedler Value Path 1/n**2 Grid 1/n 3D Grid n**2/3 Expander 1 Binary tree 1/n dumbell 1/n The smallest nonzero eigenvalueof the Laplacianmatrix is called the Fiedler value (or spectral gap). Small values of the Fiedler number mean the graph is easier to cut into two subnets. If the number is large, then every cut of the graph must cut many edges. Conjecture: Would a large Fiedler number for a requirements graph indicate a system that was difficult to partition into subnets, thus difficult to change?

A Simple Graph and Spectral Analysis A Matrix 0 1 1 0 1 1 0 1 1 1 1 0 1 0 1 0 Laplacian(D-A) 1-1 -1 2-1 -1 4-1 -1-1 -1 1-1 1-1 1 Eigenvalue: From linear algebra Lx=λx where λis an eigenvalue And x is a non-null eigenvector Because L is symmetric the eigenvalues are all real λ={0, 0.486, 1, 1, 2.428, 5.086} Fiedler number = 0.486 implying somewhere between an expander (1) and a tree form (1/6)

Summary Graphs can be useful visualization tools for large requirements sets Big picture viewpoint Patterns easily recognized Multi-level tracing Identification of subnets Potential for analysis Relationship between connection histogram and requirement decomposition Ability to quantify interconnectedness by spectral analysis