<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Modeling of NonFunctional Characteristics of the Software for Selection of Accurate Scope of Information for Their Evaluation</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<affiliation key="aff0">
								<address>
									<addrLine>Tetiana Hovorushchenko 1, -1857], Olga Pavlova 2, ], Artem Boyarchuk 3</addrLine>
									<postCode>0000-0002-7942, 0000-0003-2905-0215, 0000-0001-7349-1371]</postCode>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="institution">Khmelnytskyi National University</orgName>
								<address>
									<addrLine>Institutska str</addrLine>
									<postCode>11</postCode>
									<settlement>Khmelnytskyi</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="institution">National Aerospace University &quot;Kharkiv Aviation Institute&quot;</orgName>
								<address>
									<addrLine>Chkalova str</addrLine>
									<postCode>17</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Modeling of NonFunctional Characteristics of the Software for Selection of Accurate Scope of Information for Their Evaluation</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">367CA53508E5886572DDAF770A67A470</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T03:20+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Software</term>
					<term>Software Project</term>
					<term>Software Requirements Specification (SRS)</term>
					<term>NonFunctional Software Characteristics</term>
					<term>Ontology</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The article proposed set-theoretic models of nonfunctional characteristics of software used to systematize information on nonfunctional characteristics and bring it to the common (unified) form in accordance with ISO 25010:2011, ISO 25023:2016. In addition, basic and real ontological models of nonfunctional characteristics of software are developed based on ISO 25010:2011 and ISO 25023:2016 standards. These models provide the basis for choosing the sufficient information to evaluate nonfunctional characteristics of software.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Now mankind is often requiring the software for solving the difficult problems and the high-value software projects are rapidly developed. Therefore, software errors threaten with disasters that lead to human and environmental casualties, disasters, losses of time and finances. Most software failures were due to errors in the requirements specification <ref type="bibr" target="#b0">[1]</ref>. So, the success of the software project's implementation (both the timely implementation of the software project within the allocated budget and the implementation of all necessary features and functions <ref type="bibr" target="#b1">[2]</ref>) essentially depends on the early life cycle stages, therefore, the urgent task is automation of evaluating the level of early life cycle stages based on the specifications' analysis (assessing the sufficiency of specification's information as a key factor of the software projects' success <ref type="bibr" target="#b2">[3]</ref>), and special attention should be focused on the nonfunctional characteristicscomponents of quality of software (according to ISO 25010 <ref type="bibr" target="#b3">[4]</ref> these nonfunctional characteristics are: Reliability, Performance Efficiency, Functional Suitability, Compatibility, Maintainability, Portability, Usability, Security). The evaluation of nonfunctional characteristics-components of quality of software according to ISO 25010 standard <ref type="bibr" target="#b3">[4]</ref> is carried out as follows: based on the attributes specified in ISO 25023 <ref type="bibr" target="#b4">[5]</ref>, subcharacteristics are evaluated, which in turn assess the nonfunctional characteristics. Then, with sufficient information for the nonfunctional characteristics in the specification, we will understand the presence in the requirements of all elements (attributes) necessary to determine the nonfunctional characteristics. The analysis of ISO 25010 <ref type="bibr" target="#b3">[4]</ref>, ISO 25023 <ref type="bibr" target="#b4">[5]</ref> standards made it possible to conclude that there are attributes on which more than one nonfunctional characteristic depends, that is, there is a correlation of nonfunctional characteristics according to certain attributes (so according to ISO 25023 <ref type="bibr" target="#b4">[5]</ref> subcharacteristics of nonfunctional characteristics depends on 203 attributes, but only from 138 various attributes). The relationships (correlations) between characteristics and subcharacteristics on attributes influences on the significance of such attributes <ref type="bibr" target="#b5">[6]</ref>. If the attributes that are part of several nonfunctional characteristics are absent (there is a lack of information), the simultaneous use of these attributes will significantly affect the reliability of the estimates of nonfunctional characteristics-components of quality of the software. In such case, it is important to mitigate the influence of the mutual correlation of nonfunctional characteristics on attributes. Such mitigation is done by identifying common attributes and ensuring their availability. Thus, it was found that information about nonfunctional characteristics is conveniently presented as ontologies <ref type="bibr" target="#b6">[7]</ref>, which allow to reveal the causal relationships between concepts and to identify missing attributes, their influence on one or more nonfunctional characteristics, and also the correlation of nonfunctional characteristics for attributes. For this, we use the ontologies, which systemate the subject industry, holistic represent the subject industry, identificate gaps in knowledge, visualize missing logical connections, provide basis for intellectual agents <ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>.</p><p>In order to solve the problem of assessing the adequacy of the volume of information for determining the nonfunctional characteristics in the specifications of the requirements, it's necessary the basic (universal) ontology for software quality domain based on ISO 25010 <ref type="bibr" target="#b3">[4]</ref>, ISO 25023 <ref type="bibr" target="#b4">[ 5]</ref>, the components of which will be ontologies for each of the nonfunctional characteristics-components of quality of software. Basic ontologies will display the required information (attributes) that should be available in the specification of software requirements to ensure that its information about nonfunctional characteristics is sufficient. During developing the specific software, in addition to the basic ontologies, it is necessary to have the ontology of this software, which will reflect the requirements in the specifications for the specific software attributes necessary for determining the nonfunctional characteristics. Comparison of developed ontology of the specific software with basic ontologies allows to identify the deficiency (Fig. <ref type="figure">1 [3]</ref>) or sufficiency (Fig. <ref type="figure" target="#fig_2">2 [3]</ref>) of information about nonfunctional characteristics in the specification of requirements for the specific software. (1)</p><p>Then:  if SAMI =, then requirements' information is sufficient;  if SAMI ≠, then information in the SRS is insufficient, and the SRS requires the complement by attributes of nonfunctional characteristics.</p><p>In order to determine the structure and filling of the basic (universal) ontologies of software quality domain, set-theoretical and ontological models for nonfunctional characteristics are needed, which is the objective of this study.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Models of NonFunctional Characteristics-Software Quality Components</head><p>Models of nonfunctional characteristics-components of quality of software contain information about nonfunctional characteristics, their subcharacteristics and attributes, taken from the standards <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b4">5]</ref>. Since nonfunctional characteristics models are used to systematize information about nonfunctional characteristics and bring it to the common (unified) view in accordance with standards, then it is expedient to develop such models in the set-theoretical form.</p><p>According to the ISO 25010: 2011 standard, such nonfunctional characteristics as Functional Suitability (Fs), Performance Efficiency (Pe), Usability (Ub), Reliability (Rb), Compatibility (Cb), Security (Scr), Maintainability (Mb), Portability (Pb) are functions of several subcharacteristics, then we represent each of the above-mentioned nonfunctional characteristics as a function of the subcharacteristic <ref type="bibr" target="#b6">[7]</ref>:</p><formula xml:id="formula_0">F_S = f 1 (F_Com, F_Cor, F_Appr),<label>(2)</label></formula><p>where F_Com -Functional Completeness, F_Cor -Functional Correctness, F_Appr -Functional Appropriateness;</p><formula xml:id="formula_1">P_E = f 2 (T_B, R_U, Cc),<label>(3)</label></formula><p>where T_B -Time Behaviour, R_U -Resource Utilization, Cc -Capacity;</p><formula xml:id="formula_2">Ub = f 3 (A_R, Lb, Ob, U_E_P, U_I_A, Ab),<label>(4)</label></formula><p>where A_R -Appropriateness Recognisability, Lb -Learnability, Ob -Operability, U_E_P -User Error Protection, U_I_A -User Interface Aesthethics, Ab -Accessibility;</p><formula xml:id="formula_3">Rb = f 4 (Mat, Avb, F_T, Rcv),<label>(5)</label></formula><p>where Mat -Maturity, Avb -Availability, F_T -Fault Tolerance, Rcv -Recoverability;</p><formula xml:id="formula_4">Cb = f 5 (C_E, Ib),<label>(6)</label></formula><p>where C_E -CoExistence, Ib -Interoperability;</p><formula xml:id="formula_5">Scr = f 6 (Conf, Int, N_R, Acb, Auth),<label>(7)</label></formula><p>where Conf -Confidentiality, Int -Integrity, N_R -Non Repudiation, Acb -Accountability, Auth -Authenticity;</p><formula xml:id="formula_6">Mb = f 7 (Mod, Rub, Anb, Mdfb, Tsb),<label>(8)</label></formula><p>where Mod -Modularity, Rub -Reusability, Anb -Analysability, Mdfb -Modifability, Tsb -Testability;</p><formula xml:id="formula_7">Pb = f 8 (Adb, Inb, Rpb),<label>(9)</label></formula><p>where At the same time, each subcharacteristic of nonfunctional characteristics is a function of certain attributes described in ISO 25023. Depending on the subcharacteristics from the attributes is represented as follows: F_Com = φ 1 (N_o_F, F_I_Cn, F_Aq, F_I_C), <ref type="bibr" target="#b9">(10)</ref> where N_o_F -Number of Functions, F_I_Cn -Functional Implementation Completeness, F_Aq -Functional Adequacy, F_I_C -Functional Implementation Coverage; Considering the resulting sets of attributes and sub-characteristics of nonfunctional characteristics, obtained functions of dependencies of characteristics on subcharacteristics and characteristics on attributes, as well as the relationship between the concepts of ontology "depends on", we develop basic ontological models of nonfunctional software characteristics (principles of developing basic ontological models are presented in <ref type="bibr" target="#b6">[7]</ref>).</p><p>Then, for example, base ontological model of Functional Suitability is:</p><p>O Fs = {{F_S, A, I, J, K}, "depends on", {f 1 , φ 1, φ 2, φ 3 }} = ={{fsa 1 ,…,fsa 19 }, "depends on", {f 1 , φ 1, φ 2, φ 3 }},</p><p>where fsa 1 = F_S, {fsa 2 ,…,fsa 4 } € A, {fsa 5 ,…,fsa 8 } € I, {fsa 9 ,…,fsa 13 } € J, {fsa 14 ,…,fsa 19 } € K. Ontologies (ontological knowledge base), which are developed by models (41) etc., are filled up based on the information taken from ISO 25010 <ref type="bibr" target="#b3">[4]</ref>, ISO 25023 <ref type="bibr" target="#b4">[5]</ref> standards.</p><p>The ontological models of concrete software nonfunctional characteristics have the form, for example, ontological model of Functional Suitability is: O Fs_real = {{fsa 1 ,…,fsa m }, "depends on", {f 1 , φ 1, φ 2, φ 3 }},</p><p>where m≤19the number of attributes of subcharacteristics of functional suitability, available in the specification requirements for the specific software, as well as the number of functional suitability subcharacteristics that can be calculated based on available attributes. Ontologies (ontological knowledge bases), which are developed on the models (42) etc., are filled up based on the information taken from the specification requirements for the specific software <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>Practical case of selection of accurate scope of information for evaluation of the nonfunctional characteristics is represented at <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Conclusions</head><p>The urgency of the task of automation of evaluating the life cycle initial phases based on analysis of specifications necessitates the development of software quality models, in particular, the models of nonfunctional characteristics-software quality components.</p><p>This article proposed set-theoretic models of nonfunctional characteristics of software used to systematize information on nonfunctional characteristics and bring it to the common (unified) form according to ISO 25010: 2011, ISO 25023: 2016 standards, as well as basic (universal) ontological models and ontological models of specific software nonfunctional characteristics, based on the requirements of ISO 25010 and ISO 25023standards. These models are basis for selecting the sufficient volume of information to evaluate the software nonfunctional characteristics.</p><p>The proposed models will become the theoretical basis for the model and method of activity of the intelligence agent on the basis of the ontological approach for assessing the specifications of the requirements for software, the operation of which will be based on the comparison of ontologies. Such the intelligence agent will compare the ontology of the specific software with basic ontology and determine how many and which attributes are not sufficient to determine the particular nonfunctional characteristic, which will make the decision on the adequacy or lack of information on nonfunctional characteristics in the specification requirements to software.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .Fig. 2 .</head><label>12</label><figDesc>Fig. 1. Two cases of deficiency of requirements' information</figDesc><graphic coords="3,355.32,292.49,94.07,50.93" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Adb -Adaptability, Inb -Installability, Rpb -Replaceability. Then the sets of the subcharacteristics of nonfunctional characteristics have a form: A = {F_Com, F_Cor, F_Appr}the set of the subcharacteristics of Functional Suitability; B = {T_B, R_U, Cc}the set of the subcharacteristics of Performance Efficiency; C = {A_R, Lb, Ob, U_E_P, U_I_A, Ab}the set of the subcharacteristics of Usability, D = {Mat, Avb, F_T, Rcv}the set of the subcharacteristics of Reliability; E = {C_E, Ib}the set of the subcharacteristics of Compatibility; F = {Conf, Int, N_R, Acb, Auth}the set of the subcharacteristics of Security; G = {Mod, Rub, Anb, Mdfb, Tsb}the set of the subcharacteristics of Maintainability; H = {Adb, Inb, Rpb}the set of the subcharacteristics of Portability.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>F_Cor = φ 2 (</head><label>2</label><figDesc>O_T, N_I_C, N_D_I, C_A, Pc), (11) where O_T -Operation Time, N_I_C -Number of Inaccurate Computations Encountered by Users, N_D_I -Number of Data Items, C_A -Computational Accuracy, Pc -Precision; F_Appr = φ 3 (O_T, N_o_F, F_I_Cn, F_Aq, F_I_C, Pc), (12) T_B = φ 4 (O_T, Nm_o_T, R_T, N_o_E, Tn_T, Tsk_T, M_A_Thr), (13) where Nm_o_T -Number of Tasks, R_T -Response Time, N_o_E -Number of Evaluations, Tn_T -Turnaround Time, Tsk_T -Task Time, M_A_Thr -Mean Amount of Throughput; R_U = φ 5 (O_T, N_o_Fl, N_o_E, N_IO_R_E, U_W_T, N_M_R_E, N_T_R_E, T_Cc, IO_U, N_o_L_C_D, IO_L_L, M_M_U, M_T_U, M_O_T_E), (14) where N_o_Fl -Number of Failures, N_IO_R_E -Number of IO Related Errors, U_W_T -User Waiting Time of IO Device Utilization, N_M_R_E -Number of Memory Related Errors, N_T_R_E -Number of Transmission Related Error, T_Cc -Transmission Capacity, IO_U -IO Utilization (Number Of Buffers), N_o_L_C_D -Number of Line of Code Directly, IO_L_L -IO Loading Limits, M_M_U -Maximum Memory Utilization, M_T_U -Maximum Transmission Utilizaton, M_O_T_E -Mean Occurrence of Transmission Error; Cc = φ 6 (N_D_I, N_C_U, C_Bw, M_A_Thr, S_Db), (15) where N_C_U -Number of Concurrent Users, C_Bw -Communication Bandwidth, S_Db -Size of Database; A_R = φ 7 (N_o_F, N_o_Tt, N_IO_D_I, Cn_D, F_Ua, Ua_IO), (16) where N_o_Tt -Number of Tutorials, N_IO_D_I -Number of IO Data Items, Cn_D -Completeness of Description, F_Ua -Function Understandability, Ua_IO -Understandable Input and Output; Lb = φ 8 (N_o_F, O_T, E_F_L, Nm_o_T, H_Fq, E_U_D_H_S, H_Aa, Ease of Function Learning, H_Fq -Help Frequency, E_U_D_H_S -Effectiveness of the User Documentation and / or Help System, H_Aa -Help Accessibility, C_U_D_H -Completeness of User Documentation and / or Help Facility; Ob = φ 9 (N_o_F, O_T, E_Cr, N_S_F, N_U_E_C, N_A_C, N_IO_R_E, N_Op, N_I_W_C_C_V_D, N_M_I, N_I_E, Ph_A, N_E_U_M), (18) where E_Cr -Error Correction, N_S_F -Number of Screens or Forms, N_U_E_C -Number of User Errors or Changes, N_A_C -Number of Attempts to Customize, N_Op -Number of Operations, N_I_W_C_C_V_D -Number of Items which Could Check for Valid Data, N_M_I -Number of Messages Implemented, N_I_E -Number of Interface Elements, Ph_A -Physical Accessibility, N_E_U_M -Number of Easily Understood Messages; U_E_P = φ 10 (N_U_R_S, N_U_E_C, O_T_P_D_O, N_O_U_H_E_O, N_I_E_W_U_S_C, N_A_C_I_E, N_E_C_W_U_S_C, T_N_E_C_T, N_F_I_U_E_T, T_N_F_R_T_C, T_N_I_O_P), (19) where N_U_R_S -Number of Unsuccessfully Recovered Situation, O_T_P_D_O -Operation Time Period During Observation, N_O_U_H_E_O -Number of Occurrences of User's Human Error Operation, N_I_E_W_U_S_C -Number of Input Errors which the User Successfully Corrects, N_A_C_I_E -Number of Attempts to Correct Input Errors, N_E_C_W_U_S_C -Number of Error Conditions which the User Successfully Corrects, T_N_E_C_T -Total Number of Error Conditions Tested, N_F_I_U_E_T -Number of Functions Implemented with User Error Tolerance, T_N_F_R_T_C -Total Number of Functions Requiring the Tolerance Capability, T_N_I_O_P -Total Number of Incorrect Operation Patterns; U_I_A = φ 11 (N_I_E, N_I_G_E, D_I_P_U, D_I_S_U, D_E_A, D_R_W_M_U), (20) where N_I_G_E -Number of Interface Graphical Elements, D_I_P_U -Degree of Increase the Pleasure of User, D_I_S_U -Degree of Increase the Satisfaction of User, D_E_A -Degree of Ergonomic Attractiveness, D_R_W_M_U -Degree of Real World Metaphors Use; Ab = φ 12 (E_W_S_C_B_U_U_S_D, E_W_U_S_D, F_F_R_U_S_D, S_U_S_D, P_P_S_A), (21) where E_W_S_C_B_U_U_S_D -Extent to which Software Can Be Used by Users with Specified Disabilities, E_W_U_S_D -Effectiveness of Work of Users with Specified Disabilities, F_F_R_U_S_D -Freedom from Risk for Users With Specified Disabilities, S_U_S_D -Satisfaction of Users With Specified Disabilities, P_P_S_A -Presence of Properties That Support Accessibility; Mat = φ 13 (O_T, N_o_Ft, N_o_Fl, P_S, N_T_C, N_R_F, N_C_F, F_D_A_T_C, F_Rn, F_Rl, M_T_B_F, T_My, E_L_F_D, F_Dy), (22) where N_o_Ft -Number of Faults, P_S -Product Size, N_T_C -Number of Test Cases, N_R_F -Number of Resolved Failures, N_C_F -Number of Corrected Faults, F_D_A_T_C -Failure Density Against Test Cases, F_Rn -Failure Resolution, F_Rl -Fault Removal, M_T_B_F -Mean Time Between Failures, T_My -Test Maturity, E_L_F_D -Estimated Latent Fault Density, F_Dy -Fault Density; Avb = φ 14 (O_T, T_T_D_W_S_I_S, N_O_B, T_D_T), (23) where T_T_D_W_S_I_S -Total Time During which the Software Is in an UpState, N_O_B -Number of Observed Breakdowns, T_D_T -Total Down Time; F_T = φ 15 (N_o_Fl, N_T_C, N_Bd, N_o_F, N_I_O), (24) where N_Bd -Number of Breakdowns, N_I_O -Number of Illegal Operations; Rcv = φ 16 (O_T, N_Bd, T_t_R, D_T, N_Rs, N_Rn, Ray), (25) where T_t_R -Time to Repair, D_T -Down Time, N_Rs -Number of Restarts, N_Rn -Number of Restoration, Ray -Restartability; C_E = φ 17 (O_T, N_o_Fl, N_o_F, N_D_I), (26) Ib = φ 18 (O_T, N_D_F_R_T, N_D_F_B_E, N_I_P, D_Eay), (27) where N_D_F_R_T -Number of Data Formats Regarded by Tool, N_D_F_B_E -Number of Data Formats to Be Exchanged, N_I_P -Number of Interface Protocols, D_Eay -Data Exchangeability; Conf = φ 19 (O_T, N_I_O, N_T_C, N_I_D_C, N_D_I, N_A_T, N_C_R, A_Ca, N_D_I_C_E_D, N_D_I_B_R_E_D), (28) where N_I_D_C -Number of Instances of Data Corruption, N_A_T -Number of Access Types, N_C_R -Number of Controllability Requirements, A_Ca -Access Controllability, N_D_I_C_E_D -Number of Data Items Correctly Encrypted Decrypted, N_D_I_B_R_E_D -Number of Data Items to be Required Encryption Decryption; Int = φ 20 (O_T, N_I_O, N_T_C, N_I_D_C, N_D_I, N_A_T, N_C_R, A_Ca), (29) N_R = φ 21 (N_E_P_U_D_S, N_E_R_N_R_P), (30) where N_E_P_U_D_S -Number of Events Processed Using Digital Signature, N_E_R_N_R_P -Number of Events Requiring Non-Repudiation Property; Acb = φ 22 (N_A_S_D_R_S_L, N_A_A_O), (31) where N_A_S_D_R_S_L -Number of Accesses to System and Data Recorded in the System Log, N_A_A_O -Number of Accesses Actually Occured; Auth = φ 23 (N_P_A_M), (32) where N_P_A_M -Number of Provided Authentification Methods; Mod = φ 24 (O_T, N_o_Fl, N_R_F, N_M_M, N_V, N_o_F, N_M), (33) where N_M_M -Number of Modifications Made, N_V -Number of Variables, N_M -Number of Modules; Rub = φ 25 (F_Cy, N_F_Cy, V_Rn, Aay, Tay, C_Ra), (34) where F_Cy -Functional Commonality, N_F_Cy -Non Functional Commonality, V_Rn -Variability Richness, Aay -Applicability, Tay -Tailorability, C_Ra -Component Replaceability; Anb = φ 26 (N_o_Fl, N_D_I, Er_T, N_I_R_B_L, N_D_F_R, A_T_C), (35) where Er_T -Error Time, N_I_R_B_L -Number of Items Required to Be Logged, N_D_F_R -Number of Diagnostic Functions Required, A_T_C -Audit Trail Capability; Mdfb = φ 27 (O_T, N_R_V, N_R_F, Er_T, N_o_F, C_C_Ca, N_T_C_P_B_M, N_T_S_P_A_M), (36) where N_R_V -Number of Revised Versions, C_C_Ca -Change Control Capability, N_T_C_P_B_M -Number of Troubles within Certain Period Before Modification, N_T_S_P_A_M -Number of Troubles in Same Period After Modification; Tsb = φ 28 (O_T, N_T_C, N_R_F, N_B_T_F_R, N_T_D_O_S, N_Cp), (37) where N_B_T_F_R -Number of Built in Test Functions Required, N_T_D_O_S -Number of Test Dependencies on Other Systems, N_Cp -Number of Checkpoints; Adb = φ 29 (N_o_F, O_T, N_o_Ft, P_U_F, N_D_I, N_D_S, Aa_D_S, H_E_A, S_E_A, N_O_F_T_W_N_C_A, T_N_F_W_T_D_E), (38) where P_U_F -Porting User Friendliness, N_D_S -Number of Data Structures, Aa_D_S -Adaptability of Data Structures, H_E_A -Hardware Environmental Adaptability, S_E_A -Software Environmental Adaptability, N_O_F_T_W_N_C_A -Number of Operational Functions of which Tasks Were Not Completed or Adequated, T_N_F_W_T_D_E -Total Number of Functions which Were Tested in Different Environment; Inb = φ 30 (N_o_Ft, N_S_O, N_I_S, E_o_I), (39) where N_S_O -Number of Setup Operations, N_I_S -Number of Installation Steps, E_o_I -Ease of Installation; Rpb = φ 31 (N_o_F, N_D_I, N_Et), (40) where N_Et -Number of Entities. Then the sets of attributes for subcharacteristics of nonfunctional characteristicssoftware quality components have the form: I = {N_o_F, F_I_Cn, F_Aq, F_I_C}the set of attributes for Functional Completeness; J = {O_T, N_I_C, N_D_I, C_A, Pc}the set of attributes for Functional Correctness; K={O_T, N_o_F, F_I_Cn, F_Aq, F_I_C, Pc}the set of attributes for Functional Appropriateness; L = {O_T, Nm_o_T, R_T, N_o_E, Tn_T, Tsk_T, M_A_Thr}the set of attributes for Time Behaviour; M = {O_T, N_o_Fl, N_o_E, N_IO_R_E, U_W_T, N_M_R_E, N_T_R_E, T_Cc, IO_U, N_o_L_C_D, IO_L_L, M_M_U, M_T_U, M_O_T_E}the set of attributes for Resource Utilization; N = {N_D_I, N_C_U, C_Bw, M_A_Thr, S_Db}the set of attributes for Capacity; O = {N_o_F, N_o_Tt, N_IO_D_I, Cn_D, F_Ua, Ua_IO}the set of attributes for Appropriateness Recognisability; P = {N_o_F, O_T, E_F_L, Nm_o_T, H_Fq, E_U_D_H_S, H_Aa, C_U_D_H}the set of attributes for Learnability; Q = {N_o_F, O_T, E_Cr, N_S_F, N_U_E_C, N_A_C, N_IO_R_E, N_Op, N_I_W_C_C_V_D, N_M_I, N_I_E, Ph_A, N_E_U_M}the set of attributes for Operability; R = {N_U_R_S, N_U_E_C, O_T_P_D_O, N_O_U_H_E_O, N_I_E_W_U_S_C, N_A_C_I_E, N_E_C_W_U_S_C, T_N_E_C_T, N_F_I_U_E_T, T_N_F_R_T_C, T_N_I_O_P}the set of attributes for User Error Protection; S = {N_I_E, N_I_G_E, D_I_P_U, D_I_S_U, D_E_A, D_R_W_M_U}the set of attributes for User Interface Aesthethics; T = {E_W_S_C_B_U_U_S_D, E_W_U_S_D, F_F_R_U_S_D, S_U_S_D, P_P_S_A}the set of attributes for Accessibility; U = {O_T, N_o_Ft, N_o_Fl, P_S, N_T_C, N_R_F, N_C_F, F_D_A_T_C, F_Rn, F_Rl, M_T_B_F, T_My, E_L_F_D, F_Dy}the set of attributes for Maturity; V = {O_T, T_T_D_W_S_I_S, N_O_B, T_D_T}the set of attributes for Availability; W = {N_o_Fl, N_T_C, N_Bd, N_o_F, N_I_O}the set of attributes for Fault Tolerance; X = {O_T, N_Bd, T_t_R, D_T, N_Rs, N_Rn, Ray}the set of attributes for Recoverability; Y = {O_T, N_o_Fl, N_o_F, N_D_I}the set of attributes for CoExistence; Z = {O_T, N_D_F_R_T, N_D_F_B_E, N_I_P, D_Eay}the set of attributes for Interoperability; AA = {O_T, N_I_O, N_T_C, N_I_D_C, N_D_I, N_A_T, N_C_R, A_Ca, N_D_I_C_E_D, N_D_I_B_R_E_D}the set of attributes for Confidentiality; AB = {O_T, N_I_O, N_T_C, N_I_D_C, N_D_I, N_A_T, N_C_R, A_Ca}the set of attributes for Integrity; AC = {N_E_P_U_D_S, N_E_R_N_R_P}the set of attributes for Non Repudiation; AD = {N_A_S_D_R_S_L, N_A_A_O}the set of attributes for Accountability; AE = {N_P_A_M}the set of attributes for Authenticity; AF = {O_T, N_o_Fl, N_R_F, N_M_M, N_V, N_o_F, N_M}the set of attributes for Modularity; AG = {F_Cy, N_F_Cy, V_Rn, Aay, Tay, C_Ra}the set of attributes for Reusability; AH = {N_o_Fl, N_D_I, Er_T, N_I_R_B_L, N_D_F_R, A_T_C} the set of attributes for Analysability; AI = {O_T, N_R_V, N_R_F, Er_T, N_o_F, C_C_Ca, N_T_C_P_B_M, N_T_S_P_A_M}the set of attributes for Modifability; AJ = {O_T, N_T_C, N_R_F, N_B_T_F_R, N_T_D_O_S, N_Cp}the set of attributes for Testability; AK = {N_o_F, O_T, N_o_Ft, P_U_F, N_D_I, N_D_S, Aa_D_S, H_E_A, S_E_A, N_O_F_T_W_N_C_A, T_N_F_W_T_D_E}the set of attributes for Adaptability; AL = {N_o_Ft, N_S_O, N_I_S, E_o_I}the set of attributes for Installability; AM = {N_o_F, N_D_I, N_Et}the set of attributes for Replaceability.</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Code complete</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mcconnell</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>Microsoft Press</publisher>
			<pubPlace>Redmond</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">S</forename><surname>Hastie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Wojewoda</surname></persName>
		</author>
		<ptr target="http://www.infoq.com/articles/standish-chaos-2015" />
		<title level="m">Standish Group 2015 Chaos Report -Q&amp;A with Jennifer Lynch</title>
				<imprint>
			<date type="published" when="2019-10-29">2019/10/29</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Information technology of evaluating the sufficiency of information on quality in the software requirements specifications</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hovorushchenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Pomorova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">CEUR-WS</title>
		<imprint>
			<biblScope unit="volume">2104</biblScope>
			<biblScope unit="page" from="555" to="570" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<idno>ISO/IEC 25010:2011</idno>
		<title level="m">Systems and software engineering. Systems and software Quality Requirements and Evaluation (SQuaRE). System and software quality models</title>
				<imprint>
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<idno>ISO 25023</idno>
		<title level="m">Systems and software engineering. Systems and software Quality Requirements and Evaluation (SQuaRE). Measurement of system and software product quality</title>
				<imprint>
			<date type="published" when="2016">2016. 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Integration of DEMATEL and ANP methods for calculate the weight of characteristics software quality based model ISO 9126</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sugiyanto</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Rochiman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proccedings of the 5-th International Conference on Information Technology and Electrical Engineering</title>
				<meeting>cedings of the 5-th International Conference on Information Technology and Electrical Engineering</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="143" to="148" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Information technology for assurance of veracity of quality information in the software requirements specification</title>
		<author>
			<persName><forename type="first">T</forename><surname>Hovorushchenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Advances in Intelligent Systems and Computing II</title>
		<imprint>
			<biblScope unit="volume">689</biblScope>
			<biblScope unit="page" from="166" to="185" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Complex ontology management using task models</title>
		<author>
			<persName><forename type="first">E</forename><surname>Burov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Knowledge-Based and Intelligent Engineering Systems</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="111" to="120" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">Ontology approach to realization of information technology for normative profile forming at critical software certification. In Herald of the Military Institute of Kiev National University named after Taras Shevchenko</title>
		<author>
			<persName><forename type="first">I</forename><surname>Shostak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Butenko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="volume">38</biblScope>
			<biblScope unit="page" from="250" to="253" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">An Ontological Approach to Model Software Quality Assurance Knowledge Domain</title>
		<author>
			<persName><forename type="first">N</forename><surname>Bajnaid</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Benlamri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pakstas</surname></persName>
		</author>
		<author>
			<persName><surname>Salekzamankhani</surname></persName>
		</author>
		<author>
			<persName><surname>Sh</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Lecture Notes on Software Engineering</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="193" to="198" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
