Академический Документы
Профессиональный Документы
Культура Документы
net/publication/262373232
Software Size Estimation Using Function Point Analysis – A Case Study for a
Mobile Application
CITATIONS READS
8 1,921
1 author:
Volkan Tunalı
Maltepe University
17 PUBLICATIONS 68 CITATIONS
SEE PROFILE
All content following this page was uploaded by Volkan Tunalı on 24 May 2014.
Abstract - A good planning is essential for a software project LQ WKH VRIWZDUH V\VWHP IURP WKH XVHU¶V SHUVSHFWLYH DV VHHQ LQ
to be successful, and a good estimation of the size of the software )LJ
to be developed is critical for a good planning. There are many
methods used for size estimation of software projects. One of the
most widely known and used methods is the Function Point
Analysis (FPA). In this study, size of a mobile software project
was estimated using FPA method. The estimate was compared to
the actual size of the project after development, and results were
presented.
Index Terms – software size estimation, function poins
analysis, mobile software. )LJ)XQFWLRQDOLW\DVYLHZHGIURPWKHXVHU¶VSHUVSHFWLYH>@
,,1752'8&7,21 (VWDEOLVKHG LQ ,)38* LV D QRQSURILW RUJDQL]DWLRQ
ZKLFKSURPRWHV)3$DVLWVVWDQGDUGPHWKRGRORJ\IRUVRIWZDUH
$NH\IDFWRUIRUWKHVXFFHVVRISURMHFWVLQFOXGLQJVRIWZDUH
VL]H HVWLPDWLRQ ,)38* DOVR PDLQWDLQV WKH )XQFWLRQ 3RLQW
SURMHFWVLVWKHDFFXUDWHHVWLPDWLRQDQGSODQQLQJRIDFWLYLWLHVWR
&RXQWLQJ 3UDFWLFHV 0DQXDO &30 ZKLFK LV WKH UHFRJQL]HG
EH SHUIRUPHG DQWLFLSDWLQJ WLPH EXGJHW DQG TXDOLW\
LQGXVWU\ VWDQGDUG IRU )3$ >@ 7KH VWDQGDUG FRXQWLQJ
FRQVWUDLQWV (VWLPDWLRQ DQG SODQQLQJ LQ VRIWZDUH SURMHFWV FDQ
SURFHGXUHGHVFULEHGLQ&30LVVKRZQLQ)LJ
EHFDUULHGRXWE\ILUVWPHDVXULQJWKHVL]HRIWKHGHOLYHUDEOHVWR
EHFUHDWHGRUGHYHORSHG>@
2QH RI WKH PRVW ZLGHO\ XVHG PHWKRG IRU PHDVXULQJ WKH
VL]H RI WKH HVWLPDWHG VRIWZDUH V\VWHP LV WKH )XQFWLRQ 3RLQW
$QDO\VLV)3$)3$ZDVILUVWLQWURGXFHGE\$OODQ$OEUHFKWLQ
DQGQRZLWLVNHSWXSGDWHGE\WKH,QWHUQDWLRQDO)XQFWLRQ
3RLQW8VHU*URXS,)38*>@)3$LVEDVHGRQWKHDPRXQW
RI IXQFWLRQDOLW\ LQ D VRIWZDUH SURMHFW DQG D VHW RI LQGLYLGXDO
SURMHFW IDFWRUV )3$ LV D VWDQGDUG PHWKRG IRU PHDVXULQJ )LJ,)38*IXQFWLRQSRLQWFRXQWLQJSURFHGXUHGLDJUDP>@
VRIWZDUH GHYHORSPHQW IURP WKH XVHU¶V SRLQW RI YLHZ ,Q WKH
OLWHUDWXUH WKHUH DUH RWKHU VHYHUDO ZLGHO\ UHFRJQL]HG PHWKRGV A. Identification of User Function Types
XVHGIRUHVWLPDWLQJWKHVL]HRIVRIWZDUHSURMHFWVEDVHGRQWKH ,Q )3$ D VRIWZDUH V\VWHP FRQVLVWV RI ILYH PDMRU
IXQFWLRQSRLQWDSSURDFK6RPH RI WKHP DUH 0DUN ,, )3$ >@ FRPSRQHQWV RU W\SHV WKDW SURYLGH LQIRUPDWLRQ SURFHVVLQJ
&260,& ))3 >@ 1(60$ >@ DQG )L60$ >@ 7KHVH IXQFWLRQDOLW\ WR WKH XVHUV ,Q WKH )3$ SURFHGXUH WKHVH ILYH
XVHUIXQFWLRQW\SHVDUHLGHQWLILHGDVEHORZ>@
x External Input (EI) XVHU GDWD RU XVHU FRQWURO LQSXW W\SH
PHWKRGV DUH DOVR UHFRJQL]HG ,62 VWDQGDUGV IRU IXQFWLRQDOO\
VL]LQJVRIWZDUHDORQJZLWKWKH,)38*PHWKRGDVRI
,Q WKLV VWXG\ )3$ ZDV XVHG WR HVWLPDWH WKH VL]H RI D WKDW HQWHUV WKH H[WHUQDO ERXQGDU\ RI WKH VRIWZDUH V\VWHP
PRELOHVRIWZDUHSURMHFWGHYHORSHGE\WKHDXWKRU,Q6HFWLRQ,, EHLQJPHDVXUHG
)3$PHWKRGLVH[SODLQHGLQVRPHGHWDLO6HFWLRQ,,,GHVFULEHV x External Output (EO) XVHU GDWD RU FRQWURO RXWSXW W\SH
WKHSURSHUWLHVRIWKHDSSOLFDWLRQGHYHORSHGDQGWKHHVWLPDWLRQ WKDW OHDYHV WKH H[WHUQDO ERXQGDU\ RI WKH VRIWZDUH V\VWHP
RIWKHSURMHFWVL]HXVLQJWKH)3$PHWKRG7KHHVWLPDWHGVL]HLV EHLQJPHDVXUHG
FRPSDUHG ZLWK WKH DFWXDO SURMHFW VL]H )LQDOO\ 6HFWLRQ ,9 x Internal Logical File (ILF) ORJLFDO ILOH W\SHV WKDW DUH
FRQWDLQVVRPHFRQFOXVLRQVDQGIXWXUHZRUN JHQHUDWHGXVHGRUPDLQWDLQHGE\WKHVRIWZDUHV\VWHP
x External Interface File (EIF) ILOHW\SHVSDVVHG RU VKDUHG
EHWZHHQVRIWZDUHV\VWHPV
x External Inquiry (EQ) LQSXWRXWSXW FRPELQDWLRQ ZKHUH
,,)81&7,2132,17$1$/<6,6
)3$ LV D PHWKRG IRU PHDVXULQJ WKH VL]H RI D VRIWZDUH LQSXWFDXVHVDQGJHQHUDWHVDQLPPHGLDWHRXWSXW
V\VWHPLQWHUPVRIWKHDPRXQWRIIXQFWLRQDOLW\DQGFRPSOH[LW\
__________________________________________________________________________________________________________________________________________
¦¦ x
SURGXFWLYLW\IDFWRURI-DYDODQJXDJHLV>@
u wij
UFP ij ,,,&$6(678'<
i j
A. The Mobile Application: Activity Schedule
7KH8)3LVFDOFXODWHGDVWKHZHLJKWHGWRWDORIWKHQXPEHU
,QWKLVVWXG\DPRELOHDSSOLFDWLRQGHYHORSHGE\WKHDXWKRU
RIXVHUIXQFWLRQW\SHVZKHUHx ij LVWKHQXPEHURIXVHUIXQFWLRQ
ZDV DGGUHVVHG DV D FDVH VWXG\ 7KH $FWLYLW\ 6FKHGXOH
W\SHiZLWKFRPSOH[LW\OHYHOjDQGw ij LVWKHZHLJKWYDOXHIRU
DSSOLFDWLRQZDVGHVLJQHGDQGGHYHORSHGVSHFLILFDOO\WRUXQRQ
W\SHiZLWKFRPSOH[LW\OHYHOj
WDEOHW FRPSXWHUV IRU WHDFKLQJ FKLOGUHQ ZLWK DXWLVP WR XVH
DFWLYLW\VFKHGXOHV$FWLYLW\VFKHGXOHVDUHYHU\LPSRUWDQWYLVXDO
D. Calculation of Technical Complexity Adjustment
VXSSRUWV\VWHPVIRUFKLOGUHQZLWKDXWLVPWRGHYHORSVNLOOVOLNH
,Q )3$ WKH HIIRUW UHTXLUHG WR LPSOHPHQW D VRIWZDUH
JHWWLQJ RUJDQL]HG DFWLQJ LQGHSHQGHQWO\ DQG PDNLQJ
V\VWHPLVUHODWHGQRWMXVWWRWKHQXPEHUDQGFRPSOH[LW\RIWKH
VHOHFWLRQV
IHDWXUHV SURYLGHG WR WKH XVHU EXW DOVR WR WKH RSHUDWLRQDO
7KH DSSOLFDWLRQ ZDV GHYHORSHG ZLWK -DYD SURJUDPPLQJ
HQYLURQPHQW RI WKH V\VWHP >@ 7KXV WKHUH DUH IDFWRUV
ODQJXDJH XVLQJ WKH (FOLSVH $'7 GHYHORSPHQW HQYLURQPHQW
LGHQWLILHG ZKLFK FDQ LQIOXHQFH WKH GHJUHH RI GLIILFXOW\
DQGLWUXQVRQPRELOHGHYLFHVZLWK$QGURLGRSHUDWLQJV\VWHP
DVVRFLDWHG ZLWK LPSOHPHQWLQJ WKH V\VWHP 7KHVH IDFWRUV DUH
$FWXDO WRWDO VL]H RI WKH SURMHFW FRQVLGHULQJ RQO\ WKH -DYD
FDOOHGvalue adjustmentsDQGWKH\DUHOLVWHGLQ7DEOH,,,>@
VRXUFH FRGH ILOHV LV OLQHV LQ ILOHV &RPPHQW OLQHV
___________________________________________________________________________________________________________________________________________
__________________________________________________________________________________________________________________________________________
___________________________________________________________________________________________________________________________________________