SlideShare a Scribd company logo
1 of 3
Name: Ahsan Riaz
A-7E Module Decomposition Structure
To describe the A-7E module decomposition structure, and to give an example of how a module
structure is documented, we provide the following excerpts from the A-7E software module guide.
The decomposition tree is described beginning with the three highest-level modules. These are
motivated by the observation that, in systems like the A-7E, changes tend to come from three areas:
the hardware with which the software must interact, the required externally visible behavior of the
system, and a decision solely under the jurisdiction of a project's software designer.
Hardware-Hiding Module:-
The Hardware-Hiding Module includes the procedures that need to be changed if any part of the
hardware is replaced by a new unit with a different hardware/software interface but with the same
general capabilities. This module implements virtual hardware, or a set of abstract devices that are
used by the rest of the software. The primary secrets of this module are the hardware/software
interfaces. The secondary secrets of this module are the data structures and algorithms used to
implement the virtual hardware. One of the sub modules of the Hardware-Hiding Module is the
Extended Computer Module that hides the details of the processor.
Behavior-Hiding Module:-
The Behavior-Hiding Module includes procedures that need to be changed if there are changes in
requirements affecting the required behavior. Those requirements are the primary secret of this
module. These procedures determine the values to be sent to the virtual output devices provided
by the Hardware-Hiding Module.
Software Decision Module:-
The Software Decision Module hides software design decisions that are based on mathematical
theorems, physical facts, and programming considerations such as algorithmic efficiency and
accuracy. The secrets of this module are not described in the requirements document. This module
differs from the other modules in that both the secrets and the interfaces are determined by software
designers. Changes in these modules are more likely to be motivated by a desire to improve
performance or accuracy than by externally imposed changes.
The module guide goes on to explain how conflicts among these categories (e.g., is a required
algorithm part of the behavior or a software decision?) are arbitrated by a complete and
unambiguous requirements specification and then provides the second-level decomposition. The
following sections describe how the Software Decision Module is decomposed.
Application Data Type Module:-
The Application Data Type Module supplements the data types provided by the Extended
Computer Module with data types that are useful for avionics applications and do not require a
computer-dependent implementation. Examples of types include distance (useful for altitude),
time intervals, and angles (useful for latitude and longitude). These data types are implemented
using the basic numeric data types provided by the Extended Computer; variables of those types
are used just as if the types were built into the Extended Computer.
The secrets of the Application Data Type Module are the data representation used in the variables
and the procedures used to implement operations on those variables. Units of measurement (such
as feet, seconds, or radians) are part of the representation and are hidden. Where necessary, the
modules provide conversion operators that deliver or accept real values in specified units.
Data Banker Module:-
Most data are produced by one module and consumed by another. In most cases, the consumers
should receive a value that is as up to date as practical. The time at which a datum should be
recalculated is determined both by properties of its consumer (e.g., accuracy requirements) and by
properties of its producer (e.g., cost of calculation, rate of change of value). The Data Banker
Module acts as a "middleman" and determines when new values for these data are computed.
The Data Banker Module obtains values from producer procedures; consumer procedures obtain
data from Data Banker access procedures. The producer and consumers of a particular datum can
be written without knowing when a stored value is updated. In most cases, neither the producer
nor the consumer need be modified if the updating policy changes.
The Data Banker provides values for all data that report on the internal state of a module or on the
state of the aircraft. The Data Banker also signals events involving changes in the values that it
supplies. The Data Banker is used as long as consumer and producer are separate modules, even
when they are both sub modules of a larger module. The Data Banker is not used if consumers
require specific members of the sequence of values computed by the producer or if a produced
value is solely a function of the values of input parameters given to the producing procedure, such
as sin(x)
The choice among updating policies should be based on the consumers' accuracy requirements,
how often consumers require the value, the maximum wait that consumers can accept, how rapidly
the value changes, and the cost of producing a new value. This information is part of the
specification given to the implement the Data Banker Module.
Filter Behavior Module:-
The Filter Behavior Module contains digital models of physical filters. They can be used by other
procedures to filter potentially noisy data. The primary secrets of this module are the models used
for the estimation of values based on sample values and error estimates. The secondary secrets are
the computer algorithms and data structures used to implement those models.
Physical Models Module:-
The software requires estimates of quantities that cannot be measured directly but can be computed
from observables using mathematical models. An example is the time that a ballistic weapon will
take to strike the ground. The primary secrets of the Physical Models Module are the models; the
secondary secrets are the computer implementations of those models.
Software Utility Module:-
The Software Utility Module contains those utility routines that would otherwise have to be written
by more than one other programmer. The routines include mathematical functions, resource
monitors, and procedures that signal when all modules have completed their power-up
initialization. The secrets of the module are the data structures and algorithms used to implement
the procedures.
System Generation Module:-
The primary secrets of the System Generation Module are decisions that are postponed until
system generation time. These include the values of system-generation parameters and the choice
among alternative implementations of a module. The secondary secrets of the System Generation
Module are the method used to generate a machine-executable form of the code and the
representation of the postponed decisions. The procedures in this module do not run on the onboard
computer; they run on the computer used to generate the code for the onboard system.

More Related Content

What's hot

architectural design
 architectural design architectural design
architectural designPreeti Mishra
 
IT6701 Information Management - Unit II
IT6701 Information Management - Unit II   IT6701 Information Management - Unit II
IT6701 Information Management - Unit II pkaviya
 
SE18_Lec 09_UML Use Cases
SE18_Lec 09_UML Use CasesSE18_Lec 09_UML Use Cases
SE18_Lec 09_UML Use CasesAmr E. Mohamed
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17koolkampus
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteriaUmaselvi_R
 
Modeling System Requirements
Modeling System RequirementsModeling System Requirements
Modeling System RequirementsAsjad Raza
 
167543812 a-study-on-smart-card-doc
167543812 a-study-on-smart-card-doc167543812 a-study-on-smart-card-doc
167543812 a-study-on-smart-card-dochomeworkping8
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and designPratik Gupta
 
Information Technology ITM1
Information Technology ITM1Information Technology ITM1
Information Technology ITM1Aram Mohammed
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded SystemsAngela Hauber
 

What's hot (20)

Ch5 system modeling
Ch5 system modelingCh5 system modeling
Ch5 system modeling
 
computer Unit 8
computer Unit 8computer Unit 8
computer Unit 8
 
architectural design
 architectural design architectural design
architectural design
 
IT6701 Information Management - Unit II
IT6701 Information Management - Unit II   IT6701 Information Management - Unit II
IT6701 Information Management - Unit II
 
SE18_Lec 09_UML Use Cases
SE18_Lec 09_UML Use CasesSE18_Lec 09_UML Use Cases
SE18_Lec 09_UML Use Cases
 
Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17Critical System Specification in Software Engineering SE17
Critical System Specification in Software Engineering SE17
 
System design
System designSystem design
System design
 
Modules and modularization criteria
Modules and modularization criteriaModules and modularization criteria
Modules and modularization criteria
 
Modeling System Requirements
Modeling System RequirementsModeling System Requirements
Modeling System Requirements
 
Input and output design
Input and output designInput and output design
Input and output design
 
System Modelling
System ModellingSystem Modelling
System Modelling
 
8 system models (1)
8 system models (1)8 system models (1)
8 system models (1)
 
167543812 a-study-on-smart-card-doc
167543812 a-study-on-smart-card-doc167543812 a-study-on-smart-card-doc
167543812 a-study-on-smart-card-doc
 
Architectural design of software
Architectural  design of softwareArchitectural  design of software
Architectural design of software
 
Unit ii
Unit ii  Unit ii
Unit ii
 
Chapter 8 system analysis and design
Chapter 8   system analysis and designChapter 8   system analysis and design
Chapter 8 system analysis and design
 
Information Technology ITM1
Information Technology ITM1Information Technology ITM1
Information Technology ITM1
 
Ch7 implementation
Ch7 implementationCh7 implementation
Ch7 implementation
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems5 Techniques to Achieve Functional Safety for Embedded Systems
5 Techniques to Achieve Functional Safety for Embedded Systems
 

Viewers also liked

Planificador aamtic.docx
Planificador aamtic.docxPlanificador aamtic.docx
Planificador aamtic.docxilmuri
 
Planificadorhoy.docx (1)
Planificadorhoy.docx (1)Planificadorhoy.docx (1)
Planificadorhoy.docx (1)Susanares
 
Gestiion del talento humano
Gestiion del talento humanoGestiion del talento humano
Gestiion del talento humanoRodolfo Rosa
 
Rubrica heteroevaluacion
Rubrica heteroevaluacionRubrica heteroevaluacion
Rubrica heteroevaluacionmonicavilla159
 
TA-7779 Inception Workshop
TA-7779 Inception WorkshopTA-7779 Inception Workshop
TA-7779 Inception WorkshopSon Ha-Dang
 
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...ASINMET Mendoza
 
Unidad 1. Conceptos y definiciones del diseño
Unidad 1. Conceptos y definiciones del diseñoUnidad 1. Conceptos y definiciones del diseño
Unidad 1. Conceptos y definiciones del diseñoUGM NORTE
 

Viewers also liked (13)

Sin título 1
Sin título 1Sin título 1
Sin título 1
 
Janiele costa
Janiele costaJaniele costa
Janiele costa
 
Website
WebsiteWebsite
Website
 
Planificador aamtic.docx
Planificador aamtic.docxPlanificador aamtic.docx
Planificador aamtic.docx
 
Janiele costa
Janiele costaJaniele costa
Janiele costa
 
Planificadorhoy.docx (1)
Planificadorhoy.docx (1)Planificadorhoy.docx (1)
Planificadorhoy.docx (1)
 
Gestiion del talento humano
Gestiion del talento humanoGestiion del talento humano
Gestiion del talento humano
 
Rubrica heteroevaluacion
Rubrica heteroevaluacionRubrica heteroevaluacion
Rubrica heteroevaluacion
 
TA-7779 Inception Workshop
TA-7779 Inception WorkshopTA-7779 Inception Workshop
TA-7779 Inception Workshop
 
Marta gómez gómez bueno
Marta gómez gómez buenoMarta gómez gómez bueno
Marta gómez gómez bueno
 
Pelicula rio
Pelicula rioPelicula rio
Pelicula rio
 
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...
Mecanización en el Cultivo de Ajo. Oportunidades y Desafíos – Ing. Aldo Lopez...
 
Unidad 1. Conceptos y definiciones del diseño
Unidad 1. Conceptos y definiciones del diseñoUnidad 1. Conceptos y definiciones del diseño
Unidad 1. Conceptos y definiciones del diseño
 

Similar to A 7 e module decomposition structure

Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsMuhammadTalha436
 
GSPM (General Software Process Model)
GSPM (General Software Process Model)GSPM (General Software Process Model)
GSPM (General Software Process Model)muhammad naeem
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring systemVenkat Projects
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxminationAditi_17
 
Mobile store management
Mobile store management Mobile store management
Mobile store management Rupendra Verma
 
Management Information system
Management Information systemManagement Information system
Management Information systemCochin University
 
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTSMANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTSijseajournal
 
intelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxintelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxKondiVinay
 
BEE 049- design of embedded system.pdf
BEE 049- design of embedded system.pdfBEE 049- design of embedded system.pdf
BEE 049- design of embedded system.pdfabdisahirko
 
Giddings
GiddingsGiddings
Giddingsanesah
 
Self learning real time expert system
Self learning real time expert systemSelf learning real time expert system
Self learning real time expert systemijscai
 
System analsis and design
System analsis and designSystem analsis and design
System analsis and designRizwan Kabir
 
Software Engineering Process
Software Engineering ProcessSoftware Engineering Process
Software Engineering ProcessAbdul Naqashbandi
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridEditor IJCATR
 
An Analysis on Query Optimization in Distributed Database
An Analysis on Query Optimization in Distributed DatabaseAn Analysis on Query Optimization in Distributed Database
An Analysis on Query Optimization in Distributed DatabaseEditor IJMTER
 

Similar to A 7 e module decomposition structure (20)

Software Engineering Important Short Question for Exams
Software Engineering Important Short Question for ExamsSoftware Engineering Important Short Question for Exams
Software Engineering Important Short Question for Exams
 
GSPM (General Software Process Model)
GSPM (General Software Process Model)GSPM (General Software Process Model)
GSPM (General Software Process Model)
 
Bus information live monitoring system
Bus information live monitoring systemBus information live monitoring system
Bus information live monitoring system
 
Ia rm001 -en-p
Ia rm001 -en-pIa rm001 -en-p
Ia rm001 -en-p
 
Software_Build__Release___UAT_Phases (1).PDF
Software_Build__Release___UAT_Phases (1).PDFSoftware_Build__Release___UAT_Phases (1).PDF
Software_Build__Release___UAT_Phases (1).PDF
 
Online eaxmination
Online eaxminationOnline eaxmination
Online eaxmination
 
Mobile store management
Mobile store management Mobile store management
Mobile store management
 
Management Information system
Management Information systemManagement Information system
Management Information system
 
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTSMANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS
MANAGING AND ANALYSING SOFTWARE PRODUCT LINE REQUIREMENTS
 
intelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docxintelligent-management-of-electrical-systems-in-industries.docx
intelligent-management-of-electrical-systems-in-industries.docx
 
Software architecture
Software architectureSoftware architecture
Software architecture
 
BEE 049- design of embedded system.pdf
BEE 049- design of embedded system.pdfBEE 049- design of embedded system.pdf
BEE 049- design of embedded system.pdf
 
Cloud Storage and Security
Cloud Storage and SecurityCloud Storage and Security
Cloud Storage and Security
 
Giddings
GiddingsGiddings
Giddings
 
Self learning real time expert system
Self learning real time expert systemSelf learning real time expert system
Self learning real time expert system
 
System analsis and design
System analsis and designSystem analsis and design
System analsis and design
 
Computers in management
Computers in managementComputers in management
Computers in management
 
Software Engineering Process
Software Engineering ProcessSoftware Engineering Process
Software Engineering Process
 
Dynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the GridDynamically Adapting Software Components for the Grid
Dynamically Adapting Software Components for the Grid
 
An Analysis on Query Optimization in Distributed Database
An Analysis on Query Optimization in Distributed DatabaseAn Analysis on Query Optimization in Distributed Database
An Analysis on Query Optimization in Distributed Database
 

More from ahsan riaz

More from ahsan riaz (8)

It proffesionals
It proffesionalsIt proffesionals
It proffesionals
 
Ahsan
AhsanAhsan
Ahsan
 
It
ItIt
It
 
Primary group
Primary groupPrimary group
Primary group
 
Quality attribute scenarios
Quality attribute scenariosQuality attribute scenarios
Quality attribute scenarios
 
Pmbok
PmbokPmbok
Pmbok
 
3g and 4g
3g and 4g3g and 4g
3g and 4g
 
Availability tactics
Availability tacticsAvailability tactics
Availability tactics
 

Recently uploaded

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 

Recently uploaded (20)

(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 

A 7 e module decomposition structure

  • 1. Name: Ahsan Riaz A-7E Module Decomposition Structure To describe the A-7E module decomposition structure, and to give an example of how a module structure is documented, we provide the following excerpts from the A-7E software module guide. The decomposition tree is described beginning with the three highest-level modules. These are motivated by the observation that, in systems like the A-7E, changes tend to come from three areas: the hardware with which the software must interact, the required externally visible behavior of the system, and a decision solely under the jurisdiction of a project's software designer. Hardware-Hiding Module:- The Hardware-Hiding Module includes the procedures that need to be changed if any part of the hardware is replaced by a new unit with a different hardware/software interface but with the same general capabilities. This module implements virtual hardware, or a set of abstract devices that are used by the rest of the software. The primary secrets of this module are the hardware/software interfaces. The secondary secrets of this module are the data structures and algorithms used to implement the virtual hardware. One of the sub modules of the Hardware-Hiding Module is the Extended Computer Module that hides the details of the processor. Behavior-Hiding Module:- The Behavior-Hiding Module includes procedures that need to be changed if there are changes in requirements affecting the required behavior. Those requirements are the primary secret of this module. These procedures determine the values to be sent to the virtual output devices provided by the Hardware-Hiding Module. Software Decision Module:- The Software Decision Module hides software design decisions that are based on mathematical theorems, physical facts, and programming considerations such as algorithmic efficiency and accuracy. The secrets of this module are not described in the requirements document. This module differs from the other modules in that both the secrets and the interfaces are determined by software designers. Changes in these modules are more likely to be motivated by a desire to improve performance or accuracy than by externally imposed changes. The module guide goes on to explain how conflicts among these categories (e.g., is a required algorithm part of the behavior or a software decision?) are arbitrated by a complete and unambiguous requirements specification and then provides the second-level decomposition. The following sections describe how the Software Decision Module is decomposed. Application Data Type Module:-
  • 2. The Application Data Type Module supplements the data types provided by the Extended Computer Module with data types that are useful for avionics applications and do not require a computer-dependent implementation. Examples of types include distance (useful for altitude), time intervals, and angles (useful for latitude and longitude). These data types are implemented using the basic numeric data types provided by the Extended Computer; variables of those types are used just as if the types were built into the Extended Computer. The secrets of the Application Data Type Module are the data representation used in the variables and the procedures used to implement operations on those variables. Units of measurement (such as feet, seconds, or radians) are part of the representation and are hidden. Where necessary, the modules provide conversion operators that deliver or accept real values in specified units. Data Banker Module:- Most data are produced by one module and consumed by another. In most cases, the consumers should receive a value that is as up to date as practical. The time at which a datum should be recalculated is determined both by properties of its consumer (e.g., accuracy requirements) and by properties of its producer (e.g., cost of calculation, rate of change of value). The Data Banker Module acts as a "middleman" and determines when new values for these data are computed. The Data Banker Module obtains values from producer procedures; consumer procedures obtain data from Data Banker access procedures. The producer and consumers of a particular datum can be written without knowing when a stored value is updated. In most cases, neither the producer nor the consumer need be modified if the updating policy changes. The Data Banker provides values for all data that report on the internal state of a module or on the state of the aircraft. The Data Banker also signals events involving changes in the values that it supplies. The Data Banker is used as long as consumer and producer are separate modules, even when they are both sub modules of a larger module. The Data Banker is not used if consumers require specific members of the sequence of values computed by the producer or if a produced value is solely a function of the values of input parameters given to the producing procedure, such as sin(x) The choice among updating policies should be based on the consumers' accuracy requirements, how often consumers require the value, the maximum wait that consumers can accept, how rapidly the value changes, and the cost of producing a new value. This information is part of the specification given to the implement the Data Banker Module. Filter Behavior Module:- The Filter Behavior Module contains digital models of physical filters. They can be used by other procedures to filter potentially noisy data. The primary secrets of this module are the models used for the estimation of values based on sample values and error estimates. The secondary secrets are the computer algorithms and data structures used to implement those models.
  • 3. Physical Models Module:- The software requires estimates of quantities that cannot be measured directly but can be computed from observables using mathematical models. An example is the time that a ballistic weapon will take to strike the ground. The primary secrets of the Physical Models Module are the models; the secondary secrets are the computer implementations of those models. Software Utility Module:- The Software Utility Module contains those utility routines that would otherwise have to be written by more than one other programmer. The routines include mathematical functions, resource monitors, and procedures that signal when all modules have completed their power-up initialization. The secrets of the module are the data structures and algorithms used to implement the procedures. System Generation Module:- The primary secrets of the System Generation Module are decisions that are postponed until system generation time. These include the values of system-generation parameters and the choice among alternative implementations of a module. The secondary secrets of the System Generation Module are the method used to generate a machine-executable form of the code and the representation of the postponed decisions. The procedures in this module do not run on the onboard computer; they run on the computer used to generate the code for the onboard system.