SlideShare a Scribd company logo
1 of 41
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 1
Applying Deductive, Inductive, and Abductive
Reasoning to the System Development Life-Cycle
(SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 2
Didier Koffi
Principal Business Architect
Pragmatic Cohesion Consulting, LLC
didier@pragmaticohesion.com
Hosted by:
Jessica Dahbour
ITMPI
Jessica_Dahbour@compaid.com
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 3
About Presenter’s Firm
• Since 2010, Pragmatic Cohesion has provided state of the art
Business Architecture and Business Systems Analysis services that
take advantage of our cutting edge approach to Enterprise
Stakeholders’ collaboration and Business Model Assessment.
• Our latest product is named the EBMM-TRIADs™ 3-day
Assessment Workshop that measures your organization's ability to
deliver outcomes that properly respond to the expectations and
constraints imposed upon your business by its environment:
markets, customers, suppliers, partners, competitors, regulators,
shareholders, and various stakeholders. The assessment does so
by asking a comprehensive set of simple questions that only require
your familiarity with the various aspects of your business; NO books
of records or balance sheets needed!
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 4
CAI Achieves IT Operational Excellence
www.compaid.com
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 5
PDU Credits Available for this Webinar
• The PMI has approved this webinar with PDUs
• You will be eligible to receive 1.0 PDU credits
• Your PDU email will be sent to you
• This webinar is mapped to the TALENT TRIANGLE
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 6
Online Webinar Recordings
NOW AVAILABLE
• Anytime Access
• Hundreds of Topics
Visit:
www.ITMPI.org/library
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 7
Enjoy the benefits of ITMPI Membership
JOIN TODAY!
• UNLIMITED Free Webinar Recordings
• UNLIMITED Free PDU Credits
• Hundreds of Topics
Visit:
www.ITMPI.org/subscribe
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 8
Outline:
• Deductive Reasoning
• Inductive Reasoning
• Abductive Reasoning
• From Evidence to
Hypothesis
• From Solution System
Feature to User Need
• Requirements Validation
• System Verification
• Reasoning types across the
System Development Life
Cycle (SDLC)
• Illustrative Example
Applying Deductive, Inductive, and Abductive Reasoning to the System
Development Life-Cycle (SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 9
Deductive reasoning is a form of reasoning that
shows that certain conclusions follow
necessarily from true premises
Thale’s Theorem:
Wikipedia
In geometry, Thales'
theorem states that if A, B
and C are points on a circle
where the line AB is a
diameter of the circle,
then the angle ∠ACB is a
right angle
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 10
Deductive reasoning is Top-Down, from generalizations
to particulars or from hypothesis to evidence.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 11
Inductive reasoning asserts that something is
probably true given some evidence relevant to it.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 12
• With Inductive reasoning we consider a “mass of
evidence” that we believe is relevant to a set of
hypothesis H. The probabilistic nature of inductive
inference comes from the following characteristics of the
“mass of evidence”:
– It is incomplete
– It is inconclusive (It is consistent to some degree with the truth of
every hypothesis in H)
– It may be vague or imprecise
– It may be dissonant (some of it favors one hypothesis and some
favor others)
– Its sources may not be perfectly credible
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 13
Abductive reasoning is concern with imaginative reasoning, a
process through which new ideas or hypotheses come into existence
based on observations.
In deductive reasoning a
conclusion is already
embedded in its premises.
In inductive reasoning, a
hypothesis or idea already
exists and we are just
establishing probabilistic
grounds for it.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 14
Abductive reasoning is also used to generate inference
networks: the skillful combination of relevance and credibility
characteristics of evidence.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 15
Eco’s “Overcoded Abduction” according to Schum
• We observe clue E* (E* being evidence that
event E occurred)
• Based on our prior knowledge of contexts in
which things like event E have occurred, we
say: “Whenever something like H has
occurred, then something like E has also
occurred.” Rephrased, we might say: “If H
were true, then E would follow as a matter of
course.”
• Thus, there is reason to suspect that H may
explain the occurrence of clue E*. In other
words, clue E* points to H as a possible
explanation for its occurrence.
From Evidence to Hypothesis
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 16
From Evidence to Hypothesis Example
H=Hypothesis Set H=It rained overnight; Hc= It did not rain overnight
E=Event relevant in an Inference about H E=My lawn is wet; Ec=My lawn is not wet
E*=Evidence that E occurred E*:My hands were wet after touching a patch of grass
From E* to E : Credibility Stage
P(E*|E) Hit probability P(My hands were wet after touching a patch of
grass | My lawn is wet)
P(E*|Ec) False positive probability P(My hands were wet after touching a patch of
grass | My lawn is not wet)
From E to H : Relevance Stage
P(E|H) > P(E|Hc) E favors H over Hc If P(My lawn is wet | It rained overnight) >P(My
lawn is wet| It did not rain overnight) then ‘My
lawn is wet’ favors H ‘It rained overnight’
P(E|H) < P(E|Hc) E favors Hc over H If P(My lawn is wet | It rained overnight) <P(My
lawn is wet| It did not rain overnight) then ‘My
lawn is wet’ favors Hc ‘It did not rain overnight’
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 17
To go from Solution System Features to User Needs, we use Abductive
Reasoning through our imagination to generate an “Argument” much
similar to linking Evidence to Hypothesis.
From Solution System Features to User Needs
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 18
The Argument is
embedded in the
structure of a
Hierarchy of
Requirements: from
detailed Technical
Requirements and
Specifications, System
Requirements,
Business
Requirements, up to
Mission Requirements.
From Solution System Features to User Needs
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 19
Evidence to Hypothesis Solution System Feature to User Need
H: Hypothesis Set User Need = UN
E: Event relevant in an Inference about
H
Requirement= R : R satisfies UN
E*: Evidence that E occurred System Features = S : Evidence that R is
implemented
From E* to E : Credibility Stage From S to R : Verification Stage
P(E*|E) Hit probability P(S|R): is Requirement implemented?
P(E*|Ec) False positive probability P(S|Rc): is Requirement not
implemented?
From E to H : Relevance Stage From R to UN : Validation Stage
P(E|H) > P(E|Hc) E favors H over Hc P(R|UN) > P(R|UNc) : R satisfies UN over
UNc
P(E|H) < P(E|Hc) E favors Hc over H P(R|UN) < P(R|UNc) : R satisfies UNc
over UN
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 20
The Hierarchy of Requirements is
constructed to maximize:
P(R|UN) > P(R|UNc) : the
probability that the
Requirements Hierarchy (R)
satisfies User Needs (UN); which
is the primary index of
Requirements Validation
Requirements Validation
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 21
The Solution System Features
are crafted to maximize:
P(S|R) : the likelihood that
Requirements (R) are
implemented by the Solution
System Features (S); which is
the primary Index of System
Verification.
System Verification
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 22
Features included in Solution System = S
Features not included in Solution System = Sc
Current User Needs=UN
Not User Needs = UNc
Requirements Hierarchy= R
P(R|UN) > P(R|UNc) : R satisfies User Needs
P(R|UN) < P(R|UNc) : R does not satisfy User Needs
Validation Stage = Inductive Reasoning
P(S|R) : are Requirements implemented?
P(S|Rc) : are Requirements not implemented?
Verification Stage
Requirements Hierarchy is created through Abductive Reasoning
Deductive
Reasoning
Deductive
Reasoning
Reasoning types across the System Development
Life Cycle (SDLC)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 23
We recommend viewing
the LinkedIn presentation
titled “ 6-Dimension
Business Model”
for an in-depth coverage
on how to assemble a
linked set of credibility
and relevance evidence
to transform Customer
Demands and
Relationships (User
Needs) into appropriate
and profitable Product
and Service offerings.
class EBMM Framework
WHATWHY
Business Policy
Policy Type
Mission
Vision
Principle
Directive
Business
Initiative/Program
Driver
Business Goal
Capability Road
Map
Charter/Legislation
Business
Strategy/Objective
Success
Metric/Measure
Influencer
Business Rules
and Facts
Customer Demand
and Relationship
Value
Proposition
RegulationCompetitive
Pressure
Business Trend
Competitive
Opportunity
Business Model
Assessment
Business
Judgement
Potential ImpactPotential Reward
Risk
Issues
StrengthWeakness Recommendation
of Change
WHO
Stakeholder
Governance
Body
Business Unit Business Alliance
and Partnership
Influencing
Organization
Market Segment
Business
Capability
Required
Competency
Asset
Product and
Service
Business
Requirement
Use Case or User
Story
Data Object
WHERE
Geography/
Locale
Distribution
Channels
HOW
Business Process / Activity
Application
System Interaction
Point
Application
Feature
Assessment
Metric
Process MetricKey Performance
Indicator
Finance and Revenue Model
EBMM-TRIADS(TM) (c) 2013-2015
Pragmatic Cohesion Consulting LLC , All
Rights Reserved
requires
describes
governs use of
described in
responds to
input to
evaluates
performs
measures
describes changes to
provides impetus for
Operates from
targets
quantifies
responsible for
governs
tracks success of
delivered through
enforces
generates
provided by
affect and
demand
tracks
drives
packages
implemented through
produces and consumes
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 24
Reasoning Examples
• The User Needs are similar to the Hypothesis set.
• The highest level of the Requirements Hierarchy such as
Mission Requirements, correspond to the particulars or the
evidence that we can deduce from the User Needs.
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 25
Reasoning Examples
• Example of AQUATIO drinking fountain:
– User Needs: A Drinking Fountain that does not splash water when
user drinks directly from it and that requires minimal bending of user’
s body when operated.
– Mission Requirements can de deduced from the formulation of use
cases describing the interaction of the user with the Drinking
Fountain in its expected operating environment(s).
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 26
Reasoning Examples
• In turn, the lowest level of the Requirements Hierarchy such
as the Technical Specifications resulting from design
activities, can be used to deduce the Solution System
Features.
”The fountain is shaped like a bowl and
can be pivoted up to four inches which
will considerably reduce the need to bend
over when drinking water from the
fountain. By pressing left side of the
fountain, cold water will start to flow and
pressing the right side will give you room
temperature water.”
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 27
• X has property G (we wish to know why)
• If entity A has particular relation R to any X, then that X has property G
• Thus, there is possibly some A that has relation R to X (which explains why
X has property G)
Reasoning Examples
Thagard’s “Existential Abduction” according to
Schum:
• System X has Goal G (we wish to know why)
• If entity A has particular relation R to any System X, then that
System X has Goal G
• Thus, there is possibly some A that has relation R to System X
(which explains why System X has Goal G)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 28
Reasoning Examples
Thagard’s “Existential Abduction” according to
Schum:
• System X has Goal G (we wish to know why)
• If entity A has particular relation R to any System X, then that
System X has Goal G
• Thus, there is possibly some A that has relation R to System X
(which explains why System X has Goal G)
• System X has Goal G (we wish to know why)
• If entity A is a System Rule for[relation] any System X, then that
System X has Goal G
• Thus, there is possibly some A that is a System Rule for[relation]
System X (which explains why System X has Goal G)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 29
Reasoning Examples
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals [C2] System Functions [C3] List of things
important to the
System
Conceptual
(Business
Model)
[C4] System Rules
P(C4|C1) > P(C4|C1c)
[C5] System Processes
P(C5|C2) > P(C5|C2c)
[C6] System
Entities
P(C6|C3) > P(C6|C3c)
Logical
(System model)
support support support
support
support
P(C2|C1) > P(C2|C1c) P(C3|C1) > P(C3|C1c)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 30
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] System
Functions
[C3] List of things
important to the
System
Conceptual
(Business Model)
[C4] System Rules [C5] System
Processes
[C6] System Entities
? ?
? ? ?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 31
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] [C3] List of things
important to the
System
Conceptual
(Business Model)
[C4] System Rules [C5] [C6]
drive
?
?
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 32
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal
bending of user’ s body
when operated.
[C2] [C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off
flow
-A flow of water splashes
over a surface based on the
speed of the flow and the
angle with which it hits the
surface
-User drinks directly from
the fountain with his/her
mouth
[C5] [C6]
drive
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 33
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain Water
that does not splash water when
user requests drinking directly
from it and that requires minimal
bending of user’ s body when
operated.
[C2] System Functions [C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off flow
-A flow of water splashes over a
surface based on the speed of
the flow and the angle with
which it hits the surface
-User drinks directly from the
fountain with his/her mouth
[C5] [C6]
drive
used by
?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 34
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1]
Provide drinkable Fountain
Water that does not splash
water when user requests
drinking directly from it and
that requires minimal bending
of user’ s body when
operated.
[C2]
-Dispense drinkable water
to user’s mouth when
requested
-Suppress water splashing
when operated by user
-Preserve user’s standing
body position during
operation
[C3]
-Water trajectory from its
source to its consumption
point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of
users
Conceptual
(Business Model)
[C4]
-User controls water on/off
flow
-A flow of water splashes over
a surface based on the speed
of the flow and the angle with
which it hits the surface
-User drinks directly from the
fountain with his/her mouth
[C5] [C6]
?
System Processes
are supported by
govern
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 35
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable
Fountain Water that does
not splash water when
user requests drinking
directly from it and that
requires minimal bending
of user’ s body when
operated.
[C2] System Functions
-Dispense drinkable water to user’s
mouth when requested
-Suppress water splashing when
operated by user
-Preserve user’s standing body
position during operation
[C3] things important to the
System
-Water trajectory from its source to
its consumption point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of users
Conceptual
(Business
Model)
[C4] System Rules
-User controls water
on/off flow
-A flow of water splashes
over a surface based on
the speed of the flow and
the angle with which it
hits the surface
-User drinks directly from
the fountain with his/her
mouth
[C5] System Processes
-Controlling water on/off flow
-Routing fountain water
-Controlling water temperature
-Controlling distance between
water flow trajectory and user’s
mouth with minimal body bending
-Controlling water flow shape,
speed and angle of impact on
receiving surface
[C6] System Entities
govern use of
?produce
are supported by
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 36
Motivation
(Why)
Process
(How)
Data
(What)
Contextual
(Scope)
[C1] System Goals
Provide drinkable
Fountain Water that does
not splash water when
user requests drinking
directly from it and that
requires minimal bending
of user’ s body when
operated.
[C2] System Functions
-Dispense drinkable water to user’s
mouth when requested
-Suppress water splashing when
operated by user
-Preserve user’s standing body
position during operation
[C3] Things important to the
System
-Water trajectory from its source to
its consumption point
-Water purity
-Water splash level
-Water temperature
-Anatomy and physiology of users
Conceptual
(Business
Model)
[C4] System Rules
-User controls water
on/off flow
-A flow of water splashes
over a surface based on
the speed of the flow and
the angle with which it
hits the surface
-User drinks directly from
the fountain with his/her
mouth
[C5] System Processes
-Controlling water on/off flow
-Routing fountain water
-Controlling water temperature
-Controlling distance between water
flow trajectory and user’s mouth
with minimal body bending
-Controlling water flow shape,
speed and angle of impact on
receiving surface
[C6] System Entities
-Users’ height range
-Water drinkable quality
-Water trajectories induced by water
flow shape and speed
-Angle between water flow and
receiving surface
-Water flow splash level
-Distances between water flow and
user’s mouth while standing
-User’s body bending angle per water
flow trajectories and user’s body
heights
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 37
References:
• “Enterprise Business Motivation Model (EBMM)
TRIADS™ –The Chemistry of Business Architecture
Alignment,” Koffi A.D., Journal of Enterprise
Architecture, volume 11, number 1, pp28-40 (2015)
• “A Model for Characterizing the Influence of the
Zachman Framework’s Enterprise Architecture
Perspectives,” Koffi A.D., Journal of Enterprise
Architecture, volume 6, number 2, pp30-47 (2010)
• “Structuring design Knowledge for Better Design
Synthesis”, Tomiyama T., International conference on
Engineering Design, August pp19-20 (2003)
• “Species of Abductive Reasoning in Fact
Investigation in Law," Schum D. ,Cardozo Law
Review, Vol 22, Nos 5 - 6, pp1645 -1681 (2001)
• “The engineering design of systems: models and
methods”, Buede D.M. , Wiley, New York (2000).
• "Probabilistic Reasoning and the Science of
Complexity," Shanteau, J., Mellors. B., Schum, D.
(Eds.) Decision Science and Technology, Kluwer
Academic Press, pp183-209 (1999)
• “Systems engineering and analysis” Blanchard B.S.
and Fabrycky W.J. , Prentice-Hall, Upper Saddle River,
NJ (1998)
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 38
Questions?
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 39
CAI Sponsors Proudly Sponsors
The IT Metrics & Productivity Institute
• Accelerating IT Success: News & Education: www.aits.org
• The Strategic CIO: www.thestrategiccio.com
• Calendar of LIVE daily webinars: www.itmpi.org/webinars
• HUGE repository of webinar recordings: www.itmpi.org/library
• Enjoy the Benefits of ITMPI Membership at: www.itmpi.org/subscribe
• Automatic Registration for Live Webinars
• Unlimited Free PDU and Recording Access for ONE YEAR
• Access to Over 1000+ PDUs for a Period of ONE YEAR
• Stay tuned for our awesome new mobile app, the Great IT Pro!
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 40
Easily Maintain Your PMP with
Unlimited Access To Over
1,000 PDU Approved Webinars
For One Low Yearly Price!
www.itmpi.org/subscribe
12/1/2016
Webinar Sponsored by Computer Aid, Inc.
Slide: 41
Hosted by:
Jessica Dahbour
ITMPI
Jessica_Dahbour@compaid.com
Didier Koffi
Principal Business Architect
Pragmatic Cohesion Consulting, LLC
didier@pragmaticohesion.com

More Related Content

What's hot

FALLACIES Critical Thinking First PPT July 2016
FALLACIES Critical Thinking First PPT July 2016FALLACIES Critical Thinking First PPT July 2016
FALLACIES Critical Thinking First PPT July 2016RAJI THOMAS MUIGUA
 
Critical reasoning
Critical reasoningCritical reasoning
Critical reasoningAswin KP
 
Lecture 3 Reasoning
Lecture 3 Reasoning Lecture 3 Reasoning
Lecture 3 Reasoning Dam Frank
 
Probability mass functions and probability density functions
Probability mass functions and probability density functionsProbability mass functions and probability density functions
Probability mass functions and probability density functionsAnkit Katiyar
 
Chapter 4 logical reasoning
Chapter 4 logical reasoningChapter 4 logical reasoning
Chapter 4 logical reasoningJaypee Sidon
 
Critical thinking or critical reasoning
Critical thinking or critical reasoningCritical thinking or critical reasoning
Critical thinking or critical reasoningFazilAfghan
 
Critical thinking presentation
Critical thinking presentationCritical thinking presentation
Critical thinking presentationVictor Campo
 
Discrete Math Presentation(Rules of Inference)
Discrete Math Presentation(Rules of Inference)Discrete Math Presentation(Rules of Inference)
Discrete Math Presentation(Rules of Inference)Ikhtiar Khan Sohan
 
Intro to Discrete Mathematics
Intro to Discrete MathematicsIntro to Discrete Mathematics
Intro to Discrete Mathematicsasad faraz
 
String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)Neel Shah
 
Inductive, Deductive, and Fallacies
Inductive, Deductive, and FallaciesInductive, Deductive, and Fallacies
Inductive, Deductive, and FallaciesDarnell Kemp
 
Critical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsCritical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsHanis Razak
 
Discrete Math Lecture 01: Propositional Logic
Discrete Math Lecture 01: Propositional LogicDiscrete Math Lecture 01: Propositional Logic
Discrete Math Lecture 01: Propositional LogicIT Engineering Department
 
Introduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningIntroduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningrbangerter
 

What's hot (20)

FALLACIES Critical Thinking First PPT July 2016
FALLACIES Critical Thinking First PPT July 2016FALLACIES Critical Thinking First PPT July 2016
FALLACIES Critical Thinking First PPT July 2016
 
Critical reasoning
Critical reasoningCritical reasoning
Critical reasoning
 
Lecture 3 Reasoning
Lecture 3 Reasoning Lecture 3 Reasoning
Lecture 3 Reasoning
 
Probability mass functions and probability density functions
Probability mass functions and probability density functionsProbability mass functions and probability density functions
Probability mass functions and probability density functions
 
Probability in daily life
Probability in daily lifeProbability in daily life
Probability in daily life
 
Chapter 4 logical reasoning
Chapter 4 logical reasoningChapter 4 logical reasoning
Chapter 4 logical reasoning
 
Critical thinking or critical reasoning
Critical thinking or critical reasoningCritical thinking or critical reasoning
Critical thinking or critical reasoning
 
Critical thinking presentation
Critical thinking presentationCritical thinking presentation
Critical thinking presentation
 
Discrete Math Presentation(Rules of Inference)
Discrete Math Presentation(Rules of Inference)Discrete Math Presentation(Rules of Inference)
Discrete Math Presentation(Rules of Inference)
 
Intro to Discrete Mathematics
Intro to Discrete MathematicsIntro to Discrete Mathematics
Intro to Discrete Mathematics
 
Notes for logic
Notes for logicNotes for logic
Notes for logic
 
Graph theory
Graph  theoryGraph  theory
Graph theory
 
String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)String matching algorithms(knuth morris-pratt)
String matching algorithms(knuth morris-pratt)
 
Inductive, Deductive, and Fallacies
Inductive, Deductive, and FallaciesInductive, Deductive, and Fallacies
Inductive, Deductive, and Fallacies
 
Critical Thinking Skills - Arguments
Critical Thinking Skills - ArgumentsCritical Thinking Skills - Arguments
Critical Thinking Skills - Arguments
 
Discrete Math Lecture 01: Propositional Logic
Discrete Math Lecture 01: Propositional LogicDiscrete Math Lecture 01: Propositional Logic
Discrete Math Lecture 01: Propositional Logic
 
Validity of argument
Validity of argumentValidity of argument
Validity of argument
 
Basic Concepts of Logic
Basic Concepts of LogicBasic Concepts of Logic
Basic Concepts of Logic
 
Minimum spanning tree
Minimum spanning treeMinimum spanning tree
Minimum spanning tree
 
Introduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoningIntroduction to inductive and deductive reasoning
Introduction to inductive and deductive reasoning
 

Viewers also liked

Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Rohan Byanjankar
 
Different approaches and methods
Different approaches and methodsDifferent approaches and methods
Different approaches and methodsswitlu
 
Probabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsProbabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsFulvio Rotella
 
Introduction to Design Thinking
Introduction to Design ThinkingIntroduction to Design Thinking
Introduction to Design ThinkingLuca Lamera
 
Practical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningPractical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningGuido Governatori
 
Think again how to reason and argue (recovered)
Think again  how to reason and argue (recovered)Think again  how to reason and argue (recovered)
Think again how to reason and argue (recovered)SenthilKumar Selvaraj
 
Inductive reasoning
Inductive reasoningInductive reasoning
Inductive reasoningMoy Alotumi
 
Obj. 10 Deductive Reasoning
Obj. 10 Deductive ReasoningObj. 10 Deductive Reasoning
Obj. 10 Deductive Reasoningsmiller5
 
Writing essays guidelines
Writing essays guidelinesWriting essays guidelines
Writing essays guidelinesjsanchep
 
Deductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesDeductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesGrenada High School
 
Diagnostic Report for Your Business
Diagnostic Report for Your BusinessDiagnostic Report for Your Business
Diagnostic Report for Your BusinessRaeganPotter
 
Photography composition presentation
Photography composition presentationPhotography composition presentation
Photography composition presentationAnup Ghimire
 
Inductive and Deductive Reasoning
Inductive and Deductive ReasoningInductive and Deductive Reasoning
Inductive and Deductive ReasoningKirsten Mary Montes
 
1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoningsmiller5
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control managementIzzah Noah
 
SlII power point presentation
SlII power point presentationSlII power point presentation
SlII power point presentationsherooo83
 
Is Your Business Ready for International Expansion?
Is Your Business Ready for International Expansion?Is Your Business Ready for International Expansion?
Is Your Business Ready for International Expansion?Global Markets Coaching
 

Viewers also liked (20)

Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...Inductive and Deductive Approach to Research. Difference between Inductive an...
Inductive and Deductive Approach to Research. Difference between Inductive an...
 
Analytical
AnalyticalAnalytical
Analytical
 
Different approaches and methods
Different approaches and methodsDifferent approaches and methods
Different approaches and methods
 
Probabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible WorldsProbabilistic Abductive Logic Programming using Possible Worlds
Probabilistic Abductive Logic Programming using Possible Worlds
 
Introduction to Design Thinking
Introduction to Design ThinkingIntroduction to Design Thinking
Introduction to Design Thinking
 
Practical Non-Monotonic Reasoning
Practical Non-Monotonic ReasoningPractical Non-Monotonic Reasoning
Practical Non-Monotonic Reasoning
 
Think again how to reason and argue (recovered)
Think again  how to reason and argue (recovered)Think again  how to reason and argue (recovered)
Think again how to reason and argue (recovered)
 
Inductive reasoning
Inductive reasoningInductive reasoning
Inductive reasoning
 
What is composition?
What is composition?What is composition?
What is composition?
 
Ikon business diagnostics
Ikon business diagnosticsIkon business diagnostics
Ikon business diagnostics
 
Obj. 10 Deductive Reasoning
Obj. 10 Deductive ReasoningObj. 10 Deductive Reasoning
Obj. 10 Deductive Reasoning
 
Writing essays guidelines
Writing essays guidelinesWriting essays guidelines
Writing essays guidelines
 
Deductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic PuzzlesDeductive Reasoning: Law of Detachment/ Logic Puzzles
Deductive Reasoning: Law of Detachment/ Logic Puzzles
 
Diagnostic Report for Your Business
Diagnostic Report for Your BusinessDiagnostic Report for Your Business
Diagnostic Report for Your Business
 
Photography composition presentation
Photography composition presentationPhotography composition presentation
Photography composition presentation
 
Inductive and Deductive Reasoning
Inductive and Deductive ReasoningInductive and Deductive Reasoning
Inductive and Deductive Reasoning
 
1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning1.3.1 Inductive and Deductive Reasoning
1.3.1 Inductive and Deductive Reasoning
 
Q&A about quality control management
Q&A about quality control managementQ&A about quality control management
Q&A about quality control management
 
SlII power point presentation
SlII power point presentationSlII power point presentation
SlII power point presentation
 
Is Your Business Ready for International Expansion?
Is Your Business Ready for International Expansion?Is Your Business Ready for International Expansion?
Is Your Business Ready for International Expansion?
 

Similar to Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets OperationsTim Sheiner
 
Modeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsModeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsMitul Tiwari
 
Rapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowsRapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowstheCodery
 
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapNext Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapHeadspring
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsWSO2
 
Towards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsTowards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsLadislav Peska
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSusanne Brøndberg
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Matthias Braunhofer
 
EvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source SoftwareEvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source Softwarebpupadhyaya
 
Chapter12
Chapter12Chapter12
Chapter12Izaham
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5Pini Cohen
 
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018] ASML's MDE Going SiriusObeo
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...Amazon Web Services
 
Information system development
Information system developmentInformation system development
Information system developmentDhani Ahmad
 
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Splunk
 
Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityAggregage
 
On building more human query answering systems
On building more human query answering systemsOn building more human query answering systems
On building more human query answering systemsINRIA-OAK
 

Similar to Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system (20)

When UX (guy) Meets Operations
When UX (guy) Meets OperationsWhen UX (guy) Meets Operations
When UX (guy) Meets Operations
 
Modeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systemsModeling Impression discounting in large-scale recommender systems
Modeling Impression discounting in large-scale recommender systems
 
Rapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce FlowsRapid Solutions with Salesforce Flows
Rapid Solutions with Salesforce Flows
 
IISc Project Presentation
IISc Project PresentationIISc Project Presentation
IISc Project Presentation
 
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT RoadmapNext Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
Next Gen Continuous Delivery: Connecting Business Initiatives to the IT Roadmap
 
Enterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and AppsEnterprise Architecture in Practice: from Datastore to APIs and Apps
Enterprise Architecture in Practice: from Datastore to APIs and Apps
 
Towards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender SystemsTowards Complex User Feedback and Presentation Context in Recommender Systems
Towards Complex User Feedback and Presentation Context in Recommender Systems
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelse
 
Softwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelseSoftwareudvikling og vaerdiskabelse
Softwareudvikling og vaerdiskabelse
 
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
Usability Assessment of a Context-Aware and Personality-Based Mobile Recommen...
 
EvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source SoftwareEvalOSS : A Framework to Evaluate Open Source Software
EvalOSS : A Framework to Evaluate Open Source Software
 
Chapter12
Chapter12Chapter12
Chapter12
 
It delivery 2016 v5
It delivery 2016 v5It delivery 2016 v5
It delivery 2016 v5
 
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius[Sirius Day Eindhoven 2018]  ASML's MDE Going Sirius
[Sirius Day Eindhoven 2018] ASML's MDE Going Sirius
 
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
The People Model & Cloud Transformation - Transformation Day Public Sector Lo...
 
Information system development
Information system developmentInformation system development
Information system development
 
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
Data-Driven DevOps: Mining Machine Data for 'Metrics that Matter' in a DevOps...
 
Why Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and ReliabilityWhy Distributed Tracing is Essential for Performance and Reliability
Why Distributed Tracing is Essential for Performance and Reliability
 
On building more human query answering systems
On building more human query answering systemsOn building more human query answering systems
On building more human query answering systems
 
Revolution R: 100% R and more
Revolution R: 100% R and moreRevolution R: 100% R and more
Revolution R: 100% R and more
 

More from Pragmatic Cohesion Consulting, LLC

Applying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsApplying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsPragmatic Cohesion Consulting, LLC
 
Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Pragmatic Cohesion Consulting, LLC
 
Framework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessFramework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessPragmatic Cohesion Consulting, LLC
 
The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...Pragmatic Cohesion Consulting, LLC
 
Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Pragmatic Cohesion Consulting, LLC
 
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Pragmatic Cohesion Consulting, LLC
 
The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...Pragmatic Cohesion Consulting, LLC
 
The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...Pragmatic Cohesion Consulting, LLC
 
Balancing software project drivers a rational quantitative approach
Balancing software project drivers   a rational quantitative approachBalancing software project drivers   a rational quantitative approach
Balancing software project drivers a rational quantitative approachPragmatic Cohesion Consulting, LLC
 
Effective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisEffective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisPragmatic Cohesion Consulting, LLC
 
About the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsAbout the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsPragmatic Cohesion Consulting, LLC
 
34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!Pragmatic Cohesion Consulting, LLC
 
Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Pragmatic Cohesion Consulting, LLC
 

More from Pragmatic Cohesion Consulting, LLC (20)

Applying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triadsApplying the integrative propositional analysis (ipa) to the ebmm – triads
Applying the integrative propositional analysis (ipa) to the ebmm – triads
 
Viewers locations usa - 30000
Viewers locations usa - 30000Viewers locations usa - 30000
Viewers locations usa - 30000
 
Viewers locations outside USA - 30000
Viewers locations outside USA - 30000Viewers locations outside USA - 30000
Viewers locations outside USA - 30000
 
Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...Comparing four major organizational cultures and the challenges faced when tr...
Comparing four major organizational cultures and the challenges faced when tr...
 
Obstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitationObstacles to effective knowledge elicitation
Obstacles to effective knowledge elicitation
 
Viewers locations in the USA
Viewers locations in the USAViewers locations in the USA
Viewers locations in the USA
 
Viewers locations outside the USA
Viewers locations outside the USAViewers locations outside the USA
Viewers locations outside the USA
 
Framework for assessing business analysts situational awareness
Framework for assessing business analysts situational awarenessFramework for assessing business analysts situational awareness
Framework for assessing business analysts situational awareness
 
The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...The dynamics of cohesive and inconsistent project requirements and how they i...
The dynamics of cohesive and inconsistent project requirements and how they i...
 
Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...Creating queuing system simulations with enterprise architect sysml parametri...
Creating queuing system simulations with enterprise architect sysml parametri...
 
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
Agile scope creep and the Golden Ratio – Balancing Project Flexibility and Co...
 
The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...The non intuitive impact of software defects on development efforts time esti...
The non intuitive impact of software defects on development efforts time esti...
 
The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...The dynamic interaction of passed and failed requirements during software tes...
The dynamic interaction of passed and failed requirements during software tes...
 
Balancing software project drivers a rational quantitative approach
Balancing software project drivers   a rational quantitative approachBalancing software project drivers   a rational quantitative approach
Balancing software project drivers a rational quantitative approach
 
M theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowermentM theory for business analysts - 11 dimensions of empowerment
M theory for business analysts - 11 dimensions of empowerment
 
Effective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysisEffective Listening - a cornerstone of effective business analysis
Effective Listening - a cornerstone of effective business analysis
 
About the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methodsAbout the benefits and pitfalls of relying on analytical methods
About the benefits and pitfalls of relying on analytical methods
 
34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!34,000 delicious Food and Beverage combinations for your holidays!
34,000 delicious Food and Beverage combinations for your holidays!
 
Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2Business analysis compass mapping to the iiba babok v2
Business analysis compass mapping to the iiba babok v2
 
Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...Business analysis and business framework driven projects - Example of the Mic...
Business analysis and business framework driven projects - Example of the Mic...
 

Recently uploaded

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

Deductive, inductive, and abductive reasoning and their application in transforming user needs into a solution system

  • 1. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 1 Applying Deductive, Inductive, and Abductive Reasoning to the System Development Life-Cycle (SDLC)
  • 2. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 2 Didier Koffi Principal Business Architect Pragmatic Cohesion Consulting, LLC didier@pragmaticohesion.com Hosted by: Jessica Dahbour ITMPI Jessica_Dahbour@compaid.com
  • 3. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 3 About Presenter’s Firm • Since 2010, Pragmatic Cohesion has provided state of the art Business Architecture and Business Systems Analysis services that take advantage of our cutting edge approach to Enterprise Stakeholders’ collaboration and Business Model Assessment. • Our latest product is named the EBMM-TRIADs™ 3-day Assessment Workshop that measures your organization's ability to deliver outcomes that properly respond to the expectations and constraints imposed upon your business by its environment: markets, customers, suppliers, partners, competitors, regulators, shareholders, and various stakeholders. The assessment does so by asking a comprehensive set of simple questions that only require your familiarity with the various aspects of your business; NO books of records or balance sheets needed!
  • 4. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 4 CAI Achieves IT Operational Excellence www.compaid.com
  • 5. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 5 PDU Credits Available for this Webinar • The PMI has approved this webinar with PDUs • You will be eligible to receive 1.0 PDU credits • Your PDU email will be sent to you • This webinar is mapped to the TALENT TRIANGLE
  • 6. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 6 Online Webinar Recordings NOW AVAILABLE • Anytime Access • Hundreds of Topics Visit: www.ITMPI.org/library
  • 7. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 7 Enjoy the benefits of ITMPI Membership JOIN TODAY! • UNLIMITED Free Webinar Recordings • UNLIMITED Free PDU Credits • Hundreds of Topics Visit: www.ITMPI.org/subscribe
  • 8. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 8 Outline: • Deductive Reasoning • Inductive Reasoning • Abductive Reasoning • From Evidence to Hypothesis • From Solution System Feature to User Need • Requirements Validation • System Verification • Reasoning types across the System Development Life Cycle (SDLC) • Illustrative Example Applying Deductive, Inductive, and Abductive Reasoning to the System Development Life-Cycle (SDLC)
  • 9. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 9 Deductive reasoning is a form of reasoning that shows that certain conclusions follow necessarily from true premises Thale’s Theorem: Wikipedia In geometry, Thales' theorem states that if A, B and C are points on a circle where the line AB is a diameter of the circle, then the angle ∠ACB is a right angle
  • 10. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 10 Deductive reasoning is Top-Down, from generalizations to particulars or from hypothesis to evidence.
  • 11. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 11 Inductive reasoning asserts that something is probably true given some evidence relevant to it.
  • 12. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 12 • With Inductive reasoning we consider a “mass of evidence” that we believe is relevant to a set of hypothesis H. The probabilistic nature of inductive inference comes from the following characteristics of the “mass of evidence”: – It is incomplete – It is inconclusive (It is consistent to some degree with the truth of every hypothesis in H) – It may be vague or imprecise – It may be dissonant (some of it favors one hypothesis and some favor others) – Its sources may not be perfectly credible
  • 13. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 13 Abductive reasoning is concern with imaginative reasoning, a process through which new ideas or hypotheses come into existence based on observations. In deductive reasoning a conclusion is already embedded in its premises. In inductive reasoning, a hypothesis or idea already exists and we are just establishing probabilistic grounds for it.
  • 14. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 14 Abductive reasoning is also used to generate inference networks: the skillful combination of relevance and credibility characteristics of evidence.
  • 15. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 15 Eco’s “Overcoded Abduction” according to Schum • We observe clue E* (E* being evidence that event E occurred) • Based on our prior knowledge of contexts in which things like event E have occurred, we say: “Whenever something like H has occurred, then something like E has also occurred.” Rephrased, we might say: “If H were true, then E would follow as a matter of course.” • Thus, there is reason to suspect that H may explain the occurrence of clue E*. In other words, clue E* points to H as a possible explanation for its occurrence. From Evidence to Hypothesis
  • 16. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 16 From Evidence to Hypothesis Example H=Hypothesis Set H=It rained overnight; Hc= It did not rain overnight E=Event relevant in an Inference about H E=My lawn is wet; Ec=My lawn is not wet E*=Evidence that E occurred E*:My hands were wet after touching a patch of grass From E* to E : Credibility Stage P(E*|E) Hit probability P(My hands were wet after touching a patch of grass | My lawn is wet) P(E*|Ec) False positive probability P(My hands were wet after touching a patch of grass | My lawn is not wet) From E to H : Relevance Stage P(E|H) > P(E|Hc) E favors H over Hc If P(My lawn is wet | It rained overnight) >P(My lawn is wet| It did not rain overnight) then ‘My lawn is wet’ favors H ‘It rained overnight’ P(E|H) < P(E|Hc) E favors Hc over H If P(My lawn is wet | It rained overnight) <P(My lawn is wet| It did not rain overnight) then ‘My lawn is wet’ favors Hc ‘It did not rain overnight’
  • 17. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 17 To go from Solution System Features to User Needs, we use Abductive Reasoning through our imagination to generate an “Argument” much similar to linking Evidence to Hypothesis. From Solution System Features to User Needs
  • 18. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 18 The Argument is embedded in the structure of a Hierarchy of Requirements: from detailed Technical Requirements and Specifications, System Requirements, Business Requirements, up to Mission Requirements. From Solution System Features to User Needs
  • 19. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 19 Evidence to Hypothesis Solution System Feature to User Need H: Hypothesis Set User Need = UN E: Event relevant in an Inference about H Requirement= R : R satisfies UN E*: Evidence that E occurred System Features = S : Evidence that R is implemented From E* to E : Credibility Stage From S to R : Verification Stage P(E*|E) Hit probability P(S|R): is Requirement implemented? P(E*|Ec) False positive probability P(S|Rc): is Requirement not implemented? From E to H : Relevance Stage From R to UN : Validation Stage P(E|H) > P(E|Hc) E favors H over Hc P(R|UN) > P(R|UNc) : R satisfies UN over UNc P(E|H) < P(E|Hc) E favors Hc over H P(R|UN) < P(R|UNc) : R satisfies UNc over UN
  • 20. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 20 The Hierarchy of Requirements is constructed to maximize: P(R|UN) > P(R|UNc) : the probability that the Requirements Hierarchy (R) satisfies User Needs (UN); which is the primary index of Requirements Validation Requirements Validation
  • 21. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 21 The Solution System Features are crafted to maximize: P(S|R) : the likelihood that Requirements (R) are implemented by the Solution System Features (S); which is the primary Index of System Verification. System Verification
  • 22. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 22 Features included in Solution System = S Features not included in Solution System = Sc Current User Needs=UN Not User Needs = UNc Requirements Hierarchy= R P(R|UN) > P(R|UNc) : R satisfies User Needs P(R|UN) < P(R|UNc) : R does not satisfy User Needs Validation Stage = Inductive Reasoning P(S|R) : are Requirements implemented? P(S|Rc) : are Requirements not implemented? Verification Stage Requirements Hierarchy is created through Abductive Reasoning Deductive Reasoning Deductive Reasoning Reasoning types across the System Development Life Cycle (SDLC)
  • 23. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 23 We recommend viewing the LinkedIn presentation titled “ 6-Dimension Business Model” for an in-depth coverage on how to assemble a linked set of credibility and relevance evidence to transform Customer Demands and Relationships (User Needs) into appropriate and profitable Product and Service offerings. class EBMM Framework WHATWHY Business Policy Policy Type Mission Vision Principle Directive Business Initiative/Program Driver Business Goal Capability Road Map Charter/Legislation Business Strategy/Objective Success Metric/Measure Influencer Business Rules and Facts Customer Demand and Relationship Value Proposition RegulationCompetitive Pressure Business Trend Competitive Opportunity Business Model Assessment Business Judgement Potential ImpactPotential Reward Risk Issues StrengthWeakness Recommendation of Change WHO Stakeholder Governance Body Business Unit Business Alliance and Partnership Influencing Organization Market Segment Business Capability Required Competency Asset Product and Service Business Requirement Use Case or User Story Data Object WHERE Geography/ Locale Distribution Channels HOW Business Process / Activity Application System Interaction Point Application Feature Assessment Metric Process MetricKey Performance Indicator Finance and Revenue Model EBMM-TRIADS(TM) (c) 2013-2015 Pragmatic Cohesion Consulting LLC , All Rights Reserved requires describes governs use of described in responds to input to evaluates performs measures describes changes to provides impetus for Operates from targets quantifies responsible for governs tracks success of delivered through enforces generates provided by affect and demand tracks drives packages implemented through produces and consumes
  • 24. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 24 Reasoning Examples • The User Needs are similar to the Hypothesis set. • The highest level of the Requirements Hierarchy such as Mission Requirements, correspond to the particulars or the evidence that we can deduce from the User Needs.
  • 25. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 25 Reasoning Examples • Example of AQUATIO drinking fountain: – User Needs: A Drinking Fountain that does not splash water when user drinks directly from it and that requires minimal bending of user’ s body when operated. – Mission Requirements can de deduced from the formulation of use cases describing the interaction of the user with the Drinking Fountain in its expected operating environment(s).
  • 26. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 26 Reasoning Examples • In turn, the lowest level of the Requirements Hierarchy such as the Technical Specifications resulting from design activities, can be used to deduce the Solution System Features. ”The fountain is shaped like a bowl and can be pivoted up to four inches which will considerably reduce the need to bend over when drinking water from the fountain. By pressing left side of the fountain, cold water will start to flow and pressing the right side will give you room temperature water.”
  • 27. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 27 • X has property G (we wish to know why) • If entity A has particular relation R to any X, then that X has property G • Thus, there is possibly some A that has relation R to X (which explains why X has property G) Reasoning Examples Thagard’s “Existential Abduction” according to Schum: • System X has Goal G (we wish to know why) • If entity A has particular relation R to any System X, then that System X has Goal G • Thus, there is possibly some A that has relation R to System X (which explains why System X has Goal G)
  • 28. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 28 Reasoning Examples Thagard’s “Existential Abduction” according to Schum: • System X has Goal G (we wish to know why) • If entity A has particular relation R to any System X, then that System X has Goal G • Thus, there is possibly some A that has relation R to System X (which explains why System X has Goal G) • System X has Goal G (we wish to know why) • If entity A is a System Rule for[relation] any System X, then that System X has Goal G • Thus, there is possibly some A that is a System Rule for[relation] System X (which explains why System X has Goal G)
  • 29. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 29 Reasoning Examples Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals [C2] System Functions [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules P(C4|C1) > P(C4|C1c) [C5] System Processes P(C5|C2) > P(C5|C2c) [C6] System Entities P(C6|C3) > P(C6|C3c) Logical (System model) support support support support support P(C2|C1) > P(C2|C1c) P(C3|C1) > P(C3|C1c)
  • 30. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 30 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules [C5] System Processes [C6] System Entities ? ? ? ? ?
  • 31. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 31 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] [C3] List of things important to the System Conceptual (Business Model) [C4] System Rules [C5] [C6] drive ? ? are supported by
  • 32. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 32 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] drive are supported by
  • 33. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 33 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] drive used by ?
  • 34. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 34 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] [C6] ? System Processes are supported by govern
  • 35. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 35 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] things important to the System -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] System Rules -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] System Processes -Controlling water on/off flow -Routing fountain water -Controlling water temperature -Controlling distance between water flow trajectory and user’s mouth with minimal body bending -Controlling water flow shape, speed and angle of impact on receiving surface [C6] System Entities govern use of ?produce are supported by
  • 36. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 36 Motivation (Why) Process (How) Data (What) Contextual (Scope) [C1] System Goals Provide drinkable Fountain Water that does not splash water when user requests drinking directly from it and that requires minimal bending of user’ s body when operated. [C2] System Functions -Dispense drinkable water to user’s mouth when requested -Suppress water splashing when operated by user -Preserve user’s standing body position during operation [C3] Things important to the System -Water trajectory from its source to its consumption point -Water purity -Water splash level -Water temperature -Anatomy and physiology of users Conceptual (Business Model) [C4] System Rules -User controls water on/off flow -A flow of water splashes over a surface based on the speed of the flow and the angle with which it hits the surface -User drinks directly from the fountain with his/her mouth [C5] System Processes -Controlling water on/off flow -Routing fountain water -Controlling water temperature -Controlling distance between water flow trajectory and user’s mouth with minimal body bending -Controlling water flow shape, speed and angle of impact on receiving surface [C6] System Entities -Users’ height range -Water drinkable quality -Water trajectories induced by water flow shape and speed -Angle between water flow and receiving surface -Water flow splash level -Distances between water flow and user’s mouth while standing -User’s body bending angle per water flow trajectories and user’s body heights
  • 37. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 37 References: • “Enterprise Business Motivation Model (EBMM) TRIADS™ –The Chemistry of Business Architecture Alignment,” Koffi A.D., Journal of Enterprise Architecture, volume 11, number 1, pp28-40 (2015) • “A Model for Characterizing the Influence of the Zachman Framework’s Enterprise Architecture Perspectives,” Koffi A.D., Journal of Enterprise Architecture, volume 6, number 2, pp30-47 (2010) • “Structuring design Knowledge for Better Design Synthesis”, Tomiyama T., International conference on Engineering Design, August pp19-20 (2003) • “Species of Abductive Reasoning in Fact Investigation in Law," Schum D. ,Cardozo Law Review, Vol 22, Nos 5 - 6, pp1645 -1681 (2001) • “The engineering design of systems: models and methods”, Buede D.M. , Wiley, New York (2000). • "Probabilistic Reasoning and the Science of Complexity," Shanteau, J., Mellors. B., Schum, D. (Eds.) Decision Science and Technology, Kluwer Academic Press, pp183-209 (1999) • “Systems engineering and analysis” Blanchard B.S. and Fabrycky W.J. , Prentice-Hall, Upper Saddle River, NJ (1998)
  • 38. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 38 Questions?
  • 39. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 39 CAI Sponsors Proudly Sponsors The IT Metrics & Productivity Institute • Accelerating IT Success: News & Education: www.aits.org • The Strategic CIO: www.thestrategiccio.com • Calendar of LIVE daily webinars: www.itmpi.org/webinars • HUGE repository of webinar recordings: www.itmpi.org/library • Enjoy the Benefits of ITMPI Membership at: www.itmpi.org/subscribe • Automatic Registration for Live Webinars • Unlimited Free PDU and Recording Access for ONE YEAR • Access to Over 1000+ PDUs for a Period of ONE YEAR • Stay tuned for our awesome new mobile app, the Great IT Pro!
  • 40. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 40 Easily Maintain Your PMP with Unlimited Access To Over 1,000 PDU Approved Webinars For One Low Yearly Price! www.itmpi.org/subscribe
  • 41. 12/1/2016 Webinar Sponsored by Computer Aid, Inc. Slide: 41 Hosted by: Jessica Dahbour ITMPI Jessica_Dahbour@compaid.com Didier Koffi Principal Business Architect Pragmatic Cohesion Consulting, LLC didier@pragmaticohesion.com