A usage coverage-based approach for assessing product family design

被引:12
|
作者
Wang, Jiliang [1 ]
Yannou, Bernard [1 ]
Alizon, Fabrice [2 ]
Yvars, Pierre-Alain [3 ]
机构
[1] Ecole Cent Paris, Lab Genie Ind, F-92290 Chatenay Malabry, France
[2] Keyplatform, F-75008 Paris, France
[3] SUPMECA, Lab LISMMA, F-93407 St Ouen, France
关键词
Usage model; Usage coverage index; Constraint programming; Product family design; COMMONALITY;
D O I
10.1007/s00366-012-0262-1
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Computation techniques have provided designers with deeper understanding of the market niches that were neglected before. Usage contextual information has been studied in marketing research since the last century; however, little research in design engineering focuses on it. Therefore, in this paper, we analyzed the relations between usage context information and the design of products. A usage coverage model is established to integrate users and their expected usage scenarios into product family assessment. We map the user's individual capacity together with a given product into the usage context space. The overlapping between the required usage and feasible usage can be measured. Based on this mechanism, several usage coverage indices are proposed to assess the compliance of a given product family to the expected set of usage scenarios to be covered. The original method is demonstrated on a scale-based product family of jigsaws in a redesign context. Constraint programming technique is applied to solve the physics-based causal loops that determine usage performances in a set-based design approach. Designers can rely on the results to eliminate redundant units in the family or modify the configuration of each product. The contribution of the paper is to provide an inter-disciplinary point of view to assessing the composition and configuration of a product family design.
引用
收藏
页码:449 / 465
页数:17
相关论文
共 50 条
  • [1] A usage coverage-based approach for assessing product family design
    Jiliang Wang
    Bernard Yannou
    Fabrice Alizon
    Pierre-Alain Yvars
    Engineering with Computers, 2013, 29 : 449 - 465
  • [2] Assessing the Effectiveness of Coverage-Based Fault Localizations Using Mutants
    Xue, Xiaozhen
    Siami-Namini, Sima
    Namin, Akbar Siami
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2018, 28 (08) : 1091 - 1119
  • [3] Virtual Coverage: A New Approach to Coverage-Based Software Reliability Engineering
    Park, Joong-Yang
    Lee, Gyemin
    COMMUNICATIONS FOR STATISTICAL APPLICATIONS AND METHODS, 2013, 20 (06) : 467 - 474
  • [4] A Random and Coverage-based Approach for Fault Localization Prioritization
    Zhang, Xiao-Yi
    Towey, Dave
    Chen, Tsong Yueh
    Zheng, Zheng
    Cai, Kai-Yuan
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 3354 - 3361
  • [5] A family of code coverage-based heuristics for effective fault localization
    Wong, W. Eric
    Debroy, Vidroha
    Choi, Byoungju
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (02) : 188 - 208
  • [6] A Greedy Approach for Coverage-Based Test Suite Reduction
    Harris, Preethi
    Raju, Nedunchezhian
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (01) : 17 - 23
  • [7] A Coverage-Based Approach to Recommendation Diversity On Similarity Graph
    Parambath, Shameem A. Puthiya
    Usunier, Nicolas
    Grandvalet, Yves
    PROCEEDINGS OF THE 10TH ACM CONFERENCE ON RECOMMENDER SYSTEMS (RECSYS'16), 2016, : 15 - 22
  • [8] A fuzzy assessing approach to improve the new product design within a product family
    Kun, Z
    APPLICATIONS OF DIGITAL TECHNIQUES IN INDUSTRIAL DESIGN ENGINEERING-CAID&CD' 2005, 2005, : 163 - 168
  • [9] Coverage-Based Clustering and Scheduling Approach for Test Case Prioritization
    Fu, Wenhao
    Yu, Huiqun
    Fan, Guisheng
    Ji, Xiang
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (06): : 1218 - 1230
  • [10] On Coverage-Based Attack Profiles
    Rivers, Anthony T.
    Vouk, Mladen A.
    Williams, Laurie
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 5 - 6