The above fig1 represents the frame work for architecture style selection where it contains“Criteria” cluster and “alternatives” cluster. There isa feedback between alternatives to criteria cluster which makes in comparison of criteria cluster withrespect to alternatives, and also loop in criteria cluster indicates that the nodes in it are compared withthemselves. These nodes in the criteria andalternatives clusters are referred from variousresearch papers[10 11]. ANP model is best suitable toselect the appropriate architecture style for the bestimplementation of architecture which satisfies therequirements.
The ANP incorporates both qualitative andquantitative approaches to a decision problem.
3.1 Qualitative approach
The four major steps for the qualitative componentare described below:1. Identify the architects problem. Suppose aclient would like to select the highest scored stylesfrom a number of potential alternative styles, thedecision problem will be to “select the highest scoredarchitecture style.”2. Ensure that the decision problem of selecting architecture style can be solved by ANP.The ANP is appropriate to solve decision problemswith a network structure. Problems with a simplehierarchical model can be solved by AHP.3. Decompose the unstructured problem of selecting the architecture style in to a set of manageableand measurable levels. The topmost level is the prioritization of styles, while the lowest level is usuallythe scenario or architecture styles (Saaty 1980).4. Determine who should be responsible for making the prioritization of architecture style.Usually, various stake holders(users, domainexperts) are involved for this operationalmanagement.
3.2 Quantitative Approach
The following describes the five major steps for thequantitative component:1. Set up a quantitative questionnaire for collecting priorities of various stake holders (Users, Architects,Domain Experts, Programmers etc.). Saaty (1980)suggested the use of a nine-point priority scale and pair-wise comparison.2. Estimate the relative importance between twoelements criteria of selection and alternativearchitecture styles. Use pair-wise comparison of theelements in each matrix and calculate the eigenvector of each of the developed matrices. Refer to the existingliterature having suggested the necessary algorithms for calculating the eigenvector of each matrix, such as Saaty(1980) and Cheng and Li (2001).3. Measure the inconsistency of each of the matrices(when pairwise comparison is used) by employingthe consistency ratio (CR). Refer to the existingliterature having suggested the necessary algorithmsto calculate CR, such as Saaty (1980) and Cheng andLi (2001). Alternatively, commercial software packages that compute eigenvectors and CRs areavailable (e.g.,
Expert Choice for Windows
, 2003).Saaty (1994) set three acceptable levels for CR (i.e.,0.05 for 3 by 3 matrix, 0.08 for 4 by 4 matrix, and 0.1for other matrices). Matrices that are inconsistentshould be excluded or rerated by the raters.4. Place the eigenvectors of the individual matrices(also known as sub-matrices) to form the super matrix(Saaty 1996). Refer to the later illustrative example(KWIC) of how to construct the supermatrix.5. Ensure the supermatrix is column stochastic andraise the supermatrix to high power until the weightshave been converged and remain stable (Sarkis1999). For the purpose of mathematical computationof matrices, the authors Eddie W.L Cheng and LiangLi  created a program in the popular
. Alternatively, a commercial software tool,
, developed by William J. Adams of Embry Riddle Aeronautical University and RozannW. Saaty is appropriate to solve decision problemswith a network model (Saaty 2003). Despite theavailability of user-friendly software, users must havea thorough understanding of the ANP concepts beforeattempting to use the software. This will reduceunnecessary mistakes that hamper the making of good decisions of selecting best architecture style. Ina later section, we reveal a paper exhibiting wrongresults from using ANP.
(IJCSIS) International Journal of Computer Science and Information Security,Vol. 8, No. 1, April 2010283http://sites.google.com/site/ijcsis/ISSN 1947-5500