The capability requirements of the command, control, communication, computing, intelligence, surveillance, reconnaissance (C41SR) systems are full of uncertain and vague information, which makes it difficult to mode...The capability requirements of the command, control, communication, computing, intelligence, surveillance, reconnaissance (C41SR) systems are full of uncertain and vague information, which makes it difficult to model the C41SR architecture. The paper presents an approach to modeling the capability requirements with the fuzzy unified modeling language (UML) and building domain ontologies with fuzzy description logic (DL). The UML modeling constructs are extended according to the meta model of Depart- ment of Defense Architecture Framework to improve their domain applicability, the fuzzy modeling mechanism is introduced to model the fuzzy efficiency features of capabilities, and the capability requirement models are converted into ontologies formalized in fuzzy DL so that the model consistency and reasonability can be checked with a DL reasoning system. Finally, a case study of C41SR capability requirements model checking is provided to demonstrate the availability and applicability of the method.展开更多
A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify...A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system, A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should amuse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice.展开更多
In order to provide a quantitative analysis and verification method for activity diagrams based business process modeling, a formal definition of activity diagrams is introduced. And the basic requirements for activit...In order to provide a quantitative analysis and verification method for activity diagrams based business process modeling, a formal definition of activity diagrams is introduced. And the basic requirements for activity diagrams based business process models are proposed. Furthermore, the standardized transformation technique between business process models and basic Petri nets is presented and the analysis method for the soundness and well-structured properties of business processes is introduced.展开更多
As the main component of computer integrated manufacturing system (CIMS), flexible manufacturing system (FMS) should be an open system with reusability and extenchaility. Moreover, as FMS is a complex asynchronous con...As the main component of computer integrated manufacturing system (CIMS), flexible manufacturing system (FMS) should be an open system with reusability and extenchaility. Moreover, as FMS is a complex asynchronous concurrent system, its model also should have the abilities to express the concurrency in the system and to analyze the behavior of the system. It is difficult to use any one method to model such a complex system as FMS. A modeling method using Object-oriented modeling language-unified modeling language (UML) and object-Oriented Petri nets (OPNs) is proposed. Class diagram in UML is used to represent the static relations among the objects in FMS. OPNs are used to model the dynamic behavior of the objects and conduct performance analysis. OPNs also can be used to identify the attributes and operations of the objects. The model can describe the system integrally and can be used to design FMS control software naturally.展开更多
Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most s...Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most suitable methods for design and development. A promising solution for specification, visualization, and documentation of CPSs uses the Object Management Group (OMG) unified modeling language (UML). UML models allow an intuitive approach for embedded systems design, helping end-users to specify the requirements. However, the UML models are represented in an informal language. Therefore, it is difficult to verify the correctness and completeness of a system design. The object constraint language (OCL) was defined to add constraints to UML, but it is deficient in strict notations of mathematics and logic that permits rigorous analysis and reasoning about the specifications. In this paper, we investigated how CPS applications modeled using UML deployment diagrams could be formally expressed and verified. We used Z language constructs and prototype verification system (PVS) as formal verification tools. Considering some relevant case studies presented in the literature, we investigated the opportunity of using this approach for validation of static properties in CPS UML models.展开更多
To solve the identification and comprehension problem of crosscutting concerns in existing legacy software system, a framework of aspect-oriented software reveme engineering is proposed. An approach on re-modularizing...To solve the identification and comprehension problem of crosscutting concerns in existing legacy software system, a framework of aspect-oriented software reveme engineering is proposed. An approach on re-modularizing traversal features of legacy system is presented based on various unified modeling language (UML) diagrams. While modeling crosscutting concerns in UML use case diagrams, the non-functional requirements that affect several use case modules can be enveloped into aspect modules with a stereotype mechanism. The recurring message transmission patterns can be re-modularized as aspects in UML sequence diagrams with UML collaborations. Standard UML activity diagram notations are extended and modified by node fusion and addition, which support the graphical composition operation between crosscutting behaviors and primary business roles of concurrent systems. Case study indicates that travernal features of software system can be extracted and re-modularized from various perspectives in aspect-oriented reverse engineering, which improves comprehensibility and maintainability of legacy systems.展开更多
Unified modeling language (UML) is a powerful graphical modeling language with intuitional meaning. It provides various diagrams to depict system characteristics and complex environment from different viewpoints and...Unified modeling language (UML) is a powerful graphical modeling language with intuitional meaning. It provides various diagrams to depict system characteristics and complex environment from different viewpoints and different application layers. UML-based software development and modeling environments have been widely accepted in industry, including areas in which safety is an important issue such as spaceflight, defense, automobile, etc. To ensure and improve software quality becomes a main concern in the field. As one of the key techniques for software quality, software testing can effectively detect system faults. UML based software testing based is an important research direction in software engineering. The key to software testing is the generation of test cases. This dissertation studies an approach to generating test cases from UML statecharts.展开更多
Software system can be classified into many function modules from the perspective of user. Unified modeling language( UML) class diagram of each function module was extracted,and design characteristic metrics which in...Software system can be classified into many function modules from the perspective of user. Unified modeling language( UML) class diagram of each function module was extracted,and design characteristic metrics which influenced software maintainability were selected based on UML class diagram.Choosing metrics of UML class diagram as predictors,and mean maintenance time of function module was regarded as software maintainability parameter. Software maintainability models were built by using back propagation( BP) neural network and radial basis function( RBF) neural network, respectively and were simulated by MATLAB. In order to evaluate the performance of models,the training results were analyzed and compared with leaveone-out cross-validation and model performance evaluation criterion. The result indicated that RBF arithmetic was superior to BP arithmetic in predicting software maintainability.展开更多
Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect diffe...Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension.展开更多
文摘The capability requirements of the command, control, communication, computing, intelligence, surveillance, reconnaissance (C41SR) systems are full of uncertain and vague information, which makes it difficult to model the C41SR architecture. The paper presents an approach to modeling the capability requirements with the fuzzy unified modeling language (UML) and building domain ontologies with fuzzy description logic (DL). The UML modeling constructs are extended according to the meta model of Depart- ment of Defense Architecture Framework to improve their domain applicability, the fuzzy modeling mechanism is introduced to model the fuzzy efficiency features of capabilities, and the capability requirement models are converted into ontologies formalized in fuzzy DL so that the model consistency and reasonability can be checked with a DL reasoning system. Finally, a case study of C41SR capability requirements model checking is provided to demonstrate the availability and applicability of the method.
基金Supported by the National Natural Science Foun-dation of China (2002AA142150)
文摘A fuzzy set-based evaluation approach is demonstrated to assess the security risks for internet-banking System. The Internet-banking system is semi-formally described using Unified Modeling Language (UML) to specify the behavior and state of the system on the base of analyzing the existing qualitative risk assessment methods. And a quantitative method based on fuzzy set is used to measure security risks of the system, A case study was performed on the WEB server of the Internet-banking System using fuzzy-set based assessment algorithm to quantitatively compute the security risk severity. The numeric result also provides a method to decide the most critical component which should amuse the system administrator enough attention to take the appropriate security measure or controls to alleviate the risk severity. The experiments show this method can be used to quantify the security properties for the Internet-banking System in practice.
文摘In order to provide a quantitative analysis and verification method for activity diagrams based business process modeling, a formal definition of activity diagrams is introduced. And the basic requirements for activity diagrams based business process models are proposed. Furthermore, the standardized transformation technique between business process models and basic Petri nets is presented and the analysis method for the soundness and well-structured properties of business processes is introduced.
基金This project is supported by National Natural Science Foundation of China !(59889505)
文摘As the main component of computer integrated manufacturing system (CIMS), flexible manufacturing system (FMS) should be an open system with reusability and extenchaility. Moreover, as FMS is a complex asynchronous concurrent system, its model also should have the abilities to express the concurrency in the system and to analyze the behavior of the system. It is difficult to use any one method to model such a complex system as FMS. A modeling method using Object-oriented modeling language-unified modeling language (UML) and object-Oriented Petri nets (OPNs) is proposed. Class diagram in UML is used to represent the static relations among the objects in FMS. OPNs are used to model the dynamic behavior of the objects and conduct performance analysis. OPNs also can be used to identify the attributes and operations of the objects. The model can describe the system integrally and can be used to design FMS control software naturally.
基金Project partially supported by the Strategic Grants POSDRU/88/1.5/S/50783 Project (No.50783,2009),POSDRU/107/1.5/S/77265 Project (No.77265,2010),Romaniathe European Social Fund for Investing in People, within the Sectoral Operational Programme Human Resources Development 2007-2013
文摘Cyber physical systems (CPSs) can be found nowadays in various fields of activity. The increased interest for these systems as evidenced by the large number of applications led to complex research regarding the most suitable methods for design and development. A promising solution for specification, visualization, and documentation of CPSs uses the Object Management Group (OMG) unified modeling language (UML). UML models allow an intuitive approach for embedded systems design, helping end-users to specify the requirements. However, the UML models are represented in an informal language. Therefore, it is difficult to verify the correctness and completeness of a system design. The object constraint language (OCL) was defined to add constraints to UML, but it is deficient in strict notations of mathematics and logic that permits rigorous analysis and reasoning about the specifications. In this paper, we investigated how CPS applications modeled using UML deployment diagrams could be formally expressed and verified. We used Z language constructs and prototype verification system (PVS) as formal verification tools. Considering some relevant case studies presented in the literature, we investigated the opportunity of using this approach for validation of static properties in CPS UML models.
基金Project supported by National Natural Science Foundation of China (Grant No .60473063)
文摘To solve the identification and comprehension problem of crosscutting concerns in existing legacy software system, a framework of aspect-oriented software reveme engineering is proposed. An approach on re-modularizing traversal features of legacy system is presented based on various unified modeling language (UML) diagrams. While modeling crosscutting concerns in UML use case diagrams, the non-functional requirements that affect several use case modules can be enveloped into aspect modules with a stereotype mechanism. The recurring message transmission patterns can be re-modularized as aspects in UML sequence diagrams with UML collaborations. Standard UML activity diagram notations are extended and modified by node fusion and addition, which support the graphical composition operation between crosscutting behaviors and primary business roles of concurrent systems. Case study indicates that travernal features of software system can be extracted and re-modularized from various perspectives in aspect-oriented reverse engineering, which improves comprehensibility and maintainability of legacy systems.
文摘Unified modeling language (UML) is a powerful graphical modeling language with intuitional meaning. It provides various diagrams to depict system characteristics and complex environment from different viewpoints and different application layers. UML-based software development and modeling environments have been widely accepted in industry, including areas in which safety is an important issue such as spaceflight, defense, automobile, etc. To ensure and improve software quality becomes a main concern in the field. As one of the key techniques for software quality, software testing can effectively detect system faults. UML based software testing based is an important research direction in software engineering. The key to software testing is the generation of test cases. This dissertation studies an approach to generating test cases from UML statecharts.
文摘Software system can be classified into many function modules from the perspective of user. Unified modeling language( UML) class diagram of each function module was extracted,and design characteristic metrics which influenced software maintainability were selected based on UML class diagram.Choosing metrics of UML class diagram as predictors,and mean maintenance time of function module was regarded as software maintainability parameter. Software maintainability models were built by using back propagation( BP) neural network and radial basis function( RBF) neural network, respectively and were simulated by MATLAB. In order to evaluate the performance of models,the training results were analyzed and compared with leaveone-out cross-validation and model performance evaluation criterion. The result indicated that RBF arithmetic was superior to BP arithmetic in predicting software maintainability.
基金Supported by the Major Research Plan of the National Natural Science Foundation of China(90818027)the Key Program of the National Natural Science Foundation of China(60633010)+2 种基金the National Natural Science Foundation of China (60873050,60873049,60803008)the Natural Science Foundation of Jiangsu Province of China(BK2006094,BK2008292)the Opening Foundation of State Key Laboratory of Software Engineering in Wu-han University (SkLSE20080717)
文摘Based on the different roles played by base flow and alternative flow in the process to achieve user's goals, we have found that loop structure is frequently used to implement alternative flow and/or to connect different use cases. This paper presents an approach to identify base flows and alternative flows of different use cases by traversing control flow graph in which back edges are eliminated. The effectiveness of the approach is verified by identification of the use case structure of an ATM system. The workload of human intervention of the approach is relatively slight, and the manner of human intervention closely follows the usual process of software comprehension.