The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
UML has been widely accepted by the software community for nearly more than fifteen years. As mechatronic systems design can no longer be seen as an isolated hardware design or software design activity, UML becomes of significant interest as a unification language for systems description combining both hardware and software components. This article provides a method based on the UML applied to conceptual...
The Architecture Analysis and Design Language AADL allows one to model complete systems, but also to define specific extensions through property sets and library of models. Yet, it does not define an explicit mechanism to enforce some semantics or consistency checks to ensure property sets are correctly used. In this paper, we present REAL (Requirements and Enforcements Analysis Language) as an integrated...
This paper presents MATERA, a framework that integrates modeling in the Unified Modeling Language (UML), with requirement traceability across a model-based testing (MBT) process. The Graphical User Interface (GUI) of MATERA is implemented as a plug-in in the NoMagic's MagicDraw modeling tool, combining existing capabilities of MagicDraw with custom ones. MATERA supports graphical specification of...
In tandem with the growing important roles of software in modern society is the increasing number of threats to software. Building software systems that are resistant to these threats is one of the greatest challenges in information technology. Threat identification methods for secure software development can be found in the literature. However, none of these methods has involved automatic threat...
Artificial markets (AMs) are an emerging form of agent-based simulation (ABS), in which agents represent individual consumers, firms, or industries interacting under simulated market conditions. The validity of the method depends on the ability of researchers to construct simulated agents that faithfully capture the key behavior of targeted entities. Without such a correspondence the simulation cannot...
Aimed at lack generality and reusability in model base management system, a set of model base management system (MBMS) meta-model was established by using lightweight extension of UML profile, replaced the traditional method considering only the final table structure and DW system, and implemented the design of model base management system on concept levels. This make the design of model base management...
Facing the increase of applications around spatial or spatio-temporal databases, the assistance brought to the designer of these bases remains very poor. As in the classic data base domain (no spatial) the use of conceptual models, methods and tools of design is very current, in the real time geoprocessing application domain it is the exception. Yet, these databases are very often complex and would...
As the data warehouse contains the sensitive information, which is used for decision making process, it is necessary to take precautionary measures in the data warehouse building process itself. Current approaches for the conceptual modeling of ETL do not address the security aspects in the conceptual modeling phase. In this paper, we propose a simulation model for secure data extraction in ETL processes...
By using UML (Unified Modeling Language) and ER (Entity Relationship) notations to describe a system, the specification of persistent and transient details became separated. UML and ER models use distinct notations, that cannot be checked for consistence, and therefore are not suitable to be used in a model driven development approach. This paper proposes a synergistic approach to persistence modeling...
Co-word analysis is a typical kind of content analysis, and also it is an important content mining method. It has been widely used in medicine, chemistry, artificial intelligence, software engineering, information science and information system. By the use of SPSS software, this paper analyzes co-word of the articles on UML issued in the periodicals from year 2001 to 2008 collected by CNKI database...
This panel paper presents research activities related to modeling portability between electromagnetic transients simulation programs. Although modern computer programs are provided with sophisticated graphical user interfaces, each program has its own modeling interface and model development methods. There are no portability or interoperability standards between applications of the same type. This...
A modelling language can be defined by a metamodel in UML class diagram. This paper defines the semantics of such metamodels through two mappings: a signature mapping from metamodels to signatures of first order languages and an axiom mapping from metamodels to sets of axioms over the signature. Valid models, i.e. instances of the metamodel, are therefore mathematical structures in the signature that...
The software development nowadays exhibits some noticeable characteristics: model based development, team work, parallel development, incremental and iterative development, transregional development and so on. The development process becomes so complicated that a CASE environment is requested to support some mechanisms: mass tools integration, staff cooperation, process management, extensive data...
In this paper, we present our approach for UML based modeling of control/data driven embedded systems. In our case application is presented as a network of hierarchic data driven and control driven tasks that communicate via abstract channels. Hardware platform is modeled as UML structure diagram. Mapping of application on hardware platform is modeled through UML constraints. From UML models, a Maude...
In the paper, we discuss state space reliability modeling formalism of distributed systems and services compliant with UML metamodel. Behavior of modeled application system we describe in terms of states. Service generation process we represent as a sequence of application system states. State space approach allows us to define dependence between application system components via dependence between...
It has been 10 years since the Department of Defense (DoD) first issued its architecture framework (DODAF). In the past we have shown that it is possible to take an architecture description that conforms to DODAF and convert it to an executable model to support rigorous evaluation. We now have a proof of concept that demonstrates the feasibility of making the conversion to the executable model automatically...
Conventional data-centric integration approaches assume that the end-users are fully responsible for work-flow control, data consistency and integrity maintenance and inter-process coordination, generally without computer augmentation. The objective of this study is to develop a network-integrated engineering environment with an expanding set of system capabilities that can off-load engineers from...
Engineering enterprises today have to cope with various challenges dealing with the management of their multidisciplinary and collaborative engineering contexts. Amongst others, those are: the integration of involved distributed IT systems, the management of changes on the complex collaborative product and process data, and the support of collaborative users. Many solutions have been proposed and...
In today's continuously changing markets newly developed products often do not meet the demands and expectations of customers. Research on this problem identified a large gap between developer and user expectations. Approaches to bridge this gap are to provide the developers with better information on product usage and to create a fast feedback cycle that helps tackling usage problems. Therefore,...
Modern cars comprise tens of electronic control units, interconnected via automotive bus systems towards a specific system-of-systems inside the vehicle. Safety-relevant applications which are realized by these networked embedded controllers require a sophisticated process of system design. The appropriate choice of communication infrastructure and parameters at an early stage of system development...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.