The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Several approaches have already been proposed to extract both business processes and business rules from a legacy source code. These approaches consider static source code analysis for the extraction procedure. However, business processes have components that can not be directly extracted by static analysis (i.e., participants, responsibilities, and concurrent activities). Moreover, well-known static...
This paper presents an experiment to reverse engineer a legacy source code. Here, it is used as a part of a project to develop and upgrade the existing system written in C++ language. To accomplish this task some information's must be need to be extracted from that legacy C++ code. The extracted information now used to implement a new version of the design documentation. This experiment revealed issues...
The development process for a given software system is a combination of an idealized, prescribed model and a messy set of ad hoc practices. To some degree, process compliance can be enforced by supporting tools that require various steps be followed in order; however, this approach is often perceived as heavyweight and inflexible by developers, who generally prefer that tools support their desired...
The relationships existing between a business process and the supporting software system is a critical concern for the organizations, as it directly affects their performance. The research described in this paper is concerned with the use of information retrieval techniques to software maintenance and, in particular, to the problem of recovering traceability links between the business process models...
The main problem of enterprise application evolution is how to capture requirements and then propagate requirement changes to application. Effectively evolving enterprise application with the frequently changing requirements is still a challenge to software engineering. Requirement is the root causes of evolution of enterprise applications in many cases. Refactoring has given guidance to gradual evolution...
To support legacy migration to service-oriented architecture (SOA), this paper presents a method that derives candidates of SOA services from procedural programs. In SOA, every service is supposed to be a process (procedure) with (1) open interface, (2) self-containedness, (3) coarse granularity for business. We identify such services from the source code and its data flow diagram (DFD), by analyzing...
Business rules are operational rules that business organizations follow to perform various activities. We summarize researches for business rule extraction from legacy system and find that the limitation of these methods is to use static slicing, because static slicing sometimes produces a large portion of a source program, especially for programs with array and pointer variable. This paper presents...
BSM Business Service Management analysis requirement from business to IT system specially to software. And help CIO make the strategy of software maintenance. Framework of software maintenance based on BSM has six steps. Maintenance software according to BSM can help CIO to balance IT cost and profit and make software available.
An Enterprise Information System (EIS) software has three main aspects: data, which are processed to generate business information; application functions, which transform data into information; and business rules, which control and restrict the manipulation of data by functions. Traditional approaches to EIS software development consider data and application functions. Rules are second class citizens,...
This document proposes an approach for financial statements' anomalies detection by using on-line evolving clustering. Official records of the financial activities of a business are called financial statements and they are recorded in journals and general ledger in a supervised process. Anomalies in financial statements are caused by human mistakes during forming of financial statements, or as a result...
Understanding business processes is an important step for software maintenance. The approaches for recovering business processes are mostly based on source code analysis, including static analysis and dynamic analysis. All these methods are proved to be effective in some specific situations. However, they are challenged when facing enterprise legacy systems which implement complex business processes...
This paper describes the industrial experience in performing database reverse engineering on a large scale software reengineering project. The project in question deals with a highly heterogeneous in-house information system (IS) that has grown and evolved in numerous steps over the past three decades. This IS consists of a large number of loosely coupled single purpose systems with a database driven...
For many enterprises the introduction of service orientation is still a daunting task and there is often no distinct idea of how to approach respective projects. Only recently, SOA research addresses this open and essential question and systematic methodologies for SOA introduction and evolution have been conceived. IBM's SOMA and sd&m's Quasar Enterprise are prominent examples. In practice, these...
This paper describes a model for capturing service designs and the design of service product lines. The model promotes reuse of service artifacts, enables a balanced view of the service from different stakeholder viewpoints, and provides a foundation for design for service quality. The model leverages a phased approach to design, engineering and management of services. The model has applicability...
Currently IMO recommendation mentioned EDI data elements only for electronic means for the clearance of ships, which is only for electronic documents. Most countries followed by IMO recommendation has been using EDI or XML document (in case of applying single window system)between user and port authority. However, because there are not existing standard communication interface, shipping company(it...
Service-oriented software engineering emphasizes the discovery and reuse of existing service resources and aggregate them to meet user needs. This paper proposes a service-oriented and process-driven approach to modeling variability in software product line. In this approach, variability analysis and modeling as a means, domain ontology model as a starting point, process ontology model as the center,...
Modelling business processes using BPMN has been emerging as the preferred choice for organisations seeking to enact their business processes in service-oriented environments. However, a number of organisations have their business processes modelled using role activity diagramming, RAD. In this research, we introduce a new approach to translating RAD business process models to their respective BPMN...
The model-driven approach to software development has not only changed the way software systems are built and maintained but also the way they are tested. For such systems, a model-based testing approach is much recommended since it is aligned with the new model-driven development paradigm that favors models over code with the objective being to reduce time to market while improving product quality...
This paper analyzes the bottleneck of EJB system performance, proposes an idea of optimizing EJB design pattern to improve the performance, and then give a layered and integrated optimization method based on mixed design patterns. Accordingly, the performance of the application was improved and the system has better flexibility and maintainability. Experiments show the improvement of performance at...
COBOL systems, which often rely on legacy sequential file systems, still form a critical part in core business systems, particularly transactional systems. Understanding these systems, through domain analysis, is a critical part of any program code/data reengineering effort. Our approach involves first translating COBOL into a Wide Spectrum Language (WSL) and then subjecting this translation to a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.