SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
MIGRATION STRATEGIES FOR OBJECT ORIENTED 
SYSTEM TO COMPONENT BASED SYSTEM 
Chahat Monga1, Ms. Aman Jatain2 and Dr. Deepti Gaur2 
1Research Scholar, ITM University, Gurgaon, India 
2Assistant Professor, ITM University, Gurgaon, India 
ABSTRACT 
Migration of object oriented system to component based System is not an easy task, not only technically a 
lot of changes needs to be done but also numerous other issues needs to be kept in mind. However 
Component based Software development has been gaining its popularity from the past few years and has 
higher reusability scope. Programs built using CBSE approach are confirmed to be suitable to new 
environments. These days it’s a universal practice to reuse components in project to achieve better quality 
and to save time. So moving to CBSE from object oriented seems wise decision. Number of approaches has 
been introduced to implement this and each one of them has its own pros and cons. The paper focuses on 
the brief review on works of different authors in this area from the year 2000 to 2014. 
KEYWORDS 
Component based, clustering, graph, object oriented, reverse engineering, ROMANTIC, UML. 
1. Need of Transformation 
Most old object oriented systems commonly known as Legacy systems did not foresee the change 
in speed of modern projects. Due to this they undergo a lot of limitations; e.g.: 
a) Large maintenance costs. 
b) Difficult to train employees about old methodologies 
c) Difficult to adapt and evolve according to new environment [5]. 
However looking to the other side of the coin legacy systems could not be rejected altogether. 
They provide vital information and functionality that has been used for years and remains crucial 
for smooth working of the project. Thus legacy systems can’t be dumped and at the same time 
could not be used as it is for a long time. That is why need is felt to reverse engineer the object 
oriented legacy system to convert it into components that are both reusable, maintainable and 
efficient to use. Such a system would combine new technology with existing one and also could 
be easily adapted to the future changes. Components, due to their high cohesiveness have better 
applicability than object-oriented and also coupling between them is low making them less 
complex [10]. Thus it is evident that most of the drawbacks of object-oriented system could be 
easily overcome by components. 
Rest of the paper is aligned as follows. Section 2 discuses the inclusion and exclusion criteria and 
also brief introductions to the selected techniques. Section 3 shows the bubble graph used to 
represent the studies and finally Section 4 gives conclusions and directions for future work. 
DOI:10.5121/ijfcst.2014.4608 79
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
2. Inclusion and Exclusion of Search Results 
An extensive search on various research papers was done to retrieve the ones those contain the 
solution to our problem statement. For this activity a set of keywords is generated which consists 
of search terms that are similar to our research domain. Some of the various search terms used for 
data retrieval are:- 
80 
a) Migration 
b) Object oriented 
c) Component based 
d) Transformation 
e) Legacy 
f) Software development 
g) Reverse engineering 
h) Reengineering 
These search terms were combined with Boolean expression in the form of A or B,A or C, A or B 
or C ,D or B or C, A and E and C and F etc. which provided a list of research papers related to 
our topic of interest. Number of research papers retrieved was enormous so we included only 
those studies which presented fully implemented techniques for transformation of OOS to CBS. 
Studies which were not fully implemented or only provided theoretical basis were excluded in 
this paper. The studies that were published before year 2000 were also excluded. Also the studies 
which represented similar techniques only the most significant one is included and rest are 
excluded. The table 1 shows our detailed search strategy:- 
TABLE: 2.1. Search Strategy 
Publishing 
2000 to 2014 
Browsing libraries and sites IEEExplore, ScienceDirect, Springer, ACM 
Digital Library, Google 
Items searched Conference and journal papers 
Publication Language English 
Searched for Full text 
Using the above inclusion and exclusion criteria the following papers (table 2) are found to be fit 
for our purpose and are discussed in subsequent sections year wise. [TABLE 2] 
TABLE: 2.2. Techniques and Tools 
Year Author(s) Methodology Tool 
2003 Eunjoo Lee et al CLUSTERING - 
2005 Suk Kyung Shin & 
Soo Dong Kim 
REFACTORING - 
2005 Hironori 
Washizakia & 
Yoshiaki 
Fukazawab 
FORMAL METHODS Rigi, Refactorit 
2008 Sylvain et al. UML Diag, CLUSTERING -
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
81 
2008 Hassan Mathkour et 
al. 
ROMANTIC Code profiling tool, 
Sparx, ArgoUML 
2009 S.K.Mishra 
D.S.Kushwaha 
& 
A.K.Misra 
CORE JOT, Rational Rose, 
NUnit 
2011 Dan Li et al. UML Diag Rcose CASE tool, 
QVTR-XSLT, 
2012 Simon Allier et al. Reverse engineering Tracer, 
CBAExtractor, 
CBAToOSGi 
2012 Selim Kebir et al. Reverse engineering, 
CLUSTERING 
- 
2.1. Lee et al (2003) 
This paper was presented by Lee et al. in the year 2003[1]. They divided the whole process into 2 
sections. In first section they used relationship like inheritance and composition etc to create the 
basic components. In second step they refine this component system generated using software 
metrics like cohesion, connectivity strength etc [3]. 
1) Basic component creation:- under this section four steps were used to create an intermediate 
product i.e. component system steps involved are 1) functional units are created from the classes 
having composite relationship 2) unnecessary and redundant classes are removed. 3) Classes 
having inheritance relationship between them are put into same component as they have more 
strong cohesion. 4) Once again we will check for needless classes that were not called by any 
outside class or method and discard those classes. The resultant of these steps would create an 
intermediate component system.2) In addition to the component System that is generated in 
previous steps, connectivity strength, component complexity and cohesion are also defined. A 
clustering algorithm is them applied to cluster the similar components into one big component. 
Usually hierarchal clustering is employed. The final result will provide the components that are 
generated from initial object oriented code. The whole procedure is shown in figure 1. 
Figure 2.1 Steps involved in Lee et. al methodology
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
2.2. Washizaki et al (2005) 
Given by Washizaki and Fukazawa in 2005 it is based on REFACTORING technique called 
“extract component”[3]. The process starts by defining a CRG (class relationship graph), the 
main thing to be considered while creating CRG is that only the classes created by user become 
part of CRG, java core classes do not participate in the process. 
Next a clustering algorithm is generated to find clusters in the object oriented code, clusters are 
basically the independent nodes that do not have any link outside the cluster. For determination 
of clusters a term called “reachability” is defined. The paper also presents an extraction algorithm 
which supports clustering and the retrieval of desired components from those clusters. After the 
components have been created the part outside the components is refactored so that these freshly 
extracted components could be used independently and any situation of ambiguity does not arise. 
This refactoring is named “extract component” by the authors and contains about 17 steps [4] 
after which the output are independent components which could be reused frequently. To 
automate the whole process the authors also created an automation component extraction system 
in java so that instead of performing the transformation in batches it could be done in one go. 
Figure 2 clearly depicts the main steps involved in the process. 
82 
Figure 2.2 Steps involved in Washizaki et al methodology 
2.3 Suk Kyung Shin et al (2005) 
This method was given by Suk Kyung Shin and Soo Dong Kim in the year 2005[3]. This 
approach basically utilized formal method specification / object z technology for transformation. 
The paper talks about the meta model of object oriented design after which the meta model modal 
and finally a set of rules for migration of formal spec of OOD to formal spec. of CBD are given. 
Using these rules the final transformation is made. The final components could be used in EJB, 
CORBA or .NET. 
2.4 Mathkour et al (2008) 
This technique is given by Mathkour et al. [4] in 2008 on the basis of UML diagrams and 
clustered graph generation. They used JAVA language as their base to make the entire system 
platform independent. UML unified modeling language was utilized for specification work and 
XMI (XML based interchange language) was used to exchange file formats as it supported by 
almost all UML tools. The main phases of transformation involved in the conversion of object 
oriented to component based are depicted in Figure 3:-
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
83 
Figure 2.3. Steps involved in Mathkour et, al methodology 
2.5. Sylvain et al. (2008) 
This approach was proposed by Sylvain and Mourad in 2008 using ROMANTIC APPROACH 
[5]. This approach was quite different from previous works of authors as it included architectural 
semantics and also reduces the need of human expertise which further helped to reduce overall 
cost of the whole process. Sylvain and Mourad used two principles as their guide through the 
whole process. The principles used by them are diagrammatically represented in Figure 4. 
Principle 1 used in Romantic approach that is architecture extraction starts by mapping object 
concepts to architectural concepts like mapping classes, packages etc to components, interfaces, 
connectors etc. and thereby generating a correspondence model, using this model they partitioned 
system classes. And the elements under this partition are called “shapes” representing 
components. Thus actual requirement was to assimilate these components to shape. These shapes 
form the architecture. Principle 2 validates the previously generated architecture and also 
instantiate it. Four guides were considered for this purpose 
 Ability to adapt to deployment hardware. 
 Correct semantics. 
 Quality properties. 
 Adhere to documentation constraints. 
And finally the semantics of architecture are checked for correctness and this leaves us with 
required model. 
Figure 2.4 Steps involved in Sylvain et, al methodology 
2.6. Mishra et al. (2009) 
This technique is presented by mishra et al in 2009 and named it CORE [6]. Component oriented 
reverse engineering creates reusable software components by using reverse engineering. A tool 
named rational rose is used to reverse engineer the system for identifying the relevant use cases 
for the system. These use cases form the base for generation of component structure. Once the 
use cases are identified a CRUD matrix (create or read or update or delete) is created which
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
represents structural relationships. As a final step to extract components we apply some 
clustering techniques according to dependency relationship. Final reusable components are stored 
in component bank after testing. 
2.7. Dan Li et al. (2009) 
This technique was given by Dan Li et al. in 2011 in their paper “Interactive Transformations 
from Object-Oriented Models to Component-Based Models” [7]. The technique makes use of 
UML diagrams like class diagram and sequence diagrams for the transformation process. First 
the extraction of object sequence diagram is done, then transformation is applied to object 
sequence diagram to convert them into component sequence diagram using a validity tool called 
QVTR-XSLT. At every step a set of object lifelines are chosen that the user intends to change 
into component and then some checks are made using algorithms to ensure that selected lifeline 
would qualify as component lifeline [figure 5]. With every component lifeline the corresponding 
component is sent to component diagram and a protocol is generated for it. After all the object 
lifelines have been processed we get our desired components extracted from object-oriented code. 
84 
Figure 2.5. Steps involved in Dan Li et, al methodology 
2.8. Simon Allier et al. (2012) 
Simon Allier et al. proposed this methodology in 2012 which converts object oriented 
applications to component oriented applications [8]. The whole process revolves around two 
steps: 1) identifying components 2) identifying required interfaces. In the first step that is 
component identification we first determine the “core components”. Next the missing classes are 
added by using static call graph and finally manual refinement of generated classes is done. After 
this process we over we are left with the main components which creates component based 
architecture. Further to complete the transformation component based architecture is mapped to 
component oriented architecture using object oriented concepts [Figure 6]. 
Figure 2.6. Steps involved in Simon Allier et, al methodology
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
2.9. Selim kebir et al. (2012) 
It is a component identification methodology proposed by selim kebir et, al in 2012[9]. This 
methodology uses the concept of object oriented language and clustering to convert object 
oriented application into component oriented application. At first a mapping model to map object 
concepts to component concepts is proposed. This model also evaluates the semantic correctness 
of the components. Next the interfaces are identified and a clustering algorithm is utilized for 
grouping the relevant components together and as a last step everything is documented. The 
authors applied the technique on two systems 1) JDOM 2) Apache HTTP. This methodology 
seemed quite similar to the one proposed by Simon Allier et, al discussed above. 
3. Bubble Graph 
The techniques extracted from above discussion were analyzed to answer various research 
questions, for this purpose bubble plot is utilized to characterize and represent the studies. In 
Figure.7 the X axis denoted the publication year of the studies i.e.2003, 2005, 2008 etc and y axis 
denotes the research strategy adopted in them like UML, ROMANTIC, REVERSE Eng. etc. The 
intersection of the axis shows bubbles with contains the reference number of the studies. The 
bubble graph compares and diagrammatically represents which technology is most suited and 
widely used for transformation purpose. The size of the bubble is according to the number of 
studies covered by that bubble. We have total nine techniques to be compared so relative 
percentage occurrence of techniques is CLUSTERING=22.2%, FORMAL METHOD=11.1%, 
REVERSE ENG / REFACTORING=44.4%, UML= 11.1%, ROMANTIC=11.1%. These figures 
show that the technique that is most widely utilized is reverse engineering or refactoring. 
85 
Figure: 3.1. Bubble graph
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
4. CONCLUSION and FUTURE SCOPE 
Component based software development has emerged as a powerful technique and has been 
widely adopted these days in most of the organizations for software development. In this paper 
we reviewed various technologies that are in practice to convert object oriented legacy 
applications to component oriented applications, For instance nine techniques that have been 
practically implemented are discussed.. Many approaches have been introduced so far and the 
study is still evolving. A brief introduction and working mechanism is also provided with each 
methodology and in last a comparative analysis is done using bubble graph as an overall extract 
of the research. Through this paper we found five important techniques for transforming object 
oriented system to component based system. 
86 
1) Reverse engineering/refactoring 
2) Clustering 
3) Formal methods 
4) UML approach 
5) Romantic 
Also it is observed that most of the techniques employed for this purpose uses reverse 
engineering/refactoring approach for the transformation. There is a lot of future scope and chance 
of evolution in this field, so far a number of techniques have been offered with their own pros and 
limitations so in future a new technology could emerge as a concrete benchmark for this 
transformation and system could also be automated. 
REFERENCES 
[1] Enjoy Lee, Byungjeong Lee, Woochang Shin, Chisu Wu, “A Reengineering Process for Migrating 
from an Object-oriented Legacy System to a Component-based System”, Computer Software and 
Applications Conference, Page(s):336 – 341, (2003). 
[2] Suk Kyung Shin Soo Dong Kim, “A Method to Transform Object-Oriented Design into Component- 
Based Design using Object-Z”, Software Engineering Research, Management and 
Applications,Page(s):274 – 281, (2005). 
[3] Hironori WashizakiYoshiaki Fukazawa, “A technique for automatic component extraction from 
object-oriented programs by refactoring”, Science of Computer Programming, Pages 99–116, (2005). 
[4] Sylvain Chardigny, Mourad Oussalah,” Extraction of Component-Based Architecture From Object- 
Oriented Systems”, Software Architecture,Page(s):285 – 288, (2008). 
[5] Hassan Mathkour, AmeurTouir, Hind Hakami, Ghazy Assassa, “On the transformation of Object 
Oriented-based Systems to Component-based Systems”, Signal Image Technology and Internet Based 
Systems,Page(s):11 – 15, (2008). 
[6] S.K.Mishra, D.S.Kushwaha, A.K.Misra, “Creating Reusable Software Component from Object- 
Oriented Legacy System through Reverse Engineering”, JOURNAL OF OBJECT TECHNOLOGY, 
Vol. 8, No. 5,(2009). 
[7] Dan Li, Xiaoshan Li, Zhiming Liu and Volker Stolz, “Interactive Transformations from Object- 
OrientedModels to Component-Based Models”, UNU-IIST Report No. 451, (2011). 
[8] Simon Allier, Salah Sadou, Houari Sahraoui, R´egisFleurquin, “From Object-Oriented Applications 
to Component-Oriented Applications via Component-Oriented Architecture”, Software Architecture 
(WICSA),Page(s):214 – 223, (2012). 
[9] Selim Kebir, Sylvain Chardigny, Allaoua Chaoui, “Quality-Centric Approach for Software 
Component Identification from Object-Oriented Code”, Software Architecture (WICSA) and 
European Conference on Software Architecture (ECSA),Page(s):181 – 190, (2012). 
[10] Jong Kook Lee, “Component Identification Method with Coupling and Cohesion”, Software 
Engineering Conference APSEC, Page(s):79 – 86, (2001).
International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 
[11] Michele Lanza, “Object-Oriented Reverse Engineering Coarse-grained, Fine-grained, and 
Evolutionary Software Visualization”, Leiter der Arbeit: Prof. Dr. S. Ducasse, Prof. Dr. O. Nierstrasz 
Institut f ¨ ur Informatik und angewandte Mathematik, 2003. 
[12] Miguel A. Serrano, Doris L. Carver and Carlos Montes de Oca, “Reengineering legacy systems for 
87 
distributed environments”, Journal of System Software, Elsevier 64 (2002) 37–55, 2002. 
[13] Philippe Dugerdil,“Using RUP to reverse-engineer a legacy system”, IBM Journal, September 
2006. 
[14] Philip Newcomb and Randy A. Doblar, “Automated Transformation of legacy system”, 
www.stsc.hill.at.mil,December 2001.

More Related Content

What's hot

IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET Journal
 
IRJET- Syllabus and Timetable Generation System
IRJET- Syllabus and Timetable Generation SystemIRJET- Syllabus and Timetable Generation System
IRJET- Syllabus and Timetable Generation SystemIRJET Journal
 
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...A Novel Optimization towards Higher Reliability in Predictive Modelling towar...
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...IJECEIAES
 
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET-  	  Review of Tencent ML-Images Large-Scale Multi-Label Image DatabaseIRJET-  	  Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image DatabaseIRJET Journal
 
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...IRJET Journal
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemslaxmanLaxman03209
 
Application of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewApplication of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewIRJESJOURNAL
 
Re2018 Semios for Requirements
Re2018 Semios for RequirementsRe2018 Semios for Requirements
Re2018 Semios for RequirementsClément Portet
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATAacijjournal
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET Journal
 
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning Model
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning ModelChinese Named Entity Recognition with Graph-based Semi-supervised Learning Model
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning ModelLifeng (Aaron) Han
 
Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Wonjun Jeong
 
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...ijseajournal
 

What's hot (17)

IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...IRJET-  	  Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
IRJET- Comparative Study of PCA, KPCA, KFA and LDA Algorithms for Face Re...
 
IRJET- Syllabus and Timetable Generation System
IRJET- Syllabus and Timetable Generation SystemIRJET- Syllabus and Timetable Generation System
IRJET- Syllabus and Timetable Generation System
 
Hayes
HayesHayes
Hayes
 
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...A Novel Optimization towards Higher Reliability in Predictive Modelling towar...
A Novel Optimization towards Higher Reliability in Predictive Modelling towar...
 
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET-  	  Review of Tencent ML-Images Large-Scale Multi-Label Image DatabaseIRJET-  	  Review of Tencent ML-Images Large-Scale Multi-Label Image Database
IRJET- Review of Tencent ML-Images Large-Scale Multi-Label Image Database
 
Ijetcas14 468
Ijetcas14 468Ijetcas14 468
Ijetcas14 468
 
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
IRJET - Scrutinizing Attributes Influencing Role of Information Communication...
 
Sca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problemsSca a sine cosine algorithm for solving optimization problems
Sca a sine cosine algorithm for solving optimization problems
 
Application of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A ReviewApplication of Genetic Algorithm in Software Engineering: A Review
Application of Genetic Algorithm in Software Engineering: A Review
 
Re2018 Semios for Requirements
Re2018 Semios for RequirementsRe2018 Semios for Requirements
Re2018 Semios for Requirements
 
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATABINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA
 
Green Technology Journal - 2010
Green Technology Journal - 2010Green Technology Journal - 2010
Green Technology Journal - 2010
 
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...IRJET- A Comparative Research of Rule based Classification on Dataset using W...
IRJET- A Comparative Research of Rule based Classification on Dataset using W...
 
mlsys_portrait
mlsys_portraitmlsys_portrait
mlsys_portrait
 
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning Model
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning ModelChinese Named Entity Recognition with Graph-based Semi-supervised Learning Model
Chinese Named Entity Recognition with Graph-based Semi-supervised Learning Model
 
Retrosynthesis tutorial v2
Retrosynthesis tutorial v2Retrosynthesis tutorial v2
Retrosynthesis tutorial v2
 
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...A Software Measurement Using Artificial Neural Network and Support Vector Mac...
A Software Measurement Using Artificial Neural Network and Support Vector Mac...
 

Similar to Migration strategies for object oriented system to component based system

An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
 An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
An Adjacent Analysis of the Parallel Programming Model Perspective: A SurveyIRJET Journal
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...eSAT Journals
 
Reverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewReverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewEditor IJCATR
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...ijcsa
 
Automatic Text Summarization
Automatic Text SummarizationAutomatic Text Summarization
Automatic Text SummarizationIRJET Journal
 
Discreate eventsimulation idef
Discreate eventsimulation idefDiscreate eventsimulation idef
Discreate eventsimulation idefMandar Trivedi
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...acijjournal
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classificationijcsit
 
Performance Evaluation using Blackboard Technique in Software Architecture
Performance Evaluation using Blackboard Technique in Software ArchitecturePerformance Evaluation using Blackboard Technique in Software Architecture
Performance Evaluation using Blackboard Technique in Software ArchitectureEditor IJCATR
 
A Comparative Study between Agile Methods of Software Development
A Comparative Study between Agile Methods of Software DevelopmentA Comparative Study between Agile Methods of Software Development
A Comparative Study between Agile Methods of Software DevelopmentFelipe Alves
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsijcsit
 
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET Journal
 
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...ijseajournal
 
A new reverse engineering approach to
A new reverse engineering approach toA new reverse engineering approach to
A new reverse engineering approach toijseajournal
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexityeSAT Journals
 
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYA FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYcscpconf
 
A Review Of Code Reviewer Recommendation Studies Challenges And Future Direc...
A Review Of Code Reviewer Recommendation Studies  Challenges And Future Direc...A Review Of Code Reviewer Recommendation Studies  Challenges And Future Direc...
A Review Of Code Reviewer Recommendation Studies Challenges And Future Direc...Sheila Sinclair
 

Similar to Migration strategies for object oriented system to component based system (20)

An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
 An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
An Adjacent Analysis of the Parallel Programming Model Perspective: A Survey
 
Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...Implementation of reducing features to improve code change based bug predicti...
Implementation of reducing features to improve code change based bug predicti...
 
Reverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature ReviewReverse Engineering for Documenting Software Architectures, a Literature Review
Reverse Engineering for Documenting Software Architectures, a Literature Review
 
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
EMPIRICAL APPLICATION OF SIMULATED ANNEALING USING OBJECT-ORIENTED METRICS TO...
 
Automatic Text Summarization
Automatic Text SummarizationAutomatic Text Summarization
Automatic Text Summarization
 
Discreate eventsimulation idef
Discreate eventsimulation idefDiscreate eventsimulation idef
Discreate eventsimulation idef
 
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
A MODEL TO COMPARE THE DEGREE OF REFACTORING OPPORTUNITIES OF THREE PROJECTS ...
 
Fuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software ClassificationFuzzy Rule Base System for Software Classification
Fuzzy Rule Base System for Software Classification
 
Paper review
Paper reviewPaper review
Paper review
 
Performance Evaluation using Blackboard Technique in Software Architecture
Performance Evaluation using Blackboard Technique in Software ArchitecturePerformance Evaluation using Blackboard Technique in Software Architecture
Performance Evaluation using Blackboard Technique in Software Architecture
 
A Comparative Study between Agile Methods of Software Development
A Comparative Study between Agile Methods of Software DevelopmentA Comparative Study between Agile Methods of Software Development
A Comparative Study between Agile Methods of Software Development
 
Systems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature conceptsSystems variability modeling a textual model mixing class and feature concepts
Systems variability modeling a textual model mixing class and feature concepts
 
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical ApproachIRJET-  	  Multi-Document Summarization using Fuzzy and Hierarchical Approach
IRJET- Multi-Document Summarization using Fuzzy and Hierarchical Approach
 
Object oriented framework
Object oriented frameworkObject oriented framework
Object oriented framework
 
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
 
A new reverse engineering approach to
A new reverse engineering approach toA new reverse engineering approach to
A new reverse engineering approach to
 
Elements of legacy program complexity
Elements of legacy program complexityElements of legacy program complexity
Elements of legacy program complexity
 
Sub1583
Sub1583Sub1583
Sub1583
 
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITYA FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
A FRAMEWORK STUDIO FOR COMPONENT REUSABILITY
 
A Review Of Code Reviewer Recommendation Studies Challenges And Future Direc...
A Review Of Code Reviewer Recommendation Studies  Challenges And Future Direc...A Review Of Code Reviewer Recommendation Studies  Challenges And Future Direc...
A Review Of Code Reviewer Recommendation Studies Challenges And Future Direc...
 

More from ijfcstjournal

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ijfcstjournal
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGijfcstjournal
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESijfcstjournal
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...ijfcstjournal
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...ijfcstjournal
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...ijfcstjournal
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...ijfcstjournal
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGijfcstjournal
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYijfcstjournal
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSijfcstjournal
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMijfcstjournal
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSijfcstjournal
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...ijfcstjournal
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGijfcstjournal
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...ijfcstjournal
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHijfcstjournal
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSijfcstjournal
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)ijfcstjournal
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESijfcstjournal
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...ijfcstjournal
 

More from ijfcstjournal (20)

ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
ENHANCING ENGLISH WRITING SKILLS THROUGH INTERNET-PLUS TOOLS IN THE PERSPECTI...
 
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLINGA SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
A SURVEY TO REAL-TIME MESSAGE-ROUTING NETWORK SYSTEM WITH KLA MODELLING
 
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLESA COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
A COMPARATIVE ANALYSIS ON SOFTWARE ARCHITECTURE STYLES
 
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
SYSTEM ANALYSIS AND DESIGN FOR A BUSINESS DEVELOPMENT MANAGEMENT SYSTEM BASED...
 
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
AN ALGORITHM FOR SOLVING LINEAR OPTIMIZATION PROBLEMS SUBJECTED TO THE INTERS...
 
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
LBRP: A RESILIENT ENERGY HARVESTING NOISE AWARE ROUTING PROTOCOL FOR UNDER WA...
 
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
STRUCTURAL DYNAMICS AND EVOLUTION OF CAPSULE ENDOSCOPY (PILL CAMERA) TECHNOLO...
 
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDINGAN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
AN OPTIMIZED HYBRID APPROACH FOR PATH FINDING
 
EAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITYEAGRO CROP MARKETING FOR FARMING COMMUNITY
EAGRO CROP MARKETING FOR FARMING COMMUNITY
 
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHSEDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
EDGE-TENACITY IN CYCLES AND COMPLETE GRAPHS
 
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEMCOMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
COMPARATIVE STUDY OF DIFFERENT ALGORITHMS TO SOLVE N QUEENS PROBLEM
 
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMSPSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
PSTECEQL: A NOVEL EVENT QUERY LANGUAGE FOR VANET’S UNCERTAIN EVENT STREAMS
 
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON...
 
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTINGA MUTATION TESTING ANALYSIS AND REGRESSION TESTING
A MUTATION TESTING ANALYSIS AND REGRESSION TESTING
 
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
GREEN WSN- OPTIMIZATION OF ENERGY USE THROUGH REDUCTION IN COMMUNICATION WORK...
 
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCHA NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
A NEW MODEL FOR SOFTWARE COSTESTIMATION USING HARMONY SEARCH
 
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKSAGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
AGENT ENABLED MINING OF DISTRIBUTED PROTEIN DATA BANKS
 
International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)International Journal on Foundations of Computer Science & Technology (IJFCST)
International Journal on Foundations of Computer Science & Technology (IJFCST)
 
AN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMESAN INTRODUCTION TO DIGITAL CRIMES
AN INTRODUCTION TO DIGITAL CRIMES
 
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
DISTRIBUTION OF MAXIMAL CLIQUE SIZE UNDER THE WATTS-STROGATZ MODEL OF EVOLUTI...
 

Recently uploaded

22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfRagavanV2
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...soginsider
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projectssmsksolar
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 

Recently uploaded (20)

22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Unit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdfUnit 2- Effective stress & Permeability.pdf
Unit 2- Effective stress & Permeability.pdf
 
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
Hazard Identification (HAZID) vs. Hazard and Operability (HAZOP): A Comparati...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 

Migration strategies for object oriented system to component based system

  • 1. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 MIGRATION STRATEGIES FOR OBJECT ORIENTED SYSTEM TO COMPONENT BASED SYSTEM Chahat Monga1, Ms. Aman Jatain2 and Dr. Deepti Gaur2 1Research Scholar, ITM University, Gurgaon, India 2Assistant Professor, ITM University, Gurgaon, India ABSTRACT Migration of object oriented system to component based System is not an easy task, not only technically a lot of changes needs to be done but also numerous other issues needs to be kept in mind. However Component based Software development has been gaining its popularity from the past few years and has higher reusability scope. Programs built using CBSE approach are confirmed to be suitable to new environments. These days it’s a universal practice to reuse components in project to achieve better quality and to save time. So moving to CBSE from object oriented seems wise decision. Number of approaches has been introduced to implement this and each one of them has its own pros and cons. The paper focuses on the brief review on works of different authors in this area from the year 2000 to 2014. KEYWORDS Component based, clustering, graph, object oriented, reverse engineering, ROMANTIC, UML. 1. Need of Transformation Most old object oriented systems commonly known as Legacy systems did not foresee the change in speed of modern projects. Due to this they undergo a lot of limitations; e.g.: a) Large maintenance costs. b) Difficult to train employees about old methodologies c) Difficult to adapt and evolve according to new environment [5]. However looking to the other side of the coin legacy systems could not be rejected altogether. They provide vital information and functionality that has been used for years and remains crucial for smooth working of the project. Thus legacy systems can’t be dumped and at the same time could not be used as it is for a long time. That is why need is felt to reverse engineer the object oriented legacy system to convert it into components that are both reusable, maintainable and efficient to use. Such a system would combine new technology with existing one and also could be easily adapted to the future changes. Components, due to their high cohesiveness have better applicability than object-oriented and also coupling between them is low making them less complex [10]. Thus it is evident that most of the drawbacks of object-oriented system could be easily overcome by components. Rest of the paper is aligned as follows. Section 2 discuses the inclusion and exclusion criteria and also brief introductions to the selected techniques. Section 3 shows the bubble graph used to represent the studies and finally Section 4 gives conclusions and directions for future work. DOI:10.5121/ijfcst.2014.4608 79
  • 2. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 2. Inclusion and Exclusion of Search Results An extensive search on various research papers was done to retrieve the ones those contain the solution to our problem statement. For this activity a set of keywords is generated which consists of search terms that are similar to our research domain. Some of the various search terms used for data retrieval are:- 80 a) Migration b) Object oriented c) Component based d) Transformation e) Legacy f) Software development g) Reverse engineering h) Reengineering These search terms were combined with Boolean expression in the form of A or B,A or C, A or B or C ,D or B or C, A and E and C and F etc. which provided a list of research papers related to our topic of interest. Number of research papers retrieved was enormous so we included only those studies which presented fully implemented techniques for transformation of OOS to CBS. Studies which were not fully implemented or only provided theoretical basis were excluded in this paper. The studies that were published before year 2000 were also excluded. Also the studies which represented similar techniques only the most significant one is included and rest are excluded. The table 1 shows our detailed search strategy:- TABLE: 2.1. Search Strategy Publishing 2000 to 2014 Browsing libraries and sites IEEExplore, ScienceDirect, Springer, ACM Digital Library, Google Items searched Conference and journal papers Publication Language English Searched for Full text Using the above inclusion and exclusion criteria the following papers (table 2) are found to be fit for our purpose and are discussed in subsequent sections year wise. [TABLE 2] TABLE: 2.2. Techniques and Tools Year Author(s) Methodology Tool 2003 Eunjoo Lee et al CLUSTERING - 2005 Suk Kyung Shin & Soo Dong Kim REFACTORING - 2005 Hironori Washizakia & Yoshiaki Fukazawab FORMAL METHODS Rigi, Refactorit 2008 Sylvain et al. UML Diag, CLUSTERING -
  • 3. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 81 2008 Hassan Mathkour et al. ROMANTIC Code profiling tool, Sparx, ArgoUML 2009 S.K.Mishra D.S.Kushwaha & A.K.Misra CORE JOT, Rational Rose, NUnit 2011 Dan Li et al. UML Diag Rcose CASE tool, QVTR-XSLT, 2012 Simon Allier et al. Reverse engineering Tracer, CBAExtractor, CBAToOSGi 2012 Selim Kebir et al. Reverse engineering, CLUSTERING - 2.1. Lee et al (2003) This paper was presented by Lee et al. in the year 2003[1]. They divided the whole process into 2 sections. In first section they used relationship like inheritance and composition etc to create the basic components. In second step they refine this component system generated using software metrics like cohesion, connectivity strength etc [3]. 1) Basic component creation:- under this section four steps were used to create an intermediate product i.e. component system steps involved are 1) functional units are created from the classes having composite relationship 2) unnecessary and redundant classes are removed. 3) Classes having inheritance relationship between them are put into same component as they have more strong cohesion. 4) Once again we will check for needless classes that were not called by any outside class or method and discard those classes. The resultant of these steps would create an intermediate component system.2) In addition to the component System that is generated in previous steps, connectivity strength, component complexity and cohesion are also defined. A clustering algorithm is them applied to cluster the similar components into one big component. Usually hierarchal clustering is employed. The final result will provide the components that are generated from initial object oriented code. The whole procedure is shown in figure 1. Figure 2.1 Steps involved in Lee et. al methodology
  • 4. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 2.2. Washizaki et al (2005) Given by Washizaki and Fukazawa in 2005 it is based on REFACTORING technique called “extract component”[3]. The process starts by defining a CRG (class relationship graph), the main thing to be considered while creating CRG is that only the classes created by user become part of CRG, java core classes do not participate in the process. Next a clustering algorithm is generated to find clusters in the object oriented code, clusters are basically the independent nodes that do not have any link outside the cluster. For determination of clusters a term called “reachability” is defined. The paper also presents an extraction algorithm which supports clustering and the retrieval of desired components from those clusters. After the components have been created the part outside the components is refactored so that these freshly extracted components could be used independently and any situation of ambiguity does not arise. This refactoring is named “extract component” by the authors and contains about 17 steps [4] after which the output are independent components which could be reused frequently. To automate the whole process the authors also created an automation component extraction system in java so that instead of performing the transformation in batches it could be done in one go. Figure 2 clearly depicts the main steps involved in the process. 82 Figure 2.2 Steps involved in Washizaki et al methodology 2.3 Suk Kyung Shin et al (2005) This method was given by Suk Kyung Shin and Soo Dong Kim in the year 2005[3]. This approach basically utilized formal method specification / object z technology for transformation. The paper talks about the meta model of object oriented design after which the meta model modal and finally a set of rules for migration of formal spec of OOD to formal spec. of CBD are given. Using these rules the final transformation is made. The final components could be used in EJB, CORBA or .NET. 2.4 Mathkour et al (2008) This technique is given by Mathkour et al. [4] in 2008 on the basis of UML diagrams and clustered graph generation. They used JAVA language as their base to make the entire system platform independent. UML unified modeling language was utilized for specification work and XMI (XML based interchange language) was used to exchange file formats as it supported by almost all UML tools. The main phases of transformation involved in the conversion of object oriented to component based are depicted in Figure 3:-
  • 5. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 83 Figure 2.3. Steps involved in Mathkour et, al methodology 2.5. Sylvain et al. (2008) This approach was proposed by Sylvain and Mourad in 2008 using ROMANTIC APPROACH [5]. This approach was quite different from previous works of authors as it included architectural semantics and also reduces the need of human expertise which further helped to reduce overall cost of the whole process. Sylvain and Mourad used two principles as their guide through the whole process. The principles used by them are diagrammatically represented in Figure 4. Principle 1 used in Romantic approach that is architecture extraction starts by mapping object concepts to architectural concepts like mapping classes, packages etc to components, interfaces, connectors etc. and thereby generating a correspondence model, using this model they partitioned system classes. And the elements under this partition are called “shapes” representing components. Thus actual requirement was to assimilate these components to shape. These shapes form the architecture. Principle 2 validates the previously generated architecture and also instantiate it. Four guides were considered for this purpose  Ability to adapt to deployment hardware.  Correct semantics.  Quality properties.  Adhere to documentation constraints. And finally the semantics of architecture are checked for correctness and this leaves us with required model. Figure 2.4 Steps involved in Sylvain et, al methodology 2.6. Mishra et al. (2009) This technique is presented by mishra et al in 2009 and named it CORE [6]. Component oriented reverse engineering creates reusable software components by using reverse engineering. A tool named rational rose is used to reverse engineer the system for identifying the relevant use cases for the system. These use cases form the base for generation of component structure. Once the use cases are identified a CRUD matrix (create or read or update or delete) is created which
  • 6. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 represents structural relationships. As a final step to extract components we apply some clustering techniques according to dependency relationship. Final reusable components are stored in component bank after testing. 2.7. Dan Li et al. (2009) This technique was given by Dan Li et al. in 2011 in their paper “Interactive Transformations from Object-Oriented Models to Component-Based Models” [7]. The technique makes use of UML diagrams like class diagram and sequence diagrams for the transformation process. First the extraction of object sequence diagram is done, then transformation is applied to object sequence diagram to convert them into component sequence diagram using a validity tool called QVTR-XSLT. At every step a set of object lifelines are chosen that the user intends to change into component and then some checks are made using algorithms to ensure that selected lifeline would qualify as component lifeline [figure 5]. With every component lifeline the corresponding component is sent to component diagram and a protocol is generated for it. After all the object lifelines have been processed we get our desired components extracted from object-oriented code. 84 Figure 2.5. Steps involved in Dan Li et, al methodology 2.8. Simon Allier et al. (2012) Simon Allier et al. proposed this methodology in 2012 which converts object oriented applications to component oriented applications [8]. The whole process revolves around two steps: 1) identifying components 2) identifying required interfaces. In the first step that is component identification we first determine the “core components”. Next the missing classes are added by using static call graph and finally manual refinement of generated classes is done. After this process we over we are left with the main components which creates component based architecture. Further to complete the transformation component based architecture is mapped to component oriented architecture using object oriented concepts [Figure 6]. Figure 2.6. Steps involved in Simon Allier et, al methodology
  • 7. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 2.9. Selim kebir et al. (2012) It is a component identification methodology proposed by selim kebir et, al in 2012[9]. This methodology uses the concept of object oriented language and clustering to convert object oriented application into component oriented application. At first a mapping model to map object concepts to component concepts is proposed. This model also evaluates the semantic correctness of the components. Next the interfaces are identified and a clustering algorithm is utilized for grouping the relevant components together and as a last step everything is documented. The authors applied the technique on two systems 1) JDOM 2) Apache HTTP. This methodology seemed quite similar to the one proposed by Simon Allier et, al discussed above. 3. Bubble Graph The techniques extracted from above discussion were analyzed to answer various research questions, for this purpose bubble plot is utilized to characterize and represent the studies. In Figure.7 the X axis denoted the publication year of the studies i.e.2003, 2005, 2008 etc and y axis denotes the research strategy adopted in them like UML, ROMANTIC, REVERSE Eng. etc. The intersection of the axis shows bubbles with contains the reference number of the studies. The bubble graph compares and diagrammatically represents which technology is most suited and widely used for transformation purpose. The size of the bubble is according to the number of studies covered by that bubble. We have total nine techniques to be compared so relative percentage occurrence of techniques is CLUSTERING=22.2%, FORMAL METHOD=11.1%, REVERSE ENG / REFACTORING=44.4%, UML= 11.1%, ROMANTIC=11.1%. These figures show that the technique that is most widely utilized is reverse engineering or refactoring. 85 Figure: 3.1. Bubble graph
  • 8. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 4. CONCLUSION and FUTURE SCOPE Component based software development has emerged as a powerful technique and has been widely adopted these days in most of the organizations for software development. In this paper we reviewed various technologies that are in practice to convert object oriented legacy applications to component oriented applications, For instance nine techniques that have been practically implemented are discussed.. Many approaches have been introduced so far and the study is still evolving. A brief introduction and working mechanism is also provided with each methodology and in last a comparative analysis is done using bubble graph as an overall extract of the research. Through this paper we found five important techniques for transforming object oriented system to component based system. 86 1) Reverse engineering/refactoring 2) Clustering 3) Formal methods 4) UML approach 5) Romantic Also it is observed that most of the techniques employed for this purpose uses reverse engineering/refactoring approach for the transformation. There is a lot of future scope and chance of evolution in this field, so far a number of techniques have been offered with their own pros and limitations so in future a new technology could emerge as a concrete benchmark for this transformation and system could also be automated. REFERENCES [1] Enjoy Lee, Byungjeong Lee, Woochang Shin, Chisu Wu, “A Reengineering Process for Migrating from an Object-oriented Legacy System to a Component-based System”, Computer Software and Applications Conference, Page(s):336 – 341, (2003). [2] Suk Kyung Shin Soo Dong Kim, “A Method to Transform Object-Oriented Design into Component- Based Design using Object-Z”, Software Engineering Research, Management and Applications,Page(s):274 – 281, (2005). [3] Hironori WashizakiYoshiaki Fukazawa, “A technique for automatic component extraction from object-oriented programs by refactoring”, Science of Computer Programming, Pages 99–116, (2005). [4] Sylvain Chardigny, Mourad Oussalah,” Extraction of Component-Based Architecture From Object- Oriented Systems”, Software Architecture,Page(s):285 – 288, (2008). [5] Hassan Mathkour, AmeurTouir, Hind Hakami, Ghazy Assassa, “On the transformation of Object Oriented-based Systems to Component-based Systems”, Signal Image Technology and Internet Based Systems,Page(s):11 – 15, (2008). [6] S.K.Mishra, D.S.Kushwaha, A.K.Misra, “Creating Reusable Software Component from Object- Oriented Legacy System through Reverse Engineering”, JOURNAL OF OBJECT TECHNOLOGY, Vol. 8, No. 5,(2009). [7] Dan Li, Xiaoshan Li, Zhiming Liu and Volker Stolz, “Interactive Transformations from Object- OrientedModels to Component-Based Models”, UNU-IIST Report No. 451, (2011). [8] Simon Allier, Salah Sadou, Houari Sahraoui, R´egisFleurquin, “From Object-Oriented Applications to Component-Oriented Applications via Component-Oriented Architecture”, Software Architecture (WICSA),Page(s):214 – 223, (2012). [9] Selim Kebir, Sylvain Chardigny, Allaoua Chaoui, “Quality-Centric Approach for Software Component Identification from Object-Oriented Code”, Software Architecture (WICSA) and European Conference on Software Architecture (ECSA),Page(s):181 – 190, (2012). [10] Jong Kook Lee, “Component Identification Method with Coupling and Cohesion”, Software Engineering Conference APSEC, Page(s):79 – 86, (2001).
  • 9. International Journal in Foundations of Computer Science & Technology (IJFCST), Vol.4, No.6, November 2014 [11] Michele Lanza, “Object-Oriented Reverse Engineering Coarse-grained, Fine-grained, and Evolutionary Software Visualization”, Leiter der Arbeit: Prof. Dr. S. Ducasse, Prof. Dr. O. Nierstrasz Institut f ¨ ur Informatik und angewandte Mathematik, 2003. [12] Miguel A. Serrano, Doris L. Carver and Carlos Montes de Oca, “Reengineering legacy systems for 87 distributed environments”, Journal of System Software, Elsevier 64 (2002) 37–55, 2002. [13] Philippe Dugerdil,“Using RUP to reverse-engineer a legacy system”, IBM Journal, September 2006. [14] Philip Newcomb and Randy A. Doblar, “Automated Transformation of legacy system”, www.stsc.hill.at.mil,December 2001.