The document describes the design and development of a Business Rules Management System (BRMS) using the ATL and Eclipse Sirius frameworks. It proposes a new "Target Ecore meta model" to improve the structure and management of business rules. The system allows business rules to be modeled and transformed from their current format into an object-oriented format using ATL model transformations. This provides improved modularity, scalability and extensibility of the rules compared to the original structure. A case study demonstrates transforming an example business rule from a software package based on the proposed approach.
The Role of the Enterprise Architect in Business Process ReengineeringRichard Freggi
Business Process Reengineering is often a challenging undertaking. This paper is a case study, sharing practical experience of how the enterprise architect can help in three ways:
• Provide a common language allowing different organizations, consultants and IT teams to communicate effectively
• Set the right level of abstraction to facilitate analysis and solution of complex questions
• Reconcile user’s wants and needs with the capabilities and constraints of IT systems
Reference is made to the Zachman Framework, especially the columns for “Data”, “Function” and “People”; and how these columns can be used to interact with stakeholders using UML (Unified Modeling Language).
Using Model-Driven Engineering for Decision Support Systems Modelling, Implem...CSCJournals
Following the principle of everything is object, software development engineering has moved towards the principle of everything is model, through Model Driven Engineering (MDE). Its implementation is based on models and their successive transformations, which allow starting from the requirements specification to the code’s implementation. This engineering is used in the development of information systems, including Decision-Support Systems (DSS). Here we use MDE to propose an DSS development approach, using the Multidimensional Canonical Partitioning (MCP) design approach and a design pattern. We also use model’s transformation in order to obtain not only implementation codes, but also data warehouse feeds.
This document discusses the use of Model-Driven Architecture (MDA) and model transformations in software product lines (SPL). It begins by introducing SPLs and MDA. SPLs aim to increase productivity by leveraging commonalities between related products. MDA uses platform-independent and platform-specific models with transformations between them. The document then explores combining MDA and SPL approaches through the Modden framework and Baseline-Oriented Modeling. Modden develops reusable core assets through domain and application engineering processes with MDA. Baseline-Oriented Modeling produces expert systems as PRISMA architectural models from SPLs using MDA.
This document discusses implementing the MAP framework within the GERAM framework. MAP defines the roles and deliverables of a software architect, while GERAM is a meta-framework for enterprise architectures. The document argues that by mapping MAP to GERAM, it provides a common ontology for software architects across different enterprise architecture and software development frameworks. It describes how MAP and GERAM can be implemented using three layers (M0-M3), with MAP defining the meta-ontological concepts and processes that can then be customized for specific companies or software processes.
This document discusses various techniques for business process modeling, including flow charts, Gantt charts, PERT diagrams, data flow diagrams, control flow diagrams, functional flow block diagrams, Petri nets, IDEF, UML, BPMN, XPDL, Wf-XML, and BPEL. It provides brief descriptions of each technique and notes their purposes and applications in business process modeling and systems development.
MASRML - A DOMAIN-SPECIFIC MODELING LANGUAGE FOR MULTI-AGENT SYSTEMS REQUIREM...ijseajournal
MASRML – Multi-Agent Systems Requirements Modeling Language – is a UML-based Domain-Specific Modeling Language conceived for the requirements modeling in multi-agent system projects. Along this work the extended metamodel developed to support the language is described and the applicability of this DSML in the requirements identification of a multi-agent system is demonstrated using the new mechanisms produced to model specific functional requirements for this kind of system. This work also includes how the DSML was validated and the impressions collected during the validations.
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...IJERA Editor
As a tool to exploit economies of scale, Software as a Service cloud models promote Multi-Tenancy which is the notion of sharing instances among a large group of tenants. However, Multi-Tenancy only satisfies requirements that are common to all tenants as well as the fact that tenants themselves hesitate about sharing. In a try to solve this problem, the present paper propose a User-Aware approach for Software as a Service models using Rich-Variant Components. The main contribution of this approach is a framework summarized in a graphbased algorithm enabling deduction of an optimal distribution of instances on application's tenants. To illustrate and evaluate the framework, the approach is applied on a Software as a Service Application for private school management
This chapter discusses systems design and the key activities involved. It begins by contrasting systems design with systems analysis, noting that analysis determines requirements while design provides the blueprint for how the system will be implemented. The chapter then covers major design activities such as modeling the environment, application components, user interface, database, and software classes. It also discusses designing system controls and security methods to ensure data integrity and protect the system from threats. The goal of systems design is to bridge the gap between requirements determined in analysis and the actual system implementation.
The Role of the Enterprise Architect in Business Process ReengineeringRichard Freggi
Business Process Reengineering is often a challenging undertaking. This paper is a case study, sharing practical experience of how the enterprise architect can help in three ways:
• Provide a common language allowing different organizations, consultants and IT teams to communicate effectively
• Set the right level of abstraction to facilitate analysis and solution of complex questions
• Reconcile user’s wants and needs with the capabilities and constraints of IT systems
Reference is made to the Zachman Framework, especially the columns for “Data”, “Function” and “People”; and how these columns can be used to interact with stakeholders using UML (Unified Modeling Language).
Using Model-Driven Engineering for Decision Support Systems Modelling, Implem...CSCJournals
Following the principle of everything is object, software development engineering has moved towards the principle of everything is model, through Model Driven Engineering (MDE). Its implementation is based on models and their successive transformations, which allow starting from the requirements specification to the code’s implementation. This engineering is used in the development of information systems, including Decision-Support Systems (DSS). Here we use MDE to propose an DSS development approach, using the Multidimensional Canonical Partitioning (MCP) design approach and a design pattern. We also use model’s transformation in order to obtain not only implementation codes, but also data warehouse feeds.
This document discusses the use of Model-Driven Architecture (MDA) and model transformations in software product lines (SPL). It begins by introducing SPLs and MDA. SPLs aim to increase productivity by leveraging commonalities between related products. MDA uses platform-independent and platform-specific models with transformations between them. The document then explores combining MDA and SPL approaches through the Modden framework and Baseline-Oriented Modeling. Modden develops reusable core assets through domain and application engineering processes with MDA. Baseline-Oriented Modeling produces expert systems as PRISMA architectural models from SPLs using MDA.
This document discusses implementing the MAP framework within the GERAM framework. MAP defines the roles and deliverables of a software architect, while GERAM is a meta-framework for enterprise architectures. The document argues that by mapping MAP to GERAM, it provides a common ontology for software architects across different enterprise architecture and software development frameworks. It describes how MAP and GERAM can be implemented using three layers (M0-M3), with MAP defining the meta-ontological concepts and processes that can then be customized for specific companies or software processes.
This document discusses various techniques for business process modeling, including flow charts, Gantt charts, PERT diagrams, data flow diagrams, control flow diagrams, functional flow block diagrams, Petri nets, IDEF, UML, BPMN, XPDL, Wf-XML, and BPEL. It provides brief descriptions of each technique and notes their purposes and applications in business process modeling and systems development.
MASRML - A DOMAIN-SPECIFIC MODELING LANGUAGE FOR MULTI-AGENT SYSTEMS REQUIREM...ijseajournal
MASRML – Multi-Agent Systems Requirements Modeling Language – is a UML-based Domain-Specific Modeling Language conceived for the requirements modeling in multi-agent system projects. Along this work the extended metamodel developed to support the language is described and the applicability of this DSML in the requirements identification of a multi-agent system is demonstrated using the new mechanisms produced to model specific functional requirements for this kind of system. This work also includes how the DSML was validated and the impressions collected during the validations.
Graph-Based Algorithm for a User-Aware SaaS Approach: Computing Optimal Distr...IJERA Editor
As a tool to exploit economies of scale, Software as a Service cloud models promote Multi-Tenancy which is the notion of sharing instances among a large group of tenants. However, Multi-Tenancy only satisfies requirements that are common to all tenants as well as the fact that tenants themselves hesitate about sharing. In a try to solve this problem, the present paper propose a User-Aware approach for Software as a Service models using Rich-Variant Components. The main contribution of this approach is a framework summarized in a graphbased algorithm enabling deduction of an optimal distribution of instances on application's tenants. To illustrate and evaluate the framework, the approach is applied on a Software as a Service Application for private school management
This chapter discusses systems design and the key activities involved. It begins by contrasting systems design with systems analysis, noting that analysis determines requirements while design provides the blueprint for how the system will be implemented. The chapter then covers major design activities such as modeling the environment, application components, user interface, database, and software classes. It also discusses designing system controls and security methods to ensure data integrity and protect the system from threats. The goal of systems design is to bridge the gap between requirements determined in analysis and the actual system implementation.
Andrew p. mc mahon machine learning engineering with python- manage the pro...DenisFlavius
This document provides an introduction to Machine Learning Engineering with Python. It discusses managing the production life cycle of machine learning models using MLOps with practical examples. The book covers topics like assembling an ML engineering team, example ML system designs for different use cases, the machine learning development process, engineering models for consumption, deployment patterns and tools, and scaling ML systems. It aims to help readers navigate the challenges of taking ML to production and applying MLOps practices.
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
The present business network infrastructure is quickly varying with latest servers, services, connections,
and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and
wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent
evolution of IT infrastructure, organizations at present require more numerous vulnerability assessments.
In this paper new approach the Unified process for Network vulnerability Assessments hereafter called as
a unified NVA is proposed for network vulnerability assessment derived from Unified Software
Development Process or Unified Process, it is a popular iterative and incremental software development
process framework.
This chapter discusses domain modeling which involves identifying the key entities ("things") in the problem domain and modeling their relationships. It covers identifying domain classes through brainstorming and identifying nouns. Domain classes have attributes and attribute values. Relationships between classes are also modeled. The chapter discusses Entity-Relationship Diagrams (ERDs) and UML domain class diagrams as two techniques for modeling the domain. It provides examples of modeling customers, orders, and other domain information for an online ordering system as well as examples involving universities, banks, and bands/concerts.
The document summarizes the layered architecture pattern, one of the most common software architecture patterns. It describes the key aspects of the pattern, including how it organizes components into horizontal layers with specific roles and responsibilities. Each layer forms an abstraction and the layers are closed, meaning requests must pass through each lower layer. This isolates changes and keeps layers independent. The document provides an example of how a request flows through the layers and considerations for using this pattern.
This document discusses an approach to assembling software products using a product line approach. It presents a separation continuum that separates concerns both vertically (from abstract to implementation layers) and horizontally (between human-facing and machine-facing aspects). An application assembly approach is then discussed where a product line architecture is tied to this separation continuum, allowing high productivity by reusing pre-built software assets to realize new product lines. The approach aims to facilitate experimentation in building large-scale application assembly capabilities.
This chapter discusses domain modeling which involves identifying the key entities ("things") in the problem domain and modeling their relationships. It covers identifying domain classes through brainstorming and identifying nouns. Domain classes have attributes and attribute values. Relationships between classes are also identified. Entity-relationship diagrams and UML class diagrams are introduced to visually model the domain classes and their relationships. Examples of modeling customers, orders, and other domain concepts are provided and discussed.
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...Iver Band
In this paper, we describe an innovative approach for aligning the
business layer and the application layer of ArchiMate to ensure
that applications manage access rights consistently with enterprise
goals and risk tolerances. The alignment is realized by using the
responsibility of the employees, which we model using ReMoLa.
The main focus of the alignment targets the definition and the
assignment of the access rights needed by the employees
according to business specification. The approach is illustrated
and validated with a case study in a municipal hospital in
Luxembourg.
This chapter discusses identifying and modeling functional requirements through use cases and user stories. It describes two techniques for identifying use cases: the user goal technique which identifies user goals and tasks, and the event decomposition technique which identifies system responses to different event types. The chapter also covers modeling use cases with descriptions, diagrams, and relationships to define the system functions and actors.
Process perspective is valuable, but far too much time is wasted in detailed process modelling with too little benefit. Presents an approach that delivers high benefits for less effort.
Requirements engineering in the rational unified processJorge Baque
The document discusses requirements engineering in the Rational Unified Process (RUP). It describes how RUP incorporates requirements as a core discipline. It captures requirements iteratively throughout the software development lifecycle. The document focuses on the "Business Modeling" and "Requirements" disciplines within RUP. Business Modeling aims to understand the system context and domain. It uses modeling techniques like domain modeling with UML class diagrams. The Requirements discipline collects and maintains functional and non-functional requirements.
This document discusses concurrent development of formal models and software implementations in an evolutionary development process. It proposes using formal models, such as those written in B or Z, to support iterative software development approaches. The document describes benefits like animation and model-checking that formal models enable through tool support. It then presents two case studies on e-business applications where teams attempted to develop models and implementations concurrently and evolve them together. The case studies aimed to evaluate how well formal modeling techniques could be integrated into an evolutionary development process.
Framework for developed simple architecture enterprise fdsaecsandit
In This article presents a framework for develop de Architecture enterprise based on the
articulation of emerging paradigms for architecture development of information enterprise [1].
The first one comes from the agile methods and it is inspired on the Scrum model which aim to
simplify the complex task of developing a quality software, the second the processes models
whose are oriented the development of Architectures Enterprise as Zachman and TOGAF in a
paradigm of the Model Driven and principles de reference de architecture de Software form the
paradigms Generation (MDG), these approaches are integrated eventually leading to the
formulation and presentation of an framework for developed simple architecture enterprise –
FDSAE- The goal is to present a simple, portable, understandable terms enabling, modeling
and design business information architecture in any organizational environment, in addition to
this, there are important aspects related to the unified Modeling Language UML 2.5 and the
Business Process Modeling BPMn that become tools to obtain the products in the FDSAE
Framework, This framework is an improved version of Framework MADAIKE [2] developed by
the same authors.
The document discusses object-oriented analysis and design concepts like refinement, extensibility, and design for reusability. It provides details on different types of extensibility like white-box, black-box, and gray-box extensibility. It also discusses object-oriented database management systems and compares relational databases with object-oriented databases.
PHP modernization approach generating KDM models from PHP legacy codejournalBEEI
With the rise of new web technologies such as web 2.0, Jquery, Bootstrap. Modernizing legacy web systems to benefit from the advantages of the new technologies is more and more relevant. The migration of a system from an environment to another is a time and effort consuming process, it involves a complete rewrite of the application adapted to the target platform. To realize this migration in an automated and standardized way, many approaches have tried to define standardized engineering processes. Architecture Driven Modernization (ADM) defines an approach to standardize and automate the reengineering process. We defined an ADM approach to represent PHP web applications in the highest level of abstraction models. To do this, we have used software artifacts as a entry point . This paper describes the extraction process, which permits discovering and understanding of the legacy system. And generate models to represent the system in an abstract way.
This document provides an outline for a lecture on software design and architecture. It discusses key concepts like classes and objects, visibility, class diagrams, sequence diagrams, and design patterns. The document also includes disclaimers about the source of the material and its intended educational use.
The document discusses IT6701 - Information Management, which covers topics such as database modeling, management and development, information governance, and information architecture. It describes objectives, units, database design, data modeling, entity relationship models, normalization, Java database connectivity, stored procedures, and big data technologies including Hadoop, HDFS, MapReduce, Hive and enhancements.
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESijwscjournal
Enterprise Modelling with Web portal integration architecture requires investment of advanced architectural thinking into definition of services before any development of services or service consumers can begin. Service Oriented Architecture (SOA) is gradually replacing monolithic architecture as the premier design principle for new business applications with its inherently systematic nature and capability. Earlier efforts of notable styles of SOA such as CORBA and XATMI have failed to be adopted as main stream projects because of demanding design process requirement with sense-making activities and even have been residing with the modern SOA or Web services middleware. In this paper it is aimed to incorporate sensemaking design activities with the proposed semantic web service based architecture. This paper tries to tackle the above problem by proposing a service-oriented architecture for web data and service integration. A gen-Spec architectural pattern has been suggested and adopted in order to tackle the problem.
Firstly, it proposes a service-oriented platform independent architecture and Secondly, it presents a specific deployment of such architecture for data and service integration on the web using semantic web services implemented with the WSMO (Web Services Modeling Ontology).
A Methodology For Large-Scale E-Business Project ManagementApril Smith
This document proposes an environment-based methodology for managing large-scale e-business projects. The methodology defines six working environments - development, integration, pre-production, production, demonstration, and software repository - that represent increasing stages of stability for a software product. It describes the tasks and migration processes between environments. The methodology aims to systematically guide e-business project management according to an organization's needs and resources.
The document discusses extending the existing SRML metamodel to implement additional properties of interaction protocols and external policies. The main tasks are to define grammars for coordination and external policies, and extend the metamodel using the Xtext grammar. This will allow users to edit models and view changes in the SRML editor. The document also discusses transforming SRML models to BPEL for business processes, and improving the graphical representation of SRML models in Eclipse.
Service Oriented & Model Driven ArchitecturesPankaj Saharan
The document discusses a seminar on combining Service-Oriented Architectures (SOA) and Model Driven Architectures (MDA). It first provides an overview of SOA and MDA individually, including their goals and characteristics. It then analyzes the similarities and differences between the two approaches when combining them. Some benefits are improved productivity and lower costs, while challenges include defining models and transformations between levels of abstraction. Overall, the document concludes that combining SOA with MDA's model-driven approach can provide benefits like business agility if key issues like semantics and metadata modeling are adequately addressed.
This document proposes an extension of the ArchiMate enterprise architecture framework to model multi-agent systems for critical infrastructure governance. The authors develop a responsibility-driven policy concept and metamodel layers to represent agent behavior and organizational policies across technical, application, and organizational layers. The approach is illustrated through a case study of a financial transaction processing system.
The document discusses adopting a "two-speed IT" approach for digital transformation, where core systems operate at a steady pace of incremental changes while new digital capabilities are rapidly developed and updated. This allows companies to maintain stable operations while innovating through new digital products and services. The role of the CIO is to drive this change by implementing practices like separating infrastructure for new and legacy systems and establishing centers of excellence for different speeds of development.
Andrew p. mc mahon machine learning engineering with python- manage the pro...DenisFlavius
This document provides an introduction to Machine Learning Engineering with Python. It discusses managing the production life cycle of machine learning models using MLOps with practical examples. The book covers topics like assembling an ML engineering team, example ML system designs for different use cases, the machine learning development process, engineering models for consumption, deployment patterns and tools, and scaling ML systems. It aims to help readers navigate the challenges of taking ML to production and applying MLOps practices.
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
The present business network infrastructure is quickly varying with latest servers, services, connections,
and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and
wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent
evolution of IT infrastructure, organizations at present require more numerous vulnerability assessments.
In this paper new approach the Unified process for Network vulnerability Assessments hereafter called as
a unified NVA is proposed for network vulnerability assessment derived from Unified Software
Development Process or Unified Process, it is a popular iterative and incremental software development
process framework.
This chapter discusses domain modeling which involves identifying the key entities ("things") in the problem domain and modeling their relationships. It covers identifying domain classes through brainstorming and identifying nouns. Domain classes have attributes and attribute values. Relationships between classes are also modeled. The chapter discusses Entity-Relationship Diagrams (ERDs) and UML domain class diagrams as two techniques for modeling the domain. It provides examples of modeling customers, orders, and other domain information for an online ordering system as well as examples involving universities, banks, and bands/concerts.
The document summarizes the layered architecture pattern, one of the most common software architecture patterns. It describes the key aspects of the pattern, including how it organizes components into horizontal layers with specific roles and responsibilities. Each layer forms an abstraction and the layers are closed, meaning requests must pass through each lower layer. This isolates changes and keeps layers independent. The document provides an example of how a request flows through the layers and considerations for using this pattern.
This document discusses an approach to assembling software products using a product line approach. It presents a separation continuum that separates concerns both vertically (from abstract to implementation layers) and horizontally (between human-facing and machine-facing aspects). An application assembly approach is then discussed where a product line architecture is tied to this separation continuum, allowing high productivity by reusing pre-built software assets to realize new product lines. The approach aims to facilitate experimentation in building large-scale application assembly capabilities.
This chapter discusses domain modeling which involves identifying the key entities ("things") in the problem domain and modeling their relationships. It covers identifying domain classes through brainstorming and identifying nouns. Domain classes have attributes and attribute values. Relationships between classes are also identified. Entity-relationship diagrams and UML class diagrams are introduced to visually model the domain classes and their relationships. Examples of modeling customers, orders, and other domain concepts are provided and discussed.
Enhancing the ArchiMate® Standard with a Responsibility Modeling Language for...Iver Band
In this paper, we describe an innovative approach for aligning the
business layer and the application layer of ArchiMate to ensure
that applications manage access rights consistently with enterprise
goals and risk tolerances. The alignment is realized by using the
responsibility of the employees, which we model using ReMoLa.
The main focus of the alignment targets the definition and the
assignment of the access rights needed by the employees
according to business specification. The approach is illustrated
and validated with a case study in a municipal hospital in
Luxembourg.
This chapter discusses identifying and modeling functional requirements through use cases and user stories. It describes two techniques for identifying use cases: the user goal technique which identifies user goals and tasks, and the event decomposition technique which identifies system responses to different event types. The chapter also covers modeling use cases with descriptions, diagrams, and relationships to define the system functions and actors.
Process perspective is valuable, but far too much time is wasted in detailed process modelling with too little benefit. Presents an approach that delivers high benefits for less effort.
Requirements engineering in the rational unified processJorge Baque
The document discusses requirements engineering in the Rational Unified Process (RUP). It describes how RUP incorporates requirements as a core discipline. It captures requirements iteratively throughout the software development lifecycle. The document focuses on the "Business Modeling" and "Requirements" disciplines within RUP. Business Modeling aims to understand the system context and domain. It uses modeling techniques like domain modeling with UML class diagrams. The Requirements discipline collects and maintains functional and non-functional requirements.
This document discusses concurrent development of formal models and software implementations in an evolutionary development process. It proposes using formal models, such as those written in B or Z, to support iterative software development approaches. The document describes benefits like animation and model-checking that formal models enable through tool support. It then presents two case studies on e-business applications where teams attempted to develop models and implementations concurrently and evolve them together. The case studies aimed to evaluate how well formal modeling techniques could be integrated into an evolutionary development process.
Framework for developed simple architecture enterprise fdsaecsandit
In This article presents a framework for develop de Architecture enterprise based on the
articulation of emerging paradigms for architecture development of information enterprise [1].
The first one comes from the agile methods and it is inspired on the Scrum model which aim to
simplify the complex task of developing a quality software, the second the processes models
whose are oriented the development of Architectures Enterprise as Zachman and TOGAF in a
paradigm of the Model Driven and principles de reference de architecture de Software form the
paradigms Generation (MDG), these approaches are integrated eventually leading to the
formulation and presentation of an framework for developed simple architecture enterprise –
FDSAE- The goal is to present a simple, portable, understandable terms enabling, modeling
and design business information architecture in any organizational environment, in addition to
this, there are important aspects related to the unified Modeling Language UML 2.5 and the
Business Process Modeling BPMn that become tools to obtain the products in the FDSAE
Framework, This framework is an improved version of Framework MADAIKE [2] developed by
the same authors.
The document discusses object-oriented analysis and design concepts like refinement, extensibility, and design for reusability. It provides details on different types of extensibility like white-box, black-box, and gray-box extensibility. It also discusses object-oriented database management systems and compares relational databases with object-oriented databases.
PHP modernization approach generating KDM models from PHP legacy codejournalBEEI
With the rise of new web technologies such as web 2.0, Jquery, Bootstrap. Modernizing legacy web systems to benefit from the advantages of the new technologies is more and more relevant. The migration of a system from an environment to another is a time and effort consuming process, it involves a complete rewrite of the application adapted to the target platform. To realize this migration in an automated and standardized way, many approaches have tried to define standardized engineering processes. Architecture Driven Modernization (ADM) defines an approach to standardize and automate the reengineering process. We defined an ADM approach to represent PHP web applications in the highest level of abstraction models. To do this, we have used software artifacts as a entry point . This paper describes the extraction process, which permits discovering and understanding of the legacy system. And generate models to represent the system in an abstract way.
This document provides an outline for a lecture on software design and architecture. It discusses key concepts like classes and objects, visibility, class diagrams, sequence diagrams, and design patterns. The document also includes disclaimers about the source of the material and its intended educational use.
The document discusses IT6701 - Information Management, which covers topics such as database modeling, management and development, information governance, and information architecture. It describes objectives, units, database design, data modeling, entity relationship models, normalization, Java database connectivity, stored procedures, and big data technologies including Hadoop, HDFS, MapReduce, Hive and enhancements.
WEB PORTAL INTEGRATION ARCHITECTURE APPROACHESijwscjournal
Enterprise Modelling with Web portal integration architecture requires investment of advanced architectural thinking into definition of services before any development of services or service consumers can begin. Service Oriented Architecture (SOA) is gradually replacing monolithic architecture as the premier design principle for new business applications with its inherently systematic nature and capability. Earlier efforts of notable styles of SOA such as CORBA and XATMI have failed to be adopted as main stream projects because of demanding design process requirement with sense-making activities and even have been residing with the modern SOA or Web services middleware. In this paper it is aimed to incorporate sensemaking design activities with the proposed semantic web service based architecture. This paper tries to tackle the above problem by proposing a service-oriented architecture for web data and service integration. A gen-Spec architectural pattern has been suggested and adopted in order to tackle the problem.
Firstly, it proposes a service-oriented platform independent architecture and Secondly, it presents a specific deployment of such architecture for data and service integration on the web using semantic web services implemented with the WSMO (Web Services Modeling Ontology).
A Methodology For Large-Scale E-Business Project ManagementApril Smith
This document proposes an environment-based methodology for managing large-scale e-business projects. The methodology defines six working environments - development, integration, pre-production, production, demonstration, and software repository - that represent increasing stages of stability for a software product. It describes the tasks and migration processes between environments. The methodology aims to systematically guide e-business project management according to an organization's needs and resources.
The document discusses extending the existing SRML metamodel to implement additional properties of interaction protocols and external policies. The main tasks are to define grammars for coordination and external policies, and extend the metamodel using the Xtext grammar. This will allow users to edit models and view changes in the SRML editor. The document also discusses transforming SRML models to BPEL for business processes, and improving the graphical representation of SRML models in Eclipse.
Service Oriented & Model Driven ArchitecturesPankaj Saharan
The document discusses a seminar on combining Service-Oriented Architectures (SOA) and Model Driven Architectures (MDA). It first provides an overview of SOA and MDA individually, including their goals and characteristics. It then analyzes the similarities and differences between the two approaches when combining them. Some benefits are improved productivity and lower costs, while challenges include defining models and transformations between levels of abstraction. Overall, the document concludes that combining SOA with MDA's model-driven approach can provide benefits like business agility if key issues like semantics and metadata modeling are adequately addressed.
This document proposes an extension of the ArchiMate enterprise architecture framework to model multi-agent systems for critical infrastructure governance. The authors develop a responsibility-driven policy concept and metamodel layers to represent agent behavior and organizational policies across technical, application, and organizational layers. The approach is illustrated through a case study of a financial transaction processing system.
The document discusses adopting a "two-speed IT" approach for digital transformation, where core systems operate at a steady pace of incremental changes while new digital capabilities are rapidly developed and updated. This allows companies to maintain stable operations while innovating through new digital products and services. The role of the CIO is to drive this change by implementing practices like separating infrastructure for new and legacy systems and establishing centers of excellence for different speeds of development.
The document discusses model-oriented approaches, BPMN 2.0, and Enterprise 2.0. It describes the model-driven architecture approach, its history and key aspects. It outlines the different types of diagrams in BPMN 2.0 including processes, collaborations, and choreographies. It defines the key elements of Enterprise 2.0 including search, links, authoring, tags, and social functions. It also lists example tools that support these approaches.
Different Methodologies Used By Programming TeamsNicole Gomez
The document discusses different programming team methodologies including:
- System development life cycle (SDLC), which is used for large projects and includes waterfall models. It takes time but ensures high quality.
- Agile methodology, designed for small projects, combines methods for faster development that changes with customer needs.
- Extreme programming allows close communication between developers and customers so the software can change rapidly based on customer feedback.
Overall agile methodologies seem to have advantages over SDLC and extreme programming by allowing faster development that can change with customer desires.
MASRML - A DOMAIN-SPECIFIC MODELING LANGUAGE FOR MULTI-AGENT SYSTEMS REQUIREM...ijseajournal
MASRML – Multi-Agent Systems Requirements Modeling Language – is a UML-based Domain-Specific
Modeling Language conceived for the requirements modeling in multi-agent system projects. Along this
work the extended metamodel developed to support the language is described and the applicability of this
DSML in the requirements identification of a multi-agent system is demonstrated using the new
mechanisms produced to model specific functional requirements for this kind of system. This work also
includes how the DSML was validated and the impressions collected during the validations.
Project PlanFor our Project Plan, we are going to develop.docxwkyra78
The document outlines a project plan to develop a new payroll system for an organization using the waterfall development methodology. It estimates the project will take 33.3 person-months to complete based on industry standards of allocating 15% of effort to planning, 20% to analysis, 35% to design, and 30% to implementation. It also discusses developing a work plan, staffing the project, and coordinating project activities to manage the system development life cycle.
This document proposes a service-oriented reference architecture for goal modeling and analysis tools to address interoperability issues. It discusses using iStarML as an interchange format and presents an extension called iStarML+P that adds temporal constraints, effects, and utilities. It then proposes a reference architecture where tools expose reasoning capabilities as services using iStarML+P. As a case study, it presents Y-Reason, a tool that translates iStarML+P models to SHOP2 planner input using the reference architecture.
A Software System Development Life Cycle Model for Improved Students Communic...IJCSES Journal
This document describes a proposed software development life cycle (SDLC) model to improve student communication and collaboration. The model uses a spiral development process simulated using Simphony.NET. This allows the project manager to determine the optimal number of team members needed for each phase. The goal is to increase productivity by keeping all members busy at all times. Key aspects of the model include using Edmodo to create an online student learning network for communication and collaboration, dividing projects into small, medium, and large scales, and specifying time distributions for phases and resource needs.
Generate rough cut capacity plan
Planner: Get planning parameters
Planning Parameters: Return planning parameters
Planner: Get product constraints
Product Constraints: Return constraints
Planner: Generate rough cut capacity plan
Planner: Send rough cut capacity plan to assistant
Assistant: Acknowledge receipt of rough cut capacity plan
Planner: Inform business partner of rough cut capacity plan
Business
Priorities
Priority 1: Improve forecast accuracy
Priority 2: Reduce inventory levels
Priority 3: Shorten order fulfillment lead time
The document discusses the Unified Modeling Language (UML) and its role in object-oriented analysis and design. It describes UML as a graphical language used to visualize, specify, construct, and document software systems. UML provides tools and features to support complex systems using object-oriented concepts and methodology. UML diagrams are used to model system designs, with the key UML diagrams being class, sequence, use case, state machine, and activity diagrams. The document also briefly mentions some criticisms of UML regarding when diagrams should be used and how frequently they need to be updated.
Generation of Automatic Code using Design PatternsIRJET Journal
This document describes a tool that automatically generates code for implementing design patterns. The tool takes in basic application information from the user, such as class names, and generates all the code prescribed by the design pattern. It also incorporates an online version of the book "Design Patterns" to provide integrated reference documentation during the development process. The goal is to streamline the process of implementing design patterns by automating the lower-level coding tasks.
System Development Overview Assignment 3Ashley Fisher
This document discusses the differences between extreme programming (XP) and scrum, two agile software development methodologies. It provides an overview of the key concepts, phases, artifacts, roles and practices of both XP and scrum. The document proposes combining some XP practices, like test-driven development and pair programming, into scrum activities to create an enhanced scrum framework. This hybrid approach aims to leverage the strengths of both methodologies to produce high-quality software within time constraints.
The document discusses three papers related to data warehouse design.
Paper 1 presents the X-META methodology, which addresses developing a first data warehouse project and integrates metadata creation and management into the development process. It proposes starting with a pilot project and defines three iteration types.
Paper 2 proposes extending the ER conceptual data model to allow modeling of multi-dimensional aggregated entities. It includes entity types for basic dimensions, simple aggregations, and multi-dimensional aggregated entities.
Paper 3 presents a comprehensive UML-based method for designing all phases of a data warehouse, from source data to implementation. It defines four schemas - operational, conceptual, storage, and business - and the mappings between them. It also provides steps
The document discusses three papers related to data warehouse design.
Paper 1 presents the X-META methodology which proposes a five phase process for developing a data warehouse pilot project to gain experience. It emphasizes metadata management and defines three types of iterations for projects.
Paper 2 proposes extending the ER data model to allow modeling of multi-dimensional aggregated entities. It includes entity types for basic dimensions, simple aggregations, and multi-dimensional aggregations.
Paper 3 presents a comprehensive UML-based method for data warehouse design covering all phases from source systems to implementation. It defines four schemas - operational, conceptual, storage, and business - and the mappings between them.
ORIGINAL PAPERFuture software organizations – agile goals .docxvannagoforth
ORIGINAL PAPER
Future software organizations – agile goals and roles
Petri Kettunen1 & Maarit Laanti2
Received: 31 July 2017 /Accepted: 5 December 2017 /Published online: 16 December 2017
# The Author(s) 2017. This article is an open access publication
Abstract
Digital transformation is rapidly causing major, even disruptive changes in many industries. Moreover, global developments like
digital platforms (cloud) and IoTcreate fundamentally new connections at many levels between objects, organizations and people
(systems-of-systems). These are by nature dynamic and often work in real time – further increasing the complexity. These
systemic changes bring up new profound questions: What are those new software-intensive systems like? How are they created
and developed? Which principles should guide such organizational design? Agile enterprises are by definition proficient with
such capabilities. What solutions are the current scaled agile frameworks such as SAFe and LeSS proposing, and why? In this
paper, we aim to recognize the design principles of future software organizations, and discuss existing experiences from various
different organizations under transformations, and the insights gained. The purpose is to systematize this by proposing a
competence development impact-mapping grid for new digitalization drivers and goals with potential solutions based on our
agile software enterprise transformation experiences. Our research approach is based on the resource-based and competence-
based views (RBV, CBV) of organizations. We point out how most decision-making in companies will be more and more
software-related when companies focus on software. This has profound impacts on organizational designs, roles and competen-
cies. Moreover, increasing data-intensification poses new demands for more efficient organizational data processing and effective
knowledge utilization capabilities. However, decisive systematic transformations of companies bring new powerful tools for
steering successfully under such new business conditions. We demonstrate this via real-life examples.
Keywords Digital transformation . SAFe . LeSS . Agile enterprise . Systems thinking . Value streams
Introduction
Digital transformations are a cause of rapid and even disrup-
tive change in a majority of companies and future competitive
environments. Fundamentally novel models for organizations
and businesses (like Uber-type) are emerging, and traditional
companies as well must consider their structure and their roles
in achieving new business goals. Both the software producer
organization and the customer viewpoints should be under-
stood via comprehensive sense making. Companies now be-
gin to focus on software – either following strategy, or ad hoc,
when forced by competitive pressure imposed on them by
digitalization.
We view future competitive companies as agile and sus-
tainable, as well as more fundamentally software-based with
respect to both their outcomes (products ...
1
45
Table of Contents
Introduction3
Need for technology-based solutions3
Infrastructure Automation Tools4
Implementation4
The Central Theory: Organizational Management and Memory4
Organizational Management4
Organizational Memory4
Need of Data Archival And Storage5
Data Storage.5
Types of Storage.6
Data Archival9
Data Archival Process9
Archiving principles12
Data Management Systems12
Enterprise Resource Planning Systems (ERP systems) for data integration.13
Microservices.15
Properties of Monolithic.17
Conclusion22
References24
Introduction
Technology is considered vital in today's globalized world. Especially in terms of business, information technology has both quantifiable and unquantifiable benefits. It is essential to communicate with customers and stakeholders regularly and necessary for communicating quickly and clearly. It helps in implementing business operations efficiently and effectively, also. A business with robust technological capacity creates new opportunities for a company to stay ahead of the competition and grow eventually (Rangus & Slavec, 2017). Consequently, it also makes dynamic teams that can interact from anywhere in the world—furthermore, technology aids in understanding the business needs and managing and securing confidential and critical data.Need for technology-based solutions
The need for data recovery, active and continuous data processing by its life cycle of significance and utility for research, scientific and educational purposes (Bukari Zakaria & Mamman, 2014). The acknowledgment that information is an organization's key asset since late, decisively affecting its profitability, has contributed to some comprehensive corporate memory approaches. The key causes of competitive advantage are corporate memory and organizational learning ability (C. Priya, 2011). Hence the main obstacle is the effectiveness of information management while ensuring the consistency of training facilities.
Organizations need robust technology-based solutions. Thus, software developers have developed and deployed various forms of overtime architectures that enable software products to become resource-effective and usable. Some architectures implement their frameworks in either one layer or various layers or levels (Suresh, 2012). It is understood that ERP implementation efficiency of ERP implementations is influenced by the rise or excess of a certain degree of capability in the volume of data to process (Johansson, 2012). In the last couple of decades, new architectures have been created with creativity that offers optimum solutions. Thus, the microservices architecture is gaining room and becoming part of the technological, financial, and advertising decision-making process. Microservices replace monolithic, tightly dispersed system-focused applications with an independent operation (Vrîncianu, Anica-Popa, & Anica-Popa, 2009).Infrastructure Automation Tools
One issue as microservices are applied is that any s ...
1
45
Table of Contents
Introduction3
Need for technology-based solutions3
Infrastructure Automation Tools4
Implementation4
The Central Theory: Organizational Management and Memory4
Organizational Management4
Organizational Memory4
Need of Data Archival And Storage5
Data Storage.5
Types of Storage.6
Data Archival9
Data Archival Process9
Archiving principles12
Data Management Systems12
Enterprise Resource Planning Systems (ERP systems) for data integration.13
Microservices.15
Properties of Monolithic.17
Conclusion22
References24
Introduction
Technology is considered vital in today's globalized world. Especially in terms of business, information technology has both quantifiable and unquantifiable benefits. It is essential to communicate with customers and stakeholders regularly and necessary for communicating quickly and clearly. It helps in implementing business operations efficiently and effectively, also. A business with robust technological capacity creates new opportunities for a company to stay ahead of the competition and grow eventually (Rangus & Slavec, 2017). Consequently, it also makes dynamic teams that can interact from anywhere in the world—furthermore, technology aids in understanding the business needs and managing and securing confidential and critical data.Need for technology-based solutions
The need for data recovery, active and continuous data processing by its life cycle of significance and utility for research, scientific and educational purposes (Bukari Zakaria & Mamman, 2014). The acknowledgment that information is an organization's key asset since late, decisively affecting its profitability, has contributed to some comprehensive corporate memory approaches. The key causes of competitive advantage are corporate memory and organizational learning ability (C. Priya, 2011). Hence the main obstacle is the effectiveness of information management while ensuring the consistency of training facilities.
Organizations need robust technology-based solutions. Thus, software developers have developed and deployed various forms of overtime architectures that enable software products to become resource-effective and usable. Some architectures implement their frameworks in either one layer or various layers or levels (Suresh, 2012). It is understood that ERP implementation efficiency of ERP implementations is influenced by the rise or excess of a certain degree of capability in the volume of data to process (Johansson, 2012). In the last couple of decades, new architectures have been created with creativity that offers optimum solutions. Thus, the microservices architecture is gaining room and becoming part of the technological, financial, and advertising decision-making process. Microservices replace monolithic, tightly dispersed system-focused applications with an independent operation (Vrîncianu, Anica-Popa, & Anica-Popa, 2009).Infrastructure Automation Tools
One issue as microservices are applied is that any s ...
Similar to DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAND ECLIPSE SIRIUS (20)
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAND ECLIPSE SIRIUS
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
DOI:10.5121/ijcsit.2016.8507 91
DESIGN AND DEVELOPMENT OF BUSINESS RULES
MANAGEMENT SYSTEM (BRMS) USING ATLAND
ECLIPSE SIRIUS
Lynda Ait Oubelli and Mourad Oussalah
Department of Computer Science, University of Nantes,
2 Rue de la Houssiniére BP-92208, 44322, Nantes, France
ABSTRACT
Nowadays, in the world of industry end-users of business rules inside huge or small companies claims that
it’s so hard to understand the rules either because they are hand written by a specific structural or
procedural languages used only inside their organizations or because they require a certain understanding
of the back-end process. As a result, a high need for a better management system that is easy to use, easy to
maintain during the evolution process has increased. In this paper, the emphasis is put on building a
business rule management system (BRMS) as a graphical editor for editing the models in a flexible agile
manner with the assistant of ATL and Sirius frameworks within Eclipse platform. Thus, the proposed
solution, on one hand, solves the problem of wasting resources dedicated for updating the rules and on the
other hand it guarantees a great visibility and reusability of the rules.
KEYWORDS
MDE,DSM,BRMS,ATL transformation, EMF/ GMF,GraphicalEditor&Eclipse Sirius framework
1. INTRODUCTION
In the world of industry, the traditional approach that concerns the development of systems inside
companies, based on code limits the flexibility of business services. Indeed, once the system is
delivered, when the business logic changes, it will be necessary to make what we call an
adaptation process by one or many stakeholders. In this context, the business rules have emerged.
Which are senior formulations that describe the concepts of business and aim to separate the
business logic from the system application logic, allowing the company to adapt its operations,
according to dynamic market trends and conditions, to individual customer requirements or to the
regulatory environment changes. Thus, we see the importance of how to represent, write and
organize business rules to ensure on the one hand their better management and on the other hand,
to facilitate their evolutionary maintenance. Hence, the need for a medium to better structure and
managing the rules has increased. In this context lies our project entitled "Design and
Development of Business Rules Management System (BRMS) Using ATL and Eclipse Sirius". It
is worth noting that business rules represent the heart of each software package in a company.
However, it is difficult to identify and to structure them for better management, readability, and
reusability. For this, most of the companies always seek to create and develop tools to improve
the functioning of their software packages. Actually, to modify a rule the end user should have
strong computer science knowledge, Thereby, if a user of the standard solution wants to make a
change in the logic of the software package, he must return to companies’ personal staff to do
that for him. But, this process is not practical for both companies and for the client because it
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
92
represents a loss of time and resources. Besides that the current structure of rules does not allow a
good management. Thus a new modelling and structuring solution is highly required.
The remainder of this paper is organized as follows: Section 1 represents the general context and
the problematic of our work, Section 2 describes an overview of the general context of the
project; in this phase, we take a closer look at the theoretical and technical background. We
establish, first, the basic concepts related to business rules. Secondly, we study the rules used in
the module on which we will work as well as the language used in writing them. We choose later
the different technologies and the tools that can be used to attend the expected goals. Next, in
Section 3 we represent the proposed solution based on the theoretical sound of modelling, meta
modelling and model transformation. Section 4 represents a case study of the proposal. Where we
design, first, the new object meta model, we then model the business rules and we have finally
developed the various ATL transformation rules that allow automating the transformation
process of business rules from their current format to object format. Then, we develop an
effective tool for managing these business rules. After that, Section 5 represents a discussion
about well-known BRMS software's. Finally, Section 6 provides conclusions and future work.
2. BACKGROUND
2.1 MODEL TRANSFORMATION IN MDE
The preliminary study is an essential step in every project, in this section, we will introduce the
basic concepts related to our project. We begin with a presentation of the general concepts of
model driven Engineering; where [1] defined it as a discipline in software engineering that relies
on models as first class entities and that aims to develop, maintain and evolve software by
performing model transformations. According to [2] MDE embraces many other Technological
spaces in a uniform way. An important aspect of MDE was presented by [3] which is, its
emphasis on bridges between technological spaces and on the integration of bodies of knowledge
developed by different research communities. In each area, the concepts of model, meta-model
and model transformation take a different incarnation. But, what are the basic concepts of model-
driven engineering? What is a model? What are the levels of modelling? What is a model
transformation? What we mean by a DSM? According to [4] in MDE, models are considered as
the unifying concept in computer science engineering. MDE promotes models to primary
artefacts that drive the whole development process. The conceptual foundation of a modelling
language, when expressed as a model, is called meta model. The relation between a model
expressed in a language and the meta-model of this language is called Conforms To. Meta-models
are in turn expressed in a modelling language called Meta modelling language. Its conceptual
foundation is captured in a model called meta meta model, models, Meta models, and meta meta
model form a three-level architecture with levels named M1, M2, and M3 respectively [5]. A
standard meta meta model called Meta Object Facility (MOF) was proposed by [6]. An example
of a meta model in the context of OMG standards is the UML meta model. It is worth noting that,
model transformations in MDE follow a common pattern defined by [4] as model transformation
pattern. The transformations are at the heart of the MDA approach. They allow getting different
views of a model, to refine or abstract, they allow more to go from one language to another. It
ensures the passage of one or more models of a given level of abstraction to one or more other
models of the same level (horizontal processing) or a different level (vertical processing). From a
source model to a target model, we need to identify the correspondence between the concepts of
source and target models at their meta models.
The transformation of the source model is applied to automatically generate the target model by a
program called transformation engine whose transformation rules are meant to perform the
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
93
transformation.The transformation model not only refers to the passage of M1 source to M1
target: we can find M1 to M2 (promotion), M2 to M1 (downgrade), M3 towards M1, M3 to
M2... etc.
2.2. DSM GRAPHICAL EDITOR IN MDE
In recent years, a lot of efforts have been made by [7], [8], [9] and many others in order to
provide facilities to design executable Domain-Specific Modeling Languages (xDSMLs).
According to [10] creating a DSL in the MDE context is often called Domain-Specific Modeling
(DSM). Building a graphical tool for DSM is often a very complex labor process. It needs a lot of
time for developing and it often highly depends on reliable frameworks, because building an
editor from scratch is mostly impossible nowadays. For example [11] described with high
accuracy the Sirius framework used for developing a DSM Graphical Editor. Then [12] made a
comparative study between two Frameworks Graphiti and Eclipse Sirius, they found that a Sirius
based editor provides the most required features, which means that Sirius is a better option for
creating a DSM editor. Which encourage us later to choose it to resolve our issues. Various meta
tools that allow specifying editors were described by [13]. GMF [14] Xtext [15] and Sirius [16]
support high-level specification of graphical and textual model editors. ATL[17], [18] supports
the specification of model translations, EMFCompare [19] supports model differencing during the
comparison process. Another challenge of software evolution faces MDE developers is studied by
[20] which assume that the DSL itself is subject to evolution.
3. PROPOSED APPROACH
The present section is devoted to the presentation of the work done throughout the project using
some printed screenshot to detail the implemented features. In this part, we will represent the
workflow of the proposed solution and our new "Target Ecore meta model" of the used
descriptive the language of the business rules.
3.1. MOTIVATION
Currently, our business rules as they are written follow a functional approach, in other words,
they are composed of a series of instructions and procedures. This approach has the major
disadvantage which is the complexity of maintenance during the evolution of the application. A
simple change has a huge impact on other functions in the same business rule specifically and the
application will be edited in its entirety generally. Moreover, the current representation of
business rules does not allow better visibility of the structure and the content of the rule.
In the source meta model, we tried to model the language used in writing the rules and we finally
realized a meta model that describes the structure of the business rules within a huge software
package. After having reviewed this meta model, we realized that it does not offer a better
modularity, scalability, and thereafter extensibility of the rules. For this reason, we thought to
design once again the "Target Ecore meta model" of the concerned business rules. Inspiring by
the advantages offered by the object-oriented approach.
3.2.THE SOURCE ECORE META MODEL OF THE BUSINESS RULES
Figure 1 below, shows "Source Ecore meta model ". As we mentioned before. It allows to well
understanding the structure of a business rule. It was modelled by unified modelling language
(UML).
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
Figure 1. The Source Ec
3.3. THETARGET ECORE META
At this stage, we proposed first as target meta model the object
the latter presents a higher level of abstraction compared to the source Ecore meta model. For
this, we thought to propose our target meta model with a low abstraction level, that conforms to
object Ecore meta model. This m
shows the target Ecore meta-model of business rules. That will facilitate the matching process
while writing the ATL transformation rules.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
. The Source Ecore metamodel of Business Rule
ETA MODEL OF THE BUSINESS RULES
At this stage, we proposed first as target meta model the object meta model then we realised that
the latter presents a higher level of abstraction compared to the source Ecore meta model. For
this, we thought to propose our target meta model with a low abstraction level, that conforms to
object Ecore meta model. This means, following the object-oriented approach. Figure 2 below
model of business rules. That will facilitate the matching process
while writing the ATL transformation rules.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
94
meta model then we realised that
the latter presents a higher level of abstraction compared to the source Ecore meta model. For
this, we thought to propose our target meta model with a low abstraction level, that conforms to
oriented approach. Figure 2 below
model of business rules. That will facilitate the matching process
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
95
Figure 2. TheTarget Ecore metamodel of Business Rules
3.4. MODEL TRANSFORMATIONS USING ATL
To make a model transformation, ATL must take three inputs which are: source Ecore meta
model, target Ecore meta model and a source xmi model which represents a rule that Conforms
To source Ecore meta model in order to generate an xmi model that conforms to object Ecore
meta model as it shows Figure 3.
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
Figure 3. The workflow of the proposed
We also write the transformation rules that tell ATL how to pass from an element of the source
model to an element of the target model. As it shows Listing 1.
Listing 1. Abstraction levels Transition Rules.atl between the Source and
4. CASE STUDY
In what follows, we present a transformation example of a business
software package. The latter contains a huge number of business rules that concern a specific
domain, the used business rule during ATL transformation is presented as an .xmi file which
conforms to source Ecore meta model.
4.1. EXAMPLE OF THE TRANSFORMATION
• Step One: First, we must introduce the two meta models source and target as .ecore files
in the Eclipse modelling tools.
• Step Two: We instantiate, as an .xmi file, the business rule that we want to transform
which Conforms To the source meta model.
• Step Three: We make the matching between the two meta models source and target by
writing the ATL transformation rules.
-- @path model_in=/BRMS/MetaModels/Source_MetaModel.ecore
-- @path model_out=/BRMS/Me
moduleAbstractionlevelsTransition2;
createOUT : model_out from IN : model_in;
ruleRule2Rule {
fromin: model_in!Rule
toout:model_out!Rule (
C <
IE <
modification <
name <- in.Description.
problems <-
instructions <
procedures <
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
. The workflow of the proposed solution for building the BRMS
We also write the transformation rules that tell ATL how to pass from an element of the source
model to an element of the target model. As it shows Listing 1.
Listing 1. Abstraction levels Transition Rules.atl between the Source and Target meta models
In what follows, we present a transformation example of a business rule that belongs to the
software package. The latter contains a huge number of business rules that concern a specific
domain, the used business rule during ATL transformation is presented as an .xmi file which
conforms to source Ecore meta model.
RANSFORMATION PATH OF THE BUSINESS RULE
: First, we must introduce the two meta models source and target as .ecore files
in the Eclipse modelling tools.
We instantiate, as an .xmi file, the business rule that we want to transform
which Conforms To the source meta model.
We make the matching between the two meta models source and target by
writing the ATL transformation rules.
@path model_in=/BRMS/MetaModels/Source_MetaModel.ecore
@path model_out=/BRMS/MetaModels/Target_MetaModel.ecore
AbstractionlevelsTransition2;
OUT : model_out from IN : model_in;
Rule2Rule {
in: model_in!Rule
out:model_out!Rule (
A <- in.Description.A,
C <- in.Description.C,
IE <- in.Description.IE,
modification <- in.Description.modification,
in.Description.name,
in.Problem,
instructions <- in.Instruction,
procedures <- in.Procedure
)
}
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
96
We also write the transformation rules that tell ATL how to pass from an element of the source
meta models
rule that belongs to the
software package. The latter contains a huge number of business rules that concern a specific
domain, the used business rule during ATL transformation is presented as an .xmi file which
: First, we must introduce the two meta models source and target as .ecore files
We instantiate, as an .xmi file, the business rule that we want to transform
We make the matching between the two meta models source and target by
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
Figure 4 shows the activity diagram of a business rule that we have used to validate our approach
during the development of the BRMS, the concept of the rule is; in order to make loan amount
from a bank, first, the bank evaluates person’s credit score if
evaluates person’s employment history, if it is unstable then the bank evaluates person’s misc
loans amount, if it is heigh then it sets person’s like hood of defaulting on a loan to high, else if
person’s credit score is >= 650$ or if person’s employment history is stable or if person’s misc
loans amount is low then the bank set person’s like hood of defaulting on a loan to
Figure. 4
Figure 5 represents the xmi model of our business rule which conforms to the source Ecore meta
model. Noting that:
EPCS: Evaluate person’s credit score,
EPEH: Evaluate person’s employment history,
EPMLA: Evaluate person’s Misc Loans Amount,
PLHDLH: Set person’s like the hood of defaulting on a loan to high.
PLHDL: Set person’s like the hood of defaulting on a loan to?
After passing through these steps, we can finally generate the second model of the same
business rule which conforms to the target meta model as
diagram manually, to make it clear
textual.xmi format.
Fig. 5. The Business Rule model conforms To the Source Ecore meta model
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
Figure 4 shows the activity diagram of a business rule that we have used to validate our approach
during the development of the BRMS, the concept of the rule is; in order to make loan amount
from a bank, first, the bank evaluates person’s credit score if it is less than 650$ then, the bank
evaluates person’s employment history, if it is unstable then the bank evaluates person’s misc
then it sets person’s like hood of defaulting on a loan to high, else if
s >= 650$ or if person’s employment history is stable or if person’s misc
loans amount is low then the bank set person’s like hood of defaulting on a loan to ?
4. UML activity diagram of the Business Rule
represents the xmi model of our business rule which conforms to the source Ecore meta
EPCS: Evaluate person’s credit score,
EPEH: Evaluate person’s employment history,
EPMLA: Evaluate person’s Misc Loans Amount,
like the hood of defaulting on a loan to high.
PLHDL: Set person’s like the hood of defaulting on a loan to?
After passing through these steps, we can finally generate the second model of the same
business rule which conforms to the target meta model as it shows Figure 6.We draw the
diagram manually, to make it clearer to the reader because the generated rule using ATL has the
. The Business Rule model conforms To the Source Ecore meta model
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
97
Figure 4 shows the activity diagram of a business rule that we have used to validate our approach
during the development of the BRMS, the concept of the rule is; in order to make loan amount
it is less than 650$ then, the bank
evaluates person’s employment history, if it is unstable then the bank evaluates person’s misc
then it sets person’s like hood of defaulting on a loan to high, else if
s >= 650$ or if person’s employment history is stable or if person’s misc
?
represents the xmi model of our business rule which conforms to the source Ecore meta
After passing through these steps, we can finally generate the second model of the same
.We draw the
to the reader because the generated rule using ATL has the
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
4.2. LIMITS
One of the best methods to improve readability and structure of complex business rules is their
graphical modelling. Another advantage offered by the graphical representation, is that it is very
easy to understand by any type of end
computer science to use or to update it. While the. xmi format is understandable only by
computer scientists. Unfortunately, the rules we have generated are under the .xmi format and we
didn’t find any tools to transform them in graphical form
this problem as it describes the next subsection.
Figure 6. The Business Rule model conforms
4.3. GRAPHICAL MODELLING O
The graphical modelling of rules is extremely important in our project, that’s why; we decided to
develop a graphical editor that allows creating our BRMS as it shows Figure
facilitate the work of end-users that are responsible for the
disadvantages of GMF and the strength of Eclipse Sirius, we decided to use a rapid, agile, smooth
path to develop the graphical editor as it shows Figure
To the Target MM we can obtain a
of the proposed business rule.
Figure 7. Presentation of Eclipse Sirius initiative for developing the BRMS
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
methods to improve readability and structure of complex business rules is their
graphical modelling. Another advantage offered by the graphical representation, is that it is very
easy to understand by any type of end-users. It means, it didn’t require any knowledge in
computer science to use or to update it. While the. xmi format is understandable only by
computer scientists. Unfortunately, the rules we have generated are under the .xmi format and we
didn’t find any tools to transform them in graphical format. For this, we find another way to solve
this problem as it describes the next subsection.
The Business Rule model conforms to the target Ecore meta model
OF THE BUSINESS RULES
The graphical modelling of rules is extremely important in our project, that’s why; we decided to
develop a graphical editor that allows creating our BRMS as it shows Figure 3. This will greatly
users that are responsible for the update process. Between the
disadvantages of GMF and the strength of Eclipse Sirius, we decided to use a rapid, agile, smooth
path to develop the graphical editor as it shows Figure 7. From the business Rule that
the Target MM we can obtain a modelling tool that helps us to make a graphical presentation
. Presentation of Eclipse Sirius initiative for developing the BRMS
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
98
methods to improve readability and structure of complex business rules is their
graphical modelling. Another advantage offered by the graphical representation, is that it is very
knowledge in
computer science to use or to update it. While the. xmi format is understandable only by
computer scientists. Unfortunately, the rules we have generated are under the .xmi format and we
at. For this, we find another way to solve
The graphical modelling of rules is extremely important in our project, that’s why; we decided to
. This will greatly
update process. Between the
disadvantages of GMF and the strength of Eclipse Sirius, we decided to use a rapid, agile, smooth
. From the business Rule that Conforms
modelling tool that helps us to make a graphical presentation
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
99
In this sub-section, we will detail the steps for creating the editor with Sirius, explaining the
associated key concepts.
• Create the EMF model:The step of creating the EMF model is already made in the previous
section. Our DSM (Domain Specific Model), is a language dedicated to a business domain with
its keywords and its formalism, it was described by the meta model already presented "Target
Ecore meta model ", it specifies the structure of a business rule and relationships with the various
components of this business rule. In this step an .ecore file is realized.
• Creation of GenModel:Once the ".genmodel" file created, then, by opening it and start the
generation of the three plugins, "target.model", "target.model.edit"and "target.model.editor".
Next, by starting the Eclipse IDE with the generated plugins we open the "Run Configurations"
panel via the menu " Run > Run configurations ", and then we create a new configuration of the
type "Eclipse Application".
• Creating the editor:The great strength of Sirius is, it allows the specification of editors in a
completely graphic manner, without knowing anything about back-end process. Parallel to the
specification, Sirius allows things to be observed in real time starting from instantiating the model
that we want to represent.
We will put in this section the Sirius pallet that we have created. The latter can be used to create
two types of elements: in one hand the visible elements in the pallet and on the other hand the
mechanisms to change the items of each businessrule on the fly. For clarity and for easy handling,
we have grouped the elements in subsections. We can distinguish in Figure 9 above three types of
elements.Nodes that represent simple instructions, defining problem and variable declaration. A
container which represents items that can contain sub-elements as the "if" conditional statement
or the loop "for each". And the third type of elements (which will not be visible to the end user of
the pallet) that allows making changes on the nodes and containers without going through the
pallet such as: adding new element, deleting an element, renaming element, fixing errors in the
model, changing the label of an element, relationships source and target And even adding Java
services for arithmetical computations on tables.The figure aboveshows the creation of the business
rule with the modeler, it highlights the three views with which the user has the possibility to
create, read and update it.
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
Figure 8. Domain-specific IDE for model
5. DISCUSSION
Business Rules Management Systems are the
business rules of an organization or a company. Thus, we assumed that their use will accelerate
the creation of the business rules for software packages. Our research has shown that there are
multiple softwares of BRMS already used by companies. However, none fully meets the
objectives of the project. The following table 1 provides a comparison of the top five BRMS
softwares that we thought, it would be possible to adapt them to our project.
Table 1.
This table was completed following the results of test cases made immediately on software and
from opinions gathered by other users. According to our research, the most powerful softwares
Jess
Gratuitousness
Popularity
Portability
Intuitiveness
Adaptability
Scalability
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
specific IDE for model-driven development of the Business Rule
Business Rules Management Systems are the softwares that can create, manage and support the
business rules of an organization or a company. Thus, we assumed that their use will accelerate
the creation of the business rules for software packages. Our research has shown that there are
RMS already used by companies. However, none fully meets the
objectives of the project. The following table 1 provides a comparison of the top five BRMS
softwares that we thought, it would be possible to adapt them to our project.
Table 1. Classification Table of top BRMS software.
This table was completed following the results of test cases made immediately on software and
from opinions gathered by other users. According to our research, the most powerful softwares
DTRules Drools M.D
Network
ILOG Proposed
Solution
International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
100
of the Business Rule
that can create, manage and support the
business rules of an organization or a company. Thus, we assumed that their use will accelerate
the creation of the business rules for software packages. Our research has shown that there are
RMS already used by companies. However, none fully meets the
objectives of the project. The following table 1 provides a comparison of the top five BRMS
This table was completed following the results of test cases made immediately on software and
from opinions gathered by other users. According to our research, the most powerful softwares
Proposed
Solution
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
101
are ILOG (IBM) and Microsoft Developer Network, but their use is not free and requires in
addition to be trained and have a solid foundation in computer science. Therefore, they do not
meet the expectations of the project. The other three programs (Jess, Drools and DTRules) are
much less performing and require from their users much knowledge in computer science and a lot
of time to control and adapt the tool to their needs.
Thus, these softwares do not meet the expectations of the project. However, the results proved
that our proposed solution for the BRMS covered all features and simplifies the product
specification, reduces design time and rapidly increases the overall productivity without any
knowledge about the back-end processes.
6. CONCLUSION AND FUTURE WORK
This technical paper has described the steps that we have faced during the study of the project. It
details the stages through which we passed to achieve the project objectives. We started with a
general presentation of the project followed by a theoretical and technical study. Then we
explained the work that we have done during the project. Finally, we finished by the proposed
perspectives. This project was a considerable use. Indeed, it allowed exploiting the theoretical and
technical knowledge, such as ATL for model transformation, the project Eclipse Sirius for
creating graphical editors. Thus, the complexity of the rules was a great challenge that pushes us
to find an easy way for the end users to manipulate, update them without any difficulties.
After our research studies, design and development processes, we succeeded to build the BRMS
as a very flexible graphical editor. We propose as perspectives, the generation in text format rules
that are consistent with target ecore meta model. Indeed, after having modelled the business rules
graphically using the editor that we have developed, we can obtain as an output XMI file. The
latter may be converted to text format through XSLT which is a Document’s transformation tool
defined in the recommendation XSL of W3C as shows Figure 9. It allows the transformation of
an XML document into another format, as PDF or HTML. Thus, the rule will be ready to use in
text format.
Figure 9. XSLT Processing
Actually, we have a graphical representation of the business rules within their software package,
we can do the opposite path from the one described in the previous paragraph, i.e. from text
format, we can obtain an XML file that can be represented graphically, this treatment can be
automated subsequently to transform all the existing XML rules.
REFERENCES
[1] KURTEV, Ivan & VAN DEN BERG, Klaas, (2003) “A synthesis-based approach to transformations
in an MDA software development process”. In: Model Driven Architecture: Foundations and
Applications, p. 121.
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
102
[2] VARRÓ, Dániel & BALOGH, András, (2007) “The model transformation language of the
VIATRA2 framework. Science of Computer Programming”, vol. 68, no 3, p. 214-234.
[3] KLEPPE, Anneke G., WARMER, Jos B., & BAST, Wim, (2003) “MDA explained: the model
driven architecture: practice and promise”, Addison-Wesley Professional.
[4] JOUAULT, Frédéric, ALLILAIRE, Freddy, BÉZIVIN, Jean, & al, (2008) “ATL: A model
transformation tool. Science of computer programming”, vol. 72, no 1, p. 31-39.
[5] JOUAULT, Frédéric, BÉZIVIN, Jean, & KURTEV, Ivan, (2006) “TCS: a DSL for the specification
of textual concrete syntaxes in model engineering”. In :Proceedings of the 5th international
conference on Generative programming and component engineering. ACM. p. 249-254.
[6] OMG/MOF meta object facility (MOF) specification, OMG Document AD/97-08-14, September
(1997). Available from: www.omg.org.
[7] COMBEMALE, Benoît, CRÉGUT, Xavier, &PANTEL, Marc, (2012) “A Design Pattern to Build
Executable DSMLs and Associated V&V Tools”, in: APSEC, IEEE. Vol. 1, pp. 282-287.
[8] MAYERHOFER, Tanja, LANGER, Philip, WIMMER, Manuel, & al, (2013) “ xMOF: Executable
DSMLs based on fUML”, in: SLE, LNCS 8225, Springer International Publishing, p. 56-75.
[9] TATIBOUËT, Jérémie, CUCCURU, Arnaud, GÉRARD, Sébastien, & al., (2014) “Formalizing
Execution Semantics of UML Profiles with fUML Models”, in: MODELS, LNCS 8767, Springer,
pp. 133–148.
[10] HUDAK, Paul, (1998) “Modular domain specific languages and tools. In Software Reuse”,
Proceeding of IEEE Fifth International Conference, pp. 134-142.
[11] VIYOVIĆ, Vladimir, MAKSIMOVIĆ, Mirjam, & PERISIĆ, Branko, (2014) “Sirius: A rapid
development of DSM graphical editor”, in IEEE 18th International Conference on Intelligent
Engineering Systems INES, pp. 233-238.
[12] VUJOVIĆ, Vladimir, MAKSIMOVIĆ, Mirjana, &PERIŠIĆ Branko. , (2014) “Comparative analysis
of DSM Graphical Editor frameworks: Graphiti vs. Sirius”, 23nd International Electrotechnical and
Computer Science Conference ERK, Portorož, Slovenia, pp. 7-10.
[13] VAUPEL, Steffen, STRÜBER, Daniel, RIEGER, Felix, &al., (2015) “Agile bottom-up development
of domain-specific IDEs for model-driven development”, in Proceedings of FlexMDE, pp.12-21.
[14] GMF Tooling, (2014) “Graphical Modeling Framework”. Available at: goo.gl/9Lgtzf
[15] BETTINI, Lorenzo, (2013) “Implementing Domain-Specific Languages with Xtext and Xtend.
Packt”, Publishing Ltd.
[16] Eclipse Sirius, (2016) “The easiest way to get your own Modeling Tool”. Available at:
goo.gl/mRBHQG
[17] Lina, (2008) “Atlas Transformation Language”. Available at: Http: //www.sciences.univ-
nantes.fr/lina/atl/.
[18] Eclipse ATL, ( 2016). Available at: goo.gl/ubISKw
[19] Eclipse Foundation, (2011) “Emf compare‚ A developer guide”, available at: http://goo.gl/53XASj.
[20] FEHRENBACH, Stefan, ERDWEG, Sebastian, & OSTERMANN, Klaus, (2013) “Software
evolution to domain-specific languages”, Springer International Publishing. In International
Conference on Software Language Engineering, pp. 96-116.
AUTHORS
Lynda AIT OUBELLIis currently a PhD student in Computer Science. Previously she was a Graduate
Research Student of Software Architecture in Nantes University, France; she received her bachelor's and
Master's degrees in Software Engineering from Souk-Ahras University, Algeria. Her fields of research
interests include MDE {Modeling, Meta Modeling, Model Transformation, Model Evolution, Model co
evolution, Model comparison} Object Oriented Approach and Formal modelling languages. She can be
reached at (lynda.aitoubelli@univ-nantes.fr).
Mourad Chabane OUSSALAH is a Professor of Computer Science at the University of Nantes, France
and the chief of the software architecture modelling Team. His research concerns software architecture,
object architecture and their evolution. He worked on several European projects (Esprit, Ist,..). He is (and
was) the leader of national project (France Telecom, Bouygues telecom, Aker-Yard-STX...)..He earned a
BS degree in Mathematics in 1983, and Habilitation thesis from the University of Montpellier in 1992.He is
also the co-founder of the National RPO, OCM (Objects, Components and Models) and LMO (Langages et
Modeles a objets) Conferences since 1992, and the founder of the CAL conference (Conference
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 8, No 5, October 2016
103
francophone sur les architectures logicielles) and the general chairman of the EWSA (European Workshop
on Software Architecture) 2006.
Prof. Oussalah has published 4 books and over 150 refereed journal and conference papers in the fields of
Software Architecture, Software Engineering, and Object Oriented Modelling. He is listed among the most
prolific authors in the DBLP computer science bibliography. He has served on Program Committees of c.a.
50 International Conferences and Workshops and has act as referee for 10 International Journals.
His contact address is: LINA Laboratory, CNRS UMR 6241, University of Nantes, 2, Rue de la
Houssinière, BP 92208, 44322 Nantes, France . (Mourad.Oussalah@Univ-Nantes.fr).