With the rise of new web technologies such as web 2.0, Jquery, Bootstrap. Modernizing legacy web systems to benefit from the advantages of the new technologies is more and more relevant. The migration of a system from an environment to another is a time and effort consuming process, it involves a complete rewrite of the application adapted to the target platform. To realize this migration in an automated and standardized way, many approaches have tried to define standardized engineering processes. Architecture Driven Modernization (ADM) defines an approach to standardize and automate the reengineering process. We defined an ADM approach to represent PHP web applications in the highest level of abstraction models. To do this, we have used software artifacts as a entry point . This paper describes the extraction process, which permits discovering and understanding of the legacy system. And generate models to represent the system in an abstract way.
Validation of ATL Transformation to Generate a Reliable MVC2 Web ModelsIJEACS
Technologies are constantly evolving. In order to benefit from technological advances, it is necessary to adapt the applications to these technologies. This operation is expensive for companies because it is often necessary to rewrite the code entirely. Where there is no capitalization of application functions and development is generally based on source code, the separation of concerns appears to be the necessary solution to the problem. Thus, functional specifications and technical specifications are taken into account separately by MDA approach. In this paper we present a new method of transformation validation and then we implement a new model transformation process based on MDA approach to generate an MVC2 Web model from Struts 2. This transformation begins by the validation of different transformation rules by applying the developed method of transformation validation.
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
The present business network infrastructure is quickly varying with latest servers, services, connections,
and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and
wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent
evolution of IT infrastructure, organizations at present require more numerous vulnerability assessments.
In this paper new approach the Unified process for Network vulnerability Assessments hereafter called as
a unified NVA is proposed for network vulnerability assessment derived from Unified Software
Development Process or Unified Process, it is a popular iterative and incremental software development
process framework.
Reusability Metrics for Object-Oriented System: An Alternative ApproachWaqas Tariq
Object-oriented metrics plays an import role in ensuring the desired quality and have widely been applied to practical software projects. The benefits of object-oriented software development increasing leading to development of new measurement techniques. Assessing the reusability is more and more of a necessity. Reusability is the key element to reduce the cost and improve the quality of the software. Generic programming helps us to achieve the concept of reusability through C++ Templates which helps in developing reusable software modules and also identify effectiveness of this reuse strategy. The advantage of defining metrics for templates is the possibility to measure the reusability of software component and to identify the most effective reuse strategy. The need for such metrics is particularly useful when an organization is adopting a new technology, for which established practices have yet to be developed. Many researchers have done research on reusability metrics [2, 9, 3, 4]. In this paper we have proposed four new independent metrics Number of Template Children (NTC), Depth of Template Tree (DTT) Method Template Inheritance Factor (MTIF) and Attribute Template Inheritance Factor (ATIF), to measure the reusability for object-oriented systems.
Automatically bridging UML profiles into MOF metamodelsIvano Malavolta
27th August 2015. My presentation at SEAA 2015 (http://paginas.fe.up.pt/~dsd-seaa-2015/) about our approach for autmatically bridging UML profiles into MOF metamodels. SEAA 2015 is the 41st Euromicro Conference on Software Engineering and Advanced Applications, and it has been held in 26 - 28 August 2015, Funchal, Madeira, Portugal.
Accompanying paper:
http://www.ivanomalavolta.com/files/papers/SEAA_2015.pdf
Abstract:
In Model-Driven Engineering, UML profiles and MOF-based Domain Specific Modeling Languages (DSMLs) are the most used approaches for describing domain specific applications. The choice of the right approach depends on several aspects, such as tool support, expressivity, complexity of models, company policies. In general, profiled UML models are very much used since they are intuitive for designers and model editors already exist, however they are intrinsically complex for model manipulation (e.g., transformation, analysis); conversely, domain specific models are more concise and easy to be manipulated, but they require an initial effort in terms of designers training and model editors development.
In this paper we propose an approach that allows getting the best of the two worlds: on one side designers can use UML profiles familiar to them, on the other side DSML models (automatically generated from profiled UML models) enable a better model manipulation. Our approach is based on an automatic bridge between UML profiles and MOF metamodels (which are the main artifacts of MOF-based DSMLs). The bridge is transparent to the user since it autonomously operates both on UML profiles and all the involved models. The bridge is realized through model transformation techniques in the Eclipse platform. In this paper we show its application on a case study based on SysML.
Validation of ATL Transformation to Generate a Reliable MVC2 Web ModelsIJEACS
Technologies are constantly evolving. In order to benefit from technological advances, it is necessary to adapt the applications to these technologies. This operation is expensive for companies because it is often necessary to rewrite the code entirely. Where there is no capitalization of application functions and development is generally based on source code, the separation of concerns appears to be the necessary solution to the problem. Thus, functional specifications and technical specifications are taken into account separately by MDA approach. In this paper we present a new method of transformation validation and then we implement a new model transformation process based on MDA approach to generate an MVC2 Web model from Struts 2. This transformation begins by the validation of different transformation rules by applying the developed method of transformation validation.
THE UNIFIED APPROACH FOR ORGANIZATIONAL NETWORK VULNERABILITY ASSESSMENTijseajournal
The present business network infrastructure is quickly varying with latest servers, services, connections,
and ports added often, at times day by day, and with a uncontrollably inflow of laptops, storage media and
wireless networks. With the increasing amount of vulnerabilities and exploits coupled with the recurrent
evolution of IT infrastructure, organizations at present require more numerous vulnerability assessments.
In this paper new approach the Unified process for Network vulnerability Assessments hereafter called as
a unified NVA is proposed for network vulnerability assessment derived from Unified Software
Development Process or Unified Process, it is a popular iterative and incremental software development
process framework.
Reusability Metrics for Object-Oriented System: An Alternative ApproachWaqas Tariq
Object-oriented metrics plays an import role in ensuring the desired quality and have widely been applied to practical software projects. The benefits of object-oriented software development increasing leading to development of new measurement techniques. Assessing the reusability is more and more of a necessity. Reusability is the key element to reduce the cost and improve the quality of the software. Generic programming helps us to achieve the concept of reusability through C++ Templates which helps in developing reusable software modules and also identify effectiveness of this reuse strategy. The advantage of defining metrics for templates is the possibility to measure the reusability of software component and to identify the most effective reuse strategy. The need for such metrics is particularly useful when an organization is adopting a new technology, for which established practices have yet to be developed. Many researchers have done research on reusability metrics [2, 9, 3, 4]. In this paper we have proposed four new independent metrics Number of Template Children (NTC), Depth of Template Tree (DTT) Method Template Inheritance Factor (MTIF) and Attribute Template Inheritance Factor (ATIF), to measure the reusability for object-oriented systems.
Automatically bridging UML profiles into MOF metamodelsIvano Malavolta
27th August 2015. My presentation at SEAA 2015 (http://paginas.fe.up.pt/~dsd-seaa-2015/) about our approach for autmatically bridging UML profiles into MOF metamodels. SEAA 2015 is the 41st Euromicro Conference on Software Engineering and Advanced Applications, and it has been held in 26 - 28 August 2015, Funchal, Madeira, Portugal.
Accompanying paper:
http://www.ivanomalavolta.com/files/papers/SEAA_2015.pdf
Abstract:
In Model-Driven Engineering, UML profiles and MOF-based Domain Specific Modeling Languages (DSMLs) are the most used approaches for describing domain specific applications. The choice of the right approach depends on several aspects, such as tool support, expressivity, complexity of models, company policies. In general, profiled UML models are very much used since they are intuitive for designers and model editors already exist, however they are intrinsically complex for model manipulation (e.g., transformation, analysis); conversely, domain specific models are more concise and easy to be manipulated, but they require an initial effort in terms of designers training and model editors development.
In this paper we propose an approach that allows getting the best of the two worlds: on one side designers can use UML profiles familiar to them, on the other side DSML models (automatically generated from profiled UML models) enable a better model manipulation. Our approach is based on an automatic bridge between UML profiles and MOF metamodels (which are the main artifacts of MOF-based DSMLs). The bridge is transparent to the user since it autonomously operates both on UML profiles and all the involved models. The bridge is realized through model transformation techniques in the Eclipse platform. In this paper we show its application on a case study based on SysML.
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...ijcsit
Nowadays, in the world of industry end-users of business rules inside huge or small companies claims that
it’s so hard to understand the rules either because they are hand written by a specific structural or
procedural languages used only inside their organizations or because they require a certain understanding
of the back-end process. As a result, a high need for a better management system that is easy to use, easy to
maintain during the evolution process has increased. In this paper, the emphasis is put on building a
business rule management system (BRMS) as a graphical editor for editing the models in a flexible agile
manner with the assistant of ATL and Sirius frameworks within Eclipse platform. Thus, the proposed
solution, on one hand, solves the problem of wasting resources dedicated for updating the rules and on the
other hand it guarantees a great visibility and reusability of the rules.
PYFML- A TEXTUAL LANGUAGE FOR FEATURE MODELINGijseajournal
The Feature model is a typical approach to capture variability in a software product line design and implementation. For that, most works automate feature model using a limited graphical notation represented by propositional logic and implemented by Prolog or Java programming languages. These works do not properly combine the extensions of classical feature models and do not provide scalability to implement large size problem issues. In this work, we propose a textual feature modeling language based on Python programming language (PyFML), that generalizes the classical feature models with instance feature cardinalities and attributes which be extended with highlight of replication and complex logical and mathematical cross-tree constraints. textX Meta-language is used for building PyFML to describe and organize feature model dependencies, and PyConstraint Problem Solver is used to implement feature model variability and its constraints validation. The work provides a textual human-readable language to represent feature model and maps the feature model descriptions directly into the object-oriented representation to be used by Constraint Problem Solver for computation. Furthermore, the proposed PyFML makes the notation of feature modeling more expressive to deal with complex software product line representations and using PyConstraint Problem Solver.
Migrating existing projects to Rational solutionsEinar Karlsen
The benefits of introducing new IBM Rational tools into an existing
project often clearly outweigh the difficulties associated with making a change midstream. Read about the various techniques you can use to manage the process.
BPM-X Pattern-based model transformations (v2)BPM-Xchange
Model data conversions can be achieved with a pattern-based transformation engine, a component included into the BPM-Xchange® enterprise application integration (EAI) software.
Computer Aided Process Planning Using Neutral File Step for Rotational PartsRSIS International
Present investigation is on process planning using neutral file with format STEP for rotational parts with use of computer. CAE systems involved in every stage of product life cycle mainly uses the product data produced by the CAD systems and integrated manufacturing data produced by CAPP and CAM systems. As the degree of automation and CAD/CAM integration increases, the inclusion of high level information with the product data and its seamless flow in CAD-CAM-CNC chain becomes a necessity. The objective of this work is to develop a Computer Aided Process Planning system for rotational parts using ISO 10303 standard STEP AP224 data exchange file, enabling the inclusion of high level information about the product besides geometry. The developed system aims to incorporate the small and medium sized manufacturing enterprises into the e-manufacturing chain by adopting the NC-code based CNC machine tools without any modification of the controllers.
When talking about modeling, I think there will be a bundle of terms that will come to our mind, UML, domain driven development, DSL, forward/reverse enginerring, MDD, MDA, BPMN. These technology or methodology have been there for years; And obviously, modeling has proven itself to provide value by improving communication, business-alignment, quality, and productivity. Its applicability includes a number of disciplines such as analysis, design, or development. But why aren’t we all doing Model Driven Development yet?
OMG Specifications for Enterprise InteroperabilityBrian Elvesæter
B. Elvesæter and A.-J. Berre, "OMG Specifications for Enterprise Interoperability", paper presentation at IESA 2010 Workshop “Standards - a foundation for Interoperability”, Coventry, United Kingdom, 13 April 2010.
Model-Driven Generation of MVC2 Web Applications: From Models to CodeIJEACS
Computer systems engineering is based,
increasingly, on models. These models permit to describe the
systems under development and their environment at different
abstraction levels. These abstractions allow us to conceive
applications independently of target platforms. For a long
time, models have only constituted a help for human users,
allow to manually develop the final code of computer
applications. The Model-Driven Engineering approach (MDE)
consists of programming at the level of models, represented as
an instance of a meta-model, and using them for generating the
end code of applications. The MDA (Model-Driven
Architecture) is a typical model-driven engineering approach
to application design. MDA is based on the UML standard to
define models and on the meta-modeling environment (MOF)
[1] for model-level programming and code generation. The
code generation operation is the subject of this paper. Thus, in
this work, we explain the code generation of MVC2 Web
application by using the M2M transformation (ATL
transformation language) then the M2T transformation. To
implement this latter we use the Acceleo generator which is a
generator language. In the M2T transformation, we use the
PSM model of Struts2 already generated by M2M
transformation as an input model of Acceleo generator. This
transformation is validated by a case study. The main goal of
this paper is to achieve the end-to-end code generation.
The development of embedded applications (such as Wireless Sensor Network protocols) often
requires a shift to formal specifications. To insure the reliability and the performance of the
WSNs, such protocols must be designed following some methods reducing error rate. Formal
methods (as Automata, Petri nets, algebra, logics, etc.) were largely used in the specification of
these protocols, their analysis and their verification. After that, their implementation is an
important phase to deploy, test and use those protocols in real environments. The main
objective of the current paper is to formalize the transformation from high-level specification (in
Timed Automata) to low-level implementation (in NesC language and TinyOs system) and to
automate such transformation. The proposed transformation approach defines a set of rules that
allow the passage between these two levels. We implemented our solution and we illustrated the
proposed approach on a protocol case study for the "humidity" and "temperature" sensing in
WSNs applications.
DESIGN AND DEVELOPMENT OF BUSINESS RULES MANAGEMENT SYSTEM (BRMS) USING ATLAN...ijcsit
Nowadays, in the world of industry end-users of business rules inside huge or small companies claims that
it’s so hard to understand the rules either because they are hand written by a specific structural or
procedural languages used only inside their organizations or because they require a certain understanding
of the back-end process. As a result, a high need for a better management system that is easy to use, easy to
maintain during the evolution process has increased. In this paper, the emphasis is put on building a
business rule management system (BRMS) as a graphical editor for editing the models in a flexible agile
manner with the assistant of ATL and Sirius frameworks within Eclipse platform. Thus, the proposed
solution, on one hand, solves the problem of wasting resources dedicated for updating the rules and on the
other hand it guarantees a great visibility and reusability of the rules.
PYFML- A TEXTUAL LANGUAGE FOR FEATURE MODELINGijseajournal
The Feature model is a typical approach to capture variability in a software product line design and implementation. For that, most works automate feature model using a limited graphical notation represented by propositional logic and implemented by Prolog or Java programming languages. These works do not properly combine the extensions of classical feature models and do not provide scalability to implement large size problem issues. In this work, we propose a textual feature modeling language based on Python programming language (PyFML), that generalizes the classical feature models with instance feature cardinalities and attributes which be extended with highlight of replication and complex logical and mathematical cross-tree constraints. textX Meta-language is used for building PyFML to describe and organize feature model dependencies, and PyConstraint Problem Solver is used to implement feature model variability and its constraints validation. The work provides a textual human-readable language to represent feature model and maps the feature model descriptions directly into the object-oriented representation to be used by Constraint Problem Solver for computation. Furthermore, the proposed PyFML makes the notation of feature modeling more expressive to deal with complex software product line representations and using PyConstraint Problem Solver.
Migrating existing projects to Rational solutionsEinar Karlsen
The benefits of introducing new IBM Rational tools into an existing
project often clearly outweigh the difficulties associated with making a change midstream. Read about the various techniques you can use to manage the process.
BPM-X Pattern-based model transformations (v2)BPM-Xchange
Model data conversions can be achieved with a pattern-based transformation engine, a component included into the BPM-Xchange® enterprise application integration (EAI) software.
Computer Aided Process Planning Using Neutral File Step for Rotational PartsRSIS International
Present investigation is on process planning using neutral file with format STEP for rotational parts with use of computer. CAE systems involved in every stage of product life cycle mainly uses the product data produced by the CAD systems and integrated manufacturing data produced by CAPP and CAM systems. As the degree of automation and CAD/CAM integration increases, the inclusion of high level information with the product data and its seamless flow in CAD-CAM-CNC chain becomes a necessity. The objective of this work is to develop a Computer Aided Process Planning system for rotational parts using ISO 10303 standard STEP AP224 data exchange file, enabling the inclusion of high level information about the product besides geometry. The developed system aims to incorporate the small and medium sized manufacturing enterprises into the e-manufacturing chain by adopting the NC-code based CNC machine tools without any modification of the controllers.
When talking about modeling, I think there will be a bundle of terms that will come to our mind, UML, domain driven development, DSL, forward/reverse enginerring, MDD, MDA, BPMN. These technology or methodology have been there for years; And obviously, modeling has proven itself to provide value by improving communication, business-alignment, quality, and productivity. Its applicability includes a number of disciplines such as analysis, design, or development. But why aren’t we all doing Model Driven Development yet?
OMG Specifications for Enterprise InteroperabilityBrian Elvesæter
B. Elvesæter and A.-J. Berre, "OMG Specifications for Enterprise Interoperability", paper presentation at IESA 2010 Workshop “Standards - a foundation for Interoperability”, Coventry, United Kingdom, 13 April 2010.
Model-Driven Generation of MVC2 Web Applications: From Models to CodeIJEACS
Computer systems engineering is based,
increasingly, on models. These models permit to describe the
systems under development and their environment at different
abstraction levels. These abstractions allow us to conceive
applications independently of target platforms. For a long
time, models have only constituted a help for human users,
allow to manually develop the final code of computer
applications. The Model-Driven Engineering approach (MDE)
consists of programming at the level of models, represented as
an instance of a meta-model, and using them for generating the
end code of applications. The MDA (Model-Driven
Architecture) is a typical model-driven engineering approach
to application design. MDA is based on the UML standard to
define models and on the meta-modeling environment (MOF)
[1] for model-level programming and code generation. The
code generation operation is the subject of this paper. Thus, in
this work, we explain the code generation of MVC2 Web
application by using the M2M transformation (ATL
transformation language) then the M2T transformation. To
implement this latter we use the Acceleo generator which is a
generator language. In the M2T transformation, we use the
PSM model of Struts2 already generated by M2M
transformation as an input model of Acceleo generator. This
transformation is validated by a case study. The main goal of
this paper is to achieve the end-to-end code generation.
The development of embedded applications (such as Wireless Sensor Network protocols) often
requires a shift to formal specifications. To insure the reliability and the performance of the
WSNs, such protocols must be designed following some methods reducing error rate. Formal
methods (as Automata, Petri nets, algebra, logics, etc.) were largely used in the specification of
these protocols, their analysis and their verification. After that, their implementation is an
important phase to deploy, test and use those protocols in real environments. The main
objective of the current paper is to formalize the transformation from high-level specification (in
Timed Automata) to low-level implementation (in NesC language and TinyOs system) and to
automate such transformation. The proposed transformation approach defines a set of rules that
allow the passage between these two levels. We implemented our solution and we illustrated the
proposed approach on a protocol case study for the "humidity" and "temperature" sensing in
WSNs applications.
Using Model-Driven Engineering for Decision Support Systems Modelling, Implem...CSCJournals
Following the principle of everything is object, software development engineering has moved towards the principle of everything is model, through Model Driven Engineering (MDE). Its implementation is based on models and their successive transformations, which allow starting from the requirements specification to the code’s implementation. This engineering is used in the development of information systems, including Decision-Support Systems (DSS). Here we use MDE to propose an DSS development approach, using the Multidimensional Canonical Partitioning (MCP) design approach and a design pattern. We also use model’s transformation in order to obtain not only implementation codes, but also data warehouse feeds.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Model-Driven Architecture for Cloud Applications Development, A survey Editor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research problems.
Integrating profiling into mde compilersijseajournal
Scientific computation requires more and more performance in its algorithms. New massively parallel
architectures suit well to these algorithms. They are known for offering high performance and power
efficiency. Unfortunately, as parallel programming for these architectures requires a complex distribution
of tasks and data, developers find difficult to implement their applications effectively. Although approaches
based on source-to-source intends to provide a low learning curve for parallel programming and take
advantage of architecture features to create optimized applications, programming remains difficult for
neophytes. This work aims at improving performance by returning to the high-level models, specific
execution data from a profiling tool enhanced by smart advices computed by an analysis engine. In order to
keep the link between execution and model, the process is based on a traceability mechanism. Once the
model is automatically annotated, it can be re-factored aiming better performances on the re-generated
code. Hence, this work allows keeping coherence between model and code without forgetting to harness the
power of parallel architectures. To illustrate and clarify key points of this approach, we provide an
experimental example in GPUs context. The example uses a transformation chain from UML-MARTE
models to OpenCL code.
A service-oriented cloud modeling method and process IJECEIAES
The transition of software development from web to cloud has been accelerated. The development of cloud services requires a modeling method that reflects the characteristics of cloud including personalized service, resource sharing service, grouped and distributed services, and crossplatform operability. This study aimed to suggest a method of developing UML-based cloud services suitable for the characteristics of cloud services. A cl oud service metamodel was defined using cloud applications’ characteristic modeling elements, and after that, how these cloud modeling elements are expressed into UML modeling elements was defined with an integrated metamodel between cloud and UML. By applying this hierarchical cloud metamodel, an MDA and MVC-based service-oriented cloud modeling process was established. By doing so, it will be possible to easily design services (applications) and solutions that are suitable for cloud computing environments, and in particular, to create hierarchical reuse models by the level of the abstraction of model-driven development.
Automatic generation of business process models from user storiesIJECEIAES
In this paper, we propose an automated approach to extract business process models from requirements, which are presented as user stories. In agile software development, the user story is a simple description of the functionality of the software. It is presented from the user's point of view and is written in natural language. Acceptance criteria are a list of specifications on how a new software feature is expected to operate. Our approach analyzes a set of acceptance criteria accompanying the user story, in order, first, to automatically generate the components of the business model, and then to produce the business model as an activity diagram which is a unified modeling language (UML) behavioral diagram. We start with the use of natural language processing (NLP) techniques to extract the elements necessary to define the rules for retrieving artifacts from the business model. These rules are then developed in Prolog language and imported into Python code. The proposed approach was evaluated on a set of use cases using different performance measures. The results indicate that our method is capable of generating correct and accurate process models.
Application of SHAPE Technologies in Production and Process OptimizationBrian Elvesæter
B. Elvesæter, E. Landre, and A.-J. Berre, "Application of SHAPE Technologies in Production and Process Optimization", paper presentation at IESA 2010 Workshop “Use of MDI/SOA concepts in Industry”, Coventry, United Kingdom, 13 April 2010.
RESILIENT INTERFACE DESIGN FOR SAFETY-CRITICAL EMBEDDED AUTOMOTIVE SOFTWAREcsandit
The replacement of the former, purely mechanical, functionality with mechatronics-based solutions, the introduction of new propulsion technologies, and the connection of cars to their environment are just a few reasons for the continuously increasing electrical and/or electronic
system (E/E system) complexity in modern passenger cars. Smart methodologies and techniques have been introduced in system development to cope with these new challenges. A topic that is often neglected is the definition of the interface between the hardware and software subsystems.
However, during the development of safety-critical E/E systems, according to the automotive
functional safety standard ISO 26262, an unambiguous definition of the hardware-software interface (HSI) has become vital. This paper presents a domain-specific modelling approach for mechatronic systems with an integrated hardware-software interface definition feature. The
newly developed model-based domain-specific language is tailored to the needs of mechatronic system engineers and supports the system’s architectural design including the interface definition, with a special focus on safety-criticality.
RESILIENT INTERFACE DESIGN FOR SAFETY-CRITICAL EMBEDDED AUTOMOTIVE SOFTWAREcscpconf
The replacement of the former, purely mechanical, functionality with mechatronics-based solutions, the introduction of new propulsion technologies, and the connection of cars to their environment are just a few reasons for the continuously increasing electrical and/or electronic system (E/E system) complexity in modern passenger cars. Smart methodologies and techniques have been introduced in system development to cope with these new challenges. A topic that is often neglected is the definition of the interface between the hardware and software subsystems. However, during the development of safety-critical E/E systems, according to the automotive functional safety standard ISO 26262, an unambiguous definition of the hardware-software interface (HSI) has become vital. This paper presents a domain-specific modelling approach for mechatronic systems with an integrated hardware-software interface definition feature. The newly developed model-based domain-specific language is tailored to the needs of mechatronic system engineers and supports the system’s architectural design including the interface definition, with a special focus on safety-criticality
Model-Driven Development of Web Applicationsidescitation
Over the last few years Model-Driven Development (MDD) has been regarded as
the future of Software Engineering, offering architects the possibility of creating artifacts to
illustrate the design of the software solutions, contributing directly to the implementation of
the product after performing a series of model transformations on them. The model-to-text
transformations are the most important operations from the point of view of the automatic
code generation. The automatic generation or the fast prototyping of applications implies an
acceleration of the development process and a reduction of time and effort, which could
materialize in a noticeable cost reduction. This paper proposes a practical approach for the
model-based development of web applications, offering a solution for the layered and
platform independent modeling of web applications, as well as for the automatic generation
of software solutions realized using the ASP.NET technology.
Automated software modernisation is the best solution that is fast, low cost, preserves legacy value and is less risky by comparison to the traditional methodology of a re-write or replacement by packaged ERP. Object Management Groups (OMGs) Model Driven Architecture (MDA) methodology provides an automated model-driven reverse engineering and forward engineering process called Architecture Driven Modernisation (ADM) which has already been successfully adopted by a variety of high profile organisations such as Boeing, U.S. Air Force, Raytheon, EDS, Thales (European Aerospace) and numerous governments worldwide.
WORPCLOUD LTD is focused on being an Automated Software Modernisation Expert. We use OMG compliant tools and parsing techniques to extract all system information, business semantics and software artifacts into an XML repository called the Abstract Syntax Tree Metamodel. Next we use MDAs automated transformation procedures to generate new source code of your choice. Manual architecting of the target system are also performed before the transformation thus ensuring; speed, low cost and accuracy of the automated process combined with the flexibility & insight of human analysis.
Research reveals that application modernisation and migration budgets are currently very strong, covering between 25% to 71% of most companies IT budgets in 2013/2014. This clearly indicates that application modernisation is one of the most significant issues affecting companies – due to high software maintenance costs, low business flexibility and crippled integration and interoperability. Software modernisation is the sole remedy for these problems and your organisation can make huge savings by modernising.
Automated software modernisation is the best solution that is fast, low cost, preserves legacy value and is less risky by comparison to the traditional methodology of a re-write or replacement by packaged ERP. Object Management Groups (OMGs) Model Driven Architecture (MDA) methodology provides an automated model-driven reverse engineering and forward engineering process called Architecture Driven Modernisation (ADM) which has already been successfully adopted by a variety of high profile organisations such as Boeing, U.S. Air Force, Raytheon, EDS, Thales (European Aerospace) and numerous governments worldwide.
WORPCLOUD LTD is focused on being an Automated Software Modernisation Expert. We use OMG compliant tools and parsing techniques to extract all system information, business semantics and software artifacts into an XML repository called the Abstract Syntax Tree Metamodel. Next we use MDAs automated transformation procedures to generate new source code of your choice. Manual architecting of the target system are also performed before the transformation thus ensuring; speed, low cost and accuracy of the automated process combined with the flexibility & insight of human analysis.
Research reveals that application modernisation and migration budgets are currently very strong, covering between 25% to 71% of most companies IT budgets in 2013/2014. This clearly indicates that application modernisation is one of the most significant issues affecting companies – due to high software maintenance costs, low business flexibility and crippled integration and interoperability. Software modernisation is the sole remedy for these problems and your organisation can make huge savings by modernising.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
PHP modernization approach generating KDM models from PHP legacy code
1. Bulletin of Electrical Engineering and Informatics
Vol. 9, No. 1, February 2020,pp. 247~255
ISSN: 2302-9285,DOI: 10.11591/eei.v9i1.1269 247
Journal homepage: http://beei.org
PHP modernization approach generating KDM models from
PHP legacy code
Amine Moutaouakkil, Samir Mbarki
MISC Laboratory, Faculty of Science, Ibn Tofail University BP133, Kenitra, Morocco
Article Info ABSTRACT
Article history:
Received Jul 15, 2018
Revised Oct 7, 2019
Accepted Nov 12, 2019
With the rise of new web technologies such as web 2.0, Jquery, Bootstrap.
Modernizing legacy web systems to benefit from the advantages of the new
technologies is more and more relevant. The migration of a system from
an environment to another is a time and effort consuming process; it involves
a complete rewrite of the application adapted to the target platform.
To realize this migration in an automated and standardized way,
many approaches have tried to define standardized engineering processes.
Architecture Driven Modernization (ADM) defines an approach
to standardize and automate the reengineering process. We defined an ADM
approach to represent PHP web applications in the highest level
of abstraction models. To do this, we have used software artifacts as an entry
point. This paper describes the extraction process, which permits discovering
and understanding of the legacy system. Moreover, generate models
to represent the system in an abstract way.
Keywords:
Abstract syntax tree
meta-model(ASTM)
Architecture-driven
modernization (ADM)
Knowledge discovery model
(KDM)
Model-driven engineering
Reverse engineering
This is an open access article under the CC BY-SA license.
Corresponding Author:
Amine Moutaouakkil,
MISC Laboratory,Faculty of Science, Ibn Tofail University,
BP133, Kenitra, Morocco.
Email: amine.moutaouakkil@hotmail.fr
1. INTRODUCTION
Basing more and more their business on IT solutions, organizations using web technology systems
have to modernize their legacy systems to be aligned with competition. Most of websites and web
applications are written in PHP language (82,5% in 2017-02-11). The need to immigrate both from and to
this language is increasing. The PHP language is constantly evolving, more and more new frameworks
and new standartsare available to use which make users in the need of migrating their PHP Web applications
to anotherlanguage or to a new version of PHP language.
It is necessary to have a standardized an automatic process of reengineering to minimize time
and costs. Currently, there is an initiative to standardize and automa te the reengineering process.
The Architecture-driven Modernization (ADM) [1] is an Object Management Group (OMG) [2] initiative
related to the reverse engineering domain. This initiative has been proposed to enhance the classical reverse
engineering processes by introducing the Model-driven Architecture (MDA) [3] concepts. In the same way
that the MDA approach provides a leading role to the models, the ADM approach introduces several
conceptsto formalize the RE [4] processes based on models too.
It is necessary to realize methods for migrating PHP Web applications, but currently there are no
relied ADM based methodesmakingit. We defined an ADM based approach to represent PHP source code in
form of KDM models. This approach has taken advantage of the potential of the Architecture Driven
Modernization (ADM) to modeling the knowledge, which will be extracted from the legacy
program artifacts.
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 247 – 255
248
In this article, we describe the generation of models to represent the legacy system at the highest
level of abstraction. The rest of this article is organized as follows: section 2 describes the process based on
the ADM approach and describes their different phases. In section 3, we illustrate our proposed approach by
a case study. Section 4 makes the analysis of the process result. In section 5 we list some interesting related
works. Finally, section 6 concludes the work and presents the perspectives.
2. RESEARCH METHOD
- MDRE
Model Driven Reverse Engineering (MDRE) [5] is the application of Model Driven Engineering
(MDE) principles and techniques to Reverse Engineering (RE) in order to get model based views from legacy
systems. The MDRE is based on two main phases: Model Discovery which is extracting information from
source code by using parsers, and then represent this information in form of models. And Model
Understanding which is applying Model to Model transformations on extracted information to get a higher
abstraction level presentation of the information.
- ADM
Architecture Driven Modernization (ADM) is an initiative proposed by OMG to standardize
and automate the reengineering process. ADM is based on three standards meta-models to represent
the information involved in a software reengineering process. In the current study, only Abstract Syntax Tree
Meta-Model (ASTM) [6] and Knowledge Discovery Meta -Model (KDM) standards are useful for
the purpose. ASTM allows modeling the legacy code in form of Abstract Syntax Tree.
Otherwise, KDM [7] allows defining models at a higher abstraction level representing semantic information
about a software system.
2.1. Model discovery
Discovering the legacy system corresponding PSM models by analyze the source code constitutes
the first step. PSM models define the structures and relationships between system elements. UML Class
Diagram for example is a PSM model that can be generated by many UML tools: PowerAMC [8],
Enterprise-Architect [9], Objecteering [10], Modelio [11], Papyrus [12]. Model discovery allows
the extraction of information from the system and its representation in concrete models such as ASTM.
To represent the information in PHP code in the form of ASTM models, we have found out that we have to
write a PHP Discoverer first so that existing PHP code can be represented as a model. After dealing with
the creation and operation of discoverers. It turned out that the incorporation and implementation
is extremely complex.
We looked for alternative ways to transform PHP code into models. After searching and trying
the available parsers for PHP, one of them was interesting, glayzzle/php-parser [13]. This parser is working
well, it parses the PHP code and gets an abstract syntax tree (AST), and obtained tree is an intermediate step
to get ASTM models aftertransformations.
2.2. Model understanding
Model understanding consists in the transformation of models to get higher abstract models.
In our study, we need to make two transformations: Apply model-to-model transformation on the AST tree
to get ASTM model, which is a Generic ASTM model. Apply model-to-model transformation on the ASTM
model to get KDM model.
- QVT Transformation Standard
QVT (Query/View/Transformation) [14] is a standard set of languages for model
transformation defined by the OMG. The QVT standard defines three model transformation languages.
All of them operate on models which conform to Meta-Object Facility (MOF) 2.0 metamodels;
the transformation states which metamodels are used. QVT Operational which we use, it is an imperative
language designed for writing unidirectional transformations. Models extraction process a shown in Figure 1.
- ASTM
Current OMG ASTM meta-model needs to be simplified, to make the transformation easier for our
example.ASTM meta-modelprovided by OMG and Simplified one a shown Figure 2.
- KDM
KDM meta-model provided by OMG a shown in Figure 3. KDM is a standard defined by OMG for
the representation of software systems. This meta-model allows to represent systems artifacts in a high level
of abstraction. The KDM specification consists of 12 packages that are arranged into the following
four layers [15].
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
PHP modernization approach generating KDM models from PHP legacy code (Amine Moutaouakkil)
249
Figure 1. Models extraction process
Figure 2. ASTM meta-modelprovided by OMG and simplified one
Figure 3. KDM meta-modelprovided by OMG
PHP
Source
code
Specific
ASTM
Model
Generic
ASTM
Model
KDM
Model
M2M
Tranformation
Parser
M2M
Tranformation
Core,
KDM,
Source
Action
Code
UI
Data
Plateform
Event
Conceptual
Infrastructure
Layer
Abstractions
Layer
Resource
Layer
Program
Elements Layer
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 247 – 255
250
In our approach,we focuson Code package.The Code package represents programming elements as used by
programming languages: data types,procedures, classes, methods,variables,etc.
- AST to ASTM QVT-O Transformation script
We have defined a mapping table between AST model elements and ASTM model elements.
Based on the mapping table, we have written a QVT-O transformation script to map AST model elements to
ASTM model elements. AST elementsto ASTM elements mappinga shown in Ta ble 1.
Table 1. AST elements to ASTM elements mapping
AST element ASTM element
ChildrenType OwnedElementsType1
BodyType BodyDeclarationsType
ArgumentsType ParametersType
modeltype AST uses 'http://AstMM';
modeltype ASTM uses 'http://AstmMM';
transformation ast2astm(inast : AST, out ASTM);
main() {
ast.objects()[AST::ChildrenType]->map R1();
ast.objects()[AST::BodyType]->map R2();
…
}
mapping AST::ChildrenType::R1() : ASTM::OwnedElementsType1 {
if (self.kind<>'inline'){ name := self.name; }
}
mapping AST::BodyType::R2(): ASTM::BodyDeclarationsType {
if (self.kind='property'){
type := self.kind;
modifier := self.map R21();
fragments := self.map R22();
}
else if (self.kind='method'){
type := self.kind;
modifier := self.map R21();
fragments := self.map R22();
parameters :=self.arguments.mapR23();
}
}
…
- ASTM to KDM QVT-O Transformation script
We have defined a mapping table between ASTM model elements and KDM model elements.
Based on the mapping table, we have written a QVT-O transformation script to map ASTM model elements
to KDM model elements. ASTM elements to KDM elements mappinga shown in Table 2.
modeltype ASTM uses 'http://AstmMM';
modeltype KDM uses 'http://KdmMM';
transformation astm2kdm(inastm : ASTM, out KDM);
main() {
astm.rootObjects()[ASTM::Model]->map R0();
astm.objects()[ASTM::ModifierType]->map R1();
astm.objects()[ASTM::OwnedElementsType1]->map R2();
astm.objects()[ASTM::OwnedElementsType1]->map R21();
…
}
mapping ASTM::Model::R0() : KDM::code::CodeModel{ name := self.name; }
mapping ASTM::ModifierType::R1() : KDM::kdm::Attribute {
value := self.visibility.toString();
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
PHP modernization approach generating KDM models from PHP legacy code (Amine Moutaouakkil)
251
}
mapping ASTM::OwnedElementsType1::R2() : KDM::code::CodeElement when {self.type<>'Class'}{
name := self.name; }
mapping ASTM::OwnedElementsType1::R21(): KDM::code::ClassUnit when {self.type='Class'}{
var a := new KDM::code::ClassUnit();
a.name :=self.name;
result.codeElement := a;
}
…
Table 2. ASTM elements to KDM elements mapping
ASTM element KDM element
ModifierType kdm:Attribute
OwnedElementsType1 code:CodeElement
OwnedElementsType1 code:ClassUnit
BodyDeclarationsType code:CodeElement
ParametersType code:ParameterUnit
3. RESULTS AND DISCUSSION
3.1. Case study example
Models will be extracted from a simple PHP class: Vegetable Class which has two properties,
a constructor and two functions.
<?php
class Vegetable {
private $edible;
private $color;
public function __construct($edible,$color) {
$this->edible = (int) $edible;
$this-> color = (int) $color;
}
public function is_edible () { return $this-> edible; }
public function what_color() { return $this-> color; }
}
?>
3.2. Result
AST tree
<?xml version="1.0" encoding="UTF-8" ?>
<root>
<kind>program</kind>
<children>
<kind>class</kind>
<name>Vegetable</name>
<isAnonymous>false</isAnonymous>
<extends/>
<implements/>
<body>
<kind>property</kind>
<name>edible</name>
<value/>
<isAbstract>false</isAbstract>
<isFinal>false</isFinal>
<visibility>private</visibility>
<isStatic>false</isStatic>
</body>
<body>
<kind>property</kind>
<name>color</name>
<value/>
<isAbstract>false</isAbstract>
<isFinal>false</isFinal>
<visibility>private</visibility>
<isStatic>false</isStatic>
</body>
<body>
<kind>method</kind>
<name>__construct</name>
<arguments>
<kind>parameter</kind>
<name>edible</name>
<value/>
<type/>
<byref>false</byref>
<variadic>false</variadic>
<nullable>false</nullable>
</arguments>
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
PHP modernization approach generating KDM models from PHP legacy code (Amine Moutaouakkil)
253
<code:ParameterUnit/>
<code:CodeElement/>
<code:CodeElement name="what_color"/>
<code:ParameterUnit/>
<code:CodeElement/>
</xmi:XMI>
3.3. Related works
More and more research projects use the mechanisms offered by the MDA, in among these projects
include eg:
- ADM-Based Hybrid Model Transformation forObtaining UML Models from PHP Code [16]
- Improving Consistency of UML Diagrams and Its Implementation Using Reverse Engineering
Approach [17]
- Model Driven Approach based on Interaction Flow Modeling Language to Generate Rich Internet
Applications [18]
- Java Swing Modernization Approach: Complete Abstract Representation based on Static and
Dynamic Analysis [19]
- A Model Driven Reverse Engineering Framework for Extracting Business Rules out of
a Java Application [20]
- Reverse Engineering Applied to CMS-Based Web Applications Coded in PHP: A Proposal
of Migration [21]
- Combining UML Class and Activity Diagrams for MDA Generation of MVC 2 Web Applications [22]
- MoDisco Project [23]
ADM-Based Hybrid Model Transformation for Obtaining UML Models from PHP Code (2019).
This paper describes a model transformation process performing reverse engineering of PHP web
applications. Model to model transformations are implemented using ATL [24] (Atlas Transformation
Language). The obtained modelsare expressed in UML.
Improving Consistency of UML Diagrams and Its Implementation Using Reverse Engineering
Approach (2018). This paper describse the development of a tool that improve the consistency between
Unified Modeling Language (UML) design models and its C# implementation using reverse engineering
approach. This approach also takes code source as input a pplying to it the reverse eenginering process,
and then it takes the models as input too to verivying the consistency. This approach does not generate
models asartifacts.
A Model Driven Approach based on Interaction Flow Modeling Language to Generate Rich Internet
Applications (2016). This paper presents a model driven approach to generat GUI for Rich Internet
Application. Using the language IFML adopted by the Object Management Group, Query View
Transformation (QVT) for model transformations and Acceleo for code generation, the approach allows
to generate a RIA focusing on the graphical aspect of the application.
Java Swing Modernization Approach: Complete Abstract Representation based on Static and
Dynamic Analysis (2016). This paper defines an ADM-based method to define abstract models representing
the GUI knowledge and automate the generation of these models through transformation chains. A Model
Driven Reverse Engineering Framework for Extracting Business Rules out of a Java Application (2012). This
paper proposes a process of extracting business rules out of a Java application,
by identifying business rules from the source code. And presenting the extracted business rules
through models.
Reverse Engineering Applied to CMS-Based Web Applications Coded in PHP: A Proposal
of Migration (2013). This paper defines an ADM-based method for migrating CMS-based Web applications.
This method is focused on open-source CMS which are implemented in PHP. It makes the implementation
of the reverse engineering phase: ASTM models are extracted from the PHP code by text-to-model (T2M)
transformation implemented by a source code parser, KDM models are generated from the previous ASTM
models by means of M2M transformations. and by using M2M transformations the CMS Model which
conforms to the CMS Common Metamodel is generated. M2M transformations are implemented using ATL
Transformation Language.
Combining UML Class and Activity Diagrams for MDA Generation of MVC 2 Web Applications
(2013). This paper defines an MDA based process that integrates UML class diagram and Activity diagram,
in order to generate MVC2 web model of e-commerce web applications. Model-to-model transformations
are implemented using ATL Transformation Language, Model to text transformation are implemented using
JET language [25].
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 9, No. 1, February 2020 : 247 – 255
254
MoDisco Project (2014). The eclipse plugin « Modisco » provides the capability of extracting
information from Java software artifacts, The model resulting will conform to meta -model included in
Modisco. Model of the abstract syntax tree can be obtained first from the program (based on a generic
meta-model such as OMG ASTM), After a transformation, Model of KDM meta -model is obtained;
KDM allows representing the entire software system and all its entities at both structural and behavioral
levels. Extracted models by Modisco are Ecore models. Modisco is one of rare tools that have allowed to
apply the ADM principles in real. Unfortunately, the current Modisco version does not include any specific
support for PHP code.
3.4. Analysis and discussion
In the ADM approach, KDM plays an important role. It is a meta -model that allows to represent
the structuraland semantic aspect of the software systems artifacts in a high level of abstraction.As a system
is represented in form of KDM models, the immigration to another platform becomes easier. We can notice
that obtained result correspondsto our aim goal.
According to the related works we can conclude that ADM approaches that extra ct ASTM and
KDM models from PHP code and others platforms are rare. Modisco approach stops at the Specific ASTM
level. "java" models extract by Modisco from Java projects are not generic ASTM models. The approach
" Reverse Engineering Applied to CMS-Based Web Applications Coded in PHP: A Proposal of Migration"
is based on in the use of the Xtext [26] plugin witch allows defining the syntax of language, wich involves
to write the PHP syntax in Xtext Grammar. Writing the PHP syntax in xtext language is a hard and
time-consuming task,this task is avoided in our approach by using glayzzle php-parser, our approach helpsto
gain this consumed time.
4. CONCLUSION
This paper presented an ADM based approach that allow obtaining KDM models from PHP source
code. This approach is composed of two phases: 1) extracting AST tree from source code, in this phase
the trees are extracted from the PHP code by text-to-model(T2M) transformations implemented by a source
code parser, 2) Generation of ASTM models, KDM models are generated from the previous ASTM models
by means of M2M transformations.For the implementation of the tree extraction phase, we have used
Galyzzle PHP Parser which has allowed us to extract AST tree from the source code.For the implementation
of the Generation of ASTM and KDM models phase we have implemented transformation rules using
QVT-Operational language. The major contribution is the use of the QVT transformation language defined
by the OMG. In addition, using this approach can reduce the necessary time to make the PHP web
applications migration. As a future work, we will perform similar approach to other platform and compare
high-level abstract results.
REFERENCES
[1] Architecture Driven Modernization (ADM). [Online]. Available: http://adm.omg.org/
[2] Object Management Object (OMG). [Online]. Available: http://www.omg.org/
[3] Model Driven Architecture (MDA). [Online]. Available: http://www.omg.org/mda/
[4] E. J. Chikofsky, J. H. Cross. “Reverse engineering and design recovery: a taxonomy," in IEEE Software, vol. 7,
no.1, pp. 13-17, 1990.
[5] C. Raibulet, F. Arcelli Fontana and M. Zanoni, "Model-Driven Reverse Engineering Approaches: A Systematic
Literature Review," in IEEE Access, vol. 5, pp. 14516-14542, 2017.
[6] Abstract Syntax Tree Meta-Model specification of the OMG. [Online]. Available:
http://www.omg.org/spec/ASTM/1.0/
[7] Knowledge Discovery Meta-Model specification of the OMG. [Online]. Available:
http://www.omg.org/spec/KDM/1.3
[8] Comsoft-direct, PowerAMC. [Online]. Available: http://www.comsoft-direct.fr/poweramc
[9] Sparx systems, Enterprise architect. [Online]. Available: http://www.sparxsystems.com.au/products/ea
[10] Objecteering, Objecteering, the model driven development tool. [Online]. Available: http://www.objecteering.com/
[11] Modeliosoft, the open source modeling environment, Modelio. [Online]. Available: https://www.modelio.org/
[12] A. Lanusse, Y. Tanguy, H. Espinoza, C. Mraidha, S. Gerard, P.Tessier, R. Schnekenburger, H. Dubois, F. Terrier.
“Papyrus UML: an open source toolset for MDA”. Proc. of the Fifth European Conference on Model-Driven
Architecture Foundations and Applications (ECMDA-FA 2009), pp. 1-4, 2009.
[13] NodeJS PHP Parser - extract AST or tokens (PHP5 and PHP7) . [Online]. Available: http://glayzzle.com/
php-parser/
[14] QVT (Query/View/Transformation) standard of the OMG. [Online]. Available: http://www.omg.org/spec/QVT/1.3/
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
PHP modernization approach generating KDM models from PHP legacy code (Amine Moutaouakkil)
255
[15] KDM Technical Overview from KDM Analytics. [Online]. Available:
http://kdmanalytics.com/resources/standards/kdm/technical-overview/
[16] A. Elmounadi, N. Berbiche, N. Sefiani, N. El Moukhi, “ADM-Based Hybrid Model Transformation for Obtaining
UML Models from PHP Code,” International Journal of Embedded Systems (IJES), vol. 7, no. 1, pp. 32-41, 2019.
[17] V. Kaliappan, N. Mohd Ali, “Improving Consistency of UML Diagrams and Its Implementation Using Reverse
Engineering Approach,” Bulletin of Electrical Engineering and Informatics (BEEI). Vol. 7, no. 4,
pp. 665-672, 2018.
[18] S. S. Roubi, M. Erramdani, S. Mbarki, “A Model Driven Approach based on Interaction Flow Modeling Language
to Generate Rich Internet Applications,” International Journal of Electrical and Computer Engineering (IJECE),
vol. 6, no. 6, pp. 3073-3079, 2016.
[19] Z. Gotti, S. Mbarki, “Java Swing Modernization Approach: Complete Abstract Representation based on Static and
Dynamic Analysis,” Proceedings of the 11th International Joint Conference on Software Technologies (ICSOFT).
Lisbon. Vol. 1, pp. 210-219, 2016.
[20] V. Cosentino, J. Cabot, P. Albert, P. Bauquel, J. Perronnet, “A Model Driven Reverse Engineering Framework for
Extracting Business Rules out of a Java Application,” Proceeding RuleML'12 Proceedings of the 6th international
conference on Rules on the Web: research and applications. Montpellier, pp. 17-31, 2012.
[21] F. Trias, V. de Castro, M. López-Sanz, and E. Marcos, “Reverse Engineering Applied to CMS-Based Web
Applications Coded in PHP: A Proposal of Migration. Evaluation of Novel Approaches to Software Engineering,”
8th International Conference (ENASE). Angers, pp. 241-256, 2013.
[22] M. Rahmouni, S. Mbarki, “Combining UML Class and Activity Diagrams for MDA Generation of MVC 2 Web
Applications,” International Review on Computers and Software (IRECOS). vol 8, no. 4, pp. 949-957, 2013.
[23] H. Brunelière, J. Cabota, G. Dupé, F. Madiot, “MoDisco: a Model Driven Reverse Engineering Framework:
Information and Software Technology,” Elsevier, vol 56, no. 8, pp.1012-1032, 2014
[24] S. Mbarki, M. Rahmouni, “Validation of ATL Transformation to Generate a Reliable MVC2 Web Models,”
International Journal of Engineering and Applied Computer Science (IJEACS), vol. 2, no. 3, pp.83-91, 2017.
[25] Eclipse Foundation, “JET.” [Online]. Available: http://www.eclipse.org/modeling/m2t/?project=jet
[26] Xtext project. [Online]. Available: http://www.eclipse.org/Xtext