The data flow diagram has been employed to model the data transformation aspects of proposed systems. An extension of the data flow diagram called the transformation schema is described. The transformation schema yi...
详细信息
The data flow diagram has been employed to model the data transformation aspects of proposed systems. An extension of the data flow diagram called the transformation schema is described. The transformation schema yields a notation and formation rules for building a comprehensive system model. In addition, it supplies a set of execution rules to permit the prediction of the behavior over time of a system modeled in this way. The transformation schema allows the creation and evaluation of 2 different kinds of system models: 1. the essential, and 2. the implementation model. The transformations of the schema can depict software running on digital processors and hard-wired digital or analog circuits. The stores of the schema can describe disk files and tables in memory.
In the modern enterprise management thought, the audit management is in the key position, through carrying out the effective audit management work can strengthen the enterprise's self-restraint consciousness, stan...
详细信息
ISBN:
(纸本)9781728186160
In the modern enterprise management thought, the audit management is in the key position, through carrying out the effective audit management work can strengthen the enterprise's self-restraint consciousness, standardize the responsibility and the behavior of the enterprise department and truly realize the incentive effect. This paper mainly studies the mode method exploration of enterprise audit information management system based on data flow diagram. The design process of the audit management system adopts the MVC mode, and stipulates the responsibilities of each component on the basis of reducing the coupling of the model and view components. After the application of the system provides an efficient and practical means for the audit management system, can standardize the internal audit management system of the enterprise, the audit management work for each department can be carried out according to a unified standard;at the same time, it is helpful to strengthen the internal self-restraint of the enterprise, strengthen the assessment of the company department, and effectively ensure the virtuous cycle state of the company's operation.
The paper deals with the intergeneration municipality project on the development of computer literacy in the elderly people with focus on the management of conducted courses. The aim of the paper is to design and prop...
详细信息
ISBN:
(纸本)9783319984469;9783319984452
The paper deals with the intergeneration municipality project on the development of computer literacy in the elderly people with focus on the management of conducted courses. The aim of the paper is to design and propose a model of the project management. The sub-goal is to identify which computer skills attendees of computer literacy courses have and which computer skills they would like to gain or develop. The next issue is to find whether pupils that give lectures to the elderly people have necessary computer skills. The main purpose of the research is to gain current data needed for the updating phase of the long-term project. Key data and findings are collected from own questionnaire investigation and interviews with the municipality, directors of elementary schools, teachers, pupils and attendees which were conducted during computer courses for elderly people. Results and recommendations will be used for the next run of courses that are organized twice a year by municipality in cooperation with primary schools. The biggest ratio of participants can use the Internet followed by email and Skype. MS Excel and Instagram represent the smallest ratio of applications that pupils can use. All other followed applications are used by more than 85%. Results are important for the project team so that they could monitor and evaluate the progress of the project and work out its updated phase.
Security of payment (SOP) issues still persist in the construction industry despite numerous investigations and incremental reforms. Various solutions and policies have been proposed and analysed in-depth in previous ...
详细信息
Security of payment (SOP) issues still persist in the construction industry despite numerous investigations and incremental reforms. Various solutions and policies have been proposed and analysed in-depth in previous studies. However, limited studies have focused on the integration of advanced technologies to address SOP issues. The aim of this research is to develop a comprehensive framework that integrates practical advanced technologies to address SOP issues in the construction industry. A concurrent mixed-method design was adopted to (a) identify the industry's perspective on what advanced technologies can be accepted to address SOP issues through a questionnaire survey, and (b) identify the use of advanced technologies through a live construction project as a case study. Subsequently, a data flow diagram framework was developed to articulate the whole process flow of how the system delivers automatic payments to subcontractors upon the completion of their contractual obligations and work done. This research contributes new and practical insights into the application and integration of smart sensors, oracles, BIM, blockchain technology and smart contracts in addressing SOP issues in the construction industry.
There are many service identification methods (SIMs) to simplify service identification in SOA lifecycle. These SIMs vary in terms of their features (e.g., input artefact, technique). Due to this diversity, few evalua...
详细信息
There are many service identification methods (SIMs) to simplify service identification in SOA lifecycle. These SIMs vary in terms of their features (e.g., input artefact, technique). Due to this diversity, few evaluation frameworks have been proposed to guide organisations in selecting a suitable SIM based on their available input artefacts (e.g., source code, business process). This research concerns with SIMs that consider data flow diagram (DFD) as an input artefact, in order to migrate two legacy systems, modelled with DFD, to SOA. Only two SIMs are found in the literature to identify services based on DFD. However, these SIMs do not provide a way to select among the services identified to be implemented as web services. Therefore, this paper aims to bridge this gap by proposing a new approach for service selection based on DFD to assist organisations in speeding up the process of migrating their legacy systems to SOA.
A new synthetical knowledge representation model that integrates the attribute grammar model with the semantic network model was presented. The model mainly uses symbols of attribute grammar to establish a set of sy...
详细信息
A new synthetical knowledge representation
model that integrates the attribute grammar model with the semantic network model was
presented. The model mainly uses symbols of attribute grammar to establish a set of syntax
and semantic rules suitable for a semantic network. Based on the model,the paper introduces a
formal method defining data flow diagrams (DFD) and also simply explains how to use the
method.
Model transformations are frequently applied in business process modeling to bridge between languages on a different level of abstraction and formality This paper proposes a model transformation from data flow diagram...
详细信息
Model transformations are frequently applied in business process modeling to bridge between languages on a different level of abstraction and formality This paper proposes a model transformation from data flow diagrams(DFD) which have been used widely in structure requirement analysis phase to UML Activity diagrams(UML-AD) which have been used widely in various phases of Object Oriented Development ***, we analyze the elements in DFD and the elements in UML-AD that can be transformed from *** on the corresponding relationships between DFD and UML-AD,the transformation rules from DFD to UML-AD are ***,a case of textbook purchase and sale system is used to verify the feasibility and *** to the proposed method,the business process models that are written by DFD can be easily transformed into the business process modes that are written by UM-AD,which realizes the interoperability between DFD and UML.
Context: Threat analysis is a pillar of security-by-design which plays an important role in the elicitation and refinement of security threats. In preparation for the analysis, a model of the system under analysis e.g...
详细信息
Context: Threat analysis is a pillar of security-by-design which plays an important role in the elicitation and refinement of security threats. In preparation for the analysis, a model of the system under analysis e.g., the data flow diagram (DFD for short) is often created. Problem: Empirical measures of success are important for practitioners that are struggling to meet the current demands for expertise. But no previous work has investigated the role of these diagrams during the validation of identified security threats. Methods: This paper presents an experiment conducted with 98 students in two countries. We measured the impact of the DFD on the perceived and actual effectiveness of validating a list of identified security threats including both fabricated and actual threats. Results: In presence of sequence diagrams, the participants perceived DFDs as more useful. However, when exposed to both a DFD and a sequence diagram, DFDs had no significant impact on the participants’ ability to validate security threats.
data flow diagram (DFD) is an indispensable method to model data processing in software engineering. To analyze DFD rigorously, a formal semantics is demanded. Formal interpretation of DFD and its formal semantics lea...
详细信息
data flow diagram (DFD) is an indispensable method to model data processing in software engineering. To analyze DFD rigorously, a formal semantics is demanded. Formal interpretation of DFD and its formal semantics lead to an accurate and non-ambiguous analysis. Calculus of Communicating System (CCS), a formal approach in concurrent system modeling, could be utilized to describe DFD. Given its CCS description, automation tools generate the state space of the system depicted by DFD, which reflects all the behaviors of the system. However, analyzing the state space only with character expressions is hard for software developers. In this paper, a visual system is introduced to assist developers to analyze and compare the systems by combination of formal methods and visualization techniques.
Ripple effects may occur in modifying software requirements. Without considering such ripple effects, errors in requirements cannot be removed in software development. In this paper, we present a ripple effect analysi...
详细信息
ISBN:
(纸本)9783319976792;9783319976785
Ripple effects may occur in modifying software requirements. Without considering such ripple effects, errors in requirements cannot be removed in software development. In this paper, we present a ripple effect analysis method in software requirements modification for dataflow requirements. This method enables to specify areas of ripple effects of data flow diagrams in deletion and/or modification of requirements. Our method will be illustrated with examples using a prototype system based on the method.
暂无评论