Identifying and Modeling Non-Functional Concerns Relationships
Hakim Bendjenna, Pierre-Jean Charrel, Nacer Eddine Zarour
.
DOI: 10.4236/jsea.2010.38095   PDF    HTML     6,094 Downloads   12,081 Views   Citations

Abstract

Requirements elicitation step is of paramount importance in the requirements engineering process. In the distributed environment of so-called inter-company cooperative information system, this step is a thorny issue. To elicit require-ments for an inter-company cooperative information system, we early proposed a methodology called MAMIE (from MAcro to MIcro level requirements Elicitation) with an accompanied tool. In MAMIE methodology, requirements are the result of composing functional and non-functional concerns. Before non-functional concerns composition, it’s primary to identify relationships between them. According to the most existing approaches, a non-functional concern may have a negative, positive or null contribution on the other non-functional concerns. In this paper, we argue that using only these three contributions types is not sufficient to express relationships which may exist between non-functional concerns. Thus, we propose a process which aims to identify non-functional concerns’ relationships and model them using a fuzzy cognitive map. The resulting model is composed of non-functional concerns, relationships between them and the weight of these relationships expressed with linguistics fuzzy values. Using fuzzy cognitive maps to model non-functional concerns relationships allows moving from the conventional modelling toward developing a computer based model. An example from the textile industry is used to illustrate the applicability of our process.

Share and Cite:

Bendjenna, H. , Charrel, P. and Zarour, N. (2010) Identifying and Modeling Non-Functional Concerns Relationships. Journal of Software Engineering and Applications, 3, 820-826. doi: 10.4236/jsea.2010.38095.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] F. P. Brooks, “No Silver Bullet: Essence and Accidents of Software Engineering,” IEEE Computer Journal, Vol. 20, No. 1, 1987, pp. 10-19.
[2] B. H. C. Cheng and J. M. Atlee, “Research Directions in Requirements Engineering,” Proceedings of the Future of Software Engineering Conference, Minneapolis, IEEE Computer Society, 2007, pp. 285-303.
[3] H. Bendjenna, N. Zarour and P. J. Charrel, “MAMIE, A Methodology to Elicit Requirements for an Inter-Com- pany Cooperative Information System,” Proceeding of IEEE Conference on Innovation on Software Engineering (ISE), Vienna, IEEE Computer Society, 2008, pp. 290- 295.
[4] H. Bendjenna, N. Zarour and P. J. Charrel, “Enhancing the Elicitation Technique Selection Process in a Cooperative Distributed Environment,” Proceeding of the 14th Requirements Engineering Foundation for Software Quality Conference (REFSQ), Montpellier, Lecture Notes in Computer Science, Vol. 5025, Springer, Heidelberg, 2008, pp. 23-36.
[5] H. Bendjenna, M. Amroune, N. Zarour and P. J. Charrel, “Prioritizing Non-functional Concerns in MAMIE Methodology,” Proceeding of the Third International Conference on Knowledge Science, Engineering and Management (KSEM), Vienna, Lecture Notes in Artificial Intelligence, Vol. 5914, Springer, Heidelberg, 2009, pp. 253- 262.
[6] L. Chung, B. Nixon, E. Yu and J. Mylopoulos, “Non- Functional Requirements in Software Engineering,” Klu- wer Academic Publishers, New York, 2000.
[7] P. J. A. Diaz, F. Trilnik and M. R. Campo, “How to Handle Interaction Concerns?” Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Lan- guages, and Applications OOPSLA’00, Minneapolis, 2000, pp. 32-52.
[8] J. Liu, D. Batory and S. Neduniry, “Modelling Interactions in Feature Oriented Software Design,” International Conference on Feature Interactions in Telecommunications and Software Systems (ICFI), Leicester, 2005, pp. 178-197.
[9] F. Sanen, E. Truyen, W. Joosen, N. Loughran, A. Rashid, A. Jackson, A. Nedos and S. Clarke, “Study on Interaction Issues,” AOSD-Europe Deliverable, Vol. 44, Leuven, 2006, pp. 1-31.
[10] R. Axelrod, “Structure of Decision: The Cognitive Maps of Political Elites,” Princeton University Press, Princeton, 1976.
[11] H. J. Zimmermann, “Fuzzy Set Theory and its Applications,” Kluwer Academic Publishers, Dordrecht, 1991.
[12] S. Bueno and J. L. Salmeron, “Fuzzy Modeling Enterprise Resource Planning Tool Selection,” Computer Standards & Interfaces, Vol. 30, No. 3, 2008, pp. 137-147.
[13] B. Boehm, “Characteristics of Software Quality,” North Holland Press, New York, 1978.
[14] N. E. Fenton and S. L. Pfleeger, “Software Metrics: A Rigorous and Practical Approach,” 2nd Edition, International Thomson Computer Press, London, 1997.
[15] S. E. Keller, L. G. Khan and R. B. Panara, “Specifying Software Quality Requirements with Metrics,” In: R. H. Thayer and M. Dorfman, Eds., Tutorial: System and Software Requirements Engineering, IEEE Computer Society Press, Piscataway, 1990, pp. 145-163.
[16] M. R. Lyu, “Handbook of Software Reliability Engineering,” McGraw-Hill, New York, 1996.
[17] B. Boehm and H. In, “Identifying Quality-Requirement Conflicts,” IEEE Software Journal, Vol. 13, No. 2, 1996, pp. 25-35.
[18] L. M. Cysneiros, J. C. S. P Leite and J. S. M. Neto, “A Framework for Integrating Non-Functional Requirements into Conceptual Models,” Requirements Engineering Journal, Vol. 6, No. 2, 2001, pp. 97-115.
[19] T. G. Kirner and A. M. Davis, “Non-functional Requirements of Real-Time Systems,” Advances in Computers Journal, Vol. 42, No. 1, 1996, pp. 1-37.
[20] D. Kardaras and B. Karakostas, “The Use of Fuzzy Cognitive Maps to Simulate the Information Systems Strategic Planning Process,” Information and Software Technology Journal, Vol. 41, No. 1, 1999, pp. 97-210.
[21] B. Kosko, “Fuzzy Cognitive Maps,” International Journal on Man-Machine Studies, Vol. 24, No. 1, 1986, pp. 65-75.
[22] J. Bezdek, “Fuzzy Models-What Are They, and Why,” IEEE Transactions on Fuzzy Systems, Vol. 1, No. 1, 1993, pp. 1-6.
[23] R. Taber, “Knowledge Processing with Fuzzy Cognitive Maps,” Expert Systems with Applications Journal, Vol. 2, No. 1, 1991, pp. 83-87.
[24] C. Okoli and S. Pawlowski, “The Delphi Method as a Research Tool: An Example, Design Considerations and Applications,” Information & Management, Vol. 42, No. 1, 2004, pp. 15-29.
[25] N. Bryson, A. Mobolurin and A. Joseph, “Generating Consensus Fuzzy Cognitive Maps,” Intelligent Information Systems, Vol. 8, No. 10, 1997, pp. 231-235.
[26] N. C. Dalkey and O. Helmer, “An Experimental Application of the Delphi Method to the User of Experts,” Management Science Journal, Vol. 9, No. 3, 1963, pp. 458- 467.
[27] W. R. Zhang, S. S. Chen and J. C. Bezdek, “A Generic System for Cognitive Map Development and Decision Analysis,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 19, No. 1, 1989, pp. 31-39.
[28] W. R. Zhang, S. S. Chen, W. Wang and R. King, “A Cognitive-Map-Based Approach to The Coordination of Distributed Cooperative Agents,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 22, No. 1, 1992, pp. 103-114.
[29] G. J. Klir and B. Youan, “Fuzzy Sets and Fuzzy Logic, Theory and Applications,” Prentice Hall, India, 2005.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.