A Critical Analysis and Treatment of Important UML Diagrams Enhancing Modeling Power

DOI: 10.4236/iim.2012.45034   PDF   HTML     5,342 Downloads   8,602 Views   Citations


Requirements analysis and design specification are serious issues in systems development because of the semantics involved in transformation of real world problems to computer software systems. Although unified modeling language (UML) is now accepted as a de facto standard for design and specification of object oriented systems but its structures have various disadvantages. For example, it lacks of defining semantics of the systems to be developed. Formal me-thods are proved powerful, particularly, at requirement specification and design level. To address and realize the bene-fits of UML and formal methods our project on “formalization of UML diagrams using Z notation” is under progress. This paper is continuation of the same project in which some important diagrams namely use case, class and sequence diagrams are selected for critical analysis. Merits and demerits of the diagrams are addressed after a brief introduction. Applications of the diagrams are observed reducing complexity and proposing a good design of a system. Finally, a treatment to link diagrams with appropriate approaches is suggested to enhance modeling power of UML for facilitating the systems development.

Share and Cite:

F. Alhumaidan, "A Critical Analysis and Treatment of Important UML Diagrams Enhancing Modeling Power," Intelligent Information Management, Vol. 4 No. 5, 2012, pp. 231-237. doi: 10.4236/iim.2012.45034.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] N. H. Ali, Z. Shukur and S. Idris, “A Design of an Assessment System for UML Class Diagram,” International Conference on Computational Science and Applications, Kuala Lampur, 26-29 August 2007, pp. 539-546. doi:10.1109/ICCSA.2007. 31
[2] A. M. Mostafa, A. I. Manal, E. B. Hatem and E. M. Saad, “Toward a Formalization of UML2.0 Meta-Model Using Z Specifications,” Proceedings of 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, Qingdao, 30 July-1 August 2007, pp. 694-701. doi:10.1109/SNPD. 2007.508
[3] K. E. Hamdy, M. A. Elsoud and A. M. El-Halawany, “UML-Web Engineering Framework for Modeling Web Application,” Journal of Software Engineering, Vol. 5, No. 2, 2011, pp. 49-63. doi:10.3923/jse.2011.49.63
[4] X. He, “Formalizing UML Class Diagrams: A Hierarchical Predicate Transition Net Approach,” Proceedings of Twenty-Fourth Annual International Computer Software and Applications Conference, Taipei, 25-27 October 2000, pp. 217-222. doi:10.1109/CMPSAC.2000. 884721
[5] M. Shroff and R. B. France, “Towards Formalization of UML Class Structures in Z,” 21st International Conference on Computer Software and Applications, Washington DC, 11-15 August 1997, pp. 646-651.
[6] N. A. Zafar and F. Alhumaidan, “Transformation of Class Diagrams into Formal Specification,” International Journal Computer Science and Network Security, Vol. 11, No. 5, 2011, pp. 289-295.
[7] B. Akbarpour, S. Tahar and A. Dekdouk, “Formalization of Cadence SPW Fixed-Point Arithmetic in HOL,” Formal Methods in System Design, Vol. 27, 2005, pp. 173200.
[8] H. Beek, A. Fantechi, S. Gnesi and F. Mazzanti, “State/ Event-Based Software Model Checking,” Proceedings of 4th International Conference on Integrated Formal Methods, Canterbury, 4-7 April 2004, pp. 128-147.
[9] J. Derrick and G. Smith, “Structural Refinement of ObjectZ/CSP Specification,” Proceedings of 2nd International Conference on Integrated Formal Methods, Dagstuhl Castle, 1-3 November 2000, pp. 194-213.
[10] O. Hasan and S. Tahar, “Verification of Probabilistic Properties in the HOL Theorem Prover,” Proceedings of the 6th International Conference of Integrated Formal Methods, Oxford, 2-5 July 2007, pp. 333-352.
[11] T. B. Raymond, “Integrating Formal Methods by Unifying Abstractions,” Springer, Berlin, 2004, pp. 441-460.
[12] D. Jackson, I. Schechter and I. Shlyakhter, “Alcoa: The Alloy Constraint Analyzer,” Proceedings of International Conference on Software Engineering, Limerick, 4-11 June 2000, pp. 730-733. doi:10.1109/ICSE. 2000.870482
[13] J. Sun, J. S. Dong, J. Liu and H. Wang, “A XML/XSL Approach to Visualize and Animate TCOZ,” Proceedings of 8th Asia-Pacific Software Engineering Conference, Macao, 4-7 December 2001, pp. 453-460. doi:10.1109/APSEC.2001.991514
[14] A. Moeini and R. O. Mesbah, “Specification and Development of Database Applications Based on Z and SQL,” Proceedings of International Conference on Information Management and Engineering, Kuala Lumpur, 3-5 April 2009, pp. 399-405. doi:10.1109/ICIME.2009.143
[15] X. G. Zhang and H. Liu, “Formal Verification for CCML Based Web Service Composition,” Information Technology Journal, Vol. 10, No. 9, 2011, pp. 1692-1700. doi:10.3923/ itj.2011.1692.1700
[16] S.-K. Kim and D. Carrington, “An Integrated Framework with UML and Object-Z for Developing a Precise and Understandable Specification: The Light Control Case Study,” Proceedings of 7th Asia-Pacific Software Engineering Conference (APSEC), 5-8 December 2000, pp. 240-248. doi:10.1109/APSEC.2000.896705
[17] M. Heiner, and M. Heisel, “Modeling Safety Critical Systems with Z and Petri-Nets,” Proceedings of International Conference on Computer Safety, Reliability and Security, Toulouse, 27-29 September 1999, pp. 361-374.
[18] E. Cunha, M. Custodio, H. Rocha and R. Barreto, “Formal Verification of UML Sequence Diagrams in the Embedded Systems Context,” Brazilian Symposium on Computing System Engineering (SBESC), 2011, pp. 39-45.
[19] H. Leading and J. Souquieres, “Integration of UML and B Specification Techniques: Systematic Transformation from OCL Expressions into B,” Proceedings of 9th Asia-Pacific Software Engineering Conference, Gold Coast, 4-6 December 2002, p. 495.
[20] Z. Shi, “Intelligent Target Fusion Recognition Based on Fuzzy Petri Nets,” Information Technology Journal, Vol. 11, No. 4, 2012, pp. 500-503. doi:10.3923/itj.2012.500.503
[21] C. Yong, “Application of Wu’s Method to Proving Total Correctness of Recursive Program,” Information Technology Journal, Vol. 9, No. 7, 2010, pp. 1431-1439. doi:10.3923/ itj.2010.1431.1439
[22] Z. M. Ma, “Fuzzy Conceptual Information Modeling in UML Data Model,” International Symposium on Computer Science and Computational Technology, Shanghai, 20-22 December 2008, pp. 331-334. doi:10.1109/ ISCSCT.2008.353
[23] Z. X. Wang, H. He, L. Chen and Y. Zhang, “Ontology Based Semantics Checking for UML Activity Model,” Information Technology Journal, Vol. 11, No. 3, 2012, pp. 301-306. doi:10.3923/itj. 2012.301.306
[24] M. T. Bhiri, K. Mourad, M. Graiet and P. Aniorte, “UML/ OCL and Refinement,” 18th IEEE International Conference and Workshops on Engineering of Computer-Based Systems, Las Vegas, 27-29 April 2011, pp. 14-158.
[25] S. A. Ehikioya and B. Ola, “A Comparison of Formalisms for Electronic Commerce Systems,” Proceedings of International Conference on Computational Cybernetics, Vienna, 30 August-1 September 2004, pp. 253-258. doi:10.1109/ICCCYB. 2004.1437721
[26] W. S. Changchien, J. J. Shen and T. Y. Lin, “A Preliminary Correctness Evaluation Model of Object-Oriented Software Based on UML,” Journal of Applied Sciences, Vol. 2, No. 3, 2002, pp. 356-365. doi:10.3923/jas.2002.356.365.
[27] Z. Derakhshandeh, B. T. Ladani and N. Nematbakhsh, “Modeling and Combining Access Control Policies Using Constrained Policy Graph (CPG),” Journal of Applied Sciences, Vol. 8, No. 20, 2008, pp. 3561-3571. doi:10.3923/jas.2008.3561.3571
[28] C. Liu and X. M. Dong, “An Improved Quasi-Static Scheduling Algorithm for Mixed Data-Control Embedded Software,” Journal of Applied Sciences, Vol. 6, No. 7, 2006, pp. 1571-1575.
[29] S. Sengupta and S. Bhattacharya, “Formalization of UML Diagrams and Consistency Verification: A Z Notation Based Approach,” Proceedings of India Software Engineering Conference, Hyderabad, 19-22 February 2008, pp. 151-152. doi:10.1145/ 1342211.1342248
[30] X. Than, H. Miao and L. Liu, “Formalizing Semantics of UML Statecharts with Z,” Proceedings of 4th International Conference on Computer & Information Technology, Wuhan, 14-16 September 2004, pp. 1116-1121. doi:10.1109/ CIT.2004.1357344
[31] R. Borges and A. Mota, “Integrating UML and Formal Methods,” Electronic Notes in Theoretical Computer Science, Vol. 184, 2003, pp. 97-112. doi:10.1016/j.entcs.2007.03.017
[32] H. Podeswa, “UML for IT Business Analyst,” 2nd Edition, Course Technology, 2009.
[33] A. Dennis, B. H. Wixom and D. Tegarden, “Systems Analysis and Design with UML,” 3rd Edition, Wiley, Hoboken, 2005.
[34] R. Miles, and K. Hamilton, “Learning UML 2.0,” O’Reilly Media, 2006.
[35] S. Zarina, N. Alias, M. M. Halip and B. Idrus, “Formal Specification and Validation of Selective Acknowledgement Protocol Using Z/EVES Theorem Prover,” Journal of Applied Sciences, Vol. 6, No. 8, 2006, pp. 1712-1719. doi:10.3923/jas.2006.1712.1719
[36] J. M. Wing, “A Specifier, Introduction to Formal Methods,” Computer Journal, Vol. 23, No. 9, 1990, pp. 8-24. doi:0.1109/2.58215.
[37] F. Gervais, M. Frappier and R. Laleau, “Synthesizing B Specifications from EB3 Attribute Definitions,” Proceedings of 5th International Conference on Integrated Formal Methods, Eindhoven, 29 November-2 December 2005, pp. 207-226.
[38] A. Hall, “Correctness by Construction: Integrating Formality into a Commercial Development Process,” Proceedings of International Symposium of Formal Methods Europe, Copenhagen, 22-24 July 2002, pp. 139-157.
[39] M. Brendan and J. S. Dong, “Blending Object-Z and Timed CSP: An Introduction to TCOZ,” Proceedings of International Conference on Software Engineering, Kyoto, 19-25 April 1998, pp. 95-104. doi:10.1109/ICSE.1998.671106.
[40] M. Bo, W. Huang and J. Qin, “Automatic Verification of Security Properties of Remote Internet Voting Protocol in Symbolic Model,” Information Technology Journal, Vol. 9, No. 8, 2010, pp. 1521-1556. doi:10.3923/itj.2010. 1521.1556.
[41] K. Araki, A. Galloway and K. Taguchi, “Using a Process Algebra to Control B Operations,” Proceedings of 1st International Conference on Integrated Formal Methods, London, 26-28 October 1999, pp. 437-456.
[42] S. Bennett, S. McRobb and R. Farmer, “Object-Oriented Systems Analysis and Design Using UML,” 4th Edition, McGraw-Hill, New York, 2011
[43] I. Jacobson, M. Christerson, P. Jonsson and G. Overgaad, “Object-Oriented Software Engineering: A Use Case Driven Approach,” Addison-Wesley, Wokingham,1992,.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.