2019
DOI: 10.1109/access.2019.2950884
|View full text |Cite
|
Sign up to set email alerts
|

A Model Driven Reverse Engineering Framework for Generating High Level UML Models From Java Source Code

Abstract: Legacy systems are large applications which are significant in performing daily organizational operations and cannot be upgraded easily especially in the absence of architectural and design documentation. Software modernization is an emerging field of software engineering, which transforms the legacy systems into new one according to the specified requirements of stakeholders. It mainly deals with improving the architecture, features, rules and data sources of existing system. It always remained a challenging … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 20 publications
0
11
0
Order By: Relevance
“…3.By IV, with inequality technique, we prove the time consume range of construction process, and propose a fast prediction formula. 4.By V, we prove that the improved suffix tree can finish traversing (reusing) in linear time and achieve similar effect with white-box testing.…”
Section: Discussionmentioning
confidence: 72%
See 1 more Smart Citation
“…3.By IV, with inequality technique, we prove the time consume range of construction process, and propose a fast prediction formula. 4.By V, we prove that the improved suffix tree can finish traversing (reusing) in linear time and achieve similar effect with white-box testing.…”
Section: Discussionmentioning
confidence: 72%
“…The compression encryption [3] is different from obfuscated code [4] essentially. The obfuscated code blocks the normal understanding by disturbing instructions' logic [5], however, we still can get the encrypted source code whether by static analysis or dynamic analysis.…”
Section: ) How To Collect the Source Instructions When Facing The Compression Encryption?mentioning
confidence: 99%
“…If the class has only one attribute, the cohesion is the maximum value is 1. Taken together, formula (8) denotes that dependence relationship mentioned aforementioned with a weight value wi to highlight special concerns for some properties. For example, if the designer prioritizes the information security of an entity class the data of its objects may be altered through its own methods.…”
Section: )mentioning
confidence: 99%
“…In the context of a contemporary system design language such as UML [7], software projects may use SRE to generate UML graphical designs that explain the software. This use of SRE effectively reduces the time and cost of repeated documentation work [5], [8], [9]. Therefore, existing SRE studies mostly report how to automatically and precisely convert implemented code into specific UML diagrams.…”
Section: Introductionmentioning
confidence: 99%
“…Sabir [6] implemented a novel framework named as "Source to Model Framework (Src2MoF)" is proposed to generate Unified Modeling Language structural (class) and behavioral (activity) diagrams from the Java source code. An open source transformation engine named "UML model generator" is implemented using Java, which takes these intermediate models as input, and produce high-level UML models of the subject legacy system.…”
Section: Related Workmentioning
confidence: 99%