...Empir Software Eng (2010) 15:455–492 DOI 10.1007/s10664-009-9127-7 An experimental comparison of ER and UML class diagrams for data modelling Andrea De Lucia · Carmine Gravino · Rocco Oliveto · Genoveffa Tortora Published online: 11 December 2009 © Springer Science+Business Media, LLC 2009 Editor: Erik Arisholm Abstract We present the results of three sets of controlled experiments aimed at analysing whether UML class diagrams are more comprehensible than ER diagrams during data models maintenance. In particular, we considered the support given by the two notations in the comprehension and interpretation of data models, comprehension of the change to perform to meet a change request, and detection of defects contained in a data model. The experiments involved university students with different levels of ability and experience. The results demonstrate that using UML class diagrams subjects achieved better comprehension levels. With regard to the support given by the two notations during maintenance activities the results demonstrate that the two notations give the same support, while in general UML class diagrams provide a better support with respect to ER diagrams during verification activities. Keywords Controlled experiments · Entity-relation diagrams · UML class diagrams · Design notations · Comprehension · Maintenance · Verification The work described in this paper is supported by the project METAMORPHOS (MEthods and Tools for migrAting software systeMs towards...
Words: 16567 - Pages: 67
...WEEK4 Week 4’s slides start off with an introduction to UML interaction diagrams, diagrams which show how objects interact via messages. The first UML interaction diagram discussed was communication diagrams. Communication diagrams demonstrate object interactions in a graph or network format. The next UML interaction diagram spoken of was the sequence diagrams which are diagrams that explain interactions in a kind of fence format. When it comes to these types of diagrams the set of all operation contracts defines system behavior. It is also said, in the slides, that you’ll need to create an interaction diagram for each operation contract. The next section of slides goes in detail about designing objects with responsibilities and methods. Before I go into detail about the responsibilities and methods, it’s important to first understand that the focus of object design is to: * Identify classes and objects. * Decide what methods belong. * Where and how these objects should interact. See, responsibilities are assigned to classes during object design. There are two types of responsibilities, the “doing” and the “knowing.” The “doing” is known for doing something itself; it initiates the action in other objects and controls/coordinates the activities in other objects. The “knowing” is more about the related objects, private encapsulated data and things it can derive/calculate. Responsibilities related to “knowing” often are inferable from the Domain Model because of...
Words: 1045 - Pages: 5
...A++PAPER;http://www.homeworkproviders.com/shop/cis-510-week-7-assignment-3/ CIS 510 WEEK 7 ASSIGNMENT 3 CIS 510 Week 7 Assignment 3, CIS 510 Week 7 Assignment 3 – Strayer Assignment 3: Creating a Domain Model Class Diagram Due Week 7 and worth 150 points Refer to the RMO CSMS domain model class diagram shown in Figure 4-23 on page 111 of the textbook and the discussion of subsystems in Chapter 3. Write a two to three (2-3) page paper in which you: Using Microsoft Visio or an open source alternative such as Dia, create a domain model class diagram for the RMO CSMS marketing subsystem. Note: The graphically depicted solution is not included in the required page length. Provide a narrative describing your diagram that includes: An overview of the diagram An analysis of the different classes in the diagram Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, your name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required...
Words: 322 - Pages: 2
...Group Tour Scheduling System 1. Conceptual Class List |Conceptual Class Name |Source |Identification Technique |Conceptual Class Definition| | |Document | | | |1. BooksTheTour |GTSS System Background |Conceptual class category |GTL process of booking | | |Information |list. |tour. | |2. CollectsTourPayment |GTSS System Background |Conceptual class category |Transaction for collecting | | |Information |list. |payment. | |3. ConcessionsContact |GTSS System Background |Conceptual class category |Process between SGTA and FC| | |Information |list. |to make arrangements | |4. ViewCalendar |System Vision |Noun-phrase |Show calendar that records | | | |identification. |all booked tours. | |5. SignUpToLeadTours |System Vision |Conceptual class category |Volunteer process for | | ...
Words: 844 - Pages: 4
...Hospital Management UML Class Diagram Example This is an example of a hospital domain model diagram. The domain model for the Hospital Management System is represented by several class diagrams. The purpose of the diagram is to show and explain hospital structure, staff, relationships with patients, and patient treatment terminology. On the diagram below a Person could be associated with different Hospitals, and a Hospital could employ or serve multiple Persons. Person class has derived attributes name and homeAddress. Name represents full name and could be combined from title, given (or first) name, middle name, and family (or last) name.Patient class has derived attribute age which could be calculated based on her or his birth date and current date or hospital admission date. The Patient class inherits attributes from the Person class. Several inherited attributes name, gender, and birthDate are shown with prepended caret '^' symbol (new notation introduced in UML 2.5). Hospital organization domain model - Patient, Hospital, Staff - Operations, Administrative, Technical. Ward is a division of a hospital or a suite of rooms shared by patients who need a similar kind of care. In a hospital, there are a number of wards, each of which may be empty or have on it one or more patients. Each ward has a unique name. Diagram below shows it using {id} modifier for ward's name. Wards are differentiated by gender of its patients, i.e. male wards and female wards. A ward can only...
Words: 517 - Pages: 3
...software development and, ultimately, users. * Ann Harrison , 05/04/2000 * * Feature FEATURE Contract case could hurt reverse engineering The Supreme Court's lack of action could embolden software companies to ban reverse engineering or take away other fair-use rights already allowed by including such prohibitions in a license agreement.” ((Schwartz, 2001) As the articles above are describing. Reverse Engineering can be excellent in some ways, but, also shows the flaws of a program in many ways making it very vulnerable to those who are out to hurt the development of software companies. Key Features | “Understand your source code faster and more accurately, through software visualization and analysis. * UML Class Diagrams * Control Flow Graphs * Variable Data Flow Graphs * Template Support * Function Pointer Support” (Imagix. Reverse Engineering your software.) | These are the key features of the software engineering tool Imagix. References Imagix. Reverse Engineering Your Softwarwe. (ND) http://www.imagix.com/a/reverse-engineering.html?gclid=CMHLqcDI-8QCFQsJaQodKWwAmw References Schwartz, M. (2001, November 1). Reverse-Engineering | Computerworld. Retrieved from...
Words: 265 - Pages: 2
...engineering practices. Project The project will be chosen by each group from one of the project descriptions in the attached “Project Proposals” document. The names and numbers of group members along with the project topic that is chosen must be submitted under the heading Projects Groups and Topics Assignment on the moodle page of the course by 8.10.2015 by each team. The project will be undertaken in teams consisting of three or four members. All the members must belong to the same lab group. 1 Expected Work The teams should apply waterfall process model. They are free to use any tool or report format that may be preferred for its being very suitable for the teams specific task. For example teams may add a data flow diagram or even a flowchart to their analysis or design if they think they are necessary to get the job done. “Getting the job done” is however a strict requirement and it is expected from the team as a pay-back of the freedom that they have been granted. You will frequently find the instructors act as customers who even do not know what exactly they should expect from the project, or in general from software or computers. On the other hand the team should be motivated to discover and demonstrate what the project may do for the end users. The teams must perform all kinds of research including moving to the field and performing interviews with the experts and potential users (videos of the interviews with domain experts and potential users must be...
Words: 1146 - Pages: 5
...ENGINEERING CSE 324 class diagram Analysis. ------------------------------------------------- GARMENTS MANAGEMENT SYSTEM SUBMITTED To: SUBMITTED By: MD. SAMI UDDIN NAME: SABBIR AHMED PRINCE LECTURER, DEPT. CSE ID: 11.01.04.148 MOHAMMAD IMRUL JUBAIR NAME: LUBNA JESMIN LECTURER, DEPT. CSE ID: 11.01.04.146 NAME: SHAMIUL OVI ID: 11.01.04.150 NAME: JERIN TASNIM ID: 11.01.04.170 NAME: MEHEDI HASAN KHAN ID: 11.01.04.145 Contents Introduction……………………………………………………………………………………………………………………………………………1 Class Diagram 2 Class: 2 A class consists of three parts: 3 Class attributes 4 Class operations / methods 4 Relationships between classes 5 Relationship Type 5 Graphical representation of some relationships in class diagram: 8 Class Diagram of garments Management System: 9 Attributes used in this class: 13 Methods used in this class(): 13 Salary Class: 13 Attributes used in this class: 13 Class diagram of our Garments Management System 15 Relations used in the class diagram: 16 Conclusion: 16 Introduction Our project name is garments management system. The topic of this this report is Class Diagram. On this report first basic class diagram and different relations has been discussed. Then the class diagram of our project has been discussed briefly. Class Diagram Class diagrams are visual representations...
Words: 1432 - Pages: 6
...number, address, phone number, and email address. In addition, the bank offers its customers a choice of accounts, such as savings account, current account, and loan account. In addition, the bank stores its employee details, such as employee code, employee name, employee address, phone number, and email address. For the given scenario, complete the following: • Identify the various classes and their attributes used in this scenario. • Create a UML class diagram depicting the relationship among classes for the customer and employee information system of Universal Bank. • Create the Java code to implement the identified classes. • Assign values to the identified attributes. • Display the attribute values. Task 2 Scenario: Royal College offers different courses to its students. Whenever a student enrolls for a course, the student details, such as Registration Number, Department Name, and Permanent Address, Email ID, and Phone Number, are registered. For the given scenario, write a Java program using the Scanner class to get these student details from the user. Task 3 Analyze and identify the errors in the following Java code and...
Words: 528 - Pages: 3
...Polymorphism - iLab i L A B O V E R V I E W Scenario and Summary The objective of the lab is to take the UML Class diagram and enhance last week's Employee class by making the following changes: 1. Create a class called Salaried that is derived from Employee. 2. Create a class called Hourly that is also derived from Employee. 3. Override the base class calculatePay() method. 4. Override the displayEmployee() method. i L A B S T E P S STEP 1: Understand the UML Diagram Notice the change in UML diagram. It is common practice to leave out the accessors and mutators (getters and setters) from UML class diagrams, since there can be so many of them. Unless otherwise specified, it is assumed that there is an accessor (getter) and a mutator (setter) for every class attribute. STEP 3: Modify the Employee Class 1. Using the updated Employee class diagram, modify the attributes to be protected. 2. Delete the iEmployee interface class, and remove the reference from the Employee class. STEP 4: Create the Salaried Class 1. Using the UML Diagrams from Step 1, create the Salaried classes, ensuring to specify that the Salary class inherits from the Employee class. 2. For each of the constructors listed in the Salaried class, ensure to invoke the appropriate base class constructor and pass the correct arguments to the base class constructor. This will initialize the protected attributes and update the numEmployees counter. 3. The valid management levels...
Words: 667 - Pages: 3
...number, address, phone number, and email address. In addition, the bank offers its customers a choice of accounts, such as savings account, current account, and loan account. In addition, the bank stores its employee details, such as employee code, employee name, employee address, phone number, and email address. For the given scenario, complete the following: • Identify the various classes and their attributes used in this scenario. • Create a UML class diagram depicting the relationship among classes for the customer and employee information system of Universal Bank. • Create the Java code to implement the identified classes. • Assign values to the identified attributes. • Display the attribute values. Task 2 Scenario: Royal College offers different courses to its students. Whenever a student enrolls for a course, the student details, such as Registration Number, Department Name, and Permanent Address, Email ID, and Phone Number, are registered. For the given scenario, write a Java program using the Scanner class to get these student details from the user. Task 3 Analyze and identify the errors in the following Java code and...
Words: 528 - Pages: 3
...System Analysis Design for a Library System CS200 Fundamentals of Information Technology Module 1 Assignment 2 System Analysis Design for a Library System Suppose you are helping to develop a library system for your community. Here is a brief description of various scenarios using this library system. • Bob wanted to become a member at his local library. He went in and filled out an application form with his name, address, phone number, and driver's license number and gave it to the librarian, Alice. Alice logged into the system with her id and created a new membership for Bob. She then provided Bob with his new library card, and a login and password to his account. • Bob wanted to borrow two novels by C.S. Lewis, but he couldn’t remember their names. He used one of the computers at the library to search for the books by using the author's name. He found the titles he wanted, which were “The Chronicles of Narnia” and "The Space Trilogy". The first book was shown as available, and the second book was shown as out on loan. • Using his new login and password, Bob logged into his account and requested the book "The Space Trilogy" in order to recall it, so that when the book was returned it would be held for him at the library. • Bob then went to the stacks and found the book "The Chronicles of Narnia" on the shelf, and waited in line at the desk to check it out. He presented his ID card, and checked out the book with the librarian. • Before leaving the library...
Words: 607 - Pages: 3
...IT460 Unit 4 Assignment Dwayne M Sullivan Kaplan University Context Level Diagram This context diagram shows the scope and boundaries of the Training Information Management System. In this diagram, we see that the central process, which is the TIMS, will interact with six entities, which include the corporate client, the training administrator, the instructor, the student, the course, and the accounting system. Moreover, the interaction among these entities will involve six different data flows. The corporate client will be provided a training summary. The training administrator will receive training reports and will supply schedule decisions. The instructor will supply completion data and receive a class roster and course assignments. The accounting system will receive data regarding accounting. The course will receive course data from and supplied data back to the system. The student will request courses. When their request is processed, they will receive a confirmation and an invoice. The student can then submit a payment. Level 0 Diagram The training administrator will submit schedule decisions which are processed by the manage course scheduling process. The course management scheduling process will supply information about the course offered. This information might include course times, schedules, descriptions and so forth. The manage course scheduling process will also receive information from the courses. The Manage Course Scheduling process...
Words: 694 - Pages: 3
...System Analysis Design for a Library System Suppose you are helping to develop a library system for your community. Here is a brief description of various scenarios using this library system. • Bob wanted to become a member at his local library. He went in and filled out an application form with his name, address, phone number, and driver's license number and gave it to the librarian, Alice. Alice logged into the system with her id and created a new membership for Bob. She then provided Bob with his new library card, and a login and password to his account. • Bob wanted to borrow two novels by C.S. Lewis, but he couldn’t remember their names. He used one of the computers at the library to search for the books by using the author's name. He found the titles he wanted, which were “The Chronicles of Narnia” and "The Space Trilogy". The first book was shown as available, and the second book was shown as out on loan. • Using his new login and password, Bob logged into his account and requested the book "The Space Trilogy" in order to recall it, so that when the book was returned it would be held for him at the library. • Bob then went to the stacks and found the book "The Chronicles of Narnia" on the shelf, and waited in line at the desk to check it out. He presented his ID card, and checked out the book with the librarian. • Before leaving the library, Bob saw his friend Simon. He chatted with Simon (quietly), and asked if he was a member and came to the library...
Words: 588 - Pages: 3
...focus in the structure, management and logistic of a project. I think this area is very important in the field of engineering. Because they are like the roots of the project. Is like putting everything in order to have a logistic and to work with a same direction. In this class I learn a lot of things that I can apply in the engineering field. As it was passing the semester I understand things that when I came into this class, there were not clarified at all. In the project we were assign to do as the semester was passing I learned a lot of things helpful in the field of engineering. My team members and I at the beginning, we were confuse of what to present in our project. We change the topic like two times. But finally as a team we decide to do the project in the fabrication of Ecological Tires, which are better for the environment and reduce pollution. In the project I learned how to make the Conceptual Design, Preliminary Design and Detailed Design of a project. To make the Conceptual, Preliminary and Detailed Design, I learned how to do Need Statements, SE Process Diagrams, Tradeoff Studies, Operational Requirements, Design Requirements, Functional Diagrams Serial, Logical Diagrams, ICOM Diagrams, Risk Analysis, Migration Plans, System Reliability, System Integrations, etc… To make the project first of all, we make the Need Statement. They can be different Needs Statements, like Customer Need Statement and the Company Need Statement. In the Company Need Statement...
Words: 954 - Pages: 4