Class Diagram Extraction from Textual Requirements Using NLPTechniques
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 2
Abstract
Abstract: A new method for translating software requirements to object-oriented model is proposed. Softwarerequirements specified in a natural language using scenario like format will be transformed into class diagramsof Unified Modeling Language using specification transformation rule. The transformation rule is based on agrammatical analysis, more specifically syntactical analysis, of requirements specification. This paper proposesa new method for translating software requirements specified using natural language to formal specification (inthis context is executable and translatable Unified Modeling Language Class Diagram). Requirementsspecification written in a scenario like format will be transformed into class diagram’s components theautomation of class generation from natural language requirements is highly challenging. This paper proposesa method and a tool to facilitate requirements analysis process and class diagram extraction from textualrequirements supporting natural language processing techniques. Requirements engineers analyze requirementsmanually to come out with analysis artifacts such as class diagram
Authors and Affiliations
Vrushali Adhav , Darshana Ahire , Aarti Jadhav , Dipali Lokhande
JTAG Architecture with Multi Level Security
For in–circuit testing and debugging JTAG (Joint Test Access Group) is one of the most powerful standard architecture of DFT (Design For Testability). But JTAG can also act as a tool for hacking and hence makes...
An Enhanced Round Robin CPU Scheduling Algorithm
Abstract: CPU scheduling is a process which allows one process to use the CPU while the another process is in waiting state due to unavailability of any resource like I/O etc, thereby making full use of CPU. The aim of C...
Analysis and Implementation of Efficient Association Rules using K-mean and Neuralgas Algorithm
Efficient Privacy Preserving association rule mining has emerged as a latest research issue. In this thesis work, existing algorithms, Increase Support of Left Hand Side and Decrease Support of Right Hand Side...
A Review on Semantic Approach using Nearest Neighbor Search
Abstract: Information retrieval (IR) of acquiring information sources relevant to an information sources from a group or unit. Ontology in IR field is used to represent an official domain description in addition a semant...
A Novel Approach For Data Hiding In Web Page Steganography Using Encryption With Compression Based Technique
Abstract: Cryptography, Steganography and Watermarking are three rudimentary techniques which will avail us to secure data from unauthorized access. Steganography is one of the best techniques to obnubilate messagefrom u...