Extending UML Sequence Diagrams to Model Agent Mobility

Author(s):  
Mario Kusek ◽  
Gordan Jezic
Keyword(s):  
2021 ◽  
Vol 180 ◽  
pp. 502-506
Author(s):  
Atif Mashkoor ◽  
Alexander Egyed

Author(s):  
Neville A. Stanton ◽  
James W. Brown ◽  
Kirsten M. A. Revell ◽  
Jisun Kim ◽  
Joy Richardson ◽  
...  

AbstractDesign of appropriate interaction and human–machine interfaces for the handover of control between vehicle automation and human driver is critical to the success of automated vehicles. Problems in this interfacing between the vehicle and driver have led, in some cases, to collisions and fatalities. In this project, Operator Event Sequence Diagrams (OESDs) were used to design the handover activities to and from vehicle automation. Previous work undertaken in driving simulators has shown that the OESDs can be used to anticipate the likely activities of drivers during the handover of vehicle control. Three such studies showed that there was a strong correlation between the activities drivers represented in OESDs and those observed from videos of drivers in the handover process, in driving simulators. For the current study, OESDs were constructed during the design of the interaction and interfaces for the handover of control to and from vehicle automation. Videos of drivers during the handover were taken on motorways in the UK and compared with the predictions from the OESDs. As before, there were strong correlations between those activities anticipated in the OESDs and those observed during the handover of vehicle control from automation to the human driver. This means that OESDs can be used with some confidence as part of the vehicle automation design process, although validity generalisation remains an important goal for future research.


Author(s):  
JUN KONG ◽  
DIANXIANG XU ◽  
XIAOQIN ZENG

Poor design has been a major source of software security problems. Rigorous and designer-friendly methodologies for modeling and analyzing secure software are highly desirable. A formal method for software development, however, often suffers from a gap between the rigidity of the method and the informal nature of system requirements. To narrow this gap, this paper presents a UML-based framework for modeling and analyzing security threats (i.e. potential security attacks) rigorously and visually. We model the intended functions of a software application with UML statechart diagrams and the security threats with sequence diagrams, respectively. Statechart diagrams are automatically converted into a graph transformation system, which has a well-established theoretical foundation. Method invocations in a sequence diagram of a security threat are interpreted as a sequence of paired graph transformations. Therefore, the analysis of a security threat is conducted through simulating the state transitions from an initial state to a final state triggered by method invocations. In our approach, designers directly work with UML diagrams to visually model system behaviors and security threats while threats can still be rigorously analyzed based on graph transformation.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


Sign in / Sign up

Export Citation Format

Share Document