Goal Modeling in Requirements Engineering

Author(s):  
Evangelia Kavakli ◽  
Pericles Loucopoulos

In the field of requirements engineering, goal modeling approaches have received much attention in recent years by researchers and practitioners alike. This chapter identifies the uses of these approaches in different contexts of requirements analysis phases. It examines goal modeling in terms of five methodological orientations and defines a framework for their analysis. Using this framework it provides an analysis of goal modeling approaches in a systematic and consistent manner. The aim of this analysis is to understand the best fit for purpose of different goal modeling approaches and to highlight open issues that provide a foundation for further research in this important area of requirements engineering methodology.

Requirements elicited from requirements elicitation session with stakeholders are usually comes in bulk and it is impossible to execute them simultaneously. In addition, the requirements elicited are unfiltered and usually low quality including ambiguous, incomplete and unclear. The low quality of requirements are then refined in the next activity which is requirements analysis in requirements engineering. This paper aims to integrate requirements prioritization techniques focused on the factor of risk in requirements analysis since the early stage of requirements engineering. It is seems to have a little evidence on that requirements prioritization focus on the factor of risk in requirements based on our conducted literature review. This paper begins with elaboration on requirements prioritization, further to the aspects of requirements prioritization, criteria for best suited technique, a literature review on requirements prioritization techniques. We then proposed a framework for requirements analysis with the integration of requirements prioritization. A case study is elaborated for a better vision on the process of the proposed approach. Finally, this study is believed to produce a better quality of requirements from the requirements analysis process.


Author(s):  
Marian Daun ◽  
Jennifer Brings ◽  
Lisa Krajinski ◽  
Viktoria Stenkova ◽  
Torsten Bandyszak

AbstractCollaborative cyber-physical systems are capable of forming networks at runtime to achieve goals that are unachievable for individual systems. They do so by connecting to each other and exchanging information that helps them coordinate their behaviors to achieve shared goals. Their highly complex dependencies, however, are difficult to document using traditional goal modeling approaches. To help developers of collaborative cyber-physical systems leverage the advantages of goal modeling approaches, we developed a GRL-compliant extension to the popular iStar goal modeling language that takes the particularities of collaborative cyber-physical systems and their developers’ needs into account. In particular, our extension provides support for explicitly distinguishing between the goals of the individual collaborative cyber-physical systems and the network and for documenting various dependencies not only among the individual collaborative cyber-physical systems but also between the individual systems and the network. We provide abstract syntax, concrete syntax, and well-formedness rules for the extension. To illustrate the benefits of our extension for goal modeling of collaborative cyber-physical systems, we report on two case studies conducted in different industry domains.


Author(s):  
Ryo Alif Ramadhan ◽  
Dana Sulistyo Kusumo ◽  
Jati Hiliamsyah Husen

Safety requirements analysis is an activity inside software requirements engineering that focuses on finding and solving safety gaps inside a software product. One method to do safety requirements analysis is misuse cases, a technique adopted from the security analysis method. Misuse cases provide a safety analysis approach which allows detailed steps from different stakeholders' perspective. In this research, we evaluate the misuse cases method's understandability by implementing it to analyze safety requirements for an electric car's autopilot system. We assessed the developed models using the walkthrough method. We found differences between how the model understood from someone with experience in software development and those who don't.


Electronics ◽  
2021 ◽  
Vol 10 (11) ◽  
pp. 1357
Author(s):  
Tarek Gaber ◽  
Yassine El Jazouli ◽  
Esraa Eldesouky ◽  
Ahmed Ali

The current advancement of robotics, especially in Cyber-Physical Systems (CPS), leads to a prominent combination between the mining industry and connected-embedded technologies. This progress has arisen in the form of state-of-the-art automated giant vehicles with Autonomous Haulage Systems (AHS) that can transport ore without human intervention. Like CPS, AHS enable autonomous and/or remote control of physical systems (e.g., mining trucks). Thus, similar to CPS, AHS are also susceptible to cyber attacks such as Wi-Fi De-Auth and GPS attacks. With the use of the AHS, several mining activities have been strengthened due to increasing the efficiency of operations. Such activities require ensuring accurate data collection from which precise information about the state of the mine should be generated in a timely and consistent manner. Consequently, the presence of secure and reliable communications is crucial in making AHS mines safer, productive, and sustainable. This paper aims to identify and discuss the relation between safety of AHS in the mining environment and both cybersecurity and communication as well as highlighting their challenges and open issues. We survey the literature that addressed this aim and discuss its pros and cons and then highlight some open issues. We conclude that addressing cybersecurity issues of AHS can ensure the safety of operations in the mining environment as well as providing reliable communication, which will lead to better safety. Additionally, it was found that new communication technologies, such 5G and LTE, could be adopted in AHS-based systems for mining, but further research is needed to considered related cybersecurity issues and attacks.


2020 ◽  
Vol 1 (12) ◽  
pp. 32-38
Author(s):  
A. S. VORONOVA ◽  
◽  
M. K. DULESOVA ◽  
A. A. NAZAROV ◽  
M. A. SAPOZHNIKOVA ◽  
...  

This article offers a requirement engineering methodology consisting of five stages: information preparation, requirements identification, requirements analysis, specification, and validation. The methodology uses proven practices, methods, and tools that allow project managers, engineers to manage requirements to improve the implementation of research, development, and other projects.


2014 ◽  
Vol 543-547 ◽  
pp. 4657-4661
Author(s):  
Fu Zhao Liao ◽  
You Rong Lu ◽  
Yun Ma ◽  
Wei Qin

With the construction of C4ISR system was changing from technology-dominated traditionally to requirements-dominated, C4ISR system requirements analysis has already developed into requirements engineering. The conceptual framework and connotation of C4ISR system requirements engineering was introduced, as well as the procedure and methods. Finally, the status of domestic and overseas and future development trend for C4ISR system requirements engineering were analyzed, which will provide guideline for the research of C4ISR system requirements engineering.


Sign in / Sign up

Export Citation Format

Share Document