Development of the model and method of selecting the description of rational architecture of information system
DOI:
https://doi.org/10.15587/1729-4061.2016.60583Keywords:
information system, functional requirements, design patterns, frame, interface, communicationAbstract
The results of research of the model and method of selecting the description option of the rational architecture of the developed information system are considered. The method of synthesis of description options of the architecture of the developed IS based on the CLOPE algorithm is proposed. The following is developed:
a) formal descriptions of the functions of the Provider's and the Customer's objectives that maximize the degree of satisfaction of their functional requirements to IS;
b) the game-theoretic model of selecting the option of description of the rational architecture of the developed information system, which is a bimatrix noncooperative game of the IT service Provider and Customer;
c) the method of finding a solution to the game of the Provider and the Customer to select the option of description of the rational architecture of the developed information system based on pure strategies by finding the Nash equilibrium point, which is a sequence of actions aimed at finding the option of description of the architecture of the developed IS, which to the greatest extent meets the Provider's and the Customer's requirements.
The proposed solutions allow considering the process of designing the architecture of the developed IS as the decision-making problem of selecting the rational option of description of the architecture of the given system. The initial data for solving this problem are formal descriptions of the knowledge obtained from the descriptions of the system requirements. In the course of solving this problem, it is proposed to synthesize a set of descriptions of the architecture of the developed IS on the basis of formal descriptions of knowledge about individual requirements. Then, it is suggested to select an option in the set that to the greatest extent meets the expectations of the Provider and the Customer of the developed system. This approach to designing the architecture of the developed IS is unique in current research and existing requirements management systems.
The formal descriptions of the functions of the Provider's and the Customer's objectives, game-theoretic model and method allow automating the process of designing the architecture of the developed information system. This is achieved through the development of formal models and methods, describing the operations of forming the representations of IS requirements on the knowledge level, synthesis of a set of the architecture description options on the basis of the generated representations of requirements and selection of the description option of the rational architecture of the developed IS.
These methods allow transition from the synthesis of descriptions of the information system as a plurality of individual functional requirements to the synthesis of a unified description of the information system, taking into account the overlapping of individual functional requirements. This will improve the system-wide effect of the developed system through harmonizing the descriptions of individual functions of this system in the early stages of its life cycle.
The developed model and method, as well as information system development tools on their basis, allow unifying and simplifying the processes of pre-project survey and design of information systems. This, in turn, reduces the time and cost to implement IT projects of development and upgrading of information systems. In addition, the use of the developed methods allows adapting the Provider's previous solutions to the peculiarities of the Customer's new requirements.
References
- GOST ISO/МEК 15288–2005. System engineering. System life cycle processes (2006). Introduced 01–01–2007. Мoscow: Standartinform, 57.
- GOST ISO/МEК 12207–2010. System and software engineering –Software life cycle processes (2011). Introduced 01–03–2012. Мoscow: Standartinform, 100.
- Project Management Body of Knowledge. 5th edition (2013). Newton Square: Project Management Institute, Inc., 586.
- COCOMO II Model Definition Manual. Center for Systems and Software Engineering. Available at: http://csse.usc.edu/csse/research/COCOMOII/cocomo2000.0/CII_modelman2000.0.pdf (Last accessed: 15.01.2016).
- User’s Requirements Modeling. Microsoft Developer Network. Available at: https://msdn.microsoft.com/ru-ru/library/dd409376.aspx (Last accessed: 15.01.2016).
- Vilpola, I. H. (2008). A method for improving ERP implementation success by the principles and process of user-centred design. Enterprise Information Systems, 2 (1), 47–76. doi: 10.1080/17517570701793848
- Sutcliffe, A. (1998). Scenario-based requirements analysis. Requirements Engineering, 3 (1), 48–65. doi: 10.1007/bf02802920
- Mansilla, D., Pollo-Cattaneo, M., Britos, P., García-Martínez, R. (2013). A Proposal of a Process Model for Requirements Elicitation in Information Mining Projects. Lecture Notes in Business Information Processing, 165–173. doi: 10.1007/978-3-642-36611-6_13
- Lipko, Yu. (2014). Algoritm formalizacii trebovaniy pri razrabotke informacionnyh system. Izvestiia Yuznogo federalnogo universiteta. Tehnicheskie nauki, 6 (155), 153–158.
- Tiurganov, A. G. (2007). Osobennosti formalizacii predmetnoy oblasti korporativnyh informacionnyh system. Vestnik Ufimskogo gosudarstvennogo aviacionnogo universiteta, 9 (5), 72–76.
- Cleland-Huang, J. (2015). Mining Domain Knowledge [Requirements]. IEEE Software, 32 (3), 16–19. doi: 10.1109/ms.2015.67
- Yue, T., Briand, L. C., Labiche, Y. (2010). A systematic review of transformation approaches between user requirements and analysis models. Requirements Engineering, 16 (2), 75–99. doi: 10.1007/s00766-010-0111-y
- Ralph, P. (2012). The illusion of requirements in software development. Requirements Engineering, 18 (3), 293–296. doi: 10.1007/s00766-012-0161-4
- Rational Requisite Pro. IBM developerWorks. Available at: https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/Wbcd69e09400c_4f72_9665_66f116225986/page/Rational%20RequisitePro (Last accessed: 15.01.2016).
- IBM Rational DOORS Next Generation. An efficient requirements management tool for complex systems. IBM. Available at: http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?subtype=SP&infotype=PM&appname=SWGE_RA_IR_USEN&htmlfid=RAD14128USEN&attachment=RAD14128USEN.PDF (Last accessed: 15.01.2016).
- Cradle Overview. 3SL. Available at: https://www.threesl.com/en/cradle/index.php (Last accessed: 15.01.2016).
- Requirements Management System Devprom Requirements. DEVPROM Company. Available at: http://devprom.ru/features/Система-управления-требованиями-Devprom-Requirements (Last accessed: 15.01.2016).
- Madorskaja, Ju. M. (2013). Requirements Management Systems: What and Why? ReqCenter.pro – consisted Knowledge for practical use. Available at: http://edu.reqcenter.pro/?p=2433 (Last accessed: 15.01.2016).
- Luckham, D. (2005). The Beginnings of IT Insight: Business Activity Monitoring. Real Time Intelligence & Complex Event Processing. Available at: http://complexevents.com/media/articles/cep-article-three.pdf (Last accessed: 15.01.2016).
- Ievlanov, M. (2015) Methods of presenting formulated requirements to the information system at the level of knowledge. Eastern-European Journal of Enterprise Technologies, 4/3 (76), 4–11. doi: 10.15587/1729-4061.2015.47535
- Levikin, V. M., Ievlanov, M. V., Kernosov, M. A. (2014). Pattern planning of requirements to the informative systems: design and application. Kharkiv: The «Kompanіya «Smіt LTD», 320.
- Yang, Y., Guan, H. You, J. (2002). CLOPE: A fast and Effective Clustering Algorithm for Transaction Data. Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. New York: ACM, 682–687.
- Levykin, V., Ievlanov, M. (2006). Meta-model of functional structure of information system. New technologies, 1(11), 67–72.
- Ievlanov, M., Neumivakina, O., Karamysheva, A. (2012). Global goals of Provider and Consumer of IT-services. Eastern-European Journal of Enterprise Technologies, 5/2 (59), 12–17. Available at: http://journals.uran.ua/eejet/article/view/4137/3900
- Matveev, V. A. (2005). The final noncooperative games and balances. Pskov: PGPI im. S.M. Kirov, 176.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Максим Викторович Евланов
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.