(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
1 INTRODUCTION
1.1 BACKGROUND
1.2 AIMS AND OBJECTIVES
1.3 RESEARCH QUESTIONS
1.4 EXPECTED OUTCOME
1.5 ASSUMPTIONS
1.6 RESEARCH PLAN
1.7 THESIS OUTLINE
2 A COMPARATIVE STUDY; SYSTEM ENGINEERING VS SOFTWARE ENGINEERING
2.1 SYSTEM ENGINEERING
2.1.1 System Engineering Process
2.1.1.1 State the Problem
2.1.1.2 Investigate Alternatives
2.1.1.3 Model the system
2.1.1.4 Integrate
2.1.1.5 Launch the system
2.1.1.6 Assess performance
2.1.1.7 Re-evaluate
2.2 SOFTWARE ENGINEERING
2.3 SYSTEM ENGINEERING VS. SOFTWARE ENGINEERING
2.4 WHY SYSML?
3 SYSML ARCHITECTURE
3.1 STRUCTURE
3.2 BEHAVIOR
3.3 REQUIREMENT
3.4 PARAMETRIC
3.5 CROSS-CUTTING CONSTRUCTS
4 UML VS SYSML
4.1 ELEMENTS INTRODUCED BY SYSML
4.1.1 Requirements Diagram
4.1.2 Parametric Diagram
4.1.3 Allocations
4.1.3.1 Behavioral Allocations
4.1.3.2 Flow Allocation
4.1.3.3 Structural allocations
4.2 EXTENSIONS
4.2.1 Activity Diagram
4.2.1.1 Probability
4.2.1.2 Rate
4.2.1.3 Optional
4.2.1.4 Continuous
4.2.1.5 Discrete
4.2.1.6 Control Operator
4.2.1.7 No Buffer
4.2.1.8 Overwrite
4.2.2 Block Diagrams
4.2.2.1 Labeled compartments
4.2.2.2 Constraints compartment
4.2.2.3 Namespace compartment
4.2.2.4 Structure compartment
4.2.3 Ports and Flows
4.2.3.1 Standard Ports
4.2.3.2 Flow Ports
4.2.3.3 Item Flows
4.2.3.4 Outcome
5 DEVELOPMENT OF EVALUATION CRITERION
5.1 EVALUATION CRITERIA FOR SYSML
5.2 IBM RAIN SENSING WIPER (RSW) : CASE STUDY
6 APPLICATION OF CRITERIA ON SIMILAR
6.1 STATE THE PROBLEM
6.2 INVESTIGATE ALTERNATIVES
6.3 MODEL THE SYSTEM
6.4 INTEGRATIONS
6.5 LAUNCH THE SYSTEM
6.6 ASSESS PERFORMANCE
6.7 RE-EVALUATION
7 DISCUSSION AND FUTURE WORK
7.1 DISCUSSION
7.2 VALIDITY THREATS
7.2.1 Internal validity
7.2.1.1 Maturation threats
7.2.1.2 Testing threats
7.2.1.3 Selection threats
7.2.2 Construct Validity
7.2.3 External Validity
7.2.4 Conclusion Validity
7.3 FUTURE WORK
8 REFERENCE




