{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T04:33:42Z","timestamp":1741754022206,"version":"3.38.0"},"reference-count":60,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Multiagent and Grid Systems: An International Journal of Data Science and Artificial Intelligence"],"published-print":{"date-parts":[[2017,8]]},"abstract":"<jats:p> To tackle the problems such as the imperfection and inconsistency in software requirements in traditional Computation Independent Model (CIM) modelling, the low degree of automation as well as the imperfection in the description of Platform Independent Model (PIM) in CIM-to-PIM transforming, in this article, we propose a Business-Process-based CIM modelling method and a CIM-to-PIM transformation approach. Business Process Model is used to express CIM, and UML\u2019s Sequence Diagram, State Chart Diagram as well as Class Diagram are used to express PIM. Firstly, the users\u2019 requirements are obtained through business process models. We extract use cases from business processes and create use case specifications. A verification mechanism is also added for the use case specification. Secondly, we transform CIMs into PIMs automatically with use case specifications as the inputs as well as combining with use case based thinking, responsibility based thinking and affinity analysis. Finally, by comparing with the methods in other studies, we conclude that methods proposed in this article can ensure model integrity and increase the degree of model transformation automation. <\/jats:p>","DOI":"10.3233\/mgs-170271","type":"journal-article","created":{"date-parts":[[2017,10,17]],"date-time":"2017-10-17T16:36:59Z","timestamp":1508258219000},"page":"269-286","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["An affinity analysis based CIM-to-PIM transformation"],"prefix":"10.1177","volume":"13","author":[{"given":"Dongdai","family":"Zhou","sequence":"first","affiliation":[{"name":"College of Information and Software Engineering, Northeast Normal University, Changchun 130117, Jilin, China"},{"name":"E-Learning Technological Innovation Center of Jilin Province, Changchun 130117, Jilin, China"},{"name":"Engineering and Research Center of E-learning, Ministry of Education, Changchun 130117, Jilin, China"}]},{"given":"Xue","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Information and Software Engineering, Northeast Normal University, Changchun 130117, Jilin, China"}]},{"given":"Qiuzhi","family":"Jin","sequence":"additional","affiliation":[{"name":"College of Information and Software Engineering, Northeast Normal University, Changchun 130117, Jilin, China"}]},{"given":"Zhejun","family":"Kuang","sequence":"additional","affiliation":[{"name":"College of Information and Software Engineering, Northeast Normal University, Changchun 130117, Jilin, China"}]},{"given":"Hongji","family":"Yang","sequence":"additional","affiliation":[{"name":"Centre for Creative Computing, Bath Spa University, Bath, UK"}]}],"member":"179","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"issue":"3","key":"bibr1-MGS-170271","first-page":"13","volume":"20","author":"Mille J.","year":"2003","journal-title":"OMG"},{"key":"bibr2-MGS-170271","doi-asserted-by":"crossref","unstructured":"NjonkoP.B. and AbedW.E., From natural language business requirements to executable models via SBVR, in: International Conference on Systems and Informatics (2012), 2453\u20132457.","DOI":"10.1109\/ICSAI.2012.6223550"},{"key":"bibr3-MGS-170271","doi-asserted-by":"crossref","unstructured":"DebnathN. LeonardiM.C. RidaoM. et al. An ATL transformation from natural language requirements models to business models of a MDA project, in: IEEE 11th International Conference on ITS Telecommunications (ITST) (2011), 633\u2013639.","DOI":"10.1109\/ITST.2011.6060132"},{"key":"bibr4-MGS-170271","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1087.2010.00385"},{"issue":"7","key":"bibr5-MGS-170271","first-page":"30","volume":"14","author":"Zhang Z.","year":"2004","journal-title":"Microcomputer Development"},{"key":"bibr6-MGS-170271","unstructured":"XinY., Research on UML model transformation based on MDA, Technical Report, Xidian University, China, 2009."},{"key":"bibr7-MGS-170271","unstructured":"JiangL., MDA-based transformation between UML models, Technical Report, Xidian University, China, 2009."},{"key":"bibr8-MGS-170271","unstructured":"LiuT., Research on model transformation from CIM to PIM in MDA, Technical Report, Xidian University, China, 2010."},{"key":"bibr9-MGS-170271","first-page":"248","author":"Wei Z.","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"bibr10-MGS-170271","first-page":"230","author":"Kuang Z.","year":"2013","journal-title":"Science and Technology Information"},{"key":"bibr11-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-004-0191-7"},{"key":"bibr12-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566873"},{"key":"bibr13-MGS-170271","unstructured":"ZhengY., Research on requirements modeling based on scenarios, Technical Report, Zhejiang Normal University, China, 2009."},{"issue":"5","key":"bibr14-MGS-170271","first-page":"1","author":"Jin H.","year":"2016","journal-title":"Application Research of Computers"},{"issue":"3","key":"bibr15-MGS-170271","first-page":"211","author":"Cheng M.","year":"2014","journal-title":"Journal of Wuhan Univ (Nat Sci Ed)"},{"issue":"21","key":"bibr16-MGS-170271","first-page":"185","volume":"45","author":"Yao Y.","year":"2009","journal-title":"Computer Engineering and Applications"},{"key":"bibr17-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1109\/TLA.2010.5538400"},{"key":"bibr18-MGS-170271","first-page":"22","author":"Osis J.","year":"2007","journal-title":"IEEE Computer Society"},{"key":"bibr19-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1007\/s007660200009"},{"key":"bibr20-MGS-170271","unstructured":"LiL., Semi-automatic approach to translating use cases to sequence diagrams, in: International Conference on Technology of Object-Oriented Languages, IEEE Computer Society (1999)."},{"journal-title":"15th IEEE International Conference on Automated Software Engineering","year":"2000","author":"Li L.","key":"bibr21-MGS-170271"},{"key":"bibr22-MGS-170271","doi-asserted-by":"crossref","unstructured":"KherrafS. LefebvreR. and SurynW., Transformation from CIM to PIM using patterns and archetypes, in: 23rd Australian Software Engineering Conference, IEEE (2008), 338\u2013346.","DOI":"10.1109\/ASWEC.2008.4483222"},{"issue":"6","key":"bibr23-MGS-170271","first-page":"265","volume":"34","author":"Cao X.","year":"2007","journal-title":"Computer Science"},{"key":"bibr24-MGS-170271","unstructured":"YinJ., Research on MDA-CIM modeling and its transformation to PIM, Technical Report, Harbin Institute of Technology, China, 2007."},{"key":"bibr25-MGS-170271","first-page":"159","author":"Cao X.","year":"2008","journal-title":"Sixth International Symposium on Theoretical Aspects of Software Engineering"},{"key":"bibr26-MGS-170271","first-page":"1239","author":"Rodr\u00edguez A.","year":"2008","journal-title":"Research and Practical Issues of Enterprise Information Systems"},{"key":"bibr27-MGS-170271","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguezA. Fern\u00e1ndez-MedinaE. and PiattiniM., Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases, Business Process Management (2007), 408\u2013415.","DOI":"10.1007\/978-3-540-75183-0_30"},{"journal-title":"Final Adopted Specification","year":"2008","author":"Omg Q.","key":"bibr28-MGS-170271"},{"journal-title":"IBM Cooperation","year":"2004","author":"White S.A.","key":"bibr29-MGS-170271"},{"key":"bibr30-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-007-9023-6"},{"issue":"5","key":"bibr31-MGS-170271","first-page":"1807","volume":"5","author":"Dennis A.R.","year":"2007","journal-title":"International Journal of Control"},{"key":"bibr32-MGS-170271","unstructured":"MartinJ., Information Engineering Book II: Planning and Analysis, Englewood cliffs, Prentice Hall, 1989, 160\u2013447."},{"journal-title":"Apress","year":"2007","author":"Rosenberg D.","key":"bibr33-MGS-170271"},{"key":"bibr34-MGS-170271","unstructured":"MichaelB. and JamesR., Object-Oriented Modeling and Design with UML, Beijing Posts and Telecom Press, China, 2006."},{"key":"bibr35-MGS-170271","doi-asserted-by":"crossref","unstructured":"NjonkoP.B. and AbedW.E., From natural language business requirements to executable models via SBVR, in: International Conference on Systems and Informatics (2012), 2453\u20132457.","DOI":"10.1109\/ICSAI.2012.6223550"},{"key":"bibr36-MGS-170271","doi-asserted-by":"crossref","unstructured":"DebnathN. LeonardiM.C. RidaoM. et al. An ATL transformation from natural language requirements models to business models of a MDA project, in: 11th IEEE International Conference on ITS Telecommunications (ITST) (2011), 633\u2013639.","DOI":"10.1109\/ITST.2011.6060132"},{"issue":"12","key":"bibr37-MGS-170271","first-page":"45","volume":"32","author":"Zou S.","year":"2009","journal-title":"Modern Electronics Technique"},{"issue":"10","key":"bibr38-MGS-170271","first-page":"4","volume":"21","author":"Gao R.","year":"2004","journal-title":"Computer Applications and Software"},{"key":"bibr39-MGS-170271","unstructured":"TangY., Research of use case modeling based on Petri Net, Technical Report, Southwest University, China, 2006."},{"key":"bibr40-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1145\/182.358441"},{"key":"bibr41-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-59412-0_17"},{"key":"bibr42-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0255(83)90014-2"},{"key":"bibr43-MGS-170271","doi-asserted-by":"crossref","unstructured":"BeckK. and CunninghamW.A., Laboratory for teaching object-oriented thinking, in: Conference on Object-Oriented Programming Systems, Languages and Applications (OOPSLA), ACM, New York, USA (1989).","DOI":"10.1145\/74877.74879"},{"key":"bibr44-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-023X(98)00032-9"},{"key":"bibr45-MGS-170271","unstructured":"WahonoR.S. and FarB.H., OOExpert: Distributed expert system for automatic object-oriented software design, in: 13th Annual Conference of Japanese Society for Artificial Intelligence (1999), 456\u2013457."},{"key":"bibr46-MGS-170271","unstructured":"MichL. and GariglianoR., Nl-oops: A requirements analysis tool based on natural language processing, in: Third International Conference on Data Mining Methods and Databases for Engineering, WIT Press, Southampton, UK (2002), 321\u2013330."},{"key":"bibr47-MGS-170271","doi-asserted-by":"crossref","unstructured":"MezianeF. and VaderaS., Obtaining E-R diagrams semi-automatically from natural language specifications, in: Sixth International Conference on Enterprise Information Systems, Universidade Portucalense, Porto, Portugal (2004), 638\u2013642.","DOI":"10.5220\/0002606106380642"},{"key":"bibr48-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022916028950"},{"key":"bibr49-MGS-170271","unstructured":"HartmannS. and LinkS., English sentence structures and EER modeling, in: Fourth Asia-Pacific Conference on Conceptual Modelling, Darlinghurst, Australian Computer Society (2007), 27\u201335."},{"key":"bibr50-MGS-170271","unstructured":"GigantoR., Generating class models through controlled requirements, in: New Zealand Computer Science Research Student Conference Christchurch, New Zealand (NZCSRSC-08), 2008."},{"issue":"3","key":"bibr51-MGS-170271","first-page":"47","volume":"3","author":"Al-Safadi L.A.","year":"2009","journal-title":"International Journal of Digital Content Technology and its Applications"},{"key":"bibr52-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.02.025"},{"key":"bibr53-MGS-170271","doi-asserted-by":"publisher","DOI":"10.5120\/4901-7391"},{"key":"bibr54-MGS-170271","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2015.14.1.a1"},{"key":"bibr55-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2014.04.014"},{"key":"bibr56-MGS-170271","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.07.010"},{"key":"bibr57-MGS-170271","doi-asserted-by":"crossref","unstructured":"WangZ. and ChalmersK., Evolution feature oriented model driven product line engineering approach for synergistic and dynamic service evolution in clouds: Pattern data structure, in: 7th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS), IEEE Computer Society (2013), 471\u2013474.","DOI":"10.1109\/CISIS.2013.86"},{"key":"bibr58-MGS-170271","unstructured":"XiaoP., An MDA Based Modeling and Implementation for Web App, Zhejiang University, China, 2013."},{"key":"bibr59-MGS-170271","unstructured":"ZhangC., Research and Implementation of The Model-Driven Development Methods for Automotive Electronic OS, University of Electronic Science And Technology Of China, 2013."},{"journal-title":"Engineering Technology and Applications","year":"2014","author":"Chen X.","key":"bibr60-MGS-170271"}],"container-title":["Multiagent and Grid Systems: An International Journal of Data Science and Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/MGS-170271","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/MGS-170271","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/MGS-170271","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T11:12:07Z","timestamp":1741691527000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/MGS-170271"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":60,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["10.3233\/MGS-170271"],"URL":"https:\/\/doi.org\/10.3233\/mgs-170271","relation":{},"ISSN":["1574-1702","1875-9076"],"issn-type":[{"type":"print","value":"1574-1702"},{"type":"electronic","value":"1875-9076"}],"subject":[],"published":{"date-parts":[[2017,8]]}}}