Метод розроблення специфікацій та вимог в процесі реінжинірингу ІТ-проектів
dc.citation.epage | 8 | |
dc.citation.issue | 2 | |
dc.citation.journalTitle | Український журнал інформаційних технологій | |
dc.citation.spage | 1 | |
dc.citation.volume | 5 | |
dc.contributor.affiliation | Національний університет “Львівська політехніка” | |
dc.contributor.affiliation | Lviv Polytechnic National University | |
dc.contributor.author | Керницький, О. Б. | |
dc.contributor.author | Теслюк, В. М. | |
dc.contributor.author | Kernytskyy, O. B. | |
dc.contributor.author | Teslyuk, V. M. | |
dc.coverage.placename | Львів | |
dc.coverage.placename | Lviv | |
dc.date.accessioned | 2024-04-01T11:06:03Z | |
dc.date.available | 2024-04-01T11:06:03Z | |
dc.date.created | 2023-02-28 | |
dc.date.issued | 2023-02-28 | |
dc.description.abstract | У даному дослідженні метою є вдосконалення методу синтезу вимог та специфікацій для реінжинірингу ІТ-проектів з максимальною ефективністю та бізнес-орієнтованістю. Основним завданням є адаптація застарілих ІТ-систем до змінюваного технічного середовища, зокрема до хмарних технологій та вимог до систем безпеки. Для досягнення цих цілей, запропонована методу використовує аналіз архаїчних систем, метод зворотної розробки, опитування експертів, аналіз документації та моделювання чорного ящика. Застосування цих методів дає змогу виявити та коригувати вимоги та специфікації, забезпечуючи високий рівень якості та ефективності у процесі реінжинірингу ІТ-проектів. У статті далі розглядаються практичні використання методу, перспективи подальшого розвитку та особливості застосування різних статистичних методів у процесі покращення результатів реінжинірингу. Описуються принципи роботи методу разом із основними підходами та техніками, які сприяють аналізу існуючих ІТ-систем, синтезу вимог та специфікацій, контролю якості та ефективності реалізації проектів реінжинірингу. Окремо проаналізовані складові методу містять збір даних про існуючу систему та здійснення аналізу архаїчних систем з метою визначення вимог до нової системи. Розглядається застосування моделі чорного ящика для тестування розробленої системи, включаючи аналіз отриманих результатів, коректування вимог та покращення специфікацій. Метод включає засоби аналізу документації, реверсивного інжинірингу, опитувань і відображення даних, а також методики аналізу, наприклад формулу паралельного тестування, формулу матриці відповідності вимог та формулу прогнозування вимог на основі аналізу швидкості розбіжностей. | |
dc.description.abstract | In this study, the aim is to create and improve a methodology for synthesizing requirements and specifications for the re-engineering of IT projects with maximum efficiency and business orientation. The main task is to adapt outdated IT systems to the changing technical environment, in particular to cloud technologies and security system requirements. To achieve these goals, the proposed methodology uses the analysis of archaic systems, the reverse engineering method, expert surveys, documentation analysis, and black-box modeling. The application of these methods allows for the identification and revision of requirements and specifications, ensuring a high level of quality and efficiency in the process of re-engineering IT projects. The article further discusses the practical aspects of applying the methodology, prospects for further development, and the peculiarities of using various statistical methods in the process of improving re-engineering results. The operating principles of the method are described along with the main approaches and techniques that promote the analysis of existing IT systems, the synthesis of requirements and specifications, quality control, and successful project implementation. The individual components of the method include the collection of data about the existing system and the analysis of archaic systems to restore the definition of requirements. The use of the black-box model for testing the developed system is discussed, including the analysis of the obtained results, correction of requirements, and improvement of specifications. The methodology includes documentation analysis tools, reverse engineering, surveys and data visualization tools, as well as analytical techniques such as a formula for parallel testing, a formula for requirement traceability matrix, and a formula for forecasting requirements based on discrepancy rate analysis. As a result of implementing the IT project reengineering method, successful transition from old to new technologies can be achieved, the IT industry can be optimized, and conditions can be created for adaptation to modern technical environments, ensuring stability and reliability of the implemented reengineering projects. Based on the analysis of modern sources, previous experience, and conducted research, it can be asserted that the method for synthesizing specifications and requirements in the process of reengineering IT projects is of great importance and relevance for the modern development of information technology and business processes. | |
dc.format.extent | 1-8 | |
dc.format.pages | 8 | |
dc.identifier.citation | Керницький О. Б. Метод розроблення специфікацій та вимог в процесі реінжинірингу ІТ-проектів / О. Б. Керницький, В. М. Теслюк // Український журнал інформаційних технологій. — Львів : Видавництво Львівської політехніки, 2023. — Том 5. — № 2. — С. 1–8. | |
dc.identifier.citationen | Kernytskyy O. B. The synthesis method for specifications and requirements in the process of it project reengineer-ing / O. B. Kernytskyy, V. M. Teslyuk // Ukrainian Journal of Information Technology. — Lviv : Lviv Politechnic Publishing House, 2023. — Vol 5. — No 2. — P. 1–8. | |
dc.identifier.doi | doi.org/10.23939/ujit2023.02.001 | |
dc.identifier.issn | 2707-1898 | |
dc.identifier.uri | https://ena.lpnu.ua/handle/ntb/61593 | |
dc.language.iso | uk | |
dc.publisher | Видавництво Львівської політехніки | |
dc.publisher | Lviv Politechnic Publishing House | |
dc.relation.ispartof | Український журнал інформаційних технологій, 2 (5), 2023 | |
dc.relation.ispartof | Ukrainian Journal of Information Technology, 2 (5), 2023 | |
dc.relation.references | [1] Luna-Herrera, Y. A., Pérez-Arriaga, J. C., Ocharán-Hernández, J. O., & Sanchéz-García, Á. J. (2023). Comprehension of Computer Programs Through Reverse Engineering Approaches and Techniques: A Systematic Mapping Study. In: Mejia J., Muñoz M., Rocha Á., Hernández-Nava V. (eds). New Perspectives in Software Engineering. CIMPS 2022. Lecture Notes in Networks and Systems, 576. Springer, Cham. https://doi.org/10.1007/978-3-031-20322-0_9 | |
dc.relation.references | [2] Marinescu, R. (2012). Assessing technical debt by identifying design flaws in software systems. IBM J. Res. Dev. 56(5), 9:1-9:13. https://doi.org/10.1147/JRD.2012.2204512 | |
dc.relation.references | [3] Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud Migration Research: A Systematic Review. IEEE Transactions on Cloud Computing, 1(2), 142-157. https://doi.org/10.1109/TCC.2013.10 | |
dc.relation.references | [4] Andrikopoulos, V., Binz, T., Leymann, F., & Strauch, S. (2013). How to adapt applications for the Cloud environment: Challenges and solutions in migrating applications to the Cloud. Computing, 95(6), 493-535. https://doi.org/10.1007/s00607-012-0248-2 | |
dc.relation.references | [5] Maji, A. K., Mitra, S., & Zhou, B. (2015). "Parallel Testing of Combinational Circuits in Linear Time," 2015 33rd IEEE International Conference on Computer Design (ICCD), New York, NY, pp. 89-96. https://doi.org/10.1109/ICCD.2015.7357096 | |
dc.relation.references | [6] Adnan, M., & Mirza, N. (2010). Document Analysis through Legacy System Reengineering. Data & Knowledge Engineering Lab (DKE), University of Engineering & Technology-Lahore | |
dc.relation.references | [7] Galbois, J., & Bournez, G. (2017). Technical Documentation Mining to Improve Legacy System Processes. Control Engineering Practice, 62, 59-164, ISSN 0967-0661 | |
dc.relation.references | [8] Krishna, R., Alshayeb, M., Hattab, G., Zheng, Q., Chivers, M., & Lisitenko, D. (2021). Reverse engineering as a stepping stone to continuous software maintenance. Software: Practice and Experience, 51(10), 1914-1936. https://doi.org/10.1002/spe.2979 | |
dc.relation.references | [9] Wu, Y., Brinkkemper, S., & Li, X. (2009). Balancing agility and structured methods for successful software engineering projects. Empir Software Eng 14, 450-471. | |
dc.relation.references | [10] Chin, L., & Sturer, J. (1998). Understanding and implementing the IBM unified process for system development. IBM Systems Journal, 37(4), 539-558. | |
dc.relation.references | [11] Rubin, K. S. (2012). Essential Scrum: A practical guide to the most popular agile process. Addison-Wesley. | |
dc.relation.references | [12] Ammann, P., & Offutt, J. (2008). Introduction to software testing. Cambridge University Press. https://doi.org/10.1017/CBO9780511809163 | |
dc.relation.references | [13] IIBA (International Institute of Business Analysis), A Guide to the Business Analysis Body of Knowledge (BABOK Guide), 3rd ed., International Institute of Business Analysis, Toronto, Ontario, Canada, 2015. | |
dc.relation.references | [14] DiMarzio, J. F. (2011). "Parallel Testing of Cloud-Based Applications," 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, Busan, pp. 253-257. https://doi.org/10.1109/ISPAW.2011.49 | |
dc.relation.references | [15] Goseva-Popstojanova, K., Guedem, A., & Singh, A. D. (2016). "Cost-Effective Software Testing in the Cloud," 2016 IEEE 9th International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Chicago, IL, pp. 330-335. https://doi.org/10.1109/ICSTW.2016.25 | |
dc.relation.references | [16] Petrenko, A., Schlingloff, H. & Ulrich, A. (2005). "Black-box testing of communicating systems," 5th International Conference on Application of Concurrency to System Design, St. Malo, France, 164-173. https://doi.org/10.1109/ACSD.2005.20 | |
dc.relation.references | [17] Eagle, C., & Younan, Y. (2021). Reverse Engineering with the Ghidra Platform. Synthesis Lectures on Information Security, Privacy, and Trust, 13(1), 1-271 | |
dc.relation.references | [18] Lakes, R., Müller, D., & Kim, N. (2021). Extracting Population Dynamics Insights from Google Trends on Pandemics. PLoS ONE, 16(5), e0251867. https://doi.org/10.1371/journal.pone.0251867 | |
dc.relation.references | [19] Kumar, R., & Upreti, G. (2019). Sentiment Analysis using Machine Learning Techniques: A Comparative Analysis. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), 254-259. https://doi.org/10.1109/ISCON47742.2019.8987091 | |
dc.relation.referencesen | [1] Luna-Herrera, Y. A., Pérez-Arriaga, J. C., Ocharán-Hernández, J. O., & Sanchéz-García, Á. J. (2023). Comprehension of Computer Programs Through Reverse Engineering Approaches and Techniques: A Systematic Mapping Study. In: Mejia J., Muñoz M., Rocha Á., Hernández-Nava V. (eds). New Perspectives in Software Engineering. CIMPS 2022. Lecture Notes in Networks and Systems, 576. Springer, Cham. https://doi.org/10.1007/978-3-031-20322-0_9 | |
dc.relation.referencesen | [2] Marinescu, R. (2012). Assessing technical debt by identifying design flaws in software systems. IBM J. Res. Dev. 56(5), 9:1-9:13. https://doi.org/10.1147/JRD.2012.2204512 | |
dc.relation.referencesen | [3] Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud Migration Research: A Systematic Review. IEEE Transactions on Cloud Computing, 1(2), 142-157. https://doi.org/10.1109/TCC.2013.10 | |
dc.relation.referencesen | [4] Andrikopoulos, V., Binz, T., Leymann, F., & Strauch, S. (2013). How to adapt applications for the Cloud environment: Challenges and solutions in migrating applications to the Cloud. Computing, 95(6), 493-535. https://doi.org/10.1007/s00607-012-0248-2 | |
dc.relation.referencesen | [5] Maji, A. K., Mitra, S., & Zhou, B. (2015). "Parallel Testing of Combinational Circuits in Linear Time," 2015 33rd IEEE International Conference on Computer Design (ICCD), New York, NY, pp. 89-96. https://doi.org/10.1109/ICCD.2015.7357096 | |
dc.relation.referencesen | [6] Adnan, M., & Mirza, N. (2010). Document Analysis through Legacy System Reengineering. Data & Knowledge Engineering Lab (DKE), University of Engineering & Technology-Lahore | |
dc.relation.referencesen | [7] Galbois, J., & Bournez, G. (2017). Technical Documentation Mining to Improve Legacy System Processes. Control Engineering Practice, 62, 59-164, ISSN 0967-0661 | |
dc.relation.referencesen | [8] Krishna, R., Alshayeb, M., Hattab, G., Zheng, Q., Chivers, M., & Lisitenko, D. (2021). Reverse engineering as a stepping stone to continuous software maintenance. Software: Practice and Experience, 51(10), 1914-1936. https://doi.org/10.1002/spe.2979 | |
dc.relation.referencesen | [9] Wu, Y., Brinkkemper, S., & Li, X. (2009). Balancing agility and structured methods for successful software engineering projects. Empir Software Eng 14, 450-471. | |
dc.relation.referencesen | [10] Chin, L., & Sturer, J. (1998). Understanding and implementing the IBM unified process for system development. IBM Systems Journal, 37(4), 539-558. | |
dc.relation.referencesen | [11] Rubin, K. S. (2012). Essential Scrum: A practical guide to the most popular agile process. Addison-Wesley. | |
dc.relation.referencesen | [12] Ammann, P., & Offutt, J. (2008). Introduction to software testing. Cambridge University Press. https://doi.org/10.1017/CBO9780511809163 | |
dc.relation.referencesen | [13] IIBA (International Institute of Business Analysis), A Guide to the Business Analysis Body of Knowledge (BABOK Guide), 3rd ed., International Institute of Business Analysis, Toronto, Ontario, Canada, 2015. | |
dc.relation.referencesen | [14] DiMarzio, J. F. (2011). "Parallel Testing of Cloud-Based Applications," 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, Busan, pp. 253-257. https://doi.org/10.1109/ISPAW.2011.49 | |
dc.relation.referencesen | [15] Goseva-Popstojanova, K., Guedem, A., & Singh, A. D. (2016). "Cost-Effective Software Testing in the Cloud," 2016 IEEE 9th International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Chicago, IL, pp. 330-335. https://doi.org/10.1109/ICSTW.2016.25 | |
dc.relation.referencesen | [16] Petrenko, A., Schlingloff, H. & Ulrich, A. (2005). "Black-box testing of communicating systems," 5th International Conference on Application of Concurrency to System Design, St. Malo, France, 164-173. https://doi.org/10.1109/ACSD.2005.20 | |
dc.relation.referencesen | [17] Eagle, C., & Younan, Y. (2021). Reverse Engineering with the Ghidra Platform. Synthesis Lectures on Information Security, Privacy, and Trust, 13(1), 1-271 | |
dc.relation.referencesen | [18] Lakes, R., Müller, D., & Kim, N. (2021). Extracting Population Dynamics Insights from Google Trends on Pandemics. PLoS ONE, 16(5), e0251867. https://doi.org/10.1371/journal.pone.0251867 | |
dc.relation.referencesen | [19] Kumar, R., & Upreti, G. (2019). Sentiment Analysis using Machine Learning Techniques: A Comparative Analysis. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), 254-259. https://doi.org/10.1109/ISCON47742.2019.8987091 | |
dc.relation.uri | https://doi.org/10.1007/978-3-031-20322-0_9 | |
dc.relation.uri | https://doi.org/10.1147/JRD.2012.2204512 | |
dc.relation.uri | https://doi.org/10.1109/TCC.2013.10 | |
dc.relation.uri | https://doi.org/10.1007/s00607-012-0248-2 | |
dc.relation.uri | https://doi.org/10.1109/ICCD.2015.7357096 | |
dc.relation.uri | https://doi.org/10.1002/spe.2979 | |
dc.relation.uri | https://doi.org/10.1017/CBO9780511809163 | |
dc.relation.uri | https://doi.org/10.1109/ISPAW.2011.49 | |
dc.relation.uri | https://doi.org/10.1109/ICSTW.2016.25 | |
dc.relation.uri | https://doi.org/10.1109/ACSD.2005.20 | |
dc.relation.uri | https://doi.org/10.1371/journal.pone.0251867 | |
dc.relation.uri | https://doi.org/10.1109/ISCON47742.2019.8987091 | |
dc.rights.holder | © Національний університет “Львівська політехніка”, 2023 | |
dc.subject | реінжиніринг ІТ-проектів | |
dc.subject | архаїчні системи | |
dc.subject | паралельне тестування | |
dc.subject | модель чорного ящика | |
dc.subject | матриця трасування вимог | |
dc.subject | хмарні технології | |
dc.subject | IT project reengineering | |
dc.subject | Archaic systems | |
dc.subject | Parallel testing | |
dc.subject | Requirement Traceability Matrix | |
dc.subject | Discrepancy rate analysis | |
dc.subject | Cloud technologies | |
dc.subject.udc | 004.4 | |
dc.title | Метод розроблення специфікацій та вимог в процесі реінжинірингу ІТ-проектів | |
dc.title.alternative | The synthesis method for specifications and requirements in the process of it project reengineer-ing | |
dc.type | Article |
Files
License bundle
1 - 1 of 1