• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng. An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese[J]. Journal of Computer Research and Development, 2021, 58(4): 706-730. DOI: 10.7544/issn1000-1239.2021.20200757
Citation: Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng. An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese[J]. Journal of Computer Research and Development, 2021, 58(4): 706-730. DOI: 10.7544/issn1000-1239.2021.20200757

An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese

Funds: This work was supported by the National Natural Science Foundation of China (62072233), the Aviation Science Fund of China (201919052002), and the Fundamental Research Funds for the Central Universities (NP2017205).
More Information
  • Published Date: March 31, 2021
  • Model-driven development has been gradually adopted as an important approach of designing and developing safety-critical cyber-physical systems(SC-CPSs). The requirement of SC-CPSs is often described in natural language. How to link natural language requirements and the model-driven design and development process of SC-CPSs automatically or semi-automatically is a main existing challenge. In this paper, a method named RNL2SysML is proposed for the automatic generation of SysML models from restricted natural language requirements in Chinese. Firstly, in view of the problem that glossaries need to be manually extracted, a method for extracting and recommending terms of SC-CPSs based on artificial intelligence is proposed. Secondly, in order to reduce the ambiguity of natural language requirements, a restricted natural language requirement template is proposed for requirement specification. Then, the method of transformation from natural language requirement specification to SysML model is given. Finally, based on the open source tool Papyrus, the plugin for the method proposed in this paper is implemented, and the effectiveness and practicality of the method is evaluated and proved by an industry case of the airplane air compressor system in the aviation field.
  • Related Articles

    [1]Wu Yinghong, Huang Hao, Zeng Qingkai. Description of Service Oriented Access Control Policy Refinement[J]. Journal of Computer Research and Development, 2014, 51(11): 2470-2482. DOI: 10.7544/issn1000-1239.2014.20130973
    [2]Tang Chenghua, Yu Shunzheng. Verifying Network Security Policy Based on Features[J]. Journal of Computer Research and Development, 2009, 46(11): 1854-1861.
    [3]Sun Yong, Wu Bo, and Feng Yanpeng. A Policy-and Value- Iteration Algorithm for POMDP[J]. Journal of Computer Research and Development, 2008, 45(10): 1763-1768.
    [4]Liu Daobin, Guo Li, and Bai Shuo. A Methodology for Analyzing Security Policy in Workflow[J]. Journal of Computer Research and Development, 2008, 45(6).
    [5]Li Ji, Zeng Huaxin, Xu Dengyuan. A New Service Guaranteed Scheduling Policy for Buffered Crossbar Switches[J]. Journal of Computer Research and Development, 2007, 44(11): 1873-1880.
    [6]Li Xiaofeng, Feng Dengguo, He Yongzhong. Research on Preprocessing Policies in XACML Admin[J]. Journal of Computer Research and Development, 2007, 44(5): 729-736.
    [7]He Yongzhong, Li Xiaofeng, Feng Dengguo. Implementing Chinese Wall Policies on RBAC[J]. Journal of Computer Research and Development, 2007, 44(4): 615-622.
    [8]He Liqiang, Liu Zhiyong. A QoS Capable Fetch Policy for SMT Processors[J]. Journal of Computer Research and Development, 2006, 43(11): 1980-1984.
    [9]Li Xiangjun, Meng Luoming, and Jiao Li. Problems in Results of Policy Conflict Resolutions and Detection and Resolution Methods in Network Management Systems[J]. Journal of Computer Research and Development, 2006, 43(7): 1297-1303.
    [10]Yao Jian, Mao Bing, and Xie Li. A DAG-Based Security Policy Conflicts Detection Method[J]. Journal of Computer Research and Development, 2005, 42(7): 1108-1114.
  • Cited by

    Periodical cited type(3)

    1. 潘佳,于秀兰. 基于社交意识和支付激励的D2D协作传输策略. 计算机应用研究. 2023(06): 1801-1805 .
    2. 刘琳岚,谭镇阳,舒坚. 基于图神经网络的机会网络节点重要度评估方法. 计算机研究与发展. 2022(04): 834-851 . 本站查看
    3. 王淳,吴仕荣. 舰船自组织网络数据分发机制研究. 舰船科学技术. 2020(14): 166-168 .

    Other cited types(2)

Catalog

    Article views (882) PDF downloads (420) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return