An Approach to Code Generation from UML Diagrams
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 1
Abstract
The Unified Modeling Language (UML) has now become the de-facto industry standard for object-oriented (OO) software development. UML provides a set of diagrams to model structural and behavioral aspects of an object-oriented system. Automatic translation of UML diagrams to object oriented code is highly desirable because it eliminates the chances of introduction of human errors in the translation process. Automatic code generation is efficient which, in turn, helps the software engineers deliver the software on time. However, major challenges in this area include checking consistency of UML models, and ensuring accuracy, maintainability, and efficiency of the generated code. This paper represents an approach to generate efficient and compact executable code from UML diagram. By analyzing the characteristics UML diagram, a coding strategy is proposed, and a structure identification and coding algorithm are put forward for code generation from UML diagram. Based on the coding strategy an algorithm is proposed to generate code from UML diagrams using some intermediate steps. The main objective of this paper is to generate the code from UML diagram.
Authors and Affiliations
Harshal D. Gurad*
FINDING OF REPEATED ITEMSETS USING GENETIC ALGORITHM
Extracting high profit itemsets from a deed database allude to the finding of itemsets with high profits. In existing algorithms they acquire the difficulty of producing huge numbers of candidate itemsets reduces the...
LED SCORILING DISPLAY USING THE MICROCONTROLLER
Now a days display is most important thing/ organization or public utility places like hospitals, Railway stations, collages,hotels,shopsand parks. sticking paper is easy but naturally disaster. This project deals about...
Effective Use of Data Mining in Banking
Data mining is one of the tasks in the process of knowledge discovery from the database. In the corporate world every organization is competing the other organization in terms of their value towards the business a...
An Investigation towards Security Threats for Cloud Computing
Cloud computing, a disruptive technology of the recent era, is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources having its intrinsic potentiality...
Secure and Efficient Data Transmission for Cluster-based Wireless Technology Networks
Secure data transmission network is a decisive issue for wireless technology networks (WTNs). Clustering is an effective and practical way to enhance the system performance & methods of WTNs. In this respectiv...