The synthesis method for specifications and requirements in the process of it project reengineering

https://doi.org/10.23939/ujit2023.02.001
Received: September 29, 2024
Accepted: October 26, 2023

Цитування за ДСТУ: Керницький О. Б., Теслюк В. М. Метод розроблення специфікацій та вимог в процесі реінжинірингу ІТ-проектів. Український журнал інформаційних технологій. 2023. Т. 5, № 2. С. 01–08.
Citation APA: Kernytskyy, O. B., & Teslyuk, V. M. (2023). The synthesis method for specifications and requirements in the process of it project reengineering. Ukrainian Journal of Information Technology, 5(2), 01–08. https://doi.org/10.23939/ujit2023.02.001

1
Lviv Polytechnic National University, Lviv, Ukraine
2
Lviv Polytechnic National University, Lviv, Ukraine

In this study, the aim is to create and improve a methodology for synthesizing requirements and specifications for the re-engineering of IT projects with maximum efficiency and business orientation. The main task is to adapt outdated IT systems to the changing technical environment, in particular to cloud technologies and security system requirements. To achieve these goals, the proposed methodology uses the analysis of archaic systems, the reverse engineering method, expert surveys, documentation analysis, and black-box modeling. The application of these methods allows for the identification and revision of requirements and specifications, ensuring a high level of quality and efficiency in the process of re-engineering IT projects.

The article further discusses the practical aspects of applying the methodology, prospects for further development, and the peculiarities of using various statistical methods in the process of improving re-engineering results. The operating principles of the method are described along with the main approaches and techniques that promote the analysis of existing IT systems, the synthesis of requirements and specifications, quality control, and successful project implementation. The individual components of the method include the collection of data about the existing system and the analysis of archaic systems to restore the definition of requirements. The use of the black-box model for testing the developed system is discussed, including the analysis of the obtained results, correction of requirements, and improvement of specifications.

The methodology includes documentation analysis tools, reverse engineering, surveys and data visualization tools, as well as analytical techniques such as a formula for parallel testing, a formula for requirement traceability matrix, and a formula for forecasting requirements based on discrepancy rate analysis. As a result of implementing the IT project reengineering method, successful transition from old to new technologies can be achieved, the IT industry can be optimized, and conditions can be created for adaptation to modern technical environments, ensuring stability and reliability of the implemented reengineering projects. Based on the analysis of modern sources, previous experience, and conducted research, it can be asserted that the method for synthesizing specifications and requirements in the process of reengineering IT projects is of great importance and relevance for the modern development of information technology and business processes.

1. Luna-Herrera, Y. A., Pérez-Arriaga, J. C., Ocharán-Hernández, J. O., & Sanchéz-García, Á. J. (2023). Comprehension of Computer Programs Through Reverse Engineering Approaches and Techniques: A Systematic Mapping Study. In: Mejia J., Muñoz M., Rocha Á., Hernández-Nava V. (eds). New Perspectives in Software Engineering. CIMPS 2022. Lecture Notes in Networks and Systems, 576. Springer, Cham. 
https://doi.org/10.1007/978-3-031-20322-0_9
2. Marinescu, R. (2012). Assessing technical debt by identifying design flaws in software systems. IBM J. Res. Dev. 56(5), 9:1-9:13. 
https://doi.org/10.1147/JRD.2012.2204512
3. Jamshidi, P., Ahmad, A., & Pahl, C. (2013). Cloud Migration Research: A Systematic Review. IEEE Transactions on Cloud Computing, 1(2), 142-157. 
https://doi.org/10.1109/TCC.2013.10
4. Andrikopoulos, V., Binz, T., Leymann, F., & Strauch, S. (2013). How to adapt applications for the Cloud environment: Challenges and solutions in migrating applications to the Cloud. Computing, 95(6), 493-535. 
https://doi.org/10.1007/s00607-012-0248-2
5. Maji, A. K., Mitra, S., & Zhou, B. (2015). "Parallel Testing of Combinational Circuits in Linear Time," 2015 33rd IEEE International Conference on Computer Design (ICCD), New York, NY, pp. 89-96. 
https://doi.org/10.1109/ICCD.2015.7357096
6. Adnan, M., & Mirza, N. (2010). Document Analysis through Legacy System Reengineering. Data & Knowledge Engineering Lab (DKE), University of Engineering & Technology-Lahore
7. Galbois, J., & Bournez, G. (2017). Technical Documentation Mining to Improve Legacy System Processes. Control Engineering Practice, 62, 59-164, ISSN 0967-0661
8. Krishna, R., Alshayeb, M., Hattab, G., Zheng, Q., Chivers, M., & Lisitenko, D. (2021). Reverse engineering as a stepping stone to continuous software maintenance. Software: Practice and Experience, 51(10), 1914-1936. 
https://doi.org/10.1002/spe.2979
9. Wu, Y., Brinkkemper, S., & Li, X. (2009). Balancing agility and structured methods for successful software engineering projects. Empir Software Eng 14, 450-471.
10. Chin, L., & Sturer, J. (1998). Understanding and implementing the IBM unified process for system development. IBM Systems Journal, 37(4), 539-558.
11. Rubin, K. S. (2012). Essential Scrum: A practical guide to the most popular agile process. Addison-Wesley.
12. Ammann, P., & Offutt, J. (2008). Introduction to software testing. Cambridge University Press. 
https://doi.org/10.1017/CBO9780511809163
13. IIBA (International Institute of Business Analysis), A Guide to the Business Analysis Body of Knowledge (BABOK Guide), 3rd ed., International Institute of Business Analysis, Toronto, Ontario, Canada, 2015.
14. DiMarzio, J. F. (2011). "Parallel Testing of Cloud-Based Applications," 2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops, Busan, pp. 253-257. 
https://doi.org/10.1109/ISPAW.2011.49
15. Goseva-Popstojanova, K., Guedem, A., & Singh, A. D. (2016). "Cost-Effective Software Testing in the Cloud," 2016 IEEE 9th International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Chicago, IL, pp. 330-335. 
https://doi.org/10.1109/ICSTW.2016.25
16. Petrenko, A., Schlingloff, H. & Ulrich, A. (2005). "Black-box testing of communicating systems," 5th International Conference on Application of Concurrency to System Design, St. Malo, France, 164-173.
https://doi.org/10.1109/ACSD.2005.20
17 Eagle, C., & Younan, Y. (2021). Reverse Engineering with the Ghidra Platform. Synthesis Lectures on Information Security, Privacy, and Trust, 13(1), 1-271
18. Lakes, R., Müller, D., & Kim, N. (2021). Extracting Population Dynamics Insights from Google Trends on Pandemics. PLoS ONE, 16(5), e0251867.
https://doi.org/10.1371/journal.pone.0251867
19. Kumar, R., & Upreti, G. (2019). Sentiment Analysis using Machine Learning Techniques: A Comparative Analysis. In 2019 4th International Conference on Information Systems and Computer Networks (ISCON), 254-259. https://doi.org/10.1109/ISCON47742.2019.8987091