Äú¿ÉÒÔ¾èÖú£¬Ö§³ÖÎÒÃǵĹ«ÒæÊÂÒµ¡£

1Ôª 10Ôª 50Ôª





ÈÏÖ¤Â룺  ÑéÖ¤Âë,¿´²»Çå³þ?Çëµã»÷Ë¢ÐÂÑéÖ¤Âë ±ØÌî



  ÇóÖª ÎÄÕ ÎÄ¿â Lib ÊÓÆµ iPerson ¿Î³Ì ÈÏÖ¤ ×Éѯ ¹¤¾ß ½²×ù Model Center   Code  
»áÔ±   
   
 
     
   
 ¶©ÔÄ
  ¾èÖú
¡¾SysML¡¿ÓÃÀýͼ
 
À´Ô´£ºcnblogs ·¢²¼ÓÚ£º 2017-5-24
  3017  次浏览      29
 

ÒýÑÔ

¶ÔÓÚϵͳ¹¤³ÌʦÀ´Ëµ£¬Éè¼ÆÓÃÀýͼÊÇÒ»ÖÖ¼«Îª³£¼ûµÄ½¨Ä£»î¶¯¡£ÓÃÀýͼÊÇÒ»ÖÖºÚºÐÊÓͼ£¬Í¨¹ýÏò¶ÁÕß´«µÝһϵÁеÄÓÃÀýÒÔ¼°Ïà¹ØµÄ²ÎÓëÕߣ¬¶Ôϵͳ¶ÔÍâÌṩµÄ·þÎñ»òϵͳ¾ß±¸µÄÐÐΪ½øÐн¨Ä£¡£ÔÚÏêϸÌÖÂÛSysMLµÄÓÃÀýͼ֮ǰ£¬ÎÒÃÇÏÈÀ´Á˽âÒ»¸ö·Ç³£¹Ø¼üµÄ¸ÅÄî - ÓÃÀý¡£

ʲôÊÇÓÃÀý£¿

ÓÃÀý£¬Ó¢ÎÄΪ ¡°Use Case¡±£¬²»Í¬µÄÊé¼®»òÂÛÎÄ×ÊÁ϶ÔÓÚ ¡°ÓÃÀý¡± Óв»Í¬µÄ¶¨Ò壬±¾ÎÄÒýÓá¶Writing Effective Use Case¡·Ò»ÊéÖйØÓÚÓÃÀýµÄÃèÊö£º

A use case captures a contract between the stakeholders of a system about its behavior. The use case describes the system¡¯s behavior under various conditions as it responds to a request from one of the stakeholders, called the primary actor. The primary actor initiates an interaction with the system to accomplish some goal. The system responds, protecting the interests of all the stakeholders. Different sequences of behavior, or scenarios, can unfold, depending on the particular requests made and conditions surrounding the requests. The use case collects together those different scenarios.

ͨË×µÄ˵£¬¡°ÓÃÀý¡± ÊÇϵͳÐÐΪµÄºÚºÐÃèÊö£¬Æä²ûÊöµÄÊDzÎÓëÕߣ¨¿ÉÄÜÊÇÓû§£¬Ò²¿ÉÄÜÊÇÆäËûϵͳ£©µÄÒâͼ»ò¶ÔϵͳÐÐΪµÄÆÚÍû£¬´Ó²ÎÓëÕߵĽǶȶÔϵͳӦ¸Ã¾ß±¸µÄÐÐΪ½øÐн¨Ä£¡£

ÓÃÀý±í´ï·½Ê½£¿

ÓÃÀý¿ÉÒÔ²ÉÓûùÓÚÄ£ÐͺͻùÓÚÎı¾µÄ·½Ê½½øÐбí´ï¡£Îı¾·½Ê½ÊÇ´«Í³µÄµ«¹ã·ºÓ¦Óõķ½Ê½£¬Óû§¿ÉÒÔ²ÉÓÃÌØ¶¨¸ñʽµÄÎı¾¶ÎÂä»ò±í¸ñ¶ÔÓÃÀý½øÐÐÏêϸÃèÊö¡£Ä£ÐÍ·½Ê½ÊÇδÀ´µÄÖ÷ÒªÇ÷ÊÆ£¬ÀýÈçÓû§¿ÉÒÔͨ¹ýUML/SysMLµÄÄ£ÐÍͼÈçÓÃÀýͼ¡¢»î¶¯Í¼¡¢Ê±ÐòͼµÈ¶ÔÓÃÀý½øÐÐÃèÊöºÍϸ»¯¡£

²»¹Ü»ùÓÚÄÄÖÖ·½Ê½£¬ÓÃÀýµÄÃû³ÆµäÐ͵ػá²ÉÓö¯´Ê¶ÌÓï½øÐÐÃèÊö£¬ÀýÈç ¡°´æÇ®¡±¡¢¡°È¡Ç®¡±¡¢¡°·¢²¼Îĵµ¡±¡¢¡°´´½¨Óû§¡±µÈ£¬ÕâÖÖ¸ÅÒªÐÔÃèÊöÄܹ» ¡°´óÖ¡± ˵Ã÷²ÎÓëÕßµÄÒâͼ»òÕß²ÎÓëÕßÏ£ÍûϵͳִÐеÄÐÐΪ£¬ËäÈ»´«µÝµÄÐÅÏ¢·Ç³£¹Ø¼üµ«ÊÇÓÐÏÞ£¬Éè¼ÆÕß²»¿ÉÄܵ¥´ÓÕâЩ¶¯´Ê¶ÌÓï»ñÈ¡Í걸µÄÐÅÏ¢¡£×÷ΪһÖÖ²¹³ä£¬Ò»°ã»á²ÉÓà ÓÃÀý˵Ã÷Êé £¨¶ÔÓÚÄ£ÐÍÀ´Ëµ£¬¿ÉÄÜÊÇʱÐòͼ¡¢»î¶¯Í¼µÈÄ£ÐÍ£©¶ÔÓÃÀý½øÐÐ˵Ã÷¡£µäÐ͵أ¬ÎÒÃÇ¿ÉÒÔ²ÉÓûùÓÚÎÄ×ֵķ½Ê½±í´ïÓÃÀý˵Ã÷Êé¡£

¡¶Writing Effective Use Case¡·Ò»ÊéÖÐÌṩÁËʾÀýÐÎʽ£¬¿ÉÒԲο¼ÏÂͼ£º

²»Í¬µÄÎÄ×Ö±íÊöÐÎʽµÄÑùʽ¿ÉÄܲ»Ì«Ïàͬ£¬¾ßÌåÑ¡ÔñÄÄÖÖÑùʽȡ¾öÓÚÓû§¡£

³õʶSysMLÓÃÀýͼ

ÎÒÃÇ˵£¬ÓÃÀýͼ´«µÝÁËһϵÁеÄÓÃÀý£¬ÄÇôÔÚSysMLÖÐÓÃÀýͼÈçºÎ±íÊöÄØ£¿ÏÂÃæÏȶÃΪ¿ì¡£ÈçÏÂͼËùʾ£¬ÕâÊÇÒ»¸ö ¡°Security System¡± ϵͳµÄSysMLÓÃÌâͼ¡£Í¼Í·²¿ÊÇSysMLͨÓõÄÍ·²¿½á¹¹£¬ÆäÖÐͼÀàÐÍΪ ¡°uc¡±£¬¼´ÓÃÌâͼ¡£ÓÃÀýͼµÄÄÚÈÝÇøÓò²¿·ÖչʾÁËËÄÖÖÄ£ÐÍÔªËØ£º

ϵͳ±ß½ç¿ò£º¾ØÐοò±íʾ£¬ÓÃÓÚ¶¨ÒåϵͳµÄ·¶Î§¡£

²ÎÓëÕߣºÈËÐÎͼ±ê»ò´øÓÐ<<actor>>¹Ø¼ü×ֵľØÐÎͼ±ê¶¼¿ÉÒÔ±íʾ²ÎÓëÕߣ¬Ò»°ãϰ¹ßÓÚʹÓÃÈËÐÎͼ±ê¡£²ÎÓëÕß¿ÉÄÜÊÇÓû§£¬Ò²¿ÉÄÜÊÇÆäËûϵͳ£¬±¾ÓÃÀýͼ°üº¬Ëĸö²ÎÓëÕß¡£

ÓÃÀý£ºÍÖÔ²ÐÎͼ±ê£¬²¢´øÓÐÓÃÀýÃû³Æ¡£±¾ÓÃÀýͼ°üº¬ 2 ¸öÓÃÀý¡£

²ÎÓëÕßÓëÓÃÀý¼äµÄ¹ØÏµ£ºÎÞ¼ýͷʵÏß¡£

ÓÃÀý¼äµÄ¹ØÏµÖ®·º»¯£¨generalization£©

ÓÃÀý¼äµÄ·º»¯¹ØÏµ±íʾһÖּ̳У¬ÊÇ´Ó³éÏóµ½¾ßÌåµÄÒ»ÖÖÑÝ»¯¡£×ÓÀàÐ͵ÄÓÃÀý¼Ì³Ð¸¸ÓÃÀýµÄÄÚÈÝ£¬²¢ÔÚ´Ë»ù´¡ÉϽøÐÐÖØÐ¶¨Òå»òÌí¼Óеĸ¸ÓÃÀý²»¾ß±¸µÄ¹ØÏµ»òÐÐΪ¡£ÔÚSysMLÖУ¬·º»¯¹ØÏµ²ÉÓôø¿ÕÈý½Ç¼ýÍ·µÄʵÏß±íʾ¡£ÈçÏÂͼ£º

ÓÃÀý¼äµÄ¹ØÏµÖ®°üº¬£¨include£©

°üº¬£¨include£©¹ØÏµÔÚSysMLÖеıêʶ·¨ÊÇ´øÓмýÍ·µÄÐéÏߣ¬²¢×¢ÓÐ<<include>>¹Ø¼ü×Ö¡£¡°±»°üº¬¡± µÄÓÃÀýλÓÚ¹ØÏµµÄβ¶Ë£¬¼´¼ýÍ·¶Ë¡£

ÓÃÀý¼äµÄ°üº¬¹ØÏµ±íʾµÄÊÇ£ºµ±Ä³ÓÃÀý±»´¥·¢Ê±£¬Æä°üº¬µÄÓÃÀýÒ²»áÖ´ÐС£±»°üº¬µÄÓÃÀý×÷ΪÆäËûÓÃÀýµÄÒ»¸ö×é³É²¿·Ö´æÔÚ¡£

×¢Ò⣺ °üº¬¹ØÏµËäÈ»±í´ïÁËÓÃÀý¼äµÄ×é³É¹ØÏµ£¬µ«Óû§ÇмDz»Òª¼±ÓÚ°üº¬¹ØÏµ¶Ôϵͳ×ö¹¦Äֽܷ⡣ÕâÊÇÓû§ÔÚʹÓÃÓÃÀý½¨Ä£Ê±¾­³£³öÏÖ´íÎó¡£ÓÃÀý²»Êǹ¦ÄÜ£¬ÓÃÀýʹÓù¦ÄܶøÒÑ¡£Òò´Ë»ùÓÚÓÃÀýʵÏÖ¹¦ÄÜ·Ö½âÊDz»ºÏÊʵġ£ÁíÍ⣬µ½µ×ʲôʱºò¶¨Òå°üº¬ÓÃÀý£¿°üº¬ÓÃÀýµÄ¶¨Òå²»ÊDZØÈ»µÄ¡£´´½¨°üº¬ÓÃÀýµÄÔ­ÔòÊǵ±¶à¸öÓÃÀý¾ßÓÐһЩ¹«¹²µÄ×ÓÐÐΪʱ£¬Ò»°ã»á½«ÕâЩ¹«¹²ÐÐΪ´´½¨Îª°üº¬ÓÃÀý¡£¶øÇÒ£¬ÕâЩÍùÍù²»ÊÇÔÚϵͳÉè¼ÆµÄ³õʼµü´ú¾Í×öµÄÊÂÇ飬¶øÊÇϵͳ½¨Ä£¿ªÊ¼Ê±£¬½ö¹¹½¨»ù´¡ÓÃÀý£¬²¢¶ÔÓÃÀý½øÐÐÏêϸµÄ˵Ã÷£¨ÀýÈ磬¶¨ÒåÓÃÀý˵Ã÷Ê飩£¬Ëæ×ÅÓÃÀýµÄ²»¶ÏÃ÷È·£¬¹«¹²×ÓÐÐΪ×ÔÈ»ÏÔÏÖ³öÀ´£¬´ËʱÔÙ¶¨Òå°üº¬ÓÃÀýʱºÏÀíµÄ¡£

ÓÃÀý¼äµÄ¹ØÏµÖ®À©Õ¹£¨extend£©

SysMLÖÐÓÃÀýÀ©Õ¹£¨extend£©¹ØÏµµÄ±êʶ·¨ÊÇ´ø¼ýÍ·µÄÐéÏߣ¬²¢×¢ÓÐ<<extend>>¹Ø¼ü×Ö¡£À©Õ¹ÓÃÀýλÓÚÀ©Õ¹¹ØÏµµÄβ¶Ë£¨·Ç¼ýÍ·¶Ë£©¡£À©Õ¹¹ØÏµ±íÊöµÄÊÇÒ»ÖÖ¿ÉÑ¡µÄ¹«¹²ÐÐΪ¡£µ±ÓÃÀý´¥·¢Ê±£¬ËüµÄÀ©Õ¹ÓÃÀýÊÇ¿ÉÑ¡µÄÖ´ÐУ¨Óë°üº¬ÓÃÀý²»Í¬£©¡£

À©Õ¹¹ØÏµ±íÊöµÄÊǶԿÉÑ¡ÐÐΪµÄ½¨Ä£¡£µ±¶à¸öÓÃÀý¾ß±¸Í¨ÓõĿÉÑ¡ÐÐΪʱ£¬¿ÉÒÔ½«ÕâЩͨÓÃÐÐÎªÖØ¹¹ÎªÀ©Õ¹ÓÃÀý¡£

²ÎÓëÕß¼äµÄ¹ØÏµ

SysML»¹Ö§³Ö²ÎÓëÕß¼äµÄ·º»¯¹ØÏµ£¬±íʾ·½Ê½´øÓпÕÈý½Ç¼ýÍ·µÄʵÏߣ¬¸¸ÀàÐÍλÓÚ¼ýÍ·¶Ë¡£Í¬Ñù£¬·º»¯¹ØÏµËù±í´ïµÄº¬ÒåͬÑùÊÊÓÃÓÚ²ÎÓëÕß¼äµÄ·º»¯¹ØÏµ¡£·º»¯Òâζ׿̳У¬·º»¯Òâζ×ųéÏó£¬×ÓÀàÐÍ»á¼Ì³Ð¸¸ÀàÐ͵ÄÉÏÏÂÎÄ¡£

ÓÃÀýÓ볡¾°µÄ¹ØÏµ

³¡¾°ÊÇÓÃÀýÖ´ÐеÄ·¾¶£¬ÓÃÀý´Ó¿ªÊ¼Ö´Ðе½½áÊø¿ÉÒÔ¶¨ÒåΪһ¸ö ¡°³¡¾°¡±¡£ÓÉ´Ë£¬ÓÃÀýºÍ³¡¾°¼äÊÇ ¡°Ò»¶Ô¶à¡± µÄ¹ØÏµ¡£³¡¾°Óкܶ࣬²»½ö½ö¾ÖÏÞÓÚÓÃÀýÖ´Ðгɹ¦µÄ³¡¾°£¬µ±È»Ò²°üÀ¨ÓÃÀýÖ´Ðйý³ÌÖгöÏֵĸ÷ÖÖÒì³£³¡¾°¡£

µ±ÃèÊöÓÃÀýµÄ³¡¾°Ê±£¬·¢ÏÖij¸öÓÃÀýµÄ³É¹¦µÄ³¡¾°Ì«¶à£¬ÔòÕâÒªÒýÆð×¢Ò⣬¿ÉÄÜÊÇÓÃÀý¶¨ÒåµÄÁ£¶ÈÌ«´ó£¬µ¼Ö³ɹ¦³¡¾°£¨Ö´Ðз¾¶£©Ì«¶à¡£Òò´Ë£¬ÒªÊʵ±²ð·Ö£¬¾¡Á¿±£Ö¤µ¥¸öÓÃÀýÓÐÒ»¸öÖ÷ÒªµÄ³É¹¦³¡¾°¡£

ÓÃÀýͼÉè¼ÆÔ­Ôò

Ê×Ïȹ¹½¨»ù´¡ÓÃÀý£¬²¢Ï¸»¯ÓÃÀý˵Ã÷Ê飻

ÇмǽûֹʹÓÃÓÃÀýʵÏÖ¹¦Äֽܷ⣨ÓÃÀý²»Êǹ¦ÄÜ£¬ÓÃÀýµ÷Óù¦ÄÜ£©£»

ʹÓðüº¬ÓÃÀýÖØ¹¹¶àÓÃÀýµÄ¹«¹²ÐÐΪ£¨±ØÈ»Ö´ÐУ©£»

ʹÓÃÀ©Õ¹ÓÃÀýÖØ¹¹¶àÓÃÀýµÄ¿ÉÑ¡µÄ¹«¹²ÐÐΪ£¨¿ÉÑ¡µÄÖ´ÐУ©£»

´óÐÍϵͳµÄ¶¥²ã»ù´¡ÓÃÀýµäÐ͵ÄΪ 10 ~ 15 ¸ö£¬µ¥¸öÓÃÀýµÄÓÃÀý³¡¾°ÊýΪ 5 ~ 25 £¨À´×ÔIBM Harmoney SE£©¡£

·Ç³É¹¦³¡¾°³¬¹ý 5 ¸ö£¬ÔòÖØ¹¹Îª ¡°Exception use case¡±£¬²¢ÓëÖ÷ÓÃÀýÁ´½Ó£¨À´×ÔIBM Harmoney SE£©¡£

ÓÃÀýÒ»°ã²»°üº¬ÏµÍ³ÐÔÄÜÒÔ¼°UI£»

С½á

ÓÃÀýͼÊÇÒ»ÖÖºÚºÐÊÓͼ£¬±íÕ÷ϵͳ¶ÔÍⲿ²ÎÓëÕߵĿɼûÐÐΪ»ò·þÎñ¡£ÓÃÀý¼ä¾ßÓзº»¯¡¢À©Õ¹¡¢°üº¬ÈýÖÖ¹ØÏµ¡£Í¨¹ý°üº¬ºÍÀ©Õ¹¹ØÏµ¿ÉÒÔ¶ÔϵͳͨÓÃÐÐΪ½øÐÐÖØ¹¹¡£

   
3017 ´Îä¯ÀÀ       29
 
Ïà¹ØÎÄÕÂ

UML¸ÅÀÀ
UMLͼ½â:ÓÃÀýͼ£¨Use case diagram £©
UMLͼ½â:»î¶¯Í¼£¨activity diagram £©
UMLͼ½â:Ààͼ£¨class diagram £©
UMLͼ½â£º¶ÔÏóͼ£¨object diagram£©
UMLͼ½â£ºË³Ðòͼ£¨ sequence diagram £©
 
Ïà¹ØÎĵµ

Ä£Ð͸ú×Ù£º¸ú×Ùͼ¡¢¾ØÕó¡¢¹ØÏµ£¨½¨Ä£¹¤¾ßEA£©
×Ô¶¨Òå±í¸ñ£¨Custom Table£©ÔÚEAÖеÄʹÓÃ
ÔªËØµÄÏêÇéä¯ÀÀ¿ØÖÆ
UAF 1.2¹æ·¶½â¶Á(DMM ºÍ UAFML )
EAÖÐÖ§³ÖµÄ¸÷ÖÖͼ±í
EAÖеĽçÃæÔ­Ðͽ¨Ä£
 
Ïà¹Ø¿Î³Ì

UMLÓëÃæÏò¶ÔÏó·ÖÎöÉè¼Æ
UML + ǶÈëʽϵͳ·ÖÎöÉè¼Æ
ÒµÎñ½¨Ä£ÓëÒµÎñ·ÖÎö
»ùÓÚSysMLºÍEA½øÐÐϵͳÉè¼ÆÓ뽨ģ
»ùÓÚÄ£Ð͵ÄÐèÇó¹ÜÀí
ÒµÎñ½¨Ä£ & ÁìÓòÇý¶¯Éè¼Æ