This study mainly focuses on how object-oriented analysis makes compatible with newly develop or other existing business computing application in a better way. This study also focuses on the modelling of the exact procedure or near to the exact procedure within its application domain which may model by using different objects class. Objects are basically structured into different classes of objects which are generally related to behaviours and characteristics. These methodologies may use different generalization, classification, and different aggregation as a structure object assemblies for the target actions like services or activities which are related to the objects. There are numerous misconceptions related to object oriented analysis which are required to address when we consider the use of any object-oriented method. In this paper, try to represent different advantages and various application of the UML. The platform presented here is a comprehensive range of the different UML templates with all other required information.
Activities performed in object-oriented analysis;
M. Mukherjee, “Object-Oriented Analysis and Design,” International Journal of Advanced Engineering and Management, Vol. 1, No. 1, pp. 18-24, 2016.
- G Castagna, “Object-Oriented Programming A Unified Foundation.” Springer Science & Business Media, 2012.
- A Igarashi and N Kobayashi, “Resource Usage Analysis,” ACM Trans.on Programming Languages and Systems, vol. 27, no. 2, pp. 264-313, 2005.
- S J Gay, V T Vasconcelos, A Ravara, N Gesbert, and A Z Caldeira, “Modular Session Types for Distributed Object-Oriented Programming,” ACM Sigplan Notices, vol. 45, no. 1, pp. 299-312, 2010.
- N Thota and R Whitfield, “Holistic Approach to Learning and Teaching Introductory Object-Oriented Programming,” Computer Science Education, vol. 20, no. 2, pp. 103-127, 2010.
- Jim Conallen, Building Web Applications with UML.: Pearson, 2002.
- Richard D Neidinger, “Introduction to Automatic Differentiation and MATLAB Object-Oriented Programming,” SIAM Review, vol. 52, no. 3, pp. 545-563, 2010.
- F Schuster et al., “Counterfeit Object-Oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications,” in IEEE Symposium on Security and Privacy, 2015, pp. 745-762.
- S Chaki, S K Rajamani, and J Rehof, “Types as Models: Model Checking Message-Passing Programs,” POPL, ACM SIGPLAN Notices, vol. 37, no. 1, pp. 45-57, 2002.
- M Dezani-Ciancaglini, D Mostrous, N Yoshida, and S Drossopolou, “Session Types for Object-Oriented Languages,” ECOOP, Springer LNCS, vol. 4067, pp. 328–352, 2006.
- H G Baker, “Use-onceVariables and Linear Objects: Storage Management, Reflection and Multi-Threading,” ACM SIGPLAN Notices, vol. 30, no. 1, pp. 45-52, 1995.
- K Honda, N Yoshida, and M Carbone, “Multiparty Asynchronous Session Types,” POPL, ACM SIGPLAN Notices, vol. 43, no. 1, pp. 273–284, 2008.
- M Fahndrich and R DeLine, “Type states for Objects,” ESOP, Springer LNCS, vol. 3086, pp. 465-490, 2004.