Username   Password       Forgot your password?  Forgot your username? 


Approach to Discovering Reusable Components in Java Legacy System

Volume 15, Number 2, February 2019, pp. 637-644
DOI: 10.23940/ijpe.19.02.p28.637644

Junfeng Zhao and Yingjie Li

College of Computer Science Inner Mongolia University, Hohhot, 010021, China

(Submitted on November 15, 2018; Revised on December 17, 2018; Accepted on January 10, 2019)


With the development of modern society, human beings are more and more aware of the importance of creativity. As a new area of research, creative computing will play a bigger role in life. There is no doubt that a large pool of knowledge is the foundation of creativity. Research shows that legacy systems contain not only a great deal of domain expertise but also many reusable components. From this point, a new component extraction approach is proposed to extract reusable components of the system and provide better foundation and inspiration for creativity. Experiments have shown that this approach can extract reusable components efficiently, which is helpful for creativity.


References: 14

        1. L. Zhang and H. J. Yang, “Knowledge Discovery in Creative Computing for Creative Tasks,” in Proceedings of 1st Conference on Creativity in Intelligent Technologies and Data Science, CIT and DS 2015, September 15-17, 2015
        2. X. Meng and J. W. Shii, “Legacy Application Migration to Cloud,” in Proceedings of 2011 IEEE 4th International Conference on Cloud Computing, CLOUD 2011, pp. 750-751, 2011
        3. J. F. Zhao, J. T. Zhou, and H. J. Yang, “Modularizing Legacy System Through an Improved Bunch Clustering Approach in Cloud Migration,” International Journal of Grid Distribution Computing, Vol. 8, No. 4, pp. 1-10, 2015
        4. L. Zhang and H. J. Yang, “Definition, Research Scope and Challenges of Creative Computing,” in Proceedings of the 19th International Conference on Automation & Computing, Brunel University, London, UK, September 13-14 2013
        5. A. Hugill and H. J. Yang, “The Creative Turn: New Challenges for Computing,” Int. J. Creative Computing, Vol. 1, No. 1, 2013
        6. H. J. Yang, D. L. Jing, and L. Zhang, “Creative Computing: An Approach to Knowledge Combination for Creativity?” in Proceedings of IEEE Symposium on Service-Oriented System Engineering, May 2016
        7. S. W. Kang, S. Lee, and D. Y. Lee, “Architecture Reconstruction: Tutorial on Reverse Engineering to the Architectural Level,” Software Engineering, Vol. 5413, pp. 140-173, 2009
        8. T. A. Wiggerts, “Using Clustering Algorithms in Legacy Systems Remodularization,” in Proceedings of 4th Working Conference on Reverse Engineering, pp. 33-43, 1997
        9. H. A. Muller, S. R. Tilley, and K. Wong, “Understanding Software Systems using Reverse Engineering Technology Perspectives from the Rigi Project,” in Proceedings of Conference of the Centre for Advanced Studies on Collaborative Research: Software Engineering, pp. 217-226, 1993
        10. K. Sartipi, K. Kontogiannis, and F. Mavaddat, “Design Recovery using Data Mining Techniques,” in Proceedings of European Conference on Software Maintenance and Reengineering, pp. 129-139, 2000
        11. R. Naseem, O. Maqbool, and S. Muhammad, “Cooperative Clustering for Software Modularization,” Journal of Systems and Software, Vol. 86, No. 8, pp. 2045-2062, 2013
        12. Z. Shah, R. Naseem, M. A. Orgun, A. Mahmood, and S. Shahzad, “Software Clustering using Automatedfeature Subset Selection,” in Proceedings of 9th International Conference on Advanced Data Mining and Applications, pp. 47-58, 2013
        13. S. Mancoridis, B. Mitchell, Y. Chen, and E. Gansner, “Bunch: A Clustering Tool for the Recovery and Maintenance of Software System Structures,” in Proceedings of IEEE International Conference on Software Maintenance (ICSM), pp. 50-59, 1999
        14. V. Tzerpos and R. C. Holt, “Mojo, A Distance Metric for Software Clustering,” in Proceedings of 6th Working Conference on Reverse Engineering, pp. 187-193, 1999


        Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

        This site uses encryption for transmitting your passwords.