1/32
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Structural Models
Focus on system organization: components, characteristics, relationships.
UML Structural Models
Package diagrams - group UML models.
Component diagrams
Group classes into components.
Class diagrams
System's object-oriented classes (most common).
Deployment diagrams
Physical hardware.
Encapsulation
Group data/methods, restrict access (public/protected/private).
Abstraction
Hide implementation details.
Inheritance
Derive/add properties, promote reuse.
Polymorphism
Different behavior in different contexts.
Procedural (Imperative)
Statements/procedures (Fortran, C).
Functional (Declarative)
Chained functions (Lisp, Haskell).
Logic-based
Facts & rules (Prolog).
Object-Oriented
Interacting objects, focus on data (Java, Python, C++).
PYPL 2024 Ranking
Popularity via Google searches: Python (29%), Java (18%), JavaScript (9%), C/C++ (7%), C# (7%), R (5%). OO languages dominate.
Domain model
Real-world objects (nouns from use cases). Example: Student, Course, Instructor, Bursar.
Classes
Boxes with name.
Associations
Relationships (lines, labels, cardinality).
Multiplicity
One-to-one, one-to-many, etc.
Composition
Whole-part, dependent lifecycle (filled diamond).
Aggregation
Whole-part, independent lifecycle (open diamond).
Generalization/Inheritance
Shared characteristics, open arrow.
Attributes
Instance properties (listed under class name).
Operations
Class behaviors (methods).
Visibility
+ Public, # Protected, - Private.
Domain vs Design Models
Domain model (requirements) - problem/solution space, real-world. Design model (implementation) - software system, data types, methods.
Aggregation vs Inheritance
Inheritance (is-a) - special case. Aggregation (part-of) - component relationship.
Recursive Aggregates
A class contains instances of itself (e.g., compound statements).
Object Modeling Summary
Classes: name, attributes, operations. Associations: roles, link attributes. Relationships: aggregation, composition, inheritance.
Trust
Built on reputation, integrity, processes.
California Bill SB1047
AI developers must implement shutdown, safety protocols, and protections against misuse.
Unauthorized AI use in CSE435
Individual work → if self-reported, no penalty; if caught, penalty grade. Projects → unauthorized AI = zero on project + possible course fail.
Automotive Security
Ecosystem: vehicles = ultra-large-scale systems, connected networks.
Cybersecurity Threats
Broad threats: Interruption (DoS, data erased), Interception (unauthorized access, wiretapping), Modification (tampering, viruses, Trojans), Fabrication (fake transactions, counterfeit data).