inconsistencies occur frequently in requirements that
touch the same areas of a system (Port et al., 2011).
The process of text mining can be divided into two
phases: text preparation and text analysis (Tan, 1999).
The preparation adapts the text before it is analyzed
to reduce its complexity. These include, for example,
tokenization, stemming, and tagging (Kibble, 2013).
Tokenization splits the text into tokens that can be sin-
gle words or meaningful expression, e.g. traffic flow
and street lights. Stemming removes all affixes, e.g.
supporting is shorten into support. Tagging associates
words with a grammatical category, e.g. flow with
the type noun. A further text preparations are cluster-
ing techniques to group a set of data, so that similar
subjects are grouped together in a particular cluster
while dissimilar subjects are located in different clus-
ters (Tan, 1999). Based on the preparation, a Latent
Semantic Analysis (LSA) can be made that extracts
and represents the contextual-usage meaning of words
by statistical computations applied to a large corpus of
text (Port et al., 2011). With regard to the results of
the LSA, hints for inconsistencies can be given.
Aim of the PhD project is to adapt these tech-
niques to the use case methodology, which is de-
scribed in the next part.
3.3.4 IEC 62559-2: Use Case Methodology
Use Cases are described by the Object Management
Group (OMG)(OMG, 2011) as follows: “Use cases
are a means for specifying required usages of a sys-
tem. Typically, they are used to capture the require-
ments of a system, that is, what a system is sup-
posed to do.”. They are an effective methodology
to describe systems functionality and their bound-
aries (Cockburn, 2000; Rupp, C. and die SOPHIS-
Ten, 2014). The use case methodology is an accepted
method to describe requirements in a structured way
by natural language. Due to the presented template,
editors of the use case do not forget information, e.g.
the detailed description of actors and non-functional
requirements. However, the description of any possi-
bility and all boundaries of a system leads sometimes
to inconsistencies within the use case description.
This methodology is already used by the standard-
ization organization and an own template was devel-
oped for describing future SoS complete and consis-
tent (DKE, 2014; IEC, 2015). Regarding the com-
plexity of use case descriptions, a manual consis-
tency check is difficult and should be tool-supported.
A web-based application to describe and collect use
cases already exist, the Use Case Management Repos-
itory (UCMR). It supports the development process
by various libraries, but it does not have any possi-
bility for an automated consistency check. The IEC
use case template is introduced below to get a first
impression of the methodology.
The use case template is structured in eight parts:
description of the use case, diagrams of use case, tech-
nical details, step by step analysis, information ex-
changed, requirements, common terms and definition,
and custom information. However for explaining the
template in brief, it can also be split in four segments:
general information, functional description, technical
details, and additional information; that are subdi-
vided in further parts. The use case description starts
with general information, they may include an unique
name, objectives and a boundary to other use cases
or scenarios. On this basis, a complete description of
the required functionality is given as continuous text.
In the next step, the functional description is consti-
tuted as step-by-step analysis for different scenarios
whereas information objects and further requirements
are defined. In parallel with these three activities,
terms are defined and additional information are given
for supporting the understanding of the use case.
Figure 3 shows some parts of the use case tem-
plate based on the example Supporting the traffic flow
in cities. The tables Name of use case and Scope and
objectives of use case are part of the first segment,
general information on the use case are given. The
unique identifier is SC-01 and the use case is part of
the domains Mobility and Transport as well as Civil
Security and the zone Process (based on the Smart
City Infrastructure Architecture Model (SCIAM)). In
addition, a comprehensive name should be given for
the use case. The second table demonstrates bound-
aries, limits, and aims of the use case as well as the
link to city business cases. Thus, cities are defined
for which the use case is relevant as well as objec-
tives that should be reached through the use case, e.g.
city buses on schedule and less traffic accidents. Also,
relevant business cases are mentioned e.g. the future
city planning. The third table lists non-functional re-
quirements like the private and data protection laws
that have to be considered by the implementation of
the use case.
3.4 Related Work
In this part, an overview of related work regarding the
topics requirements specification for smart spaces and
consistency checks are given. Various approaches are
considered and described in brief.
The approach by Evans et al. (Evans et al., 2014)
describes a model to gather requirements for spe-
cial systems, in their case an ambient assisted liv-
ing system is considered. They develop a six-step
activity list to collect and describe requirements in
DCSMARTGREENS 2016 - Doctoral Consortium on Smart Cities and Green ICT Systems
22