Development of Bayesian Networks from Unified Modeling Language Artifacts

Total Page:16

File Type:pdf, Size:1020Kb

Development of Bayesian Networks from Unified Modeling Language Artifacts Development of Bayesian Networks from Unified Modeling Language Artifacts Kathryn Blackmond Laskey Philip S. Barry Peggy S. Brouse Dept. of Systems Engineering The MITRE Corporation Dept. of Systems Engineering George Mason University 1820 Dolley Madison Blvd. George Mason University Fairfax, VA 22032-4444 McLean, VA 22102-3481 Fairfax, VA 22032-4444 [email protected] [email protected] [email protected] Abstract effort and often stage the design and implementation of This paper examines how Bayesian Networks can be key features to meet release schedules and budgetary generated from development artifacts intrinsic in the constraints. In practice, determining which Use-Cases are Unified Process. The Unified Software Development architecturally significant and how they may relate to Process models the relationship between functional other Use-Cases as well as additional system requirements in the Use-Case model. These relationships requirements is usually determined by heuristic methods. are expanded in the Analysis Model and a clear mapping We assert by exploiting the implicit structure in UML to design components is created. By exploiting the diagrams an algorithmic and mathematically sound relationships intrinsic in the Use-Case Model, as well as method can be introduced to understand the importance of the stereotypical classes and temporal ordering found in use requirements represented as Use-Cases as well as the the analysis model, Bayesian networks that represent system requirements they imply. system requirements can be generated. These networks can then be used to model and assess the architectural 2 Use-Cases: The Requirements Side of UML impact of the requirements early in the system lifecycle, According to Ivar Jacobson [12] “it is absurd to believe thus promoting a more efficient and effective system that the human mind can come up with a consistent and design process. Formal capture of requirements during relevant list of thousands of requirements of the form design also promotes reusability of design knowledge “The system shall…”. The futility of direct specification across similar system. has led to a search for more human-friendly ways to develop system requirements. A highly promising and 1 Introduction popular approach is to develop requirements from a set of Within systems engineering it is well recognized that Use-Cases. Use-Cases represent functionality of the effective requirements analysis and documentation is system in terms of prototypical problems or processes the essential to the development of high performing and system is expected to execute. Thus, a Use-Case reliable systems [4]. This is equally true in software represents one distinct way of using the system from a engineering, where requirements management is generally given external agent or actor’s view. Use-Cases are recognized as a key indicator of organizational maturity generally specified using a graphically based [18]. Methodologies for developing and documenting methodology for defining the actions the system is to software requirements [e.g., 8,11,19,21] have proliferated perform. Analyzing the functionality needed for in the literature and have been employed with varying successful execution of the Use-Case then derives system degrees of success. requirements. The Unified Modeling Language (UML) [5] is rapidly A Use-Case specifies a primary sequence of actions the becoming the de facto standard for analysis and design system is to perform, and may also include excursions within the software development community. UML from the main sequence. Use-Cases have operations and provides a diagrammatic approach to describing user attributes. Thus, a Use-Case description can include state requirements, which begins with Use-Cases and then chart diagrams, collaborations and sequence diagrams. leads into more formal specification using stereotypical Use-Case attributes represent the values that a Use-Case classes in an analysis model. Key elements of these instance uses and manipulates. Use-Case instances do not artifacts form the basis for architectural views into the interact with other Use-Case instances because by design system as well as providing the groundwork for design, Use-Case models should be simple and intuitive. The implementation and validation and verification. flow of events and special requirements are captured in special textual descriptions. From an architecture viewpoint, all Use-Cases are not equally important, necessitating the need to develop a 2.1 Structuring the Use-Case Model scheme to prioritize the most significant Use-Cases. This System designers can specify relationships between Use- need comes from the requirement to focus the design Cases. These relationships can be used to form interesting structures that can provide evidence to the importance of system requirements contingent upon an agent’s goals is requirements based upon their relationships to other often referred to as allocation and flowdown [9]. requirements. There are three relationships used to model We suggest that requirements engineering can benefit Use-Cases: generalization, extension and inclusion. from a computational mechanism to represent of system requirements to each other and to the user requirements • Generalization between Use-Cases is a kind of that engender them. To achieve this the relationship we inheritance. Use-Cases can perform all behavior define an abstract structure of interrelated system described in the generalizing Use-Case. requirements called a system requirement web (SRW). A • Extension models additions to a Use-Case’s sequence SRW is a directed graph in which the nodes represent of actions. These additions are contingent upon some system requirements and the edges represent relationships conditions being satisfied. between requirements that we call weak implication. We • Inclusion between Use-Cases models the situation say that one node weakly implies another node if it is where the including Use-Case cannot function more likely that the requirement represented by the without the included Use-Case. second node is needed if the first one is. User requirements can trigger a flow of weak implication 3 Analysis Models within a SRW, providing a model for allocation and flowdown of requirements. Within the Unified Software Development Process [12], analysis is used to address previously unresolved issues Previous work by the authors has demonstrated that by analyzing the requirements in depth. Key to analysis Bayesian networks provide a natural computational model is the development of the analysis model, which yields a for SRWs [2,3]. A Bayesian network is both a structured more precise specification of the requirements than representation for knowledge about the interrelationships resulted from the Use-Case model. As the analysis model among uncertain variables and a computational is described in the language of the developers it can architecture for reasoning about these variables. A introduce more formalism and can be used to reason Bayesian network is a directed graph composed of nodes about the internal workings of the system. The analysis and arcs. The nodes represent variables whose value is model can be considered a first cut at a design model and uncertain and the arcs represent dependency relationships is an essential input to system design and implementation. between the variables. In our application, the uncertain variables represent requirements and the arcs represent The analysis model makes use of a number of diagrams. weak implication. A requirement can be in one of two Of particular interest is the collaboration diagram, which states: implied or unimplied (the semantics of these terms describes how a specific Use-Case is realized and is described below). Conditional probabilities are used to performed. The diagram is drawn in terms of model the strength of the relationship between the stereotypical analysis classes and their instantiated associated variables. analysis objects. These objects focus on handling functional requirements and postpone the consideration of As a computational architecture, a Bayesian network nonfunctional requirements by designating them as allows the user or application to declare “evidence” on special requirements. some of the nodes and, through a process called “evidence accumulation,” compute revised probabilities for all other In the analysis phase of the Unified Development process, nodes in the network. In the present application context, there are three stereotypical classes: boundary classes, user requirements can be declared as “evidence” in an entity classes and control classes. Boundary Classes are SRW represented as a Bayesian network. This evidence used to model interaction between the system and its propagates through the SRW via the weak implication actors, e.g., information input and output and can be used links, resulting in updated probabilities for other to clarify system boundaries. Entity Classes are used to requirements in the SRW. model information that is long-lived and persistent, which may have associated behaviors and a logical data Not only are Bayesian networks a useful visual metaphor structure. Control Classes are used to model coordination, to aid in the construction of SRWs, they also sequencing, transactions and control of other objects. appropriately represent a semantics appropriate to the problem at hand. At any given moment in the 4 Bayesian Networks for Requirements requirements definition process, the currently operating Key to fully understanding
Recommended publications
  • Uml.Sty, a Package for Writing UML Diagrams in LATEX
    uml.sty, a package for writing UML diagrams in LATEX Ellef Fange Gjelstad March 17, 2010 Contents 1 Syntax for all the commands 5 1.1 Lengths ........................................ 5 1.2 Angles......................................... 5 1.3 Nodenames...................................... 6 1.4 Referencepoints ................................. 6 1.5 Colors ......................................... 6 1.6 Linestyles...................................... 6 2 uml.sty options 6 2.1 debug ......................................... 6 2.2 index.......................................... 6 3 Object-oriented approach 7 3.1 Colors ......................................... 10 3.2 Positions....................................... 10 4 Drawable 12 4.1 Namedoptions .................................... 12 4.1.1 import..................................... 12 5 Element 12 5.1 Namedoptions .................................... 12 5.1.1 Reference ................................... 12 5.1.2 Stereotype................................... 12 5.1.3 Subof ..................................... 13 5.1.4 ImportedFrom ................................ 13 5.1.5 Comment ................................... 13 6 Box 13 6.1 Namedoptionsconcerninglocation . ....... 13 6.2 Boxesintext ..................................... 14 6.3 Named options concerning visual appearance . ......... 14 6.3.1 grayness.................................... 14 6.3.2 border..................................... 14 1 6.3.3 borderLine .................................. 14 6.3.4 innerBorder.................................
    [Show full text]
  • Rational Unified Process - an Overview Uppsala, 2009-02-10
    Rational Unified Process - an overview Uppsala, 2009-02-10 Mikael Broomé Consultant M.Sc. LTH 10 years in Software Development 4 different RUP implementations Project Manager Mentor for Project Managers Applying more and more of agile mindset and techniques E-Mail: [email protected] 2 1 Agenda Why a process for developing software? What is RUP? What is the “RUP-way” of developing software? How is RUP packaged? Advantages by using RUP? Challenges when using RUP? Relation to other processes? 3 A good project delivers the right solution: satisified Users satisfied Sponsor delivers in time delivers on budget 4 2 Challenges Common challenges in software development projects: Capture the “right” requirements. Requirement changes. Different parts of the system do not fit together. Small changes causes big problems. Low quality and poor performance. Major problems identified late in projects. Lack of communication. Difficult to estimate time and cost. Management of environment, platforms and tools. 5 It’s all about (lack of) communication 6 3 Agenda Why a process for developing software? What is RUP? What is the “RUP-way” of developing software? How is RUP packaged? Advantages by using RUP? Challenges when using RUP? Relation to other processes? 7 What is RUP and UML? RUP is a process for development of software that describes what should be performed (activities) who should do it (roles) what the result should be (artifacts). UML is a notation with defined symbols that is worked out by OMG (Object Management Group) is used to make drawings (for example in software development). 8 4 Agenda Why a process for developing software? What is RUP? What is the “RUP-way” of developing software? How is RUP packaged? Advantages by using RUP? Challenges when using RUP? Relation to other processes? 9 JW2 RUP’s Six Best practices 1.
    [Show full text]
  • Network Visualization with R Katherine Ognyanova, POLNET 2015 Workshop, Portland OR
    Network visualization with R Katherine Ognyanova, www.kateto.net POLNET 2015 Workshop, Portland OR Contents Introduction: Network Visualization2 Data format, size, and preparation4 DATASET 1: edgelist ......................................4 DATASET 2: matrix .......................................5 Network visualization: first steps with igraph 5 A brief detour I: Colors in R plots8 A brief detour II: Fonts in R plots 11 Back to our main plot line: plotting networks 12 Plotting parameters ........................................ 12 Network Layouts ......................................... 17 Highlighting aspects of the network ............................... 24 Highlighting specific nodes or links ............................... 27 Interactive plotting with tkplot ................................. 29 Other ways to represent a network ............................... 30 Plotting two-mode networks with igraph ............................ 31 Quick example using the network package 35 Interactive and animated network visualizations 37 Interactive D3 Networks in R .................................. 37 Simple Plot Animations in R .................................. 38 Interactive networks with ndtv-d3 ................................ 39 Interactive plots of static networks............................ 39 Network evolution animations............................... 40 1 Introduction: Network Visualization The main concern in designing a network visualization is the purpose it has to serve. What are the structural properties that we want to highlight?
    [Show full text]
  • Sysml Distilled: a Brief Guide to the Systems Modeling Language
    ptg11539604 Praise for SysML Distilled “In keeping with the outstanding tradition of Addison-Wesley’s techni- cal publications, Lenny Delligatti’s SysML Distilled does not disappoint. Lenny has done a masterful job of capturing the spirit of OMG SysML as a practical, standards-based modeling language to help systems engi- neers address growing system complexity. This book is loaded with matter-of-fact insights, starting with basic MBSE concepts to distin- guishing the subtle differences between use cases and scenarios to illu- mination on namespaces and SysML packages, and even speaks to some of the more esoteric SysML semantics such as token flows.” — Jeff Estefan, Principal Engineer, NASA’s Jet Propulsion Laboratory “The power of a modeling language, such as SysML, is that it facilitates communication not only within systems engineering but across disci- plines and across the development life cycle. Many languages have the ptg11539604 potential to increase communication, but without an effective guide, they can fall short of that objective. In SysML Distilled, Lenny Delligatti combines just the right amount of technology with a common-sense approach to utilizing SysML toward achieving that communication. Having worked in systems and software engineering across many do- mains for the last 30 years, and having taught computer languages, UML, and SysML to many organizations and within the college setting, I find Lenny’s book an invaluable resource. He presents the concepts clearly and provides useful and pragmatic examples to get you off the ground quickly and enables you to be an effective modeler.” — Thomas W. Fargnoli, Lead Member of the Engineering Staff, Lockheed Martin “This book provides an excellent introduction to SysML.
    [Show full text]
  • UML 2 Activity and Action Models
    JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering ©JOT, 2003 Vol. 2, No. 4, July-August 2003 UML 2 Activity and Action Models Conrad Bock, National Institute of Standards and Technology This is the first in a series introducing the activity model in the Unified Modeling Language, version 2 (UML 2), and how it integrates with the action model [1]. The series is a companion to the standard, providing additional background, rationale, examples, and introducing concepts in a logical order. This article covers motivation and architecture for the new models, basic aspects of UML 2 activities and actions, and introduces the general notion of behavior in UML 2. 1 BACKGROUND A focus of recent developments in UML has been on procedures and processes. UML 1.5 introduced a model for parameterized procedures defined by control and data flow to complement the existing state and interaction models [2]. For the first time UML supports first-class procedures that can be used as methods on objects or independently of objects, as occurs when modeling, for example, function libraries with popular programming languages. It also facilitates application of UML by modelers who do not use object-orientation (OO) routinely, such as system engineers and enterprise modelers, and provides them a path to incrementally adopt OO as needed [3]. The flexibility to combine OO with functional approaches considerably widens and integrates the potential applications of UML. UML 1.1 UML 1.3 UML 1.5 UML 2.0 1997 1999 2001 2003 Figure 1: UML Timeline UML 1.5 also inherited from earlier versions a form of state machine that was notationally modified to appear as a flow diagram, called the activity diagram.
    [Show full text]
  • Introduction OMG Systems Modeling Language (OMG Sysml™) and OOSEM Tutorial by Abe Meilich, Ph.D
    Introduction OMG Systems Modeling Language (OMG SysML™) and OOSEM Tutorial By Abe Meilich, Ph.D. [email protected] Acknowledged National Defense Industrial Association Original Authors: 9th Annual Systems Engineering Conference Sanford Friedenthal San Diego, CA Alan Moore October 23, 2006 Rick Steiner Copyright © 2006 by Object Management Group. Published and used by INCOSE and affiliated societies with permission. Caveat • These materials have been modified slightly from the original Tutorial given at INCOSE 2006 – Softcopy of Full Tutorial available at : http://www.omgsysml.org/SysML-Tutorial-Baseline-to-INCOSE- 060524-low_res.pdf • This material is based on version 1.0 of the SysML specification (ad-06-03-01) – Adopted by OMG in May ’06 – Going through finalization process • OMG SysML Website – http://www.omgsysml.org/ 11 July 2006 Copyright © 2006 by Object Management Group. 2 Objectives & Intended Audience At the end of this tutorial, you should understand the: • Benefits of model driven approaches to systems engineering • Types of SysML diagrams and their basic constructs • Cross-cutting principles for relating elements across diagrams • Relationship between SysML and other Standards • Introduction to principles of a OO System Engineering Method This course is not intended to make you a systems modeler! You must use the language. Intended Audience: • Practicing Systems Engineers interested in system modeling – Already familiar with system modeling & tools, or – Want to learn about systems modeling • Software Engineers who want to express systems concepts • Familiarity with UML is not required, but it will help 11 July 2006 Copyright © 2006 by Object Management Group. 3 Topics • Motivation & Background • Diagram Overview • SysML Modeling as Part of SE Process • OOSEM – Enhanced Security System Example • SysML in a Standards Framework • Transitioning to SysML • Summary 11 July 2006 Copyright © 2006 by Object Management Group.
    [Show full text]
  • Introduction to Systems Modeling Languages
    Fundamentals of Systems Engineering Prof. Olivier L. de Weck, Mark Chodas, Narek Shougarian Session 3 System Modeling Languages 1 Reminder: A1 is due today ! 2 3 Overview Why Systems Modeling Languages? Ontology, Semantics and Syntax OPM – Object Process Methodology SySML – Systems Modeling Language Modelica What does it mean for Systems Engineering of today and tomorrow (MBSE)? 4 Exercise: Describe the “Mr. Sticky” System Work with a partner (5 min) Use your webex notepad/white board I will call on you randomly We will compare across student teams © source unknown. All rights reserved. This content is excluded from our Creative Commons license. For more information, see http://ocw.mit.edu/help/faq-fair-use/. 5 Why Systems Modeling Languages? Means for describing artifacts are traditionally as follows: Natural Language (English, French etc….) Graphical (Sketches and Drawings) These then typically get aggregated in “documents” Examples: Requirements Document, Drawing Package Technical Data Package (TDP) should contain all info needed to build and operate system Advantages of allowing an arbitrary description: Familiarity to creator of description Not-confining, promotes creativity Disadvantages of allowing an arbitrary description: Room for ambiguous interpretations and errors Difficult to update if there are changes Handoffs between SE lifecycle phases are discontinuous Uneven level of abstraction Large volume of information that exceeds human cognitive bandwidth Etc…. 6 System Modeling Languages Past efforts
    [Show full text]
  • Generating Executable Capability Models for Requirements Validation
    2046 JOURNAL OF SOFTWARE, VOL. 7, NO. 9, SEPTEMBER 2012 Generating Executable Capability Models for Requirements Validation Weizhong Zhang Institute of Command Automation, PLA University of Science & Technology, Nanjing, China. Email: [email protected] Zhixue Wang1, Wen Zhao1, 2, Yingying Yang1, Xin Xin3 1. Institute of Command Automation, PLA University of Science & Technology, Nanjing, China. 2. Army Reserve Duty No.47 Infantry Division of Liaoning, Siping, China 3. Xi’an Communication Institute of PLA, Xi’an, China. Email: {wzxcx, chip_ai , flyto2016, zwjz1029}@163.com Abstract--Executable modeling allows the models to be models. The normal UML models are not executable executed and treated as prototypes to determine the because they describe the dynamic behavior of models behaviors of a system. In this paper, we propose an with natural language, and hence cannot be directly used approach for formalizing requirement models and to verify and validate the system behaviors in stage of generating executable models from them. Application analysis and design. activity diagrams (AADs), which are used to represent dynamic behaviors of systems in capability requirements The popularly applied methods include Petri Net [6] models, are firstly formalized and saved as XML documents. [7], executable UML (xUML) [8] [9] etc. But when the Then, on the basis of these models, a mapping algorithm of Petri Net applied, the requirements models built with translating AADs into instances of executable models for UML have to be transformed into those of Petri Net, and simulation is proposed. A case study is finally given to some part of model information might be lost during the demonstrate the applicability of the method.
    [Show full text]
  • Working with Deployment Diagram
    UNIVERSITY OF ENGINEERING AND TECHNOLOGY, TAXILA FACULTY OF TELECOMMUNICATION AND INFORMATION ENGINEERING SOFTWARE ENGINEERING DEPARTMENT Lab # 09 Working with Deployment Diagram You’ll learn in this Lab: What a deployment diagram is Applying deployment diagrams Deployment diagrams in the big picture of the UML A solid blueprint for setting up the hardware is essential to system design. The UML provides you with symbols for creating a clear picture of how the final hardware setup should look, along with the items that reside on the hardware What is a Deployment Diagram? A deployment diagram shows how artifacts are deployed on system hardware, and how the pieces of hardware connect to one another. The main hardware item is a node, a generic name for a computing resource. A deployment diagram in the Unified Modeling Language models the physical deployment of artifacts on nodes. To describe a web site, for example, a deployment diagram would show what hardware components ("nodes") exist (e.g., a web server, an application server, and a database server), what software components ("artifacts") run on each node (e.g., web application, database), and how the different pieces are connected (e.g. JDBC, REST, RMI). In UML 2.0 a cube represents a node (as was the case in UML 1.x). You supply a name for the node, and you can add the keyword «Device», although it's usually not necessary. Software Design and Architecture 4th Semester-SE UET Taxila Figure1. Representing a node in the UML A Node is either a hardware or software element. It is shown as a three-dimensional box shape, as shown below.
    [Show full text]
  • UML Components
    UML Components John Daniels Syntropy Limited [email protected] © Syntropy Limited 2001 All rights reserved Agenda • Aspects of a component • A process for component specification • Implications for the UML email:[email protected] Syntropy Limited Aspects of a component email:[email protected] Syntropy Limited UML Unified Modeling Language • The UML is a standardised language for describing the structure and behaviour of things • UML emerged from the world of object- oriented programming • UML has a set of notations, mostly graphical • There are tools that support some parts of the UML email:[email protected] Syntropy Limited Aspects of an Object ! Specification unit 1..* Interface ! Implementation unit * realization Class 0..1 Class Implementation source 1 1 instance * Object ! Execution unit email:[email protected] Syntropy Limited Components in context ObjectObject Evolving PrinciplesPrinciples developed within adopted by adopted by 1989- 1967- RMI 1995- Smalltalk EJB DistributedDistributed Object-orientedObject-oriented ObjectObject ComponentsComponents Programming DCOM Programming TechnologyTechnology C++ Java CORBA COM+/.NET Only interoperable Typically language neutral. A way of packaging within the language. Multiple address spaces. object implementations Single address space Non-integrated services to ease their use. Integrated services email:[email protected] Syntropy Limited Component standard features • Component Model: – defined set of services that support the software – set of rules that must be obeyed in order
    [Show full text]
  • The IBM Rational Unified Process for System Z
    Front cover The IBM Rational Unified Process for System z RUP for System z includes a succinct end-to-end process for z practitioners RUP for System z includes many examples of various deliverables RUP for System z is available as an RMC/RUP plug-in Cécile Péraire Mike Edwards Angelo Fernandes Enrico Mancin Kathy Carroll ibm.com/redbooks International Technical Support Organization The IBM Rational Unified Process for System z July 2007 SG24-7362-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2007) This edition applies to the IBM Rational Method Composer Version 7.1 © Copyright International Business Machines Corporation 2007. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this IBM Redbooks publication . .x Become a published author . xii Comments welcome. xii Part 1. Introduction to the IBM Rational Unified Process for System z. 1 Chapter 1. Introduction. 3 1.1 Purpose. 4 1.2 Audience . 4 1.3 Rationale . 4 1.4 Scope . 5 1.5 Overview . 5 Part 2. The IBM Rational Unified Process for System z for Beginners . 9 Chapter 2. Introduction to the IBM Rational Unified Process and its extension to Service-Oriented Architecture. 11 2.1 Overview . 12 2.2 Introduction to RUP. 13 2.2.1 The heart of RUP . 13 2.2.2 The IBM Rational Method Composer (RMC) platform . 13 2.3 Key principles for successful software development.
    [Show full text]
  • Deployment Diagrams Deployment Diagrams
    DEPLOYMENT DIAGRAMS DEPLOYMENT DIAGRAMS • Deployment diagrams are used to visualize the topology of the physical components of a system. • The purpose of deployment diagrams can be described as: • Visualize hardware topology of a system. • Describe the hardware components used to deploy software components. • Describe runtime processing nodes. Definitions • Deployment diagram is a structure diagram which shows architecture of the system as deployment (distribution) of software artifacts to deployment targets. • Artifacts represent concrete elements in the physical world that are the result of a development process. Examples of artifacts are executable files, libraries, archives, database schemas, configuration files, etc. • Deployment target is usually represented by a node which is either hardware device or some software execution environment. Nodes could be connected through communication paths to create networked systems of arbitrary complexity. UML deployment diagram nodes and edges • Node/deployment target • Artifact • Manifests • Deployment specification • Deploy Node • Node is a deployment target which represents computational resource upon which artifacts may be deployed for execution. • Node is shown as a perspective, 3-dimensional view of a cube. • Node is specialized by: Device Execution environment Hierarchical Node Artifact • An artifact is a classifier that represents some physical entity, a piece of information that is used or is produced by a software development process. • Some real life examples of UML artifacts are: 1. text document 2. source file 3. script 4. binary executable file 5. archive file 6. database table Device Node • A device is a node which represents a physical computational resource with processing capability upon which artifacts may be deployed for execution. • A device is rendered as a node (perspective, 3-dimensional view of a cube) annotated with keyword «device».
    [Show full text]