Nowadays more and more attraction is drawn by the event based implicit invocation one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration...Nowadays more and more attraction is drawn by the event based implicit invocation one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration in software systems. Analyzing object oriented interaction with objects, this paper, based upon the principle of software architecture, presents an approach on event based object model with Ada exception handler. Consequently it is possible for us to improve, with adding specific architectural patterns, traditional programming languages into architectural description languages.展开更多
Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, d...Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .展开更多
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c...Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.展开更多
Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web bas...Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.展开更多
The methods to implement RMI parameter conversion and to generate the relevant client stub and server skeleton in DAPOOL (the system for distributed application programming with object-oriented languages ) are discuss...The methods to implement RMI parameter conversion and to generate the relevant client stub and server skeleton in DAPOOL (the system for distributed application programming with object-oriented languages ) are discussed in this paper. The algorithm with which some kinds of parameter type in DELPHI language can be converted into JAVA data representation is described. And how to use the object-oriented programming method to organize a class module of parameter conversion which is clear in hierarchy, unanimous in form and easy to generate is also discussed.展开更多
In this paper, we adopt Java platform to achieve a multi-tier distributed object enterprise computing model which provides an open, flexible, robust and cross-platform standard for enterprise applications of new gener...In this paper, we adopt Java platform to achieve a multi-tier distributed object enterprise computing model which provides an open, flexible, robust and cross-platform standard for enterprise applications of new generation. In addition to this model, we define remote server objects as session or entity objects according to their roles in a distributed application server, which separate information details from business operations for software reuse. A web store system is implement by using this multi-tier distributed object enterprise computing model.展开更多
Based on Java RMI framework, a new design is introduced to plug common services into RMI application without modifying the remote interface. This design improves the mechanism of RMI, which is based on dynamic proxy a...Based on Java RMI framework, a new design is introduced to plug common services into RMI application without modifying the remote interface. This design improves the mechanism of RMI, which is based on dynamic proxy and interceptor technology. The implementation of class loader and stub is custom. The design ensures both the integrity of RMI mechanism and the plug-ins of some common services that are based on component. The design improves the modularization of application and decreases the coupling degree among different modules; by this means these middle-ware's modules gain more scalability and flexibility.展开更多
The distributed system with high performance and stability is commonly adopted in large scale scientific and engineering computing. In this paper, we discuss a fault-tolerant mechanism under Linux circumstance to impr...The distributed system with high performance and stability is commonly adopted in large scale scientific and engineering computing. In this paper, we discuss a fault-tolerant mechanism under Linux circumstance to improve the fault-tolerant ability of the system, namely a scheme and frame to form the stable computing platform. In terms of the structure and function of the distributed system, active list and file invocation strategies are employed in the task management. System multilevel fault-tolerance can be achieved by repeated processes in a single node and task migration on multi-nodes. Manager node agent introduced in this paper administrates the nodes using the list, disposes of the tasks according to the nodes’ performance, and hence, to be able to make full use of the cluster resources. An evaluation method is proposed to appraise the performance. The analyzed results show the usefulness of the scheme proposed except for some additional overhead of memory consumption.展开更多
基金Supported by National Natural Science Foundation of China(6 97730 41)
文摘Nowadays more and more attraction is drawn by the event based implicit invocation one of useful architectural patterns, because of its loose coupling between components in the architecture and reactive integration in software systems. Analyzing object oriented interaction with objects, this paper, based upon the principle of software architecture, presents an approach on event based object model with Ada exception handler. Consequently it is possible for us to improve, with adding specific architectural patterns, traditional programming languages into architectural description languages.
基金The National Natural Science Foundation of China (59990470).
文摘Using remote method invocation (RMI) and a distributed object-oriented technique, this paper presents a systematic approach to developing a manufacturing execution system (MES) framework, which is open, modularized, distributed, configurable, interoperable and maintainable. Moreover, the design patterns for the framework .are developed and a variety of functional components are designed by inheriting appropriate patterns. And then an application is constructed by invoking corresponding methods of related components. An MES system implementing the framework and design patterns can be facilely integrated with other manufacturing applications, such as enterprise resource planning (ERP) and floor control system (FCS) .
基金supported by National Basic Research Program of China (973 Program) (No. 2007CB310801)National Natural Science Foundation of China (No. 60873083, No. 60803025, No. 60970017, No. 60903034, No. 60873225)+3 种基金Natural Science Foundation of Hubei Province for Distinguished Young Scholars (No. 2008CDB351)Natural Science Foundation of Hubei Province (No. 2008ABA358, No. 2008ABA379)Research Fund for the Doctoral Program of Higher Education of China (No. 20070486065)Open Foundation of State Key Laboratory of Software Engineering (No. SKLSE20080718)
文摘Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.
文摘Efficient real time data exchange over the Internet plays a crucial role in the successful application of web-based systems. In this paper, a data transfer mechanism over the Internet is proposed for real time web based applications. The mechanism incorporates the eXtensible Markup Language (XML) and Hierarchical Data Format (HDF) to provide a flexible and efficient data format. Heterogeneous transfer data is classified into light and heavy data, which are stored using XML and HDF respectively; the HDF data format is then mapped to Java Document Object Model (JDOM) objects in XML in the Java environment. These JDOM data objects are sent across computer networks with the support of the Java Remote Method Invocation (RMI) data transfer infrastructure. Client's defined data priority levels are implemented in RMI, which guides a server to transfer data objects at different priorities. A remote monitoring system for an industrial reactor process simulator is used as a case study to illustrate the proposed data transfer mechanism.
文摘The methods to implement RMI parameter conversion and to generate the relevant client stub and server skeleton in DAPOOL (the system for distributed application programming with object-oriented languages ) are discussed in this paper. The algorithm with which some kinds of parameter type in DELPHI language can be converted into JAVA data representation is described. And how to use the object-oriented programming method to organize a class module of parameter conversion which is clear in hierarchy, unanimous in form and easy to generate is also discussed.
文摘In this paper, we adopt Java platform to achieve a multi-tier distributed object enterprise computing model which provides an open, flexible, robust and cross-platform standard for enterprise applications of new generation. In addition to this model, we define remote server objects as session or entity objects according to their roles in a distributed application server, which separate information details from business operations for software reuse. A web store system is implement by using this multi-tier distributed object enterprise computing model.
基金by the Ministerial Level Advanced Research Foundation(413040402)
文摘Based on Java RMI framework, a new design is introduced to plug common services into RMI application without modifying the remote interface. This design improves the mechanism of RMI, which is based on dynamic proxy and interceptor technology. The implementation of class loader and stub is custom. The design ensures both the integrity of RMI mechanism and the plug-ins of some common services that are based on component. The design improves the modularization of application and decreases the coupling degree among different modules; by this means these middle-ware's modules gain more scalability and flexibility.
基金the Creative Research Team Foundation of the National Natural Science Foundation of China (No. 50221903)
文摘The distributed system with high performance and stability is commonly adopted in large scale scientific and engineering computing. In this paper, we discuss a fault-tolerant mechanism under Linux circumstance to improve the fault-tolerant ability of the system, namely a scheme and frame to form the stable computing platform. In terms of the structure and function of the distributed system, active list and file invocation strategies are employed in the task management. System multilevel fault-tolerance can be achieved by repeated processes in a single node and task migration on multi-nodes. Manager node agent introduced in this paper administrates the nodes using the list, disposes of the tasks according to the nodes’ performance, and hence, to be able to make full use of the cluster resources. An evaluation method is proposed to appraise the performance. The analyzed results show the usefulness of the scheme proposed except for some additional overhead of memory consumption.