期刊文献+
共找到18篇文章
< 1 >
每页显示 20 50 100
Process Mining Discovery Techniques for Software Architecture Lightweight Evaluation Framework
1
作者 Mahdi Sahlabadi Ravie Chandren Muniyandi +2 位作者 Zarina Shukur Faizan Qamar Syed Hussain Ali Kazmi 《Computers, Materials & Continua》 SCIE EI 2023年第3期5777-5797,共21页
This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and fa... This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and factors of lightweightness. Process mining deals with the largescalecomplexity of security and performance analysis, which are the goalsof SA evaluation frameworks. As a result of these conjectures, all ProcessMining researches in the realm of SA are thoroughly reviewed, and ninechallenges for Process Mining Adaption are recognized. Process mining isembedded in the framework and to boost the quality of the SA model forfurther analysis, the framework nominates architectural discovery algorithmsFlower, Alpha, Integer Linear Programming (ILP), Heuristic, and Inductiveand compares them vs. twelve quality criteria. Finally, the framework’s testingon three case studies approves the feasibility of applying process mining toarchitectural evaluation. The extraction of the SA model is also done by thebest model discovery algorithm, which is selected by intensive benchmarkingin this research. This research presents case studies of SA in service-oriented,Pipe and Filter, and component-based styles, modeled and simulated byHierarchical Colored Petri Net techniques based on the cases’ documentation.Processminingwithin this framework dealswith the system’s log files obtainedfrom SA simulation. Applying process mining is challenging, especially for aSA evaluation framework, as it has not been done yet. The research recognizesthe problems of process mining adaption to a hypothetical lightweightSA evaluation framework and addresses these problems during the solutiondevelopment. 展开更多
关键词 software architecture process mining hierarchical colored petri Net architectural discovery algorithms model discovery algorithm
下载PDF
Research on the Component-based Software Architecture
2
作者 CHEN Hai-shan (School of Computer and Information Engineering, Xiamen University, X iamen 361005, China) 《厦门大学学报(自然科学版)》 CAS CSCD 北大核心 2002年第S1期287-288,共2页
Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp ... Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp onent-based software development technique is a better method to solve the prob lem. In this paper, we first discuss the concept, description method and some fa miliar styles of software architecture, and then analyze the merits of using the software architecture to guide the software development. We also present a gene ral design method for component. Its applications are finally provided. 展开更多
关键词 software architecture component technology soft ware development APPLICATION
下载PDF
A Case Study in Teaching Pipes-and-filters and Batch Sequential Software Architectures
3
作者 SUN Yu-shan DING Jian-rui 《计算机教育》 2012年第10期18-22,共5页
In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java templ... In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java template class design in implementing the "pipes" and "filters" in the pipes-and-filters architecture is given at the design level.Finally,this paper uses a concrete example to show how to use Java to implement the pipesand-filters architecture.Using varied amount of data from text files,performance and memory usage of the two architectures are illustrated. 展开更多
关键词 software architecture data flow system pipes-and-filters architecture batch sequential architecture
下载PDF
An Approach to Modelling and Analysing Reliability of Breeze/ADL-based Software Architecture
4
作者 Chen Li Hong-Ji Yang Hua-Xiao Liu 《International Journal of Automation and computing》 EI CSCD 2017年第3期275-284,共10页
Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provid... Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment. 展开更多
关键词 software architecture RELIABILITY Breeze/architecture description language(ADL) generalized stochastic Petri net(GSPN) Breeze graph grammar
原文传递
Universal Software Architecture of Magnetic Resonance-Guided Focused Ultrasound Surgery System and Experimental Study
5
作者 张胜发 唐纳 +2 位作者 沈国峰 王悍 乔杉 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期471-481,共11页
Magnetic resonance-guided focused ultrasound surgery (MRgFUS) is an emerging, non-invasive hyperthermia technology which can be used for the treatment of benign and malignant tumours, in conjunction with intracranial ... Magnetic resonance-guided focused ultrasound surgery (MRgFUS) is an emerging, non-invasive hyperthermia technology which can be used for the treatment of benign and malignant tumours, in conjunction with intracranial neurological diseases. To treat different indications, it is often necessary to design special focused ultrasound devices and treatment plans, which poses great challenges and results in substantial costs during software development. This article introduces a general software architecture that can be applied to three different focused ultrasound devices for the treatment of uterine fibroids, breast fibroids, and pain palliation of bone metastases, respectively, and can be integrated with GE Discovery or Signa MRI scanners and Xingaoyi BroadScan MRI scanners. Finally, the proposed software architecture was shown to possess desirable universality and safety through various tests and animal experimental studies. 展开更多
关键词 magnetic resonance-guided focused ultrasound surgery(MRgFUS) software architecture focused ultrasound surgery workflow MRI thermometry
原文传递
On Software Application Database Constraint-driven Design and Development
6
作者 Christian Mancas Cristina Serban Diana Christina Mancas 《Journal of Computer Science Research》 2023年第1期31-45,共15页
This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality... This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality of the managed data.The proposed methodology is illustrated with an easy to understand,yet complex medium-sized genealogy software application driven by more than 200 database constraints,which fully meets such expectations. 展开更多
关键词 Database constraint-driven design and development Database constraint Data plausibility software architecture Design and development The(elementary)mathematical data model MatBase
下载PDF
An Open IoT Framework Based on Microservices Architecture 被引量:6
7
作者 Long Sun Yan Li Raheel Ahmed Memon 《China Communications》 SCIE CSCD 2017年第2期154-162,共9页
With the continuous development and evolvement of Internet of Things(Io T), monolithic application becomes much larger in scale and even more complex in structure. This leads to poor scalability, extensibility and mai... With the continuous development and evolvement of Internet of Things(Io T), monolithic application becomes much larger in scale and even more complex in structure. This leads to poor scalability, extensibility and maintainability. In response to those challenges, microservice architecture has been introduced in the field of Io T application, due to its flexibility, lightweight and loose coupling. However, the existing Io T framework of microservice mainly focus on a specific domain, therefore, this greatly limits its application. In this paper, we propose a general microservice system framework for the Io T application, which is a better scalable, extendable and maintainable architecture. We introduce its system design and related microservices, and emphasize on core service and device communication from service layer to physical layer. It has better capacity to support interoperability and accommodate heterogeneous objects. In addition, this framework can easily achieve more application integration such as automation, intelligence, Geo service and Big Data. 展开更多
关键词 Internet of things IOT micro service software architecture
下载PDF
SOFTWARE RELIABILITY MODEL FOR COMPONENT INTERACTION MODE 被引量:2
8
作者 Wang Qiang Lu Yang +1 位作者 Xu Zijun Han Jianghong 《Journal of Electronics(China)》 2011年第4期632-642,共11页
With the rapid progress of component technology,the software development methodology of gathering a large number of components for designing complex software systems has matured.But,how to assess the application relia... With the rapid progress of component technology,the software development methodology of gathering a large number of components for designing complex software systems has matured.But,how to assess the application reliability accurately with the information of system architecture and the components reliabilities together has become a knotty problem.In this paper,the defects in formal description of software architecture and the limitations in existed model assumptions are both analyzed.Moreover,a new software reliability model called Component Interaction Mode(CIM) is proposed.With this model,the problem for existed component-based software reliability analysis models that cannot deal with the cases of component interaction with non-failure independent and non-random control transition is resolved.At last,the practice examples are presented to illustrate the effectiveness of this model. 展开更多
关键词 COMPONENT CONNECTOR software architecture Reliability model
下载PDF
SA BASED SOFTWARE DEPLOYMENT RELIABILITY ESTIMATION CONSIDERING COMPONENT DEPENDENCE
9
作者 Su Xihong Liu Hongwei Wu Zhibo Yang Xiaozong Zuo Decheng 《Journal of Electronics(China)》 2011年第1期118-125,共8页
Reliability is one of the most critical properties of software system.System deployment architecture is the allocation of system software components on host nodes.Software Architecture(SA) based software deployment mo... Reliability is one of the most critical properties of software system.System deployment architecture is the allocation of system software components on host nodes.Software Architecture(SA) based software deployment models help to analyze reliability of different deployments.Though many approaches for architecture-based reliability estimation exist,little work has incorporated the influence of system deployment and hardware resources into reliability estimation.There are many factors influencing system deployment.By translating the multi-dimension factors into degree matrix of component dependence,we provide the definition of component dependence and propose a method of calculating system reliability of deployments.Additionally,the parameters that influence the optimal deployment may change during system execution.The existing software deployment architecture may be ill-suited for the given environment,and the system needs to be redeployed to improve reliability.An approximate algorithm,A*_D,to increase system reliability is presented.When the number of components and host nodes is relative large,experimental results show that this algorithm can obtain better deployment than stochastic and greedy algorithms. 展开更多
关键词 software architecture(SA) software deployment System reliability COMPONENT Redeploy
下载PDF
Integration of naval distributed tactical training simulation system based on advanced message queuing protocol 被引量:2
10
作者 柳玉 Wen Jiayan Ji Daqin 《High Technology Letters》 EI CAS 2016年第4期385-394,共10页
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc... Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange. 展开更多
关键词 tactical simulation message middleware advanced message queuing protocol(AMQP) software architecture distributed interactive simulation
下载PDF
软件体系结构教学大纲设计中精致教学理论的应用与教学实践(英文)
11
作者 孙玉山 丁建睿 《计算机教育》 2010年第9期86-89,共4页
In this paper,we firstly describes problems in designing a syllabus for a course named software architecture,then presents the creation of the syllabus by applying Elaboration Theory of Instruction.Our actual teaching... In this paper,we firstly describes problems in designing a syllabus for a course named software architecture,then presents the creation of the syllabus by applying Elaboration Theory of Instruction.Our actual teaching practice by following the bottom-up,and iterative method in classroom presentations is also discussed.Finally a use case study in teaching this course is given. 展开更多
关键词 software architecture elaboration theory of instruction iterative teaching
下载PDF
Intermediate Common Model—The Solution to Separate Concerns and Responsiveness in Dynamic Context-Aware System
12
作者 Gaetan Rey The Can Do +2 位作者 Jean-Yves Tigli Stéphane Lavirotte Nhan Le Thanh 《Journal of Computer and Communications》 2017年第4期44-59,共16页
Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper... Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level. 展开更多
关键词 MIDDLEWARE Ubiquitous Computing Context-Aware System software Composition software architecture
下载PDF
API Development Increases Access to Shared Computing Resources at Boston University
13
作者 George Jones Amanda E. Wakefield +4 位作者 Jeff Triplett Kojo Idrissa James Goebel Dima Kozakov Sandor Vajda 《Journal of Software Engineering and Applications》 2022年第6期197-207,共11页
Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must... Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must be able to access computing resources. One way to provide such resources is through High-Performance Computing (HPC) centers. Many academic research institutions offer their own HPC Centers but struggle to make the computing resources easily accessible and user-friendly. Here we present SHABU, a RESTful Web API framework that enables S & E communities to access resources from Boston University’s Shared Computing Center (SCC). The SHABU requirements are derived from the use cases described in this work. 展开更多
关键词 API Framework Open Source High-Performance Computing software architecture Science and Engineering
下载PDF
Software component composition based on ADL and Middleware 被引量:19
14
作者 梅宏 常继传 杨芙清 《Science in China(Series F)》 2001年第2期136-151,共16页
How to compose prefabricated components is a key issue in component-based reuse. Research on Software Architecture (SA) and Component-based Software Development (CBSD) provides two hopeful solutions from different per... How to compose prefabricated components is a key issue in component-based reuse. Research on Software Architecture (SA) and Component-based Software Development (CBSD) provides two hopeful solutions from different perspectives. SA provides a top-down approach to realizing component-based reuse. However, it pays insufficient attention to the refinement and implementation of the architectural descriptions, and does not provide the necessary capability to automate the transformation or composition to form a final executable application. CBSD provides a bottom-up way by using existing middleware infrastructures. However, these technologies do not take into account the systematic methodology that can guide the CBSD process, especially the component composition at higher abstract levels. We argue that it is a natural solution to combine these two approaches.   In this paper, an architecture-based component composition approach is presented. In this way, SA description, using mapping rules and mini-tools to narrow the gap between design and implementation, is used as the blueprint and middleware technology as the runtime scaffold for component composition. Our approach presents an ADL, which supports user-defined connectors and has an extensible framework, to specify software architectures. To map a SA description into implementation, it is necessary to map it first to an OO design model described in UML, then to the final implementation. The architectural description can be mapped into source code or executable code by using some ORB conforming to CORBA standard. Also a toolkit is provided to support this approach efficiently. 展开更多
关键词 software architecture component composition component-based development software reuse UML CORBA.
原文传递
Distribution Management Systems for Smart Grid:Architecture,Work Flows,and Interoperability 被引量:2
15
作者 Rabih A.Jabr Izudin Dzafic 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2022年第2期300-308,共9页
The smart grid integrates advanced sensors,a two-way communication infrastructure,and high-performance computation-based control.The distribution management systems for smart grid include several functions for manipul... The smart grid integrates advanced sensors,a two-way communication infrastructure,and high-performance computation-based control.The distribution management systems for smart grid include several functions for manipulating legacy voltage control devices and distributed energy resources through closed-loop volt/var control,leading to wide-area regulation of voltages in the presence of fluctuating power.The other primary distribution network analysis application is concerned with automatic fault location and service restoration following fault events,aiming to provide the grid with autonomous intelligence for self-healing.Communication technologies are vital to enable the computing applications of distribution networks,whether they work in centralized or distributed modes.This paper presents the state of the art in distribution management system architectures and modern workflows showing data exchange,practical parallel implementations designed to handle large amounts of data,in addition to communication standards that serve as interoperability enablers.It demystifies the relationship between different functions developed independently by power system researchers and shows their operation as a complete system,thus placing them in a better context for future research and development. 展开更多
关键词 Cyber security data communication power distribution networks SELF-HEALING software architecture voltage control.
原文传递
Towards Efficient Robotic Software Development by Reusing Behavior Tree Structures for Task Planning Paradigms
16
作者 Shuo Yang Qi Zhang 《Complex System Modeling and Simulation》 EI 2023年第4期357-380,共24页
interaction pipelines while maintaining interfaces for task-specific customization.The Structural-BT framework supports the modular design of structure functionalities and allows easy extensibility of the inner planni... interaction pipelines while maintaining interfaces for task-specific customization.The Structural-BT framework supports the modular design of structure functionalities and allows easy extensibility of the inner planning flows between BT components.With the Structural-BT framework,software engineers can develop robotic software by flexibly composing BT structures to formulate the skeleton software architecture and implement task-specific algorithms when necessary.In the experiment,this paper develops robotic software for diverse task scenarios and selects the baseline approaches of Robot Operating System(ROS)and classical BT development frameworks for comparison.By quantitatively measuring the reuse frequencies and ratios of BT structures,the Structural-BT framework has been shown to be more efficient than the baseline approaches for robotic software development. 展开更多
关键词 robotic software modeling and development software architecture task planning paradigm behavior tree modeling
原文传递
Event-driven flood management:design and computational modules
17
作者 Vinod Kumar Sharma G.Srinivasa Rao +4 位作者 E.Amminedu P.V.Nagamani Abhinav Shukla K.Ram Mohan Rao V.Bhanumurthy 《Geo-Spatial Information Science》 SCIE EI CSCD 2016年第1期39-55,共17页
Flood management is a set of activities that have to be carried out in collaboration with multiple agencies.Advanced flood information with early warning generated using remote sensing satellite technologies can help ... Flood management is a set of activities that have to be carried out in collaboration with multiple agencies.Advanced flood information with early warning generated using remote sensing satellite technologies can help the agencies to effectively manage the situation on ground.Various environmental parameters and forecasts provided by different agencies can be analyzed and compared with historical flood events for generating probable flood event alerts.The information(environmental parameters)provided by the agencies are heterogeneous and noncompliant to standards and distributed in nature.Synchronization of data from distributed resources and automation of data analysis process for flood management is a primary prerequisite for faster and efficient decision-making.Web 2.0-based web services enable data creation,sharing,communication,and collaboration on web.Spatial data sharing on web 2.0 for making quality of service using open-source software for efficient flood management is a challenge.Available software architectures proposed for risk and environmental crisis management are too generic in nature and needs lot of modification for flood management.An event-driven model coupled with data standardization procedures using service-oriented architecture provides an effective framework for flood management.In this paper,a framework capable of collecting heterogeneous distributed flood-related information for analyzing and alerting probable flood events is proposed.The framework has been implemented to generate automatic flood extent maps,by analyzing the distributed satellite data(as service).The automation of flood delineation process reduces the overall flood product generation time.Open-source web tools have been utilized in development of spatial information system to visualize and analyze the actual situation on ground facilitating overall decision-making process. 展开更多
关键词 Flood management software architectures service oriented architecture(SOA) event-based methods AUTOMATION heterogeneous data
原文传递
Abstract security patterns and the design of secure systems
18
作者 Eduardo B.Fernandez Nobukazu Yoshioka +1 位作者 Hironori Washizaki Joseph Yoder 《Cybersecurity》 EI CSCD 2022年第3期1-17,共17页
During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be ba... During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design. 展开更多
关键词 Security patterns Secure software development Security requirements Secure software architecture loT systems design
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部