This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and fa...This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and factors of lightweightness. Process mining deals with the largescalecomplexity of security and performance analysis, which are the goalsof SA evaluation frameworks. As a result of these conjectures, all ProcessMining researches in the realm of SA are thoroughly reviewed, and ninechallenges for Process Mining Adaption are recognized. Process mining isembedded in the framework and to boost the quality of the SA model forfurther analysis, the framework nominates architectural discovery algorithmsFlower, Alpha, Integer Linear Programming (ILP), Heuristic, and Inductiveand compares them vs. twelve quality criteria. Finally, the framework’s testingon three case studies approves the feasibility of applying process mining toarchitectural evaluation. The extraction of the SA model is also done by thebest model discovery algorithm, which is selected by intensive benchmarkingin this research. This research presents case studies of SA in service-oriented,Pipe and Filter, and component-based styles, modeled and simulated byHierarchical Colored Petri Net techniques based on the cases’ documentation.Processminingwithin this framework dealswith the system’s log files obtainedfrom SA simulation. Applying process mining is challenging, especially for aSA evaluation framework, as it has not been done yet. The research recognizesthe problems of process mining adaption to a hypothetical lightweightSA evaluation framework and addresses these problems during the solutiondevelopment.展开更多
Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp ...Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp onent-based software development technique is a better method to solve the prob lem. In this paper, we first discuss the concept, description method and some fa miliar styles of software architecture, and then analyze the merits of using the software architecture to guide the software development. We also present a gene ral design method for component. Its applications are finally provided.展开更多
In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java templ...In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java template class design in implementing the "pipes" and "filters" in the pipes-and-filters architecture is given at the design level.Finally,this paper uses a concrete example to show how to use Java to implement the pipesand-filters architecture.Using varied amount of data from text files,performance and memory usage of the two architectures are illustrated.展开更多
Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provid...Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment.展开更多
Magnetic resonance-guided focused ultrasound surgery (MRgFUS) is an emerging, non-invasive hyperthermia technology which can be used for the treatment of benign and malignant tumours, in conjunction with intracranial ...Magnetic resonance-guided focused ultrasound surgery (MRgFUS) is an emerging, non-invasive hyperthermia technology which can be used for the treatment of benign and malignant tumours, in conjunction with intracranial neurological diseases. To treat different indications, it is often necessary to design special focused ultrasound devices and treatment plans, which poses great challenges and results in substantial costs during software development. This article introduces a general software architecture that can be applied to three different focused ultrasound devices for the treatment of uterine fibroids, breast fibroids, and pain palliation of bone metastases, respectively, and can be integrated with GE Discovery or Signa MRI scanners and Xingaoyi BroadScan MRI scanners. Finally, the proposed software architecture was shown to possess desirable universality and safety through various tests and animal experimental studies.展开更多
This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality...This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality of the managed data.The proposed methodology is illustrated with an easy to understand,yet complex medium-sized genealogy software application driven by more than 200 database constraints,which fully meets such expectations.展开更多
With the continuous development and evolvement of Internet of Things(Io T), monolithic application becomes much larger in scale and even more complex in structure. This leads to poor scalability, extensibility and mai...With the continuous development and evolvement of Internet of Things(Io T), monolithic application becomes much larger in scale and even more complex in structure. This leads to poor scalability, extensibility and maintainability. In response to those challenges, microservice architecture has been introduced in the field of Io T application, due to its flexibility, lightweight and loose coupling. However, the existing Io T framework of microservice mainly focus on a specific domain, therefore, this greatly limits its application. In this paper, we propose a general microservice system framework for the Io T application, which is a better scalable, extendable and maintainable architecture. We introduce its system design and related microservices, and emphasize on core service and device communication from service layer to physical layer. It has better capacity to support interoperability and accommodate heterogeneous objects. In addition, this framework can easily achieve more application integration such as automation, intelligence, Geo service and Big Data.展开更多
With the rapid progress of component technology,the software development methodology of gathering a large number of components for designing complex software systems has matured.But,how to assess the application relia...With the rapid progress of component technology,the software development methodology of gathering a large number of components for designing complex software systems has matured.But,how to assess the application reliability accurately with the information of system architecture and the components reliabilities together has become a knotty problem.In this paper,the defects in formal description of software architecture and the limitations in existed model assumptions are both analyzed.Moreover,a new software reliability model called Component Interaction Mode(CIM) is proposed.With this model,the problem for existed component-based software reliability analysis models that cannot deal with the cases of component interaction with non-failure independent and non-random control transition is resolved.At last,the practice examples are presented to illustrate the effectiveness of this model.展开更多
Reliability is one of the most critical properties of software system.System deployment architecture is the allocation of system software components on host nodes.Software Architecture(SA) based software deployment mo...Reliability is one of the most critical properties of software system.System deployment architecture is the allocation of system software components on host nodes.Software Architecture(SA) based software deployment models help to analyze reliability of different deployments.Though many approaches for architecture-based reliability estimation exist,little work has incorporated the influence of system deployment and hardware resources into reliability estimation.There are many factors influencing system deployment.By translating the multi-dimension factors into degree matrix of component dependence,we provide the definition of component dependence and propose a method of calculating system reliability of deployments.Additionally,the parameters that influence the optimal deployment may change during system execution.The existing software deployment architecture may be ill-suited for the given environment,and the system needs to be redeployed to improve reliability.An approximate algorithm,A*_D,to increase system reliability is presented.When the number of components and host nodes is relative large,experimental results show that this algorithm can obtain better deployment than stochastic and greedy algorithms.展开更多
Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protoc...Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.展开更多
In this paper,we firstly describes problems in designing a syllabus for a course named software architecture,then presents the creation of the syllabus by applying Elaboration Theory of Instruction.Our actual teaching...In this paper,we firstly describes problems in designing a syllabus for a course named software architecture,then presents the creation of the syllabus by applying Elaboration Theory of Instruction.Our actual teaching practice by following the bottom-up,and iterative method in classroom presentations is also discussed.Finally a use case study in teaching this course is given.展开更多
Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper...Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level.展开更多
Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must...Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must be able to access computing resources. One way to provide such resources is through High-Performance Computing (HPC) centers. Many academic research institutions offer their own HPC Centers but struggle to make the computing resources easily accessible and user-friendly. Here we present SHABU, a RESTful Web API framework that enables S & E communities to access resources from Boston University’s Shared Computing Center (SCC). The SHABU requirements are derived from the use cases described in this work.展开更多
How to compose prefabricated components is a key issue in component-based reuse. Research on Software Architecture (SA) and Component-based Software Development (CBSD) provides two hopeful solutions from different per...How to compose prefabricated components is a key issue in component-based reuse. Research on Software Architecture (SA) and Component-based Software Development (CBSD) provides two hopeful solutions from different perspectives. SA provides a top-down approach to realizing component-based reuse. However, it pays insufficient attention to the refinement and implementation of the architectural descriptions, and does not provide the necessary capability to automate the transformation or composition to form a final executable application. CBSD provides a bottom-up way by using existing middleware infrastructures. However, these technologies do not take into account the systematic methodology that can guide the CBSD process, especially the component composition at higher abstract levels. We argue that it is a natural solution to combine these two approaches. In this paper, an architecture-based component composition approach is presented. In this way, SA description, using mapping rules and mini-tools to narrow the gap between design and implementation, is used as the blueprint and middleware technology as the runtime scaffold for component composition. Our approach presents an ADL, which supports user-defined connectors and has an extensible framework, to specify software architectures. To map a SA description into implementation, it is necessary to map it first to an OO design model described in UML, then to the final implementation. The architectural description can be mapped into source code or executable code by using some ORB conforming to CORBA standard. Also a toolkit is provided to support this approach efficiently.展开更多
The smart grid integrates advanced sensors,a two-way communication infrastructure,and high-performance computation-based control.The distribution management systems for smart grid include several functions for manipul...The smart grid integrates advanced sensors,a two-way communication infrastructure,and high-performance computation-based control.The distribution management systems for smart grid include several functions for manipulating legacy voltage control devices and distributed energy resources through closed-loop volt/var control,leading to wide-area regulation of voltages in the presence of fluctuating power.The other primary distribution network analysis application is concerned with automatic fault location and service restoration following fault events,aiming to provide the grid with autonomous intelligence for self-healing.Communication technologies are vital to enable the computing applications of distribution networks,whether they work in centralized or distributed modes.This paper presents the state of the art in distribution management system architectures and modern workflows showing data exchange,practical parallel implementations designed to handle large amounts of data,in addition to communication standards that serve as interoperability enablers.It demystifies the relationship between different functions developed independently by power system researchers and shows their operation as a complete system,thus placing them in a better context for future research and development.展开更多
interaction pipelines while maintaining interfaces for task-specific customization.The Structural-BT framework supports the modular design of structure functionalities and allows easy extensibility of the inner planni...interaction pipelines while maintaining interfaces for task-specific customization.The Structural-BT framework supports the modular design of structure functionalities and allows easy extensibility of the inner planning flows between BT components.With the Structural-BT framework,software engineers can develop robotic software by flexibly composing BT structures to formulate the skeleton software architecture and implement task-specific algorithms when necessary.In the experiment,this paper develops robotic software for diverse task scenarios and selects the baseline approaches of Robot Operating System(ROS)and classical BT development frameworks for comparison.By quantitatively measuring the reuse frequencies and ratios of BT structures,the Structural-BT framework has been shown to be more efficient than the baseline approaches for robotic software development.展开更多
Flood management is a set of activities that have to be carried out in collaboration with multiple agencies.Advanced flood information with early warning generated using remote sensing satellite technologies can help ...Flood management is a set of activities that have to be carried out in collaboration with multiple agencies.Advanced flood information with early warning generated using remote sensing satellite technologies can help the agencies to effectively manage the situation on ground.Various environmental parameters and forecasts provided by different agencies can be analyzed and compared with historical flood events for generating probable flood event alerts.The information(environmental parameters)provided by the agencies are heterogeneous and noncompliant to standards and distributed in nature.Synchronization of data from distributed resources and automation of data analysis process for flood management is a primary prerequisite for faster and efficient decision-making.Web 2.0-based web services enable data creation,sharing,communication,and collaboration on web.Spatial data sharing on web 2.0 for making quality of service using open-source software for efficient flood management is a challenge.Available software architectures proposed for risk and environmental crisis management are too generic in nature and needs lot of modification for flood management.An event-driven model coupled with data standardization procedures using service-oriented architecture provides an effective framework for flood management.In this paper,a framework capable of collecting heterogeneous distributed flood-related information for analyzing and alerting probable flood events is proposed.The framework has been implemented to generate automatic flood extent maps,by analyzing the distributed satellite data(as service).The automation of flood delineation process reduces the overall flood product generation time.Open-source web tools have been utilized in development of spatial information system to visualize and analyze the actual situation on ground facilitating overall decision-making process.展开更多
During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be ba...During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.展开更多
基金This paper is supported by Research Grant Number:PP-FTSM-2022.
文摘This research recognizes the limitation and challenges of adaptingand applying Process Mining as a powerful tool and technique in theHypothetical Software Architecture (SA) Evaluation Framework with thefeatures and factors of lightweightness. Process mining deals with the largescalecomplexity of security and performance analysis, which are the goalsof SA evaluation frameworks. As a result of these conjectures, all ProcessMining researches in the realm of SA are thoroughly reviewed, and ninechallenges for Process Mining Adaption are recognized. Process mining isembedded in the framework and to boost the quality of the SA model forfurther analysis, the framework nominates architectural discovery algorithmsFlower, Alpha, Integer Linear Programming (ILP), Heuristic, and Inductiveand compares them vs. twelve quality criteria. Finally, the framework’s testingon three case studies approves the feasibility of applying process mining toarchitectural evaluation. The extraction of the SA model is also done by thebest model discovery algorithm, which is selected by intensive benchmarkingin this research. This research presents case studies of SA in service-oriented,Pipe and Filter, and component-based styles, modeled and simulated byHierarchical Colored Petri Net techniques based on the cases’ documentation.Processminingwithin this framework dealswith the system’s log files obtainedfrom SA simulation. Applying process mining is challenging, especially for aSA evaluation framework, as it has not been done yet. The research recognizesthe problems of process mining adaption to a hypothetical lightweightSA evaluation framework and addresses these problems during the solutiondevelopment.
文摘Computer software has been becoming more and more c om plex with the development of hardware. Thus, how to efficiently develop extensib le, maintainable and adaptable software occurs to be an urgent problem. The comp onent-based software development technique is a better method to solve the prob lem. In this paper, we first discuss the concept, description method and some fa miliar styles of software architecture, and then analyze the merits of using the software architecture to guide the software development. We also present a gene ral design method for component. Its applications are finally provided.
文摘In this paper,a case study is carried out in comparison of pipes-and-filters architecture and batch sequential architecture.Concepts on a data flow system and the two mentioned architectures are presented.A Java template class design in implementing the "pipes" and "filters" in the pipes-and-filters architecture is given at the design level.Finally,this paper uses a concrete example to show how to use Java to implement the pipesand-filters architecture.Using varied amount of data from text files,performance and memory usage of the two architectures are illustrated.
基金supported by Jilin Province Science Foundation for Youths(No.20150520060JH)
文摘Breeze/architecture description language(ADL), is an eX tensible markup language(XML) based architecture description language which is used to model software systems at the architecture level. Though Breeze/ADL provides an appropriate basis for architecture modelling, it can neither analyse nor evaluate the architecture reliability. In this paper, we propose a Breeze/ADL based strategy which, by combining generalized stochastic Petri net(GSPN) and tools for reliability analysis, supports architecture reliability modelling and evaluation. This work expands the idea in three directions: Firstly, we give a Breeze/ADL reliability model in which we add error attributes to Breeze/ADL error model for capturing architecture error information, and at the same time perform the system error state transition through the Breeze/ADL production. Secondly, we present how to map a Breeze/ADL reliability model to a GSPN model, which in turn can be used for reliability analysis. The other task is to develop a Breeze/ADL reliability analysis modelling tool–EXGSPN(Breeze/ADL reliability analysis modelling tool), and combine it with platform independent petri net editor 2(PIPE2) to carry out a reliability assessment.
基金the National Natural Science Foundation of China (Nos. 81727806 and 11774231)the National Key Research and Development Program of Ministry of Science and Technology (No. 2017YFC0108900)+1 种基金the Shanghai Municipal Education Commission—Gaofeng Clinical Medicine Grant Support—Gainers from Shanghai Jiao Tong University School of Medicine (No. 20152230)the Emerging Frontier Technology Joint Research Program of Shanghai Shen-Kang Hospital Development Center (No. SHDC2017127)。
文摘Magnetic resonance-guided focused ultrasound surgery (MRgFUS) is an emerging, non-invasive hyperthermia technology which can be used for the treatment of benign and malignant tumours, in conjunction with intracranial neurological diseases. To treat different indications, it is often necessary to design special focused ultrasound devices and treatment plans, which poses great challenges and results in substantial costs during software development. This article introduces a general software architecture that can be applied to three different focused ultrasound devices for the treatment of uterine fibroids, breast fibroids, and pain palliation of bone metastases, respectively, and can be integrated with GE Discovery or Signa MRI scanners and Xingaoyi BroadScan MRI scanners. Finally, the proposed software architecture was shown to possess desirable universality and safety through various tests and animal experimental studies.
文摘This paper presents a methodology driven by database constraints for designing and developing(database)software applications.Much needed and with excellent results,this paradigm guarantees the highest possible quality of the managed data.The proposed methodology is illustrated with an easy to understand,yet complex medium-sized genealogy software application driven by more than 200 database constraints,which fully meets such expectations.
文摘With the continuous development and evolvement of Internet of Things(Io T), monolithic application becomes much larger in scale and even more complex in structure. This leads to poor scalability, extensibility and maintainability. In response to those challenges, microservice architecture has been introduced in the field of Io T application, due to its flexibility, lightweight and loose coupling. However, the existing Io T framework of microservice mainly focus on a specific domain, therefore, this greatly limits its application. In this paper, we propose a general microservice system framework for the Io T application, which is a better scalable, extendable and maintainable architecture. We introduce its system design and related microservices, and emphasize on core service and device communication from service layer to physical layer. It has better capacity to support interoperability and accommodate heterogeneous objects. In addition, this framework can easily achieve more application integration such as automation, intelligence, Geo service and Big Data.
基金Supported by the National Natural Science Foundation of China (No. 60873195,60873003,and 61070220)the Doctoral Foundation of Ministry of Education (No.20090111110002)
文摘With the rapid progress of component technology,the software development methodology of gathering a large number of components for designing complex software systems has matured.But,how to assess the application reliability accurately with the information of system architecture and the components reliabilities together has become a knotty problem.In this paper,the defects in formal description of software architecture and the limitations in existed model assumptions are both analyzed.Moreover,a new software reliability model called Component Interaction Mode(CIM) is proposed.With this model,the problem for existed component-based software reliability analysis models that cannot deal with the cases of component interaction with non-failure independent and non-random control transition is resolved.At last,the practice examples are presented to illustrate the effectiveness of this model.
基金Supported by the High Technology Research and Development Program of China(No.2008AA01A201)National High Technology Research,Development Plan of China (No.2006AA01A103)the High Technology Research and Development Program of China(No.2009AA01A404)
文摘Reliability is one of the most critical properties of software system.System deployment architecture is the allocation of system software components on host nodes.Software Architecture(SA) based software deployment models help to analyze reliability of different deployments.Though many approaches for architecture-based reliability estimation exist,little work has incorporated the influence of system deployment and hardware resources into reliability estimation.There are many factors influencing system deployment.By translating the multi-dimension factors into degree matrix of component dependence,we provide the definition of component dependence and propose a method of calculating system reliability of deployments.Additionally,the parameters that influence the optimal deployment may change during system execution.The existing software deployment architecture may be ill-suited for the given environment,and the system needs to be redeployed to improve reliability.An approximate algorithm,A*_D,to increase system reliability is presented.When the number of components and host nodes is relative large,experimental results show that this algorithm can obtain better deployment than stochastic and greedy algorithms.
基金Supported by the National Natural Science Foundation of China(No.61401496)
文摘Aiming at the problems of unreliable data transmission,poor steadiness,nonsupport of complex data types,direct couple between data transmission and exchange,a high-level method based on advanced message queuing protocol( AMQP) is proposed to integrate naval distributed tactical training simulation system after serious consideration with current information exchange features of military combat system. Transferring layer in traditional user datagram protocol is implemented by publishing and subscribing scheme of message middleware. By creating message model to standardize message structure,integration architecture is formulated to resolve potential information security risks from inconsistent data type and express data transmission. Meanwhile,a communication model is put forward based on AMQP,which is in the center position of the whole transmission framework and responsible for reliably transferring battlefield data among subsystems. Experiments show that the method can accurately post amounts of data to the subscriber without error and loss,and can get excellent real-time performance of data exchange.
文摘In this paper,we firstly describes problems in designing a syllabus for a course named software architecture,then presents the creation of the syllabus by applying Elaboration Theory of Instruction.Our actual teaching practice by following the bottom-up,and iterative method in classroom presentations is also discussed.Finally a use case study in teaching this course is given.
基金the U-Insither Project(collaborative project between the Universite Nice Sophia Antipolis and EDF R&D/STREP).
文摘Nowadays, many works are interested in adapting to the context without taking into account neither the responsiveness to adapt their solution, nor the ability of designers to model all the relevant concerns. Our paper provides a new architecture for context management that tries to solve both problems. This approach is also based on the analysis and synthesis of context-aware frameworks proposed in literature. Our solution is focus on a separation of contextual concerns at the design phase and preserves it as much as possible at runtime. For this, we introduce the notion of independent views that allow designers to focus on their domain of expertise. At runtime, the architecture is splitted in 2 independent levels of adaptation. The highest is in charge of current context identification and manages each view independently. The lowest handles the adaptation of the application according to the rules granted by the previous level.
文摘Within the last few decades, increases in computational resources have contributed enormously to the progress of science and engineering (S & E). To continue making rapid advancements, the S & E community must be able to access computing resources. One way to provide such resources is through High-Performance Computing (HPC) centers. Many academic research institutions offer their own HPC Centers but struggle to make the computing resources easily accessible and user-friendly. Here we present SHABU, a RESTful Web API framework that enables S & E communities to access resources from Boston University’s Shared Computing Center (SCC). The SHABU requirements are derived from the use cases described in this work.
基金This work was supported by the 9th State Five-Year Plan, State 863 High-Tech Program, and the National Natural Science Foundation of China It also got support from Bell-Labs China and Software Production Research of Bell-Labs.
文摘How to compose prefabricated components is a key issue in component-based reuse. Research on Software Architecture (SA) and Component-based Software Development (CBSD) provides two hopeful solutions from different perspectives. SA provides a top-down approach to realizing component-based reuse. However, it pays insufficient attention to the refinement and implementation of the architectural descriptions, and does not provide the necessary capability to automate the transformation or composition to form a final executable application. CBSD provides a bottom-up way by using existing middleware infrastructures. However, these technologies do not take into account the systematic methodology that can guide the CBSD process, especially the component composition at higher abstract levels. We argue that it is a natural solution to combine these two approaches. In this paper, an architecture-based component composition approach is presented. In this way, SA description, using mapping rules and mini-tools to narrow the gap between design and implementation, is used as the blueprint and middleware technology as the runtime scaffold for component composition. Our approach presents an ADL, which supports user-defined connectors and has an extensible framework, to specify software architectures. To map a SA description into implementation, it is necessary to map it first to an OO design model described in UML, then to the final implementation. The architectural description can be mapped into source code or executable code by using some ORB conforming to CORBA standard. Also a toolkit is provided to support this approach efficiently.
基金MONKS,Sarajevo,FBiH,Bosnia and Herzegovina(No.27-02-11-41250-34/21).
文摘The smart grid integrates advanced sensors,a two-way communication infrastructure,and high-performance computation-based control.The distribution management systems for smart grid include several functions for manipulating legacy voltage control devices and distributed energy resources through closed-loop volt/var control,leading to wide-area regulation of voltages in the presence of fluctuating power.The other primary distribution network analysis application is concerned with automatic fault location and service restoration following fault events,aiming to provide the grid with autonomous intelligence for self-healing.Communication technologies are vital to enable the computing applications of distribution networks,whether they work in centralized or distributed modes.This paper presents the state of the art in distribution management system architectures and modern workflows showing data exchange,practical parallel implementations designed to handle large amounts of data,in addition to communication standards that serve as interoperability enablers.It demystifies the relationship between different functions developed independently by power system researchers and shows their operation as a complete system,thus placing them in a better context for future research and development.
文摘interaction pipelines while maintaining interfaces for task-specific customization.The Structural-BT framework supports the modular design of structure functionalities and allows easy extensibility of the inner planning flows between BT components.With the Structural-BT framework,software engineers can develop robotic software by flexibly composing BT structures to formulate the skeleton software architecture and implement task-specific algorithms when necessary.In the experiment,this paper develops robotic software for diverse task scenarios and selects the baseline approaches of Robot Operating System(ROS)and classical BT development frameworks for comparison.By quantitatively measuring the reuse frequencies and ratios of BT structures,the Structural-BT framework has been shown to be more efficient than the baseline approaches for robotic software development.
文摘Flood management is a set of activities that have to be carried out in collaboration with multiple agencies.Advanced flood information with early warning generated using remote sensing satellite technologies can help the agencies to effectively manage the situation on ground.Various environmental parameters and forecasts provided by different agencies can be analyzed and compared with historical flood events for generating probable flood event alerts.The information(environmental parameters)provided by the agencies are heterogeneous and noncompliant to standards and distributed in nature.Synchronization of data from distributed resources and automation of data analysis process for flood management is a primary prerequisite for faster and efficient decision-making.Web 2.0-based web services enable data creation,sharing,communication,and collaboration on web.Spatial data sharing on web 2.0 for making quality of service using open-source software for efficient flood management is a challenge.Available software architectures proposed for risk and environmental crisis management are too generic in nature and needs lot of modification for flood management.An event-driven model coupled with data standardization procedures using service-oriented architecture provides an effective framework for flood management.In this paper,a framework capable of collecting heterogeneous distributed flood-related information for analyzing and alerting probable flood events is proposed.The framework has been implemented to generate automatic flood extent maps,by analyzing the distributed satellite data(as service).The automation of flood delineation process reduces the overall flood product generation time.Open-source web tools have been utilized in development of spatial information system to visualize and analyze the actual situation on ground facilitating overall decision-making process.
基金This work received no external funding,but the National Institute of Informatics of Japan funded the trip of the first and fourth authors to Tokyo to participate in meetings where the idea of this paper was developed.
文摘During the initial stages of software development,the primary goal is to define precise and detailed requirements without concern for software realizations.Security constraints should be introduced then and must be based on the semantic aspects of applications,not on their software architectures,as it is the case in most secure development methodologies.In these stages,we need to identify threats as attacker goals and indicate what conceptual security defenses are needed to thwart these goals,without consideration of implementation details.We can consider the effects of threats on the application assets and try to find ways to stop them.These threats should be controlled with abstract security mechanisms that can be realized by abstract security patterns(ASPs),that include only the core functions of these mechanisms,which must be present in every implementation of them.An abstract security pattern describes a conceptual security mechanism that includes functions able to stop or mitigate a threat or comply with a regulation or institutional policy.We describe here the properties of ASPs and present a detailed example.We relate ASPs to each other and to Security Solution Frames,which describe families of related patterns.We show how to include ASPs to secure an application,as well as how to derive concrete patterns from them.Finally,we discuss their practical value,including their use in“security by design”and IoT systems design.