Business process modeling is important for SOA application development. Formal modeling methodology has significant benefits but related research seems inadequate. In this paper we present an upper ontology for busine...
详细信息
ISBN:
(纸本)9780889866560
Business process modeling is important for SOA application development. Formal modeling methodology has significant benefits but related research seems inadequate. In this paper we present an upper ontology for business process modeling, called Business Process Ontology (BPO), and propose an SOA application modeling and developing framework. The BPO provides accurate definitions of the main components of SOA modeling. The extension of BPO can be used to define business process models, describe existing services, and define the mapping between processes and services. Applying ontology to SOA Modeling can help to identify the binding information of business process and service, increase the reusability of existing business processes and services, and accelerate the development of application.
Currently there are neither structured nor efficient ways to develop and reuse non-trivial and complex distributedsystems despite the fact that there exist numerous sources of software, components and knowledge relat...
详细信息
ISBN:
(纸本)9780889866560
Currently there are neither structured nor efficient ways to develop and reuse non-trivial and complex distributedsystems despite the fact that there exist numerous sources of software, components and knowledge relating to this field. In this paper we describe how we use a novel all-encompassing development methodology called the Total Components Aspect-Oriented (TCAO) methodology to efficiently and rapidly design and develop reusable distributedsystems of any size, functionality and complexity. We further describe our other novel concepts of using Early Aspect-Oriented Components (EAOC) and Early Aspect-Oriented Software (EAOS), collectively known as early systemic-entities, to get an early head-start in the development process starting from the requirements engineering phase itself and spanning throughout all the phases. TCAO also encompasses the activities of deployment, maintenance and refactoring to add any further remoting functionalities if the need arises. We further describe how we use TCAO to identify, isolate and use aspects, which are systemic cross-cutting concerns, to make the analysis, design, modelling and implementations of reusable distributedsystems easier to understand, manage and control. With the aid of an exemplar software system, we also describe how a non-trivial reusable distributed system can be efficiently and rapidly developed by using our methodology to facilitate technology transfer and reuse.
Automatic detection and tracking of human hands in video imagery has many applications. While some success has been achieved in human-computer interaction applications, hand tracking would also be extremely useful in ...
详细信息
ISBN:
(纸本)9780889866560
Automatic detection and tracking of human hands in video imagery has many applications. While some success has been achieved in human-computer interaction applications, hand tracking would also be extremely useful in security systems, where it could help the system to understand and predict human actions, intentions, and goals. We have designed and implemented a prototype hand tracking system, which is able to track the hands of moving humans in low resolution video sequences. Our system uses grayscale appearance and skin color information to classify image subwindows as either containing or not containing a human hand. The prototype's performance is quite promising, detecting nearly all visible hands in a test sequence with a relatively low error rate. In future work we plan to improve the prototype and explore methods for interpreting human gestures in surveillance video.
Exudates are the primary signs of diabetic retinopathy which are mainly cause of blindness and could be prevented with an early screening process. Pupil dilation is required in the normal screening process but this af...
详细信息
ISBN:
(纸本)9780889866560
Exudates are the primary signs of diabetic retinopathy which are mainly cause of blindness and could be prevented with an early screening process. Pupil dilation is required in the normal screening process but this affects patients' vision. This paper investigated and proposed automatic methods of exudates detection on low-contrast images taken from non-dilated pupils. The process has two main segmentation steps which are coarse segmentation using Fuzzy C-Means clustering and fine segmentation using morphological reconstruction. Four features, namely intensity, standard deviation on intensity, hue and adapted edge, were selected for coarse segmentation. The detection results are validated by comparing with expert ophthalmologists' hand-drawn ground-truth. The sensitivity and specificity for our exudates detection are 86% and 99% respectively.
Service-oriented architecture (SOA) is a popular industry standard that provides an elegant model to create and compose interoperable applications. In the case of sensor networks, SOA is considered to be a very attrac...
详细信息
ISBN:
(纸本)9780889866560
Service-oriented architecture (SOA) is a popular industry standard that provides an elegant model to create and compose interoperable applications. In the case of sensor networks, SOA is considered to be a very attractive enabler for sensor programmability and self-integration. However, SOA cannot be used without additional mechanisms to enhance the reliability and availability of the sensors behind the services. In the absence of such mechanisms, sensor-based SOA could provide a false promise of service whose, quality and availability are highly questionable and cannot be guaranteed. In this paper, we propose a Virtual Sensor framework for service-oriented sensor networks with the aim of enhancing reliability, prolonging availability and enabling automatic service composability. We classify and model three useful virtual sensor concepts and present compensation algorithms for coping with sensor failure. To quantify the merit of our approach, we developed a Data Quality Indicator measure for expressing the perceived quality of virtual sensor readings.
The paper focuses on the synthesis of a highly parallel hardware implementation of the main cipher designed for the third generation mobile communication system. The investigated algorithm is the KASUMI block cipher. ...
详细信息
ISBN:
(纸本)9780889866560
The paper focuses on the synthesis of a highly parallel hardware implementation of the main cipher designed for the third generation mobile communication system. The investigated algorithm is the KASUMI block cipher. Currently, KASUMI is well known to be a strong encryption algorithm. The use of such an algorithm within critical applications, such as mobile communication, requires efficient, highly reliable and correct hardware implementation. We will investigate satisfying such requirements by proposing and adopting a step-wise refinement software engineering approach to develop correct hardware circuits. The method uses a formal functional programming notation for specifying algorithms. The parallel behavior is then obtained through the use of a combination of function decomposition strategies, besides, data and process refinement techniques. The refinements are inspired by the operators of Communicating Sequential Processes (CSP) and map easily to programs in Handel-C (a modern C-based high-level langauge with hardware output). In this paper, we obtain several hardware implementations with different performance characteristics by applying different refinements to the algorithm. The developed designs are compiled and tested under Celoxica's RC-1000 reconfigurable computer with its 2 million gates Virtex-E FPGA. Performance analysis and evaluation of these implementations are included.
The proceedings contain 98 papers. The topics discussed include: alternative dataflow model;MOOSS2: a CPU with support for HLL memory structures;architecting security: a secure implementation of hardware buffer-overfl...
ISBN:
(纸本)9780889866560
The proceedings contain 98 papers. The topics discussed include: alternative dataflow model;MOOSS2: a CPU with support for HLL memory structures;architecting security: a secure implementation of hardware buffer-overflow protection;design of a two-level hot path Detector for path-based loop optimizations;write-aware buffer cache management scheme for nonvolatile RAM;equivalence checking in C-based system-level design by sequentializing concurrent behaviors;formal equivalence checking for loop optimization in C programs without unrolling;design and simulation for three SEU immune latches in a 0.18μm CMOS commercial process;redesign the 4:2 compressor for partial product reduction;using advanced transaction and workflow models in composing Web services;and assessing the traffic ranking of Websites with artificial neural network.
With the explosion in information over the internet, extracting knowledge from media-based data in the form of images, audio streams and videos replacing textual ones is getting more complex. So a comprehensive method...
详细信息
ISBN:
(纸本)9780889866560
With the explosion in information over the internet, extracting knowledge from media-based data in the form of images, audio streams and videos replacing textual ones is getting more complex. So a comprehensive methodology covering all forms of data are needed which is able to provide the contents of the data in a short period of time. Text mining tools and algorithms are becoming increasingly popular with many of the books, texts and documentation getting converted to soft-copy versions and being made globally accessible. Though this trend is predominantly in English language, the need has arisen for such an approach for other languages too, as many of the ancient and out-of-print texts in different languages are getting 'softer' versions for preserving and extraction of Information and Knowledge. In the context of Indian languages this need is more pronounced as many texts in different languages, scripts, different material forms ranging from palm leaves to stone cutting and dialects are available having wealth of information in variety of disciplines. In this paper, we propose a novel contentbased approach and demonstrate for textual data in the first instance, to be termed as CBTM (Content-Based Text-Mining) for knowledge discovery of multilingual texts. The proposed methodology employs a content based approach using keywords and patterns stored in the form of gif strings so that extensions to other forms of data are possible. Potential applications of this approach in a distributed environment are also highlighted. We have used the advertisements in newspapers for demonstrating the system.
The development of Grid environment provides an efficient way for implementing the parallel algorithm. Here we focus on the discovery of short recurring patterns in DNA sequences that represent binding sites for certa...
详细信息
The development of Grid environment provides an efficient way for implementing the parallel algorithm. Here we focus on the discovery of short recurring patterns in DNA sequences that represent binding sites for certain proteins in the process of gene regulation. We develop parallelcomputing algorithm for solving this problem by partitioning the overall DNA sequences. This provides us an option to implement the algorithm on Grid and to evaluate its performance. We use the open source software "Alchemi" for building the Grid environment. Also by using a merging repeat approach to find these patterns, we address other related problems, including finding of repetition with insertion and deletion.
暂无评论