A Service Composition Approach Based on Sequence Mining for Migrating E-learning Legacy System to SO

来源 :International Journal of Automation & Computing | 被引量 : 0次 | 上传用户:asas123456123456
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
With the fast development of business logic and information technology,today s best solutions are tomorrow’s legacy systems.In China,the situation in the education domain follows the same path.Currently,there exists a number of e-learning legacy assets with accumulated practical business experience,such as program resource,usage behaviour data resource,and so on.In order to use these legacy assets adequately and efficiently,we should not only utilize the explicit assets but also discover the hidden assets.The usage behaviour data resource is the set of practical operation sequences requested by all users.The hidden patterns in this data resource will provide users practical experiences,which can benefit the service composition in service-oriented architecture (SOA) migration.Namely,these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems.Although data mining techniques have been used for software engineering tasks,little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA.In this paper,we propose a service composition approach based on sequence mining techniques for MELS.Composite services found by this approach will be the complementation of business logic analysis results of MELS.The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system.According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis,we propose a sequential mining algorithm to mine this kind of data of the legacy system.For validation,this approach has been applied to the corresponding real data,which was collected from the e-learning legacy system;meanwhile,some investigation questionnaires were set up to collect satisfaction data.The investigation result is 90 % the same with the result obtained through our approach. With the fast development of business logic and information technology, today s best solutions are tomorrow’s legacy systems.In China, the situation in the education domain follows the same path. Current there, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behavior data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behavior data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services ( coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. This paper, we propose a service composition approach based on sequence mining techniques for MELS. Compilation services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behavior from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of the legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; , some investigation questionnaires were set up to collect satisfaction data. investigation result is 90% the same with the result obtained through our approach.
其他文献
2007年6月28日上午,韩国最新型导弹艇——PKG型导弹艇首艇在蔚山现代重工造船厂下水。为纪念于2002年与朝鲜海军在黄海海上冲突(韩国方面称其为“西海事件”)中阵亡的护卫艇
1995年,联合国教科文组织宣布4月23日为“世界读书日”。设立目的是推动更多的人去阅读和写作,希望散居在世界各地的人,无论年老还是年轻,无论贫穷还是富裕,无论患病还是健康
随着雷达技术的不断发展,对抗雷达的手段也在不断提高。因为雷达工作必须辐射电磁波,容易被侦察发现和定位,且雷达又需要架设在开阔的平地或四周无遮蔽的高地,天线必须外露,
市委市府奖励《北京教育丛书》有功人员本刊讯教师节前夕,、们匕京教育丛书》的作者、编者欢聚一堂.受到雷洁琼、陈希同、徐惟诚、柳斌、张健民、王大明、李志坚、陶西平、胡昭
《生物学教学》创刊于1958年3月,经历了三十五个春秋,编者的辛勤耕耘,读者殷切支持,“三十五年名尘与土,八千里路云和月”1993年恢复为月刊,将以更新的面貌出现于期刊之林。
人造“自然武器”由来已久,其巨大的威力和很强的隐蔽性诱使不少军事强国斥巨资竞相研制。这强烈地提醒人们:人类最需要警惕的还是自己! Man-made “natural weapons” have
全省报刊工作会议强调要把认识统一到提高报刊质量上来本刊讯「江泽民总书记提出的『一项根本指针,四项基本任务」,各报刊都要努力学习贯彻。我省的报刊舆论导向总的来说是好的
近年来,社会公众对全民阅读的关注热情日渐升温,讨论的焦点主要是读不读、读多少。当然,提高阅读量固然重要,但是随着阅读越来越被重视、阅读资源越来越丰富、阅读方式越来越
PKI(Public Key Infrastructure),即公钥基础设施,是一种运用公钥的概念与技术来实施并提供安全服务的、具有普遍适用性的网络安全基础设施。PKI的核心技术是现代加密技术和
狐狸和猴子好几天没吃东西了,在路上它们发现了一个洞穴,里面有一个神像和两个瓶子。狐狸祈求神像:“我们几天没吃东西了,这样下去会饿死的……”这时,神像开口说道:“这儿有