Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to ful...Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to fulfill a common mission are challenged by the ever-changing battlefield and hence requires a cross-organizational process management that produces an autonomous, flexible and adaptable architecture for collaborative process evolution. The traditional business process collaboration pattern is based on the predefined "public-view" perspective and cannot meet the requirement of the joint task operations. This paper proposes a flexible visibility control mechanism and a dynamic collaboration framework for modeling and generating collaborative processes. The mechanism allows collaborators to define a set of visibility rules to generate different views of the private processes for different collaborations, which gives a great flexibility for the collaboration initiator to decide on an appropriate collaboration pattern. The framework supports collaborators to dynamically and recursively add a new process or even a new organization to an existing collaboration. Moreover, a formal representation of the processes and a set of generation algorithms are provided to consolidate the proposed theory.展开更多
Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c...Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.展开更多
The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enter...The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enterprises'information systems.Ontology is an important tool to overcome the above mentioned syntax and semantic misunderstanding problem.Our goal is to provide a user-friendly environment supporting syntax and neutral format data model for business information.In this paper,two scenarios are discussed and a unified description of data model is developed to solve the gap in interoperation through mapping from logical data of enterprise's information system.It provides the methods to realize the mapping among different types of data or information.First,database and other types of information are transformed into neutral format that are described by web ontology language(OWL).Second,the neutral format can be mapped into the semantic entities and semantic linking through the process of extraction and annotation and added into ontology and then described in a standard format that makes the collaboration be understood easily.展开更多
Dual-Frequency Ground-Based Augmentation Systems(GBAS)can be affected by receiver Inter-Frequency Bias(IFB)when Ionosphere-Free(Ifree)smoothing is applied.In the framework of the proposed GBAS Approach Service Type F(...Dual-Frequency Ground-Based Augmentation Systems(GBAS)can be affected by receiver Inter-Frequency Bias(IFB)when Ionosphere-Free(Ifree)smoothing is applied.In the framework of the proposed GBAS Approach Service Type F(GAST-F),the IFB in the Ifree smoothed pseudorange can be corrected.However,IFB residual uncertainty still exists,which may threaten the integrity of the system.This paper presents an improved algorithm for the airborne protection level considering the residual uncertainty of IFBs to protect the integrity of dual-frequency GBAS.The IFB residual uncertainty multiplied by a frequency factor is included in the Ifree protection level together with the uncertainty of other error sources.To verify the proposed protection level algorithm,we calculate the IFB residual uncertainties of ground reference receivers and user receiver based on BDS B1I and B3I dual-frequency observation data and carry out a test at the Dongying Airport GBAS station.The results show that the proposed Ifree protection level with IFB residual uncertainty is 1.48 times the current protection level on average.The probability of Misleading Information(MI)during the test is reduced from 3.2×10^(-4)to the required value.It is proven that the proposed protection level can significantly reduce the integrity risk brought by IFB residual uncertainty and protect the integrity of dual-frequency GBAS.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst...Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.展开更多
Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weight...Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weighted scale-free community network and susceptible-infected-recovered(SIR)model.To solve the problem of difficulty in describing the changes in the structure and collaboration mode of the system under external factors,a two-dimensional Monte Carlo method and an improved dynamic Bayesian network are used to simulate the impact of external environmental factors on multi-agent systems.A collaborative information flow path optimization algorithm for agents under environmental factors is designed based on the Dijkstra algorithm.A method for evaluating system interoperability is designed based on simulation experiments,providing reference for the construction planning and optimization of organizational application of the system.Finally,the feasibility of the method is verified through case studies.展开更多
The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challen...The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challenges arising from heterogeneous communication protocols,diverse data formats,and fragmented standardization efforts hinder the seamless integration of IoT systems.This paper explores the current state of IoT interoperability,analyzing key challenges,existing standardization initiatives,and emerging technological solutions.We examine the role of middleware,gateway solutions,artificial intelligence(AI),blockchain,and edge computing in facilitating interoperability.Furthermore,we provide a comparative analysis of major IoT standards and discuss the potential for greater convergence among standardization efforts.The findings highlight that while significant progress has been made,a unified and widely accepted interoperability framework remains elusive.Addressing these challenges requires collaborative efforts among industry stakeholders,researchers,and policymakers to establish robust and scalable interoperability solutions,ensuring the continued growth and efficiency of IoT ecosystems.展开更多
Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositori...Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositories results in increased overload due to the adoption of cloud services.Moreover,the migration of applications on the cloud with optimized resource allocation is a herculean task even though it is employed for minimizing the dilemma of allocating resources.In this paper,a Fire Hawk Optimization enabled Deep Learning Scheme(FHOEDLS)is proposed for minimizing the overload and optimizing the resource allocation on the hybrid cloud container architecture for migrating interoperability based applications This FHOEDLS achieves the load prediction through the utilization of deep CNN-GRU-AM model for attaining resource allocation and better migration of applications.It specifically adopted the Fire Hawk Optimization Algorithm(FHOA)for optimizing the parameters that influence the factors that aid in better interoperable application migration with improved resource allocation and minimized overhead.It considered the factors of resource capacity,transmission cost,demand,and predicted load into account during the formulation of the objective function utilized for resource allocation and application migration.The cloud simulation of this FHOEDLS is achieved using a container,Virtual Machine(VM),and Physical Machine(PM).The results of this proposed FHOEDLS confirmed a better resource capability of 0.418 and a minimized load of 0.0061.展开更多
In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive i...In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive interfaces (SII) and service aggregative interfaces (SAI) modeled with abstract state machine (ASM) to abstractly describe the behavior of the invoked web service instances, which makes business processing accurately specify tasks and effectively solves the problems of communication and collaboration between service providers and service requesters. The mechanism also uses appropriate mediators to solve the problems of information and coinmunication incompatibility during the course of service interaction, which is convenient for service interoperability, sharing and integration. The mechanism' s working principle and interoperability implementation are illustrated by a use case in detail.展开更多
通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转...通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转换,实现数据共享"这个制约GIS发展的瓶颈问题.展开更多
基金supported by the National Natural Science Foundation of China(61273210)the National High Technology Research and Development Program of China(863 Program)(2007AA01Z126)
文摘Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to fulfill a common mission are challenged by the ever-changing battlefield and hence requires a cross-organizational process management that produces an autonomous, flexible and adaptable architecture for collaborative process evolution. The traditional business process collaboration pattern is based on the predefined "public-view" perspective and cannot meet the requirement of the joint task operations. This paper proposes a flexible visibility control mechanism and a dynamic collaboration framework for modeling and generating collaborative processes. The mechanism allows collaborators to define a set of visibility rules to generate different views of the private processes for different collaborations, which gives a great flexibility for the collaboration initiator to decide on an appropriate collaboration pattern. The framework supports collaborators to dynamically and recursively add a new process or even a new organization to an existing collaboration. Moreover, a formal representation of the processes and a set of generation algorithms are provided to consolidate the proposed theory.
基金supported by National Basic Research Program of China (973 Program) (No. 2007CB310801)National Natural Science Foundation of China (No. 60873083, No. 60803025, No. 60970017, No. 60903034, No. 60873225)+3 种基金Natural Science Foundation of Hubei Province for Distinguished Young Scholars (No. 2008CDB351)Natural Science Foundation of Hubei Province (No. 2008ABA358, No. 2008ABA379)Research Fund for the Doctoral Program of Higher Education of China (No. 20070486065)Open Foundation of State Key Laboratory of Software Engineering (No. SKLSE20080718)
文摘Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.
基金supported by the Europeans Commission s 6th Framework Programme(No.FP6-2005-IST-5-034980)National High Technology Research and Development Program of China(863 Pro-gram)(No.2007AA04Z105)National Natural Science of Foun-dation of China(No.60674080)
文摘The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enterprises'information systems.Ontology is an important tool to overcome the above mentioned syntax and semantic misunderstanding problem.Our goal is to provide a user-friendly environment supporting syntax and neutral format data model for business information.In this paper,two scenarios are discussed and a unified description of data model is developed to solve the gap in interoperation through mapping from logical data of enterprise's information system.It provides the methods to realize the mapping among different types of data or information.First,database and other types of information are transformed into neutral format that are described by web ontology language(OWL).Second,the neutral format can be mapped into the semantic entities and semantic linking through the process of extraction and annotation and added into ontology and then described in a standard format that makes the collaboration be understood easily.
基金financial support from the National Natural Science Foundation of China(Nos.61871012,62022012,U1833125,U2033215)the National Key Research and Development Program of China(Nos.2020YFB0505602,2018YFB0505105)+2 种基金the Civil Aviation Security Capacity Building Fund Project,China(Nos.CAAC Contract 2020(123),CAAC Contract 2021(77))Open Fund Project of Intelligent Operation Key Laboratory of Civil Aviation Airport Group,China(No.KLAGIO20180405)the Beijing Nova Program of Science and Technology,China(No.Z191100001119134)。
文摘Dual-Frequency Ground-Based Augmentation Systems(GBAS)can be affected by receiver Inter-Frequency Bias(IFB)when Ionosphere-Free(Ifree)smoothing is applied.In the framework of the proposed GBAS Approach Service Type F(GAST-F),the IFB in the Ifree smoothed pseudorange can be corrected.However,IFB residual uncertainty still exists,which may threaten the integrity of the system.This paper presents an improved algorithm for the airborne protection level considering the residual uncertainty of IFBs to protect the integrity of dual-frequency GBAS.The IFB residual uncertainty multiplied by a frequency factor is included in the Ifree protection level together with the uncertainty of other error sources.To verify the proposed protection level algorithm,we calculate the IFB residual uncertainties of ground reference receivers and user receiver based on BDS B1I and B3I dual-frequency observation data and carry out a test at the Dongying Airport GBAS station.The results show that the proposed Ifree protection level with IFB residual uncertainty is 1.48 times the current protection level on average.The probability of Misleading Information(MI)during the test is reduced from 3.2×10^(-4)to the required value.It is proven that the proposed protection level can significantly reduce the integrity risk brought by IFB residual uncertainty and protect the integrity of dual-frequency GBAS.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.
基金supported by the International Scientific and Technological Cooperation Project of Huangpu and Development Districts in Guangzhou(2023GH17)the National Science and Technology Council in Taiwan under grant number NSTC-113-2224-E-027-001,Private Funding(PV009-2023)the KW IPPP(Research Maintenance Fee)Individual/Centre/Group(RMF1506-2021)at Universiti Malaya,Malaysia.
文摘Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.
基金supported by the Key R&D Projects in Jiangsu Province(BE2021729)the Key Primary Research Project of Primary Strengthening Program(KYZYJKKCJC23001).
文摘Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weighted scale-free community network and susceptible-infected-recovered(SIR)model.To solve the problem of difficulty in describing the changes in the structure and collaboration mode of the system under external factors,a two-dimensional Monte Carlo method and an improved dynamic Bayesian network are used to simulate the impact of external environmental factors on multi-agent systems.A collaborative information flow path optimization algorithm for agents under environmental factors is designed based on the Dijkstra algorithm.A method for evaluating system interoperability is designed based on simulation experiments,providing reference for the construction planning and optimization of organizational application of the system.Finally,the feasibility of the method is verified through case studies.
文摘The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challenges arising from heterogeneous communication protocols,diverse data formats,and fragmented standardization efforts hinder the seamless integration of IoT systems.This paper explores the current state of IoT interoperability,analyzing key challenges,existing standardization initiatives,and emerging technological solutions.We examine the role of middleware,gateway solutions,artificial intelligence(AI),blockchain,and edge computing in facilitating interoperability.Furthermore,we provide a comparative analysis of major IoT standards and discuss the potential for greater convergence among standardization efforts.The findings highlight that while significant progress has been made,a unified and widely accepted interoperability framework remains elusive.Addressing these challenges requires collaborative efforts among industry stakeholders,researchers,and policymakers to establish robust and scalable interoperability solutions,ensuring the continued growth and efficiency of IoT ecosystems.
文摘Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositories results in increased overload due to the adoption of cloud services.Moreover,the migration of applications on the cloud with optimized resource allocation is a herculean task even though it is employed for minimizing the dilemma of allocating resources.In this paper,a Fire Hawk Optimization enabled Deep Learning Scheme(FHOEDLS)is proposed for minimizing the overload and optimizing the resource allocation on the hybrid cloud container architecture for migrating interoperability based applications This FHOEDLS achieves the load prediction through the utilization of deep CNN-GRU-AM model for attaining resource allocation and better migration of applications.It specifically adopted the Fire Hawk Optimization Algorithm(FHOA)for optimizing the parameters that influence the factors that aid in better interoperable application migration with improved resource allocation and minimized overhead.It considered the factors of resource capacity,transmission cost,demand,and predicted load into account during the formulation of the objective function utilized for resource allocation and application migration.The cloud simulation of this FHOEDLS is achieved using a container,Virtual Machine(VM),and Physical Machine(PM).The results of this proposed FHOEDLS confirmed a better resource capability of 0.418 and a minimized load of 0.0061.
基金The Natural Science Foundation of Hunan Province (No.05JJ30122),the Education Department Foundation of Hunan Prov-ince (No.05C519).
文摘In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive interfaces (SII) and service aggregative interfaces (SAI) modeled with abstract state machine (ASM) to abstractly describe the behavior of the invoked web service instances, which makes business processing accurately specify tasks and effectively solves the problems of communication and collaboration between service providers and service requesters. The mechanism also uses appropriate mediators to solve the problems of information and coinmunication incompatibility during the course of service interaction, which is convenient for service interoperability, sharing and integration. The mechanism' s working principle and interoperability implementation are illustrated by a use case in detail.
文摘通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转换,实现数据共享"这个制约GIS发展的瓶颈问题.