Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in c...Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.展开更多
Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to ful...Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to fulfill a common mission are challenged by the ever-changing battlefield and hence requires a cross-organizational process management that produces an autonomous, flexible and adaptable architecture for collaborative process evolution. The traditional business process collaboration pattern is based on the predefined "public-view" perspective and cannot meet the requirement of the joint task operations. This paper proposes a flexible visibility control mechanism and a dynamic collaboration framework for modeling and generating collaborative processes. The mechanism allows collaborators to define a set of visibility rules to generate different views of the private processes for different collaborations, which gives a great flexibility for the collaboration initiator to decide on an appropriate collaboration pattern. The framework supports collaborators to dynamically and recursively add a new process or even a new organization to an existing collaboration. Moreover, a formal representation of the processes and a set of generation algorithms are provided to consolidate the proposed theory.展开更多
The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enter...The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enterprises'information systems.Ontology is an important tool to overcome the above mentioned syntax and semantic misunderstanding problem.Our goal is to provide a user-friendly environment supporting syntax and neutral format data model for business information.In this paper,two scenarios are discussed and a unified description of data model is developed to solve the gap in interoperation through mapping from logical data of enterprise's information system.It provides the methods to realize the mapping among different types of data or information.First,database and other types of information are transformed into neutral format that are described by web ontology language(OWL).Second,the neutral format can be mapped into the semantic entities and semantic linking through the process of extraction and annotation and added into ontology and then described in a standard format that makes the collaboration be understood easily.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to syst...Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.展开更多
The metaverse is seen as the next technological revolution and tipped to generate up to$5 trillion in value by 2030,worldwide.However,many questions remain,and moving too fast could be detrimental if issues like priva...The metaverse is seen as the next technological revolution and tipped to generate up to$5 trillion in value by 2030,worldwide.However,many questions remain,and moving too fast could be detrimental if issues like privacy and interoperability are not ironed out soon.So what exactly is the metaverse and how can standards help?展开更多
The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challen...The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challenges arising from heterogeneous communication protocols,diverse data formats,and fragmented standardization efforts hinder the seamless integration of IoT systems.This paper explores the current state of IoT interoperability,analyzing key challenges,existing standardization initiatives,and emerging technological solutions.We examine the role of middleware,gateway solutions,artificial intelligence(AI),blockchain,and edge computing in facilitating interoperability.Furthermore,we provide a comparative analysis of major IoT standards and discuss the potential for greater convergence among standardization efforts.The findings highlight that while significant progress has been made,a unified and widely accepted interoperability framework remains elusive.Addressing these challenges requires collaborative efforts among industry stakeholders,researchers,and policymakers to establish robust and scalable interoperability solutions,ensuring the continued growth and efficiency of IoT ecosystems.展开更多
The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneousl...The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.展开更多
Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weight...Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weighted scale-free community network and susceptible-infected-recovered(SIR)model.To solve the problem of difficulty in describing the changes in the structure and collaboration mode of the system under external factors,a two-dimensional Monte Carlo method and an improved dynamic Bayesian network are used to simulate the impact of external environmental factors on multi-agent systems.A collaborative information flow path optimization algorithm for agents under environmental factors is designed based on the Dijkstra algorithm.A method for evaluating system interoperability is designed based on simulation experiments,providing reference for the construction planning and optimization of organizational application of the system.Finally,the feasibility of the method is verified through case studies.展开更多
Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositori...Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositories results in increased overload due to the adoption of cloud services.Moreover,the migration of applications on the cloud with optimized resource allocation is a herculean task even though it is employed for minimizing the dilemma of allocating resources.In this paper,a Fire Hawk Optimization enabled Deep Learning Scheme(FHOEDLS)is proposed for minimizing the overload and optimizing the resource allocation on the hybrid cloud container architecture for migrating interoperability based applications This FHOEDLS achieves the load prediction through the utilization of deep CNN-GRU-AM model for attaining resource allocation and better migration of applications.It specifically adopted the Fire Hawk Optimization Algorithm(FHOA)for optimizing the parameters that influence the factors that aid in better interoperable application migration with improved resource allocation and minimized overhead.It considered the factors of resource capacity,transmission cost,demand,and predicted load into account during the formulation of the objective function utilized for resource allocation and application migration.The cloud simulation of this FHOEDLS is achieved using a container,Virtual Machine(VM),and Physical Machine(PM).The results of this proposed FHOEDLS confirmed a better resource capability of 0.418 and a minimized load of 0.0061.展开更多
In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive i...In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive interfaces (SII) and service aggregative interfaces (SAI) modeled with abstract state machine (ASM) to abstractly describe the behavior of the invoked web service instances, which makes business processing accurately specify tasks and effectively solves the problems of communication and collaboration between service providers and service requesters. The mechanism also uses appropriate mediators to solve the problems of information and coinmunication incompatibility during the course of service interaction, which is convenient for service interoperability, sharing and integration. The mechanism' s working principle and interoperability implementation are illustrated by a use case in detail.展开更多
以某一地区的地形图为例,研究了基于ArcGIS数据互操作扩展模块(ArcGIS Data Interoper-ability)实现ArcGIS与AutoCAD之间空间数据共享的方法.结果表明:借助ArcGIS数据互操作扩展模块,可以不必购买和安装额外的软件、不用编程,就能方便...以某一地区的地形图为例,研究了基于ArcGIS数据互操作扩展模块(ArcGIS Data Interoper-ability)实现ArcGIS与AutoCAD之间空间数据共享的方法.结果表明:借助ArcGIS数据互操作扩展模块,可以不必购买和安装额外的软件、不用编程,就能方便地实现多种常见格式空间数据间的"无损"转换;可以将AutoCAD方便、灵活的编辑功能与ArcGIS软件强大的空间分析功能有效地结合起来,更好地满足行业GIS应用和研究的需要.展开更多
In order to realize interoperability to a large number of autonomous and heterogeneous information sources with high efficiency, an agent-based multi-broker architecture (AMA)-HustEven, is constructed. A group of br...In order to realize interoperability to a large number of autonomous and heterogeneous information sources with high efficiency, an agent-based multi-broker architecture (AMA)-HustEven, is constructed. A group of broker agents are designed to provide brokering services in a peer-to-peer (P2P) manner for the non- broker agents (user agents, resource agents, query agents). Thus, the scalability and robustness of the system are enhanced. Ontology is also used by the broker agents for facilitating interoperability among all the agents in HustEven. Unlike any other AMAs, an interdomain ontology is built in this system to represent the relationships among the common concepts in the innerdomain ontologies. Therefore, a broker forwards the queries only to the other related brokers according to the interdomain ontology and the communication overhead among the brokers is reduced. Obviously, the application of the interdomain ontology enables a broker to fully take advantage of the multi-broker architecture. The experimental results show that the HustEven performs more efficiently than any other existing systems.展开更多
To meet the challenge of implementing rapidly advanced, time-consuming medical image processing algorithms, it is necessary to develop a medical image processing technology to process a 2D or 3D medical image dynamica...To meet the challenge of implementing rapidly advanced, time-consuming medical image processing algorithms, it is necessary to develop a medical image processing technology to process a 2D or 3D medical image dynamically on the web. But in a premier system, only static image processing can be provided with the limitation of web technology. The development of Java and CORBA (common object request broker architecture) overcomes the shortcoming of the web static application and makes the dynamic processing of medical images on the web available. To develop an open solution of distributed computing, we integrate the Java, and web with the CORBA and present a web-based medical image dynamic processing methed, which adopts Java technology as the language to program application and components of the web and utilies the CORBA architecture to cope with heterogeneous property of a complex distributed system. The method also provides a platform-independent, transparent processing architecture to implement the advanced image routines and enable users to access large dataset and resources according to the requirements of medical applications. The experiment in this paper shows that the medical image dynamic processing method implemented on the web by using Java and the CORBA is feasible.展开更多
The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reas...The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.展开更多
通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转...通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转换,实现数据共享"这个制约GIS发展的瓶颈问题.展开更多
A modified Benes network is proposed to be used as an optimal shuffle network in worldwide interoperability for microwave access (WiMAX) low density parity check (LDPC) decoders, When the size of the input is not ...A modified Benes network is proposed to be used as an optimal shuffle network in worldwide interoperability for microwave access (WiMAX) low density parity check (LDPC) decoders, When the size of the input is not a power of two, the modified Benes network can achieve the most optimal performance. This modified Benes network is non-blocking and can perform any sorts of permutations, so it can support 19 modes specified in the WiMAX system. Furthermore, an efficient algorithm to generate the control signals for all the 2 × 2 switches in this network is derived, which can reduce the hardware complexity and overall latency of the modified Benes network. Synthesis results show that the proposed control signal generator can save 25.4% chip area and the overall network latency can be reduced by 36. 2%.展开更多
This paper highlights the role of automation technologies for improving the safety, productivity, and environmental sustainability of underground coal mining processes. This is accomplished by reviewing the impact tha...This paper highlights the role of automation technologies for improving the safety, productivity, and environmental sustainability of underground coal mining processes. This is accomplished by reviewing the impact that the introduction of automation technology has made through the longwall shearer automation research program of Longwall Automation Steering Committee(LASC). This result has been achieved through close integration of sensing, processing, and control technologies into the longwall mining process. Key to the success of the automation solution has been the development of new sensing methods to accurately measure the location of longwall equipment and the spatial configuration of coal seam geology. The relevance of system interoperability and open communications standards for facilitating effective automation is also discussed. Importantly, the insights gained through the longwall automation development process are now leading to new technology transfer activity to benefit other underground mining processes.展开更多
基金supported by National Basic Research Program of China (973 Program) (No. 2007CB310801)National Natural Science Foundation of China (No. 60873083, No. 60803025, No. 60970017, No. 60903034, No. 60873225)+3 种基金Natural Science Foundation of Hubei Province for Distinguished Young Scholars (No. 2008CDB351)Natural Science Foundation of Hubei Province (No. 2008ABA358, No. 2008ABA379)Research Fund for the Doctoral Program of Higher Education of China (No. 20070486065)Open Foundation of State Key Laboratory of Software Engineering (No. SKLSE20080718)
文摘Cloud computing can be realized by service interoperation and its essence is to provide cloud services through network. The development of effective methods to assure the trustworthiness of service interoperation in cloud environment is a very important problem. The essence of cloud security is trust and trust management. Combining quality of service (QoS) with trust model, this paper constructs a QoS-aware and quantitative trust-model that consists of initial trust value, direct trust value, and recommendatory trust value of service, making the provision, discovery, and aggregation of cloud services trustworthy. Hence, it can assure trustworthiness of service interoperation between users and services or among services in cloud environment. At the same time, based on this model, service discovery method based on QoS-aware and quantitative trust-model (TQoS-WSD) is proposed, which makes a solid trust relationship among service requestor, service provider and service recommender, and users can find trustworthy service whose total evaluation value is higher. Corapared to QoS-based service discovery (QoS-WSD) method, it is proved by the experiment for TQoS-WSD method that more accurate result of service discovery will be achieved by service requestor, while reasonable time cost is increased. Meanwhile, TQoS-WSD method strongly resists the effect of service discovery by untrustworthy QoS values and improves service invocation success-rate and thus assures trustworthiness of services interoperation.
基金supported by the National Natural Science Foundation of China(61273210)the National High Technology Research and Development Program of China(863 Program)(2007AA01Z126)
文摘Interoperability plays an important role in the joint command, control, communication, computer, intelligence, surveillance, reconnaissance(C4 ISR) operations. Coordinating and integrating operational processes to fulfill a common mission are challenged by the ever-changing battlefield and hence requires a cross-organizational process management that produces an autonomous, flexible and adaptable architecture for collaborative process evolution. The traditional business process collaboration pattern is based on the predefined "public-view" perspective and cannot meet the requirement of the joint task operations. This paper proposes a flexible visibility control mechanism and a dynamic collaboration framework for modeling and generating collaborative processes. The mechanism allows collaborators to define a set of visibility rules to generate different views of the private processes for different collaborations, which gives a great flexibility for the collaboration initiator to decide on an appropriate collaboration pattern. The framework supports collaborators to dynamically and recursively add a new process or even a new organization to an existing collaboration. Moreover, a formal representation of the processes and a set of generation algorithms are provided to consolidate the proposed theory.
基金supported by the Europeans Commission s 6th Framework Programme(No.FP6-2005-IST-5-034980)National High Technology Research and Development Program of China(863 Pro-gram)(No.2007AA04Z105)National Natural Science of Foun-dation of China(No.60674080)
文摘The interoperation among enterprises in e-business could block the ambient semantic collaboration and cause a big problem since varying information descriptions and different data models may be used in different enterprises'information systems.Ontology is an important tool to overcome the above mentioned syntax and semantic misunderstanding problem.Our goal is to provide a user-friendly environment supporting syntax and neutral format data model for business information.In this paper,two scenarios are discussed and a unified description of data model is developed to solve the gap in interoperation through mapping from logical data of enterprise's information system.It provides the methods to realize the mapping among different types of data or information.First,database and other types of information are transformed into neutral format that are described by web ontology language(OWL).Second,the neutral format can be mapped into the semantic entities and semantic linking through the process of extraction and annotation and added into ontology and then described in a standard format that makes the collaboration be understood easily.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.
基金supported by the International Scientific and Technological Cooperation Project of Huangpu and Development Districts in Guangzhou(2023GH17)the National Science and Technology Council in Taiwan under grant number NSTC-113-2224-E-027-001,Private Funding(PV009-2023)the KW IPPP(Research Maintenance Fee)Individual/Centre/Group(RMF1506-2021)at Universiti Malaya,Malaysia.
文摘Blockchain interoperability enables seamless communication and asset transfer across isolated permissioned blockchain systems,but it introduces significant security and privacy vulnerabilities.This review aims to systematically assess the security and privacy landscape of interoperability protocols for permissioned blockchains,identifying key properties,attack vectors,and countermeasures.Using PRISMA 2020 guidelines,we analysed 56 peerreviewed studies published between 2020 and 2025,retrieved from Scopus,ScienceDirect,Web of Science,and IEEE Xplore.The review focused on interoperability protocols for permissioned blockchains with security and privacy analyses,including only English-language journal articles and conference proceedings.Risk of bias in the included studies was assessed using the MMAT.Methods for presenting and synthesizing results included descriptive analysis,bibliometric analysis,and content analysis,with findings organized into tables,charts,and comparative summaries.The review classifies interoperability protocols into relay,sidechain,notary scheme,HTLC,and hybrid types and identifies 18 security and privacy properties along with 31 known attack types.Relay-based protocols showed the broadest security coverage,while HTLC and notary schemes demonstrated significant security gaps.Notably,93% of studies examined fewer than four properties or attack types,indicating a fragmented research landscape.The review identifies underexplored areas such as ACID properties,decentralization,and cross-chain attack resilience.It further highlights effective countermeasures,including cryptographic techniques,trusted execution environments,zero-knowledge proofs,and decentralized identity schemes.The findings suggest that despite growing adoption,current interoperability protocols lack comprehensive security evaluations.More holistic research is needed to ensure the resilience,trustworthiness,and scalability of cross-chain operations in permissioned blockchain ecosystems.
文摘The metaverse is seen as the next technological revolution and tipped to generate up to$5 trillion in value by 2030,worldwide.However,many questions remain,and moving too fast could be detrimental if issues like privacy and interoperability are not ironed out soon.So what exactly is the metaverse and how can standards help?
文摘The rapid advancement of the Internet of Things(IoT)has led to the proliferation of connected devices across various domains,including smart cities,industrial automation,and healthcare.However,interoperability challenges arising from heterogeneous communication protocols,diverse data formats,and fragmented standardization efforts hinder the seamless integration of IoT systems.This paper explores the current state of IoT interoperability,analyzing key challenges,existing standardization initiatives,and emerging technological solutions.We examine the role of middleware,gateway solutions,artificial intelligence(AI),blockchain,and edge computing in facilitating interoperability.Furthermore,we provide a comparative analysis of major IoT standards and discuss the potential for greater convergence among standardization efforts.The findings highlight that while significant progress has been made,a unified and widely accepted interoperability framework remains elusive.Addressing these challenges requires collaborative efforts among industry stakeholders,researchers,and policymakers to establish robust and scalable interoperability solutions,ensuring the continued growth and efficiency of IoT ecosystems.
文摘The blockchain trilemma—balancing decentralization,security,and scalability—remains a critical challenge in distributed ledger technology.Despite significant advancements,achieving all three attributes simultaneously continues to elude most blockchain systems,often forcing trade-offs that limit their real-world applicability.This review paper synthesizes current research efforts aimed at resolving the trilemma,focusing on innovative consensus mechanisms,sharding techniques,layer-2 protocols,and hybrid architectural models.We critically analyze recent breakthroughs,including Directed Acyclic Graph(DAG)-based structures,cross-chain interoperability frameworks,and zero-knowledge proof(ZKP)enhancements,which aimto reconcile scalability with robust security and decentralization.Furthermore,we evaluate the trade-offs inherent in these approaches,highlighting their practical implications for enterprise adoption,decentralized finance(DeFi),and Web3 ecosystems.By mapping the evolving landscape of solutions,this review identifies gaps in currentmethodologies and proposes future research directions,such as adaptive consensus algorithms and artificial intelligence-driven(AI-driven)governance models.Our analysis underscores that while no universal solution exists,interdisciplinary innovations are progressively narrowing the trilemma’s constraints,paving the way for next-generation blockchain infrastructures.
基金supported by the Key R&D Projects in Jiangsu Province(BE2021729)the Key Primary Research Project of Primary Strengthening Program(KYZYJKKCJC23001).
文摘Multi-agent systems often require good interoperability in the process of completing their assigned tasks.This paper first models the static structure and dynamic behavior of multiagent systems based on layered weighted scale-free community network and susceptible-infected-recovered(SIR)model.To solve the problem of difficulty in describing the changes in the structure and collaboration mode of the system under external factors,a two-dimensional Monte Carlo method and an improved dynamic Bayesian network are used to simulate the impact of external environmental factors on multi-agent systems.A collaborative information flow path optimization algorithm for agents under environmental factors is designed based on the Dijkstra algorithm.A method for evaluating system interoperability is designed based on simulation experiments,providing reference for the construction planning and optimization of organizational application of the system.Finally,the feasibility of the method is verified through case studies.
文摘Virtualization is an indispensable part of the cloud for the objective of deploying different virtual servers over the same physical layer.However,the increase in the number of applications executing on the repositories results in increased overload due to the adoption of cloud services.Moreover,the migration of applications on the cloud with optimized resource allocation is a herculean task even though it is employed for minimizing the dilemma of allocating resources.In this paper,a Fire Hawk Optimization enabled Deep Learning Scheme(FHOEDLS)is proposed for minimizing the overload and optimizing the resource allocation on the hybrid cloud container architecture for migrating interoperability based applications This FHOEDLS achieves the load prediction through the utilization of deep CNN-GRU-AM model for attaining resource allocation and better migration of applications.It specifically adopted the Fire Hawk Optimization Algorithm(FHOA)for optimizing the parameters that influence the factors that aid in better interoperable application migration with improved resource allocation and minimized overhead.It considered the factors of resource capacity,transmission cost,demand,and predicted load into account during the formulation of the objective function utilized for resource allocation and application migration.The cloud simulation of this FHOEDLS is achieved using a container,Virtual Machine(VM),and Physical Machine(PM).The results of this proposed FHOEDLS confirmed a better resource capability of 0.418 and a minimized load of 0.0061.
基金The Natural Science Foundation of Hunan Province (No.05JJ30122),the Education Department Foundation of Hunan Prov-ince (No.05C519).
文摘In order to fully realize semantic interoperability among distributed and heterogeneous applications on the web, a set of effective interoperability mechanisms is presented. This mechanism adopts service interactive interfaces (SII) and service aggregative interfaces (SAI) modeled with abstract state machine (ASM) to abstractly describe the behavior of the invoked web service instances, which makes business processing accurately specify tasks and effectively solves the problems of communication and collaboration between service providers and service requesters. The mechanism also uses appropriate mediators to solve the problems of information and coinmunication incompatibility during the course of service interaction, which is convenient for service interoperability, sharing and integration. The mechanism' s working principle and interoperability implementation are illustrated by a use case in detail.
文摘以某一地区的地形图为例,研究了基于ArcGIS数据互操作扩展模块(ArcGIS Data Interoper-ability)实现ArcGIS与AutoCAD之间空间数据共享的方法.结果表明:借助ArcGIS数据互操作扩展模块,可以不必购买和安装额外的软件、不用编程,就能方便地实现多种常见格式空间数据间的"无损"转换;可以将AutoCAD方便、灵活的编辑功能与ArcGIS软件强大的空间分析功能有效地结合起来,更好地满足行业GIS应用和研究的需要.
基金The National Natural Science Foundation of China(No60673128)
文摘In order to realize interoperability to a large number of autonomous and heterogeneous information sources with high efficiency, an agent-based multi-broker architecture (AMA)-HustEven, is constructed. A group of broker agents are designed to provide brokering services in a peer-to-peer (P2P) manner for the non- broker agents (user agents, resource agents, query agents). Thus, the scalability and robustness of the system are enhanced. Ontology is also used by the broker agents for facilitating interoperability among all the agents in HustEven. Unlike any other AMAs, an interdomain ontology is built in this system to represent the relationships among the common concepts in the innerdomain ontologies. Therefore, a broker forwards the queries only to the other related brokers according to the interdomain ontology and the communication overhead among the brokers is reduced. Obviously, the application of the interdomain ontology enables a broker to fully take advantage of the multi-broker architecture. The experimental results show that the HustEven performs more efficiently than any other existing systems.
基金This project was supported by the National Natural Science Foundation of China (69931010).
文摘To meet the challenge of implementing rapidly advanced, time-consuming medical image processing algorithms, it is necessary to develop a medical image processing technology to process a 2D or 3D medical image dynamically on the web. But in a premier system, only static image processing can be provided with the limitation of web technology. The development of Java and CORBA (common object request broker architecture) overcomes the shortcoming of the web static application and makes the dynamic processing of medical images on the web available. To develop an open solution of distributed computing, we integrate the Java, and web with the CORBA and present a web-based medical image dynamic processing methed, which adopts Java technology as the language to program application and components of the web and utilies the CORBA architecture to cope with heterogeneous property of a complex distributed system. The method also provides a platform-independent, transparent processing architecture to implement the advanced image routines and enable users to access large dataset and resources according to the requirements of medical applications. The experiment in this paper shows that the medical image dynamic processing method implemented on the web by using Java and the CORBA is feasible.
文摘The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm.
文摘通过分析AutoCAD和ArcGIS的数据结构,提出了如何利用ArcGIS Data Interoper-ability实现CAD数据与GIS数据的语义转换.采用这种方法进行数据转换,可以在数据转换过程中重构数据实体,能够有效地解决"如何实现数据在不同平台之间的转换,实现数据共享"这个制约GIS发展的瓶颈问题.
基金The National Natural Science Foundation of China(No.60871079)
文摘A modified Benes network is proposed to be used as an optimal shuffle network in worldwide interoperability for microwave access (WiMAX) low density parity check (LDPC) decoders, When the size of the input is not a power of two, the modified Benes network can achieve the most optimal performance. This modified Benes network is non-blocking and can perform any sorts of permutations, so it can support 19 modes specified in the WiMAX system. Furthermore, an efficient algorithm to generate the control signals for all the 2 × 2 switches in this network is derived, which can reduce the hardware complexity and overall latency of the modified Benes network. Synthesis results show that the proposed control signal generator can save 25.4% chip area and the overall network latency can be reduced by 36. 2%.
文摘This paper highlights the role of automation technologies for improving the safety, productivity, and environmental sustainability of underground coal mining processes. This is accomplished by reviewing the impact that the introduction of automation technology has made through the longwall shearer automation research program of Longwall Automation Steering Committee(LASC). This result has been achieved through close integration of sensing, processing, and control technologies into the longwall mining process. Key to the success of the automation solution has been the development of new sensing methods to accurately measure the location of longwall equipment and the spatial configuration of coal seam geology. The relevance of system interoperability and open communications standards for facilitating effective automation is also discussed. Importantly, the insights gained through the longwall automation development process are now leading to new technology transfer activity to benefit other underground mining processes.