DOI QR코드

DOI QR Code

The Design of an Extended Complex Event Model based on Event Correlation using Aspect Oriented Programming

  • Kum, Deuk-Kyu (Dept. of Information Technology, Yuhan University)
  • Received : 2017.09.25
  • Accepted : 2017.10.21
  • Published : 2017.10.31

Abstract

In recent through development of IOT owing to that mass stream data is being generated in variety of application complex event processing technology is being watched with keen interest as a technology to analyze this kind of real-time continuous data. However, the existing study related with complex event processing only comes to an end at simple event processing based on low-level event or comes to an end at service defect discovery with providing limited operator and so on. Accordingly, there would be limitation to provide useful analysis information. In this paper in consideration of complex event along with aspect-oriented programming an extended complex event model is provided, which is possible to provide more valuable and useful information. Specifically, we extend the model to support hierarchical event structures and let the model recognize point-cuts of aspect-oriented programming as events. We provide the event operators designed to specify the events on instances and handle temporal relations of the instances. It is presented that syntax and semantics of constructs in our event processing language including various and progressive event operators, complex event pattern, etc. In addition, an event context mechanism is proposed to analyze more delicate events. Finally, through application studies application possibility of this study would be shown and merits of this event model would be present through comparison with other event model.

Keywords

References

  1. N. Y. Lee and C. R. Litecky, "An empirical study of software reuse with Special Attention to Ada," IEEE Trans. on Software Engineering, Vol. 23, No. 9, pp. 537-549, September 1997. https://doi.org/10.1109/32.629492
  2. K. M. Chandy, "Event-Driven Applications: Costs, Benefits and Design Approaches," California Institute of Technology, November 2006.
  3. K. M. Chandy, S. Ramo and W. R. Schulte, "What is Event Driven Architecture (EDA) and Why Does it Matter?," Gartner Inc., March 2007.
  4. S. Chakravarthy et al., "Composite Events forActive Databases: Semantics, Contexts and Detection," In Proc. of the International Conference on Very Large Data Bases (VLDB), Vol. 9, No. 6, pp. 606-617, September 1994.
  5. G. Liu et al., "Composite Events for Network Event Correlation," Proc. of the IFIP/IEEE Symposium on Integrated Network Management, May 1999.
  6. U. Dayal et al., "The HiPAC Project: Combining Active Databases and Timing Constraints," ACM SIGMOD RECORD, Vol. 17, No. 1, pp. 51-70, March 1988. https://doi.org/10.1145/44203.44208
  7. G. Kiczales et al., "Aspect-oriented programming," In Proc. of the European Conference on Object-Oriented Programming (ECOOP), Vol. 1241, No 1, pp. 220-242, June 1997.
  8. C. McGregor and J. Schiefer, "A web-Service based framework for analyzing and measuring business performance," Information Systems and e-Business Management, Vol. 2, No 1, pp. 89-110, Springer, 2004.
  9. D. Luckham and B. Frasca, "Complex Event Processing in Distributed System," Stanford University Tech, Report CSL-TR-98-754, Mar, 1998.
  10. D. Wang et al., "Utility-maximizing event stream suppression," In Proc. of 2013 ACM SIGMOD International Conference on Management of Data, pp. 589-600, June 2013.
  11. A. K. Mok and G. Liu, "Efficient Runtime Monitoring of Timing Constraints," In Proc. of the IEEE Real-Time Technology and Applications Symposium (RTAS), 1997.
  12. N. W. Paton and O. Diaz, "Active Database Systems," ACM Computing Surveys, 31(1), 1999.
  13. A. K. Mok et al., "Specifying Timing Constraints and Composite Events: An Application in the Design of Electronic Brokerages," IEEE Transactions on Software Engineering, Vol. 30, No. 12, pp. 841-858, Dec 2004. https://doi.org/10.1109/TSE.2004.105
  14. C. G. Lee et al., "Monitoring of Timing Constraints with Confidence Threshold Requirements," IEEE Transactions on Computers, Vol. 56, No. 7, pp. 606-617, May 2007. https://doi.org/10.1109/TC.2007.1040
  15. uEngine BPM, http://uengine.org/