Skip to main content
Log in

A service composition approach based on sequence mining for migrating e-learning legacy system to SOA

  • Published:
International Journal of Automation and Computing Aims and scope Submit manuscript

Abstract

With the fast development of business logic and information technology, today’s best solutions are tomorrow’s legacy systems. In China, the situation in the education domain follows the same path. Currently, there exists a number of e-learning legacy assets with accumulated practical business experience, such as program resource, usage behaviour data resource, and so on. In order to use these legacy assets adequately and efficiently, we should not only utilize the explicit assets but also discover the hidden assets. The usage behaviour data resource is the set of practical operation sequences requested by all users. The hidden patterns in this data resource will provide users’ practical experiences, which can benefit the service composition in service-oriented architecture (SOA) migration. Namely, these discovered patterns will be the candidate composite services (coarse-grained) in SOA systems. Although data mining techniques have been used for software engineering tasks, little is known about how they can be used for service composition of migrating an e-learning legacy system (MELS) to SOA. In this paper, we propose a service composition approach based on sequence mining techniques for MELS. Composite services found by this approach will be the complementation of business logic analysis results of MELS. The core of this approach is to develop an appropriate sequence mining algorithm for mining related data collected from an e-learning legacy system. According to the features of execution trace data on usage behaviour from this e-learning legacy system and needs of further pattern analysis, we propose a sequential mining algorithm to mine this kind of data of the legacy system. For validation, this approach has been applied to the corresponding real data, which was collected from the e-learning legacy system; meanwhile, some investigation questionnaires were set up to collect satisfaction data. The investigation result is 90% the same with the result obtained through our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. K. Bennett. Legacy systems: Copying with success. IEEE Software, vol. 12, no. 1, pp. 19–23, 1995.

    Article  Google Scholar 

  2. A. Brown, S. Johnston, K. Kelly. Using Service-oriented Architecture and Component-based Development to Build Web Service Applications, A Rational Software White Paper, Rational Software Corporation, pp. 11–15, 2002.

  3. T. Xie, A. E. Hassan. Mining software engineering data. [Online], Available: http://ase.csc.ncsu.edu/dmse/dmseicse07-tutorial.ppt#256, August 30, 2008.

  4. Z. Zhang, H. Yang. Incubating services in legacy systems for architectural migration. In Proceedings of the 11th Asia-Pacific Software Engineering Conference, IEEE, pp. 196–203, 2004.

  5. S. Inaganti, G. K. Behara. Service identification: BPM and SOA handshake. [Online], Available: http://www.bptrends.com, March 2007.

  6. G. Canfora, A. R. Fasolino, G. Frattolillo, P. Tramontana. A wrapping approach for migrating legacy system interactive functionalities to service oriented architectures. Journal of Systems and Software, vol. 81, no. 4, pp. 463–480, 2008.

    Article  Google Scholar 

  7. D. S. Linthicum. Next Generation Application Integration: From Simple Information to Web Services, Addison Wesley Press, 2003.

  8. M. Mattson. Evolution and Composition of Object-oriented Frameworks, Kaserntryckeriet AB, Karlskrona, Sweden, 2000.

    Google Scholar 

  9. W. H. Hu, W. Zhao, S. K. Zhang. Study of application framework meta-model based on component technology. Journal of Software, vol. 15, no. 1, pp. 1–8, 2004. (in Chinese)

    MATH  Google Scholar 

  10. A. Papkov. Develop a migration strategy from a legacy enterprise IT infrastructure to an SOA-based enterprise architecture. IBM Developer Works, [Online], Available: http://www.ibm.com/developerworks/library/ws-migrate2soa/index.html?S_TACT=105AGX20&S_CMP=EDU, november, 2007.

  11. J. Hanson. Coarse-grained interfaces enable service composition in SOA. JavaOne, [Online], Available: http://articles.techrepublic.com.com/5100-10878_11-5064520.html August 29, 2003.

  12. S. G. Deng, J. Wu, Y. Li, Z. H. Wu. Automatic web service composition based on backward tree. Journal of Software, vol. 18, no. 8, pp. 1896–1910, 2007.

    Article  Google Scholar 

  13. M. DiBernardo, R. Pottinger, M. Wilkinson. Semiautomatic web service composition for the life sciences using the BioMoby semantic web framework. Journal of Biomedical Informatics, vol. 41, no. 5, pp. 837–847, 2008.

    Article  Google Scholar 

  14. Z. Maamar, D. Benslimane, P. Thiran, C. Ghedira, S. Dustdar, S. Sattanathan. Towards a context-based multi-type policy approach for Web services composition. Data and Knowledge Engineering, vol. 62, no. 2, pp. 327–351, 2007.

    Article  Google Scholar 

  15. J. Z. Li, Z. P. Zhang, B. Qiao, H. J. Yang. A component mining approach to incubate grid services in object-oriented legacy systems. International Journal of Automation and Computing, vol. 3, no. 1, pp. 47–55, 2006.

    Article  MATH  Google Scholar 

  16. J. Han, M. Kamber. Data Mining: Concepts and Techniques, China Machine Press, 2006.

  17. M. Mendonca, N. L. Sunderhaft. Mining Software Engineering Data: A Survey, A DACS State-of-the-Art Report, no. SPO700-98-D-4000, Data & Analysis Center for Software, 1999.

  18. T. Eisenbarth, R. Koschke, G. Vogel. Static trace extraction. In Proceedings of IEEE Working Conference on Reverse Engineering, IEEE, Richmond, VA, USA, pp. 128–137, 2002.

    Google Scholar 

  19. A. Zaidman, T. Calders, S. Demeyer, J. Paredaens. Applying webmining techniques to execution traces to support the program comprehension process. In Proceedings of the 9th European Conference on Software Maintenance and Reengineering, IEEE, pp. 134–142, 2005.

  20. G. Antoniol, M. D. Penta. A distributed architecture for dynamic analyses on user-profile data. In Proceedings of the 8th European Conference on Software Maintenance and Reengineering, IEEE, Tampere, Finland, pp. 319–328, 2004.

    Google Scholar 

  21. A. Hamou-Lhadj, T. C. Lethbridge. Compression techniques to simplify the analysis of large execution traces. In Proceedings of the 10th International Workshop on Program Comprehension, IEEE, Paris, France, pp. 159–168, 2002.

    Chapter  Google Scholar 

  22. G. Antoniol, M. D. Penta. Library miniaturization using static and dynamic information. In Proceedings of IEEE International Conference on Software Maintenance, IEEE, Amsterdam, The Netherlands, pp. 235–244, 2003.

    Google Scholar 

  23. G. Antoniol, M. D. Penta, M. Neteler. Moving to smaller libraries via clustering and genetic algorithms. In Proceedings of the 7th European Conference on Software Maintenance and Reengineering, Benevento, Italy, pp. 307–316, 2003.

  24. T. Xie. Mining software engineering data bibliography. [Online], Available: http://ase.csc.ncsu.edu/dmse/setasks, October, 2008.

  25. R. Agrawal, R. Srikant. IBM Research Report RJ9910: Mining Sequential Patterns, IBM Research Division, Almaden research center, CA, USA, 1994.

    Google Scholar 

  26. R. Srikant. Fast algorithms for Mining Association Rules and Sequential Patterns, Madison, USA: University of Wisconsin, 1996.

    Google Scholar 

  27. R. Srikant, R. Agrawal. Mining sequential patterns: Generalizations and performance improvements. In Proceedings of the 5th International Conference on Extending Database Technology, Lecture Notes in Computer Science, Springer, vol. 1057, pp. 1–17, 1996.

    Google Scholar 

  28. M. El-Ramly, E. Stroulia, P. Sorenson. From run-time behaviour to usage scenarios: An interaction-pattern mining approach. In Proceedings of the 8th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 315–324, 2002.

  29. A. Hamou-Lhadj, T. C. Lethbridge. An efficient algorithm for detecting patterns in traces of procedure calls. In Proceedings of ICSE Workshop on Dynamic Analysis, Portland, OR, USA, pp. 33–36, 2003.

  30. T. Denmat, M. Ducassé, O. Ridoux. Data mining and crosschecking of execution traces: A re-interpretation of Jones, Harrold and Stasko test information visualization. In Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering, ACM, Long Beach, California, USA, pp. 396–399, 2005.

    Chapter  Google Scholar 

  31. M. Christodorescu, S. Jha, C. Kruegel. Mining specifications of malicious behaviour. In Proceedings of the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ACM, Dubrovnik, Croatia, pp. 5–14, 2007.

    Google Scholar 

  32. S. Thummalapenta, T. Xie. PARSEWeb: A programmer assistant for reusing open source code on the web. In Proceedings of the 22nd IEEE/ACM International Conference on Automated Software Engineering, ACM, Atlanta, Georgia, USA, pp. 204–213, 2007.

    Google Scholar 

  33. C. Kim, J. H. Lim, R. T. Ng, K. Shim. SQUIRE: Sequential pattern mining with quantities. Journal of Systems and Software, vol. 80, no. 10, pp. 1726–1745, 2007.

    Article  Google Scholar 

  34. Y. L. Chen, T. C. K. Huang. A new approach for discovering fuzzy quantitative sequential patterns in sequence databases. Fuzzy Sets and Systems, vol. 157, no. 12, pp. 1641–1661, 2006.

    Article  MATH  MathSciNet  Google Scholar 

  35. Y. L. Chen, T. C. K. Huang. A novel knowledge discovering model for mining fuzzy multi-level sequential patterns in sequence databases. Data & Knowledge Engineering, vol. 66, no. 3, pp. 349–367, 2008.

    Article  Google Scholar 

  36. Z. Zhang, L. Zhang, S. Zhong, J. Guan. A new algorithm for mining sequential patterns. In Proceedings of the 5th International Conference on Fuzzy Systems and Knowledge Discovery, IEEE, Jinan, PRC, pp. 625–629, 2008.

    Chapter  Google Scholar 

  37. Z. Zhang, L. Zhang, S. Zhong, J. Guan. Improving algorithm Apriori for data mining. In Proceedings of the 8th International FLINs Conference on Computational Intelligence in Decision and Control, Madrid, Spain, pp. 17–22, 2008.

  38. Ideal Information Technology Institute of Northeast Normal University in China, [Online], Available: http://www.dsideal.net/.

  39. NorthEast Normal University (NENU) in China, [Online], Available: http://www.nenu.edu.cn/.

  40. D. Zhou, Z. Zhang, S. Zhong, P. Xie. The design of software architecture for e-learning platforms. In Proceedings of the 3rd International Conference on E-learning and Games, Lecture Notes in Computer Science, Springer, Nanjing, PRC, vol. 5093, pp. 32–40, 2008.

  41. S. Zhong, J. Li, Z. Zhang, Y. Zhong, J. Shang. Methods on educational resource development and application. In Proceedings of the 3rd International Conference on E-learning and Games, Lecture Notes in Computer Science, Springer, Nanjing, PRC, vol. 5093, pp. 290–301, 2008.

  42. C. W. Dai, S. H. Yang, R. Knott. Data transfer over the Internet for real time applications. International Journal of Automation and Computing, vol. 3, no. 4, pp. 414–424, 2006.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shao-Chun Zhong.

Additional information

The work was supported by E-learning Platform, National Torch Project (No. z20040010)

Zhuo Zhang graduated from Jilin University, PRC in 1986. She received the M. Sc. degree from Jilin University, PRC in 1999, and from Montreal University, Canada in 2003. She is currently a professor at Software School in Northeast Normal University, PRC and a Ph.D. candidate of De Montfort University, UK.

Her research interests include data mining, software architecture, and intelligent tutoring, especially the service-oriented architecture (SOA) migration from the legacy systems such as migrating the educational software to SOA.

Dong-Dai Zhou graduated from Changchun University of Science and Technology (CUST), PRC in 1992. He received the M. Sc. degree from CUST in 1997 and the Ph. D. degree from the Jilin University, PRC in 2001. He is currently a professor at School of Software, Northeast Normal University, PRC.

His research interests include software architecture and software code autogeneration, especially the architecture design and codeless development of e-learning software.

Hong-Ji Yang received the B. Sc. and M.Phil. degrees from Jilin University in 1982 and 1985, respectively, and the Ph.D. degree from Durham University, UK in 1994. Currently, he is a professor at the Software Technology Research Laboratory, Faculty of Technology, De Montfort University, UK and leads the Software Evolution and Reengineering Group. He served as a program co-chair at IEEE International Conference on Software Maintenance in 1999 and the program chair at IEEE Computer Software and Application Conference in 2002.

His research interests include software engineering and pervasive computing.

Shao-Chun Zhong graduated from Northeast Dianli University, PRC in 1982. He received the M. Sc. degree from Jilin University, PRC in 1989 and the Ph.D. degree from Jilin University, PRC in 1994.

He is a professor at the Northeast Normal University, PRC and he is the director of Engineering Research Center of e-learning Technologies, Ministry of Education, PRC. His research interests include artificial intelligence, intelligent tutoring, and education technology.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, Z., Zhou, DD., Yang, HJ. et al. A service composition approach based on sequence mining for migrating e-learning legacy system to SOA. Int. J. Autom. Comput. 7, 584–595 (2010). https://doi.org/10.1007/s11633-010-0544-2

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11633-010-0544-2

Keywords

Navigation