Journal of Zhejiang University-SCIENCE A

, Volume 4, Issue 5, pp 542–548 | Cite as

Distributed heterogeneous inspecting system and its middleware-based solution

  • Huang Li-can
  • Wu Zhao-hui
  • Pan Yun-he
Electronics & Information Technology


There are many cases when an organization needs to monitor the data and operations of its supervised departments, especially those departments which are not owned by this organization and are managed by their own information systems. Distributed Heterogeneous Inspecting System (DHIS) is the system an organization uses to monitor its supervised departments by inspecting their information systems. In DHIS, the inspected systems are generally distributed, heterogeneous, and constructed by different companies. DHIS has three key processes-abstracting core data sets and core operation sets, collecting these sets, and inspecting these collected sets. In this paper, we present the concept and mathematical definition of DHIS, a metadata method for solving the interoperability, a security strategy for data transferring, and a middleware-based solution of DHIS. We also describe an example of the inspecting system at WENZHOU custom.

Key words

Distributed computing Middleware Heterogeneous systems 

Document code

CLC number



Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. BEA Systems, Inc., 1997. Introduction to message queuing, Scholar
  2. Case, J., Mundy, R., Partain, D. and Stewart, B., 1999. Introduction to Version 3 of the Internet-Standard Network Management Framework. Internet Engineering Task Force RFC 2570.Google Scholar
  3. Chiang, C. C., 2001. Wrapping legacy systems for use in heterogeneous computing environments.Information and Software Technology,43: 497–507.CrossRefGoogle Scholar
  4. Huang, L. C. and Wu, Z. H., 2001. An SC-SS Interconnected Protocol between Heterogeneous and Distributed Monitoring and Controlling Systems.In: The Proceedings of the Sixth International Conference for Young Computer Scientist ICYCS2001, International Academic Publishers, p. 188–192.Google Scholar
  5. Huang, L. C. and Wu, Z. H., 2002. The Architecture of Centralized Monitoring and Controlling System and its High-Performance and Interoperability Protocol.In: The Proceedings of the International Conference of Telecommunication ICT 2002, VOL (3), p. 117–123.Google Scholar
  6. ITU-T, 1998a. Information Technology—Abstract Syntax Notation One (ASN.1): Specification of Basic Notation. International Standard ITU-T Rec. X. 680, 1997/ISO/IEC 8824-1, 1998.Google Scholar
  7. ITU-T, 1998b. Information Technology—ASN. 1 Encoding Rules: Specification of Packed Encoding Rules (PER). International Standard ITU-T Rec. X. 691, 1997/ISO/IEC 8825-2, 1998.Google Scholar
  8. Object Management Group, 1998. CORBA 2.2. Specification. Scholar
  9. Platt, S. D., 1999. Understanding COM+. Microsoft Press.Google Scholar
  10. Richard, M. H., 1998. Enterprise JavaBeans. O'Reilly & Associates, Inc.Google Scholar
  11. Sidnie, M. F., 1995. SNMP: A Guide to Network Management., New York: McGraw-Hill, Sneed M. H., 1996. Encapsulating Legacy Systems for Use in Client/Server Systems.In: Proceedings of WCRE'96, IEEE Press, New York.Google Scholar
  12. Sneed, M. H., 1996. Encapsulating Legacy Systems for Use in Client/Server Systems.In: Proceedings of WCRE' 96, IEEE Press, New York.Google Scholar
  13. Stanford Medical Informatics, 2000. Protégé-2000. http://protege. stanford. edu/.Google Scholar

Copyright information

© Zhejiang University Press 2003

Authors and Affiliations

  • Huang Li-can
    • 1
  • Wu Zhao-hui
    • 1
  • Pan Yun-he
    • 1
  1. 1.College of Computer ScienceZhejiang UniversityHangzhouChina

Personalised recommendations