SlideShare a Scribd company logo
1 of 25
Download to read offline
OOccttoobbeerr 22002200:: TToopp RReeaadd
AArrttiicclleess iinn WWeebb SSeerrvviiccee
CCoommppuuttiinngg
International Journal on Web Service Computing
(IJWSC)
ISSN : 0976 - 9811 (Online) ; 2230 - 7702 (print)
http://airccse.org/journal/jwsc/ijwsc.html
BUSINESS RULE MANAGEMENT FRAMEWORK
FOR ENTERPRISE WEB SERVICES
Thirumaran.M1
and Ilavarasan.E2
and Thanigaivel.K3
and Abarna. S4
1
Department of Computer science and Engineering, Pondicherry Engg College, India.
2
Department of Computer science and Engineering, Pondicherry Engg College, India.
3
Department of Computer science and Engineering, Pondicherry Engg College, India.
4
Department of Computer science and Engineering, Pondicherry Engg College, India.
ABSTRACT
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if
we decompose the business process structure in a set of rules, each of them representing a
transition of the business process. As a consequence the business process engine can be realized
by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the
business rules and then to modify it at the runtime. Business rules specifies the constraints that
affect the behaviors and also specifies the derivation of conditions that affect the execution flow.
The rules can be extracted from use cases, specifications or system code. But since not many
enterprises capture their business rules in a structured, explicit form like documents or implicit
software codes, they need to be identified first, before being captured and managed. These rules
change more often than the processes themselves, but changing and managing business rules is a
complex task beyond the abilities of most business analysts. The capturing process focuses on
the identification of the potential business rules sources. As business logic requirements change,
business analysts can update the business logic without enlisting the aid of the IT staff. The new
logic is immediately available to all client applications. In current trend the rules are modified or
changed in the static time phase. But this paper provides to change the rules at the run time. Here
the rules are extracted from the services and can be a changed dynamically. The existing rules
are modified and attached to source code without hindering service to the end user which can be
achieved with source control systems. When the rules are revised, it provides a path in budding
new business logic. This new business logic can be adopted for the efficient software
development.
KEYWORDS
Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches.
Original Source URL: http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/currentissue.html
REFERENCES
[1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems”
[2] Michael zurMuehlen, “Business Process and Business Rule Modeling Languages for Compliance
Management: A Representational Analysis”, Twenty-Sixth International Conference on Conceptual
Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial Contributions, Auckland, New
Zealand.
[3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”.
[4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process Description
Languages and Business Rules”.
[5] AncaAndreescu, “ A General Software Development Process Suitable for Explicit Manipulation of
Business Rules”
[6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business Process
Language”
[7] OlegasVasilecas,” Ensuring Consistency of Information Systems Rules Models”.
[8] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”.
[9] Bruno de MouraAraujo, “ A method for Validating the Compliance of Business Processes to
Business Rules”.
[10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”.
[11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”.
[12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach
Supported by Pattern Identification”.
[13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support System”,
IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007.
[14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, AchilleFokoue-Nkoutche, and Isabelle
Rouvellou, “Fusion: A System For Business Users To Manage Program Variability”, IEEE
Transaction on software engineering , Nov 2008.
[15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for
Redevelopment”, 9th International Workshop on Program Comprehension, Toronto, Canada, 2001,
pp. 167-175.
[16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp. 818-822.
[17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE.
[18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software Systems”,
2009 33rd Annual IEEE International Computer Software and Applications Conference.
[19] OlegasVasilecas, “Ensuring Consistency of Information Systems Rules Models”, the International
Multiconference on Computer Science and Information Technology, 2008.
[20] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”,
ICSOC'04, November 15–19, 2004, New York, New York, USA.
[21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach
Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre, Switzerland.
[22] GulnozaZiyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and Message
Processing in Enterprise Service Bus”, International Conference on Convergence and Hybrid
Information Technology, 2008
[23] en.wikipedia.org/wiki/Business_rule
AUTHORS
Thirumaran. M, working as Asst.Professor in Pondicherry Engineering College, Pondicherry,
India, one of India’s premier institutions providing high quality education and a great platform
for research. He pursued his B.Tech and M.Tech in Computer Science and Engineering from the
Pondicherry University. The author is specialized in Web Services and Business Object Model
and possesses a very profound knowledge in the same. He has worked on establishing the
Business Object Model and Business Logic System with respect to Web Service Computation,
Web Service Composition and Web Service Customization. His flair for research has made him
explore deep in this domain and he has published more than 20 papers in various International
Conferences, Journals and Magazines. Currently he is working on developing a model for
Business Logic Systems for various E-Commerce systems.
Ilavarasan.E, working as Associate Professor in Pondicherry Engineering College, Pondicherry,
India. He received his Bachelor’s degree in Mathematics from the University of Madras in the
year 1987 and Master’s degree in Computer Applications in the year 1990 from Pondicherry
University. Later he completed his M.Tech., degree in Computer Science and Engineeering at
Pondicherry University in the year 1997. He has published more than Twenty five research
papers in the International Journals and Conferences. His area of specialization includes Parallel
and Distributed Systems, Design of Operating System and Web Technology.
Thanigaivel.K, studying in Pondicherry Engineering College, Pondicherry, India. He received
his B.Tech degree in Computer Science and Engineering from the Pondicherry University in the
year 2009. He currently pursuing M.Tech., degree in Computer Science and Engineering at
Pondicherry University and he is currently working in the area of Webservices.
Abarna.S, studying in Pondicherry Engineering College, Pondicherry, India. She currently
pursuing M.Tech., degree in Computer Science and Engineering at Pondicherry University and
she is currently working in the area of Webservices.
A COMPARATIVE STUDY OF SOCIAL
NETWORKING APPROACHES IN IDENTIFYING
THE COVERT NODES
Karthika S1
and Bose S2
1
Teaching Fellow 2
Assistant Professor
Department of Computer Science and Engineering
College of Engineering Guindy, Anna University, Chennai-600096
ABSTRACT
This paper categories and compares various works done in the field of social networking for
covert networks. It uses criminal network analysis to categorize various approaches in social
engineering like dynamic network analysis, destabilizing covert networks, counter terrorism, key
player, subgroup detection and homeland security. The terrorist network has been taken for study
because of its network of individuals who spread from continents to continents and have an
effective influence of their ideology throughout the globe. It also presents various metrics based
on which the centrality of nodes in the graphs could be identified and it’s illustrated based on a
synthetic dataset for 9/11 attack. This paper will also discuss various open problems in this area.
KEYWORDS
Criminal Network Analysis (CNA), Social Network Analysis (SNA), Terrorist Network.
Original Source URL: http://airccse.org/journal/jwsc/papers/0911wsc06.pdf
Volume Link: http://airccse.org/journal/jwsc/current2011.html
REFERENCES
[1] Jennifer J.Xu and Hsinchun Chen, “CrimeNet Explorer: A framework for criminal network
knowledge discovery,” ACM Transactions on Information Systems, vol.23, no.2, pp. 201-226, April
(2005).
[2] Steve Ressler, “Social network analysis as an approach to combat terrorism: past, present, and future
research,” Homeland Security Affairs, vol. II, no. 2, JULY (2006).
[3] Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang Yi Qin and Michael Chau “Crime
Data Mining: A general framework and some examples,” IEEE Computer Society, vol.37, no.4,
pp.50-56, (2004).
[4] NasrullahMemon and HenrikLegind Larsen “Practical approaches for analysis, visualization and
destabilizing terrorist networks,” presented at first international conference on availability, reliability
and security, (2006).
[5] Jennifer Schroeder, Hsinchun Chen, Jennifer Xu and Michael Chau “Automated criminal link
analysis based on domain knowledge,” Journal of the American society for information science and
technology, vol. 58, no.6, pp. 842-855, (2007).
[6] Robert D. Duval, Kyle Christenseny, ArianSpahiuz “Bootstrapping a terrorist network,” presented in
the conference of Southern Illinois University Carbondale, (2010).
[7] C. C. Yang and T. D. Ng, “Terrorism and crime related weblog social network: link, content analysis
and information visualization,” presented in IEEE international conference on intelligence and
security informatics, New Brunswick, NJ, (2007).
[8] Xu J. J., Chen H., “Using shortest path algorithms to identify criminal associations,” Decision
Support Systems, vol. 38, pp. 473-487, (2004).
[9] Boongoen, T., Q. Shen, and C. Price. “Disclosing false identity through hybrid link analysis,” AI and
Law, in press.
[10] Yoshiharu Maeno and Yukio Ohsawa “Analyzing covert social network foundation behind terrorism
disaster,” Int. J. Services Sciences, vol. 2, no. 2, (2007).
[11] Yoshiharu Maeno “Node discovery problem for a social network,” Connections, vol. 29, pp. 62-76,
(2009).
[12] Dombroski, Matthew and Kathleen M. Carley “NETEST: Estimating a terrorist network’s structure,”
Computational & Mathematical Organization Theory, vol.8, pp.235-241, (2002).
[13] Christopher E. Hutchins and Marge Benham-Hutchins “Hiding in plain sight: criminal network
analysis,” Computational & Mathematical Organization Theory, vol.16, no.1 pp.89-111, (2009).
[14] Dombroski, M., P. Fischbeck, and K. Carley, “Estimating the shape of covert networks,” presented
in the proceedings of 8th International Command and Control Research and Technology
Symposium, Washington, DC, June (2003).
[15] S. Appavu , R. Rajaram, M. Muthupandian, G. Athiappan, K.S. Kashmeera “ Data mining based on
intelligent analysis of threatening e-mail,” Knowledge-Based Systems, vol. 22, pp.392–393, (2009).
[16] Carley, K.M.” A dynamic network approach to the assessment of terrorist groups and the impact of
alternative courses of action,” In Visualizing Network Information. Meeting Proceedings RTOMP-
IST-063. Neuilly-sur-Seine, France: RTO, pp. KN1-1 – KN1-10, (2006).
[17] Ian A. McCulloh and Kathleen M. Carley “Social network change detection,” Carnegie Mellon
University, School of Computer Science, Technical Report, CMU-CS-08-116.
[18] Carley, K. M. “Estimating vulnerabilities in large covert networks,” presentedin the proceedings of
9th International Command and Control Research and Technology Symposium held at Loews
Corornado Resort, CA. Evidence Based Research, Vienna, VA, (2004).
[19] BORGATTI, S. “The key player problem,” presented in the proceedings of the National Academy of
Sciences Workshop on Terrorism. National Academy of Sciences, Washington DC, (2002).
[20] Shou-de Lin and Hans Chalupsky “Discovering and explaining abnormal nodes in semantic graphs,”
IEEE Transactions on knowledge and data engineering, vol. 20, no. 8, pp.1039-1052, (2008).
[21] NasrullahMemon, Nicholas Harkiolakis and David L. Hicks “Detecting High-Value Individuals in
Covert Networks: 7/7 London Bombing Case Study,” in the proceedings of the IEEE/ACS
International Conference on Computer Systems and Applications, pp. 206-215, (2008).
[22] NasrullahMemon, Abdul RasoolQureshi, UffeKockWiil, David L. Hicks “Novel algorithms for
subgroup detection in terrorist networks,” presented in the International Conference on Availability,
Reliability and Security, Fukuoka Institute of Technology, Fukuoka, Japan, (2009).
[23] Yuval Elovici, BrachaShapira, Mark Last, Omer Zaafrany and Menahem Friedman, Moti Schneider
and Abraham Kandel “Detection of access to terror-related web sites using an Advanced Terror
Detection System (ATDS),” Journal of the American society for information science and
technology, vol.61, no.2, pp.405–418, (2010).
[24] AparnaBasu “Social network analysis of terrorist organizations in India,” paper presented at the
North American Association for Computational Social and Organizational Science (NAACSOS)
Conference, Notre Dame, Indiana, pp. 26-28, (2005).
[25] Sudhir Saxena, K. Santhanam, AparnaBasu “Application of Social Network Analysis (SNA) to
terrorist networks in Jammu & Kashmir,” Strategic Analysis, vol. 28, no.1, (2004).
[26] UffeKockWiil, NasrullahMemon and JolantaGniadek “Knowledge management processes, tools and
techniques for counterterrorism,” presented in the International conference on Knowledge
Management and Information Sharing, pp. 29-36, (2009).
[27] C. Weinstein, W. Campbell, B. Delaney, and J. O’Leary, “Modeling and detection techniques for
counter-terror social network analysis and intent recognition,” presented in the proceedings of the
IEEE Aerospace Conference, (2009).
[28] Christopher C. Yang, Nan Liu, and Marc Sageman “Analyzing the terrorist social networks with
visualization tools,” Intelligence and Security Informatics, Lecture Notes in Computer Science, vol.
3975,pp. 331-342, (2006).
[29] Rebecca Goolsby “Combating terrorist networks: An evolutionary approach,” presented in the
proceedings of the 8th International Command and Control Research and Technology Symposium
held at National Defense War College Washington DC, Evidence Based Research Vienna VA,
(2003).
[30] Hsinchun Chen, Wingyan Chung, Jialun Qin, Edna Reid, Marc Sageman, Gabriel Weimann
“Uncovering the dark web: A case study of Jihad on the web,” Journal of the American society for
information science and technology, vol.59, no.8, pp.1347–1359, (2008).
[31] Valdis E. Krebs “Mapping networks of terrorist cells,” Connections, vol.24, no.3, pp. 43-52, (2002).
[32] Linton C. Freeman “Centrality in Social Networks Conceptual Clarification,” Social Networks,
vol.1, pp. 215-239, (1978/79).
SURVEY OF CLOUD COMPUTING
Amira. A. Elsonbaty
High Institute of Engineering & Technology in New Damietta
ABSTRACT
With expanding volumes of knowledgeable production and the variability of themes and roots,
shapes and languages, most detectable issues related to the delivery of storage space for the
information and the variety of treatment strategies in addition to the problems related to the flow
of information and methods go down and take an interest in the advantage of them face the
researchers. In any case, such a great significance comes with a support of a great infrastructure
that includes large data centers comprising thousands of server units and other supporting
equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is
based on the internet, an image from the internet. Cloud Computing is a developed technology,
cloud computing, possibly offers an overall economic benefit, in that end users shares a large,
centrally achieved pool of storing and computing resources, rather than owning and managing
their own systems. But, it needs to be environment friendly also. This review paper gives a
general overview of cloud computing, also it describes cloud computing, architecture of cloud
computing, characteristics of cloud computing, and different services and deployment model of
cloud computing. This paper is for anyone who will have recently detected regarding cloud
computing and desires to grasp a lot of regarding cloud computing.
KEYWORDS
cloud computing; architecture of cloud computing; characteristics of cloud computing
Original Source URL: http://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
REFERENCES
[1] BhartiWadhwa, “Energy Saving Approaches for Green Cloud Computing: A Review”, Proceedings
of 2014 RAECS UIET Panjab University Chandigarh, 06 - 08 March, 2014 978-1-4799-2291-
8/14/$31.00 ©2014 IEEE
[2] JasleenKaur, Ms. AnupmaSehrawat, Ms. NehaBishnoi, " Survey Paper on Basics of Cloud
Computing and Data Security," International Journal of Computer Science Trends and Technology
(IJCST) – Volume 2 Issue 3, May-Jun 2014.
[3] https://en.wikipedia.org/wiki/Cloud_computing,12-9-4:30pm
[4] YashpalsinhJadeja, KiritModi, “Cloud Computing - Concepts, Architecture and Challenges” in
Proceeding of International Conference on Computing, Electronics and Electrical Technologies
[ICCEET], 2012.
[5] Qi Zhang, Lu Cheng and RaoufBoutaba, “Cloud computing: state-of-the-art and research
challenges”. Journal of Internet Services and Applications, Volume 1, Issue 1, pp 7–18, May 2010
[6] Ivanka Menken," Cloud Computing - The Complete Cornerstone Guide to Cloud Computing Best
Practices Concepts, Terms, and Techniques for Successfully Planning, Implementing ... Enterprise
IT Cloud ComputingTechnology", London, UK, UK ©2008 , ISBN:1921573007
9781921573002,2008.
[7] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,”
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.1,
2013.
[8] JasleenKaur, Ms.AnupmaSehrawat, Ms.NehaBishnoi ,"Survey Paper on Basics of Cloud Computing
and Data Security", International Journal of Computer Science Trends and Technology (IJCST) –
Volume 2 Issue 3, May-Jun 2014.
[9] M. Armbrust, O. Fox, R. Griffith, A. D. Joseph, Y. Katz, A. Konwinski, et al., "M.: Above the
clouds: A Berkeley view of cloud computing," 2009.
[10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud
computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011.
[11] Aniruddha S. Rumale, D.N.Chaudhari, ” Cloud Computing: Infrastructure as a Service,”
International Journal of Inventive Engineering and Sciences (IJIES) ISSN: 2319–9598, Volume-1,
Issue-3, February 2013.
[12] Imran Ashrafa, "An Overview of Service Models of Cloud Computing," International Journal of
Multidisciplinary and Current Research 27 Aug 2014, Vol.2 [8] YashpalsinhJadeja; KiritModi,
“Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International
Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012.
[13] Xu Wang, Beizhan Wang, Jing Huang, “Cloud computing and its key techniques” in Proceeding of
IEEE Conference, 2011.
[14] Michael Boniface, Bassem Nasser, JuriPapay, Stephen C. Phillips, Arturo Servin, Xiaoyu Yang,
ZlatkoZlatev, Spyridon V. Gogouvitis, Gregory Katsaros, KleopatraKonstanteli, George Kousiouris,
Andreas Menychtas, DimosthenisKyriazis, “Platform-as-a-Service Architecture for Real-time
Quality of Service Management in Clouds,” Fifth International Conference on Internet and Web
Applications and Services, 2010.
Mobile Web – Strategy for Enterprise Success
JitendraMaan
Tata Consultancy Services, TCS Towers, 249 D & E, UdyogVihar Phase IV, Gurgaon,
Haryana, India – 122001
ABSTRACT
Today, enterprises are faced with increased global competition in an environment where
customers are demanding faster delivery, better service and also want to gain significant and
immediate business value by increasing productivity and reducing operational cost. Spurred by
unprecedented customer demand, each Industry cluster has developed its own source of
comparative advantage. Even within a single organization, the business value chain is
geographically fragmented. Such diversification and fragmentation of value chain drives the
need for cross-platform Web applications over mobile channel. Mobile Web is the next logical
transition in this evolutionary process and Mobile Web applications will continue to gain more
prominence in the enterprises not just to improve the return on investment in their existing
system landscape, but also to expand global reach and improve operational efficiency of their
mobile workforce. This paper outlines the critical business needs to rapidly create flexible
Mobile web solutions across all lines of business. The paper enlightens the benefits offered by
enabling web applications on Mobile devices and also addresses the current business challenges
in developing Mobile Web applications. This paper is intended for all business domains
irrespective of application portfolios.
KEYWORDS
Mobile computing, Mobile Web, Mobile Internet, Enterprise Mobility, Mobile Solutions, Mobile
Web Solutions, Mobile web experience, Mobile Web Services
Original Source URL: http://airccse.org/journal/jwsc/papers/3112ijwsc04.pdf
Volume Link: http://airccse.org/journal/jwsc/current2012.html
REFERENCES
[1] John Arne Saeteras, Mobile Web vs. Native Apps, Revisited, 2010
[2] Dana Moore, Raymond Budd and Edward Benson, Professional Rich Internet Applications: AJAX
and Beyond, Wrox Press © 2007 Citation
[3] Designing for the Mobile Web, Sitepoint -http://www.sitepoint.com/designing-for-mobile-web/
[4] Forrester Report - Making The Case For The Mobile Internet by Julie A. Ask and Seth Fowler with
J.P. Gownder and Laura Wiramihardja
[5] Gartner Report - Key Issues for Mobile Applications, 2010, William Clark, Publication Date: 25
June 2010, ID Number: G00201576
[6] Gens, F.: IDC Predictions 2010: Recovery and Transformation, Filing Information: IDC #220987, 1,
3-7 (2009)
[7] Gartner Report - Key Issues for Mobile Applications, 2010, William Clark, Publication Date: 25
June 2010, ID Number: G00201576
[8] Sudesh Prasad “Emerging Trends Enterprise Mobility: Always Connected”, Voice & Data, First
Quarter, 2006
[9] yungMun, Corporate Technology Strategist, Alcatel-Lucent: Mobile Cloud Computing Challenges,
September 201, TechZine, Technology and Research e-zone (September 2001),
http://www2.alcatellucent.com/blogs/techzine/2010/mobile-cloud-computing-challenges
SPEEDING UP THE WEB CRAWLING PROCESS
ON A MULTI-CORE PROCESSOR USING
VIRTUALIZATION
Hussein Al-Bahadili1
, Hamzah Qtishat2
, Reyadh S. Naoum2
1
Faculty of Information Technology, Petra University, Amman, Jordan
2
Faculty of Information Technology, Middle East University, Amman, Jordan
ABSTRACT
A Web crawler is an important component of the Web search engine. It demands large amount of
hardware resources (CPU and memory) to crawl data from the rapidly growing and changing
Web. So that the crawling process should be a continuous process performed from time-to-time
to maintain up-to-date crawled data. This paper develops and investigates the performance of a
new approach to speed up the crawling process on a multi-core processor through virtualization.
In this approach, the multi-core processor is divided into a number of virtual-machines (VMs)
that can run in parallel (concurrently) performing different crawling tasks on different data. It
presents a description, implementation, and evaluation of a VM-based distributed Web crawler.
In order to estimate the speedup factor achieved by the VM-based crawler over a non-
virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling
times for various numbers of documents. Furthermore, the average crawling rate in documents
per unit time is computed, and the effect of the number of VMs on the speedup factor is
investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a
speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs.
KEYWORDS
Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi-
core processor; distribution methodologies; processor-farm methodology.
Original Source URL: http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/current2013.html
REFERENCES
[1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in
Practice. Addison Wesley.
[2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison Wesley.
[3] WorldWideWebSize (2012). The size of the World Wide Web.
http://www.worldwidewebsize.com.
[4] T. Calishain. (2004). Web Search Garage. Prentice Hall.
[5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc.
[6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search Engines.
VDM Verlag.
[7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling.
Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp. 287-
296.
[8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a
Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a
Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal
Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea.
[9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H.
Isahara(2006).Collaborative Web Crawler over High-speed Research Network. Proceedings
of the 1st International Conference on Knowledge, Information and Creativity Support
Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand.
[10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully
Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 – 726.
[11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th
International Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii,
USA.
[12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance
Distributed Web Crawler.Proceedings of the 18th International Conference on Data
Engineering, pp.357-368. February 26-March 1. San Jose, CA, USA.
[13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient
Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234
[14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education.
[15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip
Microprocessors. International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330.
[16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall.
[17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query
Web Search Engine Model. International Journal of Information Technology and Web
Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56.
[18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and
Processes. The Morgan Kaufmann Series in Computer Architecture and Design.
[19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media.
[20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System
Administrator. 1st Edition. No Starch Press.
[21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL
Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW 1998),
April 14-18, Brisbane, Australia.
[22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach
to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp.
1623–1640.
[23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings
of the ACM Conference on Information and Knowledge Management (CIKM’02),
November 4–9. McLean, Virginia, USA.
[24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an
Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185-
193.
[25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web
Crawler. Proceedings of the 11th International Conference on World Wide Web (WWW
2002), May 7-11, Honolulu, Hawaii, USA.
[26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs.
University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305.
Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04-
1305.
[27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th
ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04), pp.
299-306, October 10-16, New York, USA.
[28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for
Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on
Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany.
[29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online
Social Networks. Proceedings of the International Conference on World Wide Web (WWW
2007). May 8-12. PP. 201-210. Banff, Alberta, Canada.
[30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on
Virtual Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp.
519-528.
[31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of
an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked
Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA.
[32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile
Crawler. International Conference on Emerging Trends in Electrical and Computer
Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India.
[33] Xen (2012). http://www.xen.org.
[34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it-
works.html.
[35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media.
[36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling
Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman,
Jordan.
[37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for
Embedded Parallel Systems. John Wiley & Sons.
[38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation.
Springer Verlag. New York, USA.
AUTHORS
Hussein Al-Bahadili is an associate professor at Petra University. He received his PhD and M.Sc
degrees from University of London (Queen Mary College) in 1991 and 1988. He received his
B.Sc in Engineering from the University of Baghdad in 1986. He has published many papers in
different fields of science and engineering in numerous leading scholarly and practitioner
journals, and presented at leading world-level scholarly conferences. His research interests
include computer networks design and architecture, routing protocols optimizations, parallel and
distributed computing, cryptography and network security, data compression, software and Web
engineering.
HamzaAlqtaishat is a senior developer at Yahoo Arabia, Amman, Jordan.
He received his B.Sc degree from Al-Balqa Applied University, Jordan in
2006 and his M.Sc degree in Computer Information Systems from the
Middle-East University, Amman, Jordan in 2012 under the supervision of
Dr. Hussein Al-Bahadili. His current research interests are Web Search
Engine Architecture and techniques, Virtual Machines, Parallel and
Distributed Processing and Methodologies, Websites Development, Web
Services, Network Scalability, and Social Networks.
ReyadhS. Naoum is a professor at Middle East University, Amman, Jordan.
He received his PhD and M.Sc degree from University of Manchester in
1976 and 1973.He received his B.Sc degree in Mathematics from University
of Basra in 1969. He published more than one hundred papers in the field of
Computer Science and Mathematicshigh standard journals, and well-
recognized international conferences. His current interest includes Neural
Computing and Genetic Algorithms, Image Processing, Cloud Computing,
Computer Security and Instruction Detection Systems, Numerical Analysis
Computation and Software.
USING MOBILE SERVICE FOR SUPPLY CHAIN
MANAGEMENT: A SURVEY AND CHALLENGES
Selwa ELFIRDOUSSI
EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150,
Benguerir, Morocco,
ABSTRACT
Efficient supply chain management calls for robust analytical and optimal models to automate its
process. Therefore, information technology is an essential ingredient that integrates these tools in
supply chain. With the emergence of wireless, the high technologies and the reliability of mobile
devices, mobile web services draw a promising horizon facing economic challenges. They offer
new personalized services to each actor in the supply chain on their mobile devices at anytime
and anywhere. This paper presents a literature review of mobile web service implemented on the
industry context based on the supply chain management approach. First, a large definition of
mobile web service and some proposal architecture are exposed. Then the paper discuss some
generic related work on mobile web service focusing on supply chain management. Finally some
challenges on m-service oriented supply chain management are proposed.
KEYWORDS
Mobile web service; smart industry; Supply chain management; Service Oriented Architecture.
Original Source URL: http://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
REFERENCES
[1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia,
«Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp. 1-25,
2001.
[2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution &
Materials Management, vol. 19, n° %18, pp. 3-8, 1989.
[3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and Challenges,»
International Journal of Advanced Computer Science and Applications, vol. 5, n° %13, pp. 173-188,
2014.
[4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services Selection for
Mobile,» chez The 9th International Conference on INFOrmatics and Systems, 2014.
[5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile
devicesimplementation and experience,» Mobile Computing Systems and Applications, pp. 100-109,
2003.
[6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services from
mobile hosts,» chez Internet and Web Applications and Services, 2010.
[7] S. Hamida, Uneapprochebasée agent mobile pour le m-service web sémantique, BISKRA:
Université Mohamed Khider, 2014.
[8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for mobile web
services,» Computer Communications, p. 1097–1105, 2007.
[9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,» chez
International Conference on Software Engineering, Honolulu, 2010.
[10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John Wiley &
Sons, 2007.
[11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and
Implementations,» Technical paper, 2005.
[12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,»InformaticaEconomică, vol. 14,
n° %13, pp. 98-105, 2010.
[13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture design of
an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18, 2005.
[14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile environments,» chez
International conferance on Web Services (ICWS), Anchorage, 2014.
[15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic Applications,» AIS
Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009.
[16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery and
invocation of Web Services from mobile devices,» IEEE Transactions on Services Computing, vol.
5, n° %11, pp. 99-115, 2012.
[17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th
International Conference on web service, Hawai, 2012.
[18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez
ACM/IFIP/USENIX International Middleware Conference, New York, 2007.
[19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,» Pervasive
and Mobile Computing, vol. 13, p. 67–84, 2014.
[20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE Internet
Computing, vol. 10, n° %13, pp. 58-65, 2006.
[21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing Scalable Mobile
Web Service Provisioning,» chez International conference on MOBILe Wireless MiddleWARE,
Operating Systems, and Applications, 2008.
[22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in peer to peer
networks,» chez Internet and Web Applications and Services, 2008.
[23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,» chez World
Congress on Services, Santa Clara Marriott, CA, USA, 2013.
[24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through Android
Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n° %17, pp. 3182-
3185, 2013.
[25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web services,»
chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014.
[26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service Composition,»
chez arXiv preprint arXiv:, 1304.5045.
[27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and solutions,» IEEE
wireless communications, pp. 38-47, 2004.
[28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services security,» chez
3rd International Conference on Web Information Systems and Technologies, 2007.
[29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and management,»
European Journal of Operational Research, vol. 159, n° %12, pp. 269-295, 2004.
[30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management Processes,»
The International Journal of Logistics Management, vol. 12, n° %12, pp. 13-36, 2001.
[31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case study,» Journal
of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013.
[32] A. Light, S. Punnettet K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content, Services,
and Applications, Toronto: Mobile Experience Innovation Centre, 2012.
[33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536, 2006.
[34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible Through Use of
EIS Platforms,» chez Instrumentation and Measurement Technology Conference, USA, 2003.
[35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using GPS
technology solutions: a case study,» chez POMS conference, Vancouver, 2010.
[36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,» International Journal
of Modern Engineering Research, pp. 084-088, 2012.
[37] R. Angeles, «supply-chain applications and implementation issues,» Information systems
management, vol. 22, n° %11, pp. 51-65, 2005.
[38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply chain,»
Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007.
[39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A critical
review,» Automation in Construction., 2016.
[40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile Industry,»
Cisco, 2012.
[41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine based on
popularity: Architecture and Implementation,» International Journal of Software Engineering and Its
Applications, pp. 213-228, 2014.
[42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,» chez CS
& IT CSCP, 2014.
AUTHOR
After obtaining a Degree as a computer science engineer from ENSIAS in
2000, I started my career as a consultant in the field of information system.
In 2015, I obtained a PhD in Computer Engineering and Applied
Mathematics from the Cadi Ayyad University of Marrakech in co-
supervision with the Saint-Jérôme University of Marseille on the
classification, discovery and composition of web services Based on
popularity. Then, I joined the UM6P as a university professor at EMINES
School of Industrial Management, where I am in charge of the computer
science courses of the Integrated Preparatory Cycle and the Engineering
Cycle. I am also a member of the EMINES industrial management research
team. My research works focuses on the development of decision support
systems for the advanced management of supply chains Integrating the
Service Oriented Architecture (SOA).
CONTEMPORARY SEMANTIC WEB SERVICE
FRAMEWORKS: AN OVERVIEW AND
COMPARISONS
Keyvan Mohebbi1
, Suhaimi Ibrahim2
, Norbik Bashah Idris3
1
Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (UTM),
Malaysia
2,3
Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia
ABSTRACT
The growing proliferation of distributed information systems, allows organizations to offer their
business processes to a worldwide audience through Web services. Semantic Web services have
emerged as a means to achieve the vision of automatic discovery, selection, composition, and
invocation of Web services by encoding the specifications of these software components in an
unambiguous and machine-interpretable form. Several frameworks have been devised as
enabling technologies for Semantic Web services. In this paper, we survey the prominent
Semantic Web service frameworks. In addition, a set of criteria is identified and the discussed
frameworks are evaluated and compared with respect to these criteria. Knowing the strengths and
weaknesses of the Semantic Web service frameworks can help researchers to utilize the most
appropriate one according to their needs.
KEYWORDS
Web services, Semantic Web, Semantic Web services, Semantic Web service Frameworks
Original Source URL: http://airccse.org/journal/jwsc/papers/3312ijwsc06.pdf
Volume Link: http://airccse.org/journal/jwsc/current2012.html
REFERENCES
[1] D. Fensel, et al., "Web Services," in Semantic Web Services, ed: Springer Berlin Heidelberg,
2011, pp. 37-65.
[2] T. Berners-Lee, et al., "Uniform Resource Identifiers (URI): Generic Syntax," 1998.
[3] (2004, November 25). Web Services Architecture Requirements. Available:
http://www.w3.org/TR/wsa-reqs/
[4] D. Fensel, et al., "Semantic Web," in Semantic Web Services, ed: Springer Berlin
Heidelberg, 2011, pp. 87-104.
[5] G. Meditskos and N. Bassiliades, "Structural and Role-Oriented Web Service Discovery with
Taxonomies in OWL-S," Knowledge and Data Engineering, IEEE Transactions on, vol. 22,
pp. 278-290, 2010.
[6] L. Cabral, et al., "Approaches to Semantic Web Services: an Overview and Comparisons," in
The Semantic Web: Research and Applications. vol. 3053, C. Bussler, et al., Eds., ed:
Springer Berlin / Heidelberg, 2004, pp. 225-239.
[7] D. Martin, et al. (2004, December 6). OWL-S: Semantic Markup for Web Services.
Available: http://www.w3.org/Submission/OWL-S/
[8] J. d. Bruijn, et al., "Web Service Modeling Ontology (WSMO)," DERI, 2005.
[9] R. Akkiraju, et al. (2005, December 6). Web Service Semantics - WSDL-S. Available:
http://www.w3.org/Submission/WSDL-S/
[10] Joel Farrell and H. Lausen. (2007, March 3). Semantic Annotations for WSDL and XML
Schema. Available: http://www.w3.org/TR/sawsdl/
[11] R. Lara, et al., "A Conceptual Comparison of WSMO and OWL-S," in Web Services, ed,
2004, pp. 254-269.
[12] R. Akkiraju, "Semantic Web Services," in Semantic Web Services: Theory, Tools, and
Applications, J. Cardoso, Ed., ed Hershey, NY: Information Science Reference, 2007, pp.
191-216.
[13] N. Yacoubi Ayadi and M. Ben Ahmed, "An Enhanced Framework for Semantic Web
Service Discovery," in Exploring Services Science. vol. 82, M. Snene, et al., Eds., ed:
Springer Berlin Heidelberg, 2011, pp. 53-67.
[14] (2003, March 12). Standard Upper Ontology Working Group (SUO WG) Home Page.
Available: http://suo.ieee.org/
[15] (2002, March 12). The Object Management Group: Meta-Object Facility (MOF™),
version 1.4. Available: http://www.omg.org/technology/documents/formal/mof.htm
[16] D. Fensel and C. Bussler, "The web service modeling framework WSMF," Electronic
Commerce Research and Applications, vol. 1, pp. 113-137, 2002.
[17] J. d. Bruijn, et al., "Web Service Modeling Language (WSML)," DERI, 2005.
[18] C. Bussler, et al. (2005, March 12). Web Service Execution Environment (WSMX).
Available: http://www.w3.org:80/Submission/WSMX/
[19] R. Chinnici, et al. (2007, November 27). Web Services Description Language (WSDL)
Version 2.0 Part 1: Core Language. Available: http://www.w3.org/TR/wsdl20
[20] (March 3). Semantic Annotations for WSDL Working Group. Available:
http://www.w3.org/2002/ws/sawsdl/
[21] K. Iqbal, et al., "Semantic Service Discovery using SAWSDL and SPARQL," 2008.
[22] N. Steinmetz, et al. (2008). Simplifying the Web Service Discovery Process. 1st
Workshop on Semantic Metadata Management and Applications (SeMMA '08) at the 5th
European Semantic Web Conference (ESWC '08) 346. Available: http://CEUR-WS.org/Vol-
346
[23] D. Fensel, et al., "Related Work in the Area of Semantic Web Service Frameworks," in
Enabling Semantic Web Services, ed: Springer-Verlag Berlin Heidelberg, 2007, pp. 101-110.
[24] J. Cardoso, Semantic Web Services: Theory, Tools, and Applications. Hershey, NY:
Information Science Reference, 2007.
[25] X. Du, "Semantic Service Description Framework for Efficient Service Discovery and
Composition," Doctor of Philosophy PhD thesis, Department of Computer Sciences,
University of Durham, 2009.

More Related Content

What's hot

Benchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisBenchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisConference Papers
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...IJECEIAES
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationAmjad Adib
 
Interaction of IT investment mandates and mobile savvy affecting mobile offic...
Interaction of IT investment mandates and mobile savvy affecting mobile offic...Interaction of IT investment mandates and mobile savvy affecting mobile offic...
Interaction of IT investment mandates and mobile savvy affecting mobile offic...IJECEIAES
 
Evaluating the impact of removing less important terms on sentiment analysis
Evaluating the impact of removing less important terms on sentiment analysisEvaluating the impact of removing less important terms on sentiment analysis
Evaluating the impact of removing less important terms on sentiment analysisConference Papers
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALAIRCC Publishing Corporation
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Conference Papers
 
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...ijcsit
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)AIRCC Publishing Corporation
 
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...cscpconf
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSAIRCC Publishing Corporation
 
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET-  	  Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...IRJET-  	  Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...IRJET Journal
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxPvrtechnologies Nellore
 
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...ijcsit
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...cscpconf
 

What's hot (19)

Benchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisBenchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysis
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...
 
Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
Goal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to ImplementationGoal Dynamics_From System Dynamics to Implementation
Goal Dynamics_From System Dynamics to Implementation
 
Interaction of IT investment mandates and mobile savvy affecting mobile offic...
Interaction of IT investment mandates and mobile savvy affecting mobile offic...Interaction of IT investment mandates and mobile savvy affecting mobile offic...
Interaction of IT investment mandates and mobile savvy affecting mobile offic...
 
Evaluating the impact of removing less important terms on sentiment analysis
Evaluating the impact of removing less important terms on sentiment analysisEvaluating the impact of removing less important terms on sentiment analysis
Evaluating the impact of removing less important terms on sentiment analysis
 
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSALARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
ARCHITECTURAL ASPECT-AWARE DESIGN FOR IOT APPLICATIONS: CONCEPTUAL PROPOSAL
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...
 
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
RECOMMENDATION GENERATION JUSTIFIED FOR INFORMATION ACCESS ASSISTANCE SERVICE...
 
V5 i3201613
V5 i3201613V5 i3201613
V5 i3201613
 
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines)
 
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
CRESUS: A TOOL TO SUPPORT COLLABORATIVE REQUIREMENTS ELICITATION THROUGH ENHA...
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
 
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET-  	  Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...IRJET-  	  Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
IRJET- Sentimental Analysis from Tweets to Find Positive, Negative,Neutra...
 
Bim adoptation to sri lanka
Bim adoptation to sri lanka Bim adoptation to sri lanka
Bim adoptation to sri lanka
 
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSSEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTS
 
A computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docxA computational-dynamic-trust-model-for-user-authorization-docx
A computational-dynamic-trust-model-for-user-authorization-docx
 
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...
Ijcsit12REQUIREMENTS ENGINEERING OF A WEB PORTAL USING ORGANIZATIONAL SEMIOTI...
 
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
DEPENDABLE WEB SERVICES SECURITY ARCHITECTURE DEVELOPMENT THEORETICAL AND PRA...
 

Similar to October 2020 - Top Read Articles in Web Service Computing

Service Oriented Computing
Service Oriented ComputingService Oriented Computing
Service Oriented ComputingAie Sa
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentationsireesha nimmagadda
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...Editor IJCATR
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
Software Systems Requirements Engineering
Software Systems Requirements EngineeringSoftware Systems Requirements Engineering
Software Systems Requirements EngineeringKristen Wilson
 
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...ijseajournal
 
Introspection Analaysis of Availability ver0_1-1.pptx
Introspection Analaysis of Availability ver0_1-1.pptxIntrospection Analaysis of Availability ver0_1-1.pptx
Introspection Analaysis of Availability ver0_1-1.pptxPrasannaVenkatesanVe1
 
Call for Papers - International Journal on Web Service Computing (IJWSC)
Call for Papers - International Journal on Web Service Computing (IJWSC)Call for Papers - International Journal on Web Service Computing (IJWSC)
Call for Papers - International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)ijwscjournal
 
A Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project ManagementA Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project ManagementApril Smith
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UI General Methodology for developing UML models from UI
General Methodology for developing UML models from UI ijwscjournal
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UIGeneral Methodology for developing UML models from UI
General Methodology for developing UML models from UIijwscjournal
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UIGeneral Methodology for developing UML models from UI
General Methodology for developing UML models from UIijwscjournal
 

Similar to October 2020 - Top Read Articles in Web Service Computing (20)

Service Oriented Computing
Service Oriented ComputingService Oriented Computing
Service Oriented Computing
 
235429094 jobportal-documentation
235429094 jobportal-documentation235429094 jobportal-documentation
235429094 jobportal-documentation
 
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...Presenting an Excusable Model of Enterprise  Architecture for Evaluation of R...
Presenting an Excusable Model of Enterprise Architecture for Evaluation of R...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018Information Technology in Industry(ITII) - November Issue 2018
Information Technology in Industry(ITII) - November Issue 2018
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
computerworld
computerworldcomputerworld
computerworld
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
Software Systems Requirements Engineering
Software Systems Requirements EngineeringSoftware Systems Requirements Engineering
Software Systems Requirements Engineering
 
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
A SOFTWARE REQUIREMENT ENGINEERING TECHNIQUE USING OOADA-RE AND CSC FOR IOT B...
 
Introspection Analaysis of Availability ver0_1-1.pptx
Introspection Analaysis of Availability ver0_1-1.pptxIntrospection Analaysis of Availability ver0_1-1.pptx
Introspection Analaysis of Availability ver0_1-1.pptx
 
Call for Papers - International Journal on Web Service Computing (IJWSC)
Call for Papers - International Journal on Web Service Computing (IJWSC)Call for Papers - International Journal on Web Service Computing (IJWSC)
Call for Papers - International Journal on Web Service Computing (IJWSC)
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
A Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project ManagementA Methodology For Large-Scale E-Business Project Management
A Methodology For Large-Scale E-Business Project Management
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UI General Methodology for developing UML models from UI
General Methodology for developing UML models from UI
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UIGeneral Methodology for developing UML models from UI
General Methodology for developing UML models from UI
 
General Methodology for developing UML models from UI
General Methodology for developing UML models from UIGeneral Methodology for developing UML models from UI
General Methodology for developing UML models from UI
 

Recently uploaded

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

October 2020 - Top Read Articles in Web Service Computing

  • 1. OOccttoobbeerr 22002200:: TToopp RReeaadd AArrttiicclleess iinn WWeebb SSeerrvviiccee CCoommppuuttiinngg International Journal on Web Service Computing (IJWSC) ISSN : 0976 - 9811 (Online) ; 2230 - 7702 (print) http://airccse.org/journal/jwsc/ijwsc.html
  • 2. BUSINESS RULE MANAGEMENT FRAMEWORK FOR ENTERPRISE WEB SERVICES Thirumaran.M1 and Ilavarasan.E2 and Thanigaivel.K3 and Abarna. S4 1 Department of Computer science and Engineering, Pondicherry Engg College, India. 2 Department of Computer science and Engineering, Pondicherry Engg College, India. 3 Department of Computer science and Engineering, Pondicherry Engg College, India. 4 Department of Computer science and Engineering, Pondicherry Engg College, India. ABSTRACT Making a business rule extraction more dynamic is an open issue, and we think it is feasible if we decompose the business process structure in a set of rules, each of them representing a transition of the business process. As a consequence the business process engine can be realized by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the business rules and then to modify it at the runtime. Business rules specifies the constraints that affect the behaviors and also specifies the derivation of conditions that affect the execution flow. The rules can be extracted from use cases, specifications or system code. But since not many enterprises capture their business rules in a structured, explicit form like documents or implicit software codes, they need to be identified first, before being captured and managed. These rules change more often than the processes themselves, but changing and managing business rules is a complex task beyond the abilities of most business analysts. The capturing process focuses on the identification of the potential business rules sources. As business logic requirements change, business analysts can update the business logic without enlisting the aid of the IT staff. The new logic is immediately available to all client applications. In current trend the rules are modified or changed in the static time phase. But this paper provides to change the rules at the run time. Here the rules are extracted from the services and can be a changed dynamically. The existing rules are modified and attached to source code without hindering service to the end user which can be achieved with source control systems. When the rules are revised, it provides a path in budding new business logic. This new business logic can be adopted for the efficient software development. KEYWORDS Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches. Original Source URL: http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf Volume Link: http://airccse.org/journal/jwsc/currentissue.html
  • 3. REFERENCES [1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems” [2] Michael zurMuehlen, “Business Process and Business Rule Modeling Languages for Compliance Management: A Representational Analysis”, Twenty-Sixth International Conference on Conceptual Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial Contributions, Auckland, New Zealand. [3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”. [4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process Description Languages and Business Rules”. [5] AncaAndreescu, “ A General Software Development Process Suitable for Explicit Manipulation of Business Rules” [6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business Process Language” [7] OlegasVasilecas,” Ensuring Consistency of Information Systems Rules Models”. [8] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”. [9] Bruno de MouraAraujo, “ A method for Validating the Compliance of Business Processes to Business Rules”. [10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”. [11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”. [12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”. [13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support System”, IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007. [14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, AchilleFokoue-Nkoutche, and Isabelle Rouvellou, “Fusion: A System For Business Users To Manage Program Variability”, IEEE Transaction on software engineering , Nov 2008. [15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for Redevelopment”, 9th International Workshop on Program Comprehension, Toronto, Canada, 2001, pp. 167-175. [16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp. 818-822. [17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE.
  • 4. [18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software Systems”, 2009 33rd Annual IEEE International Computer Software and Applications Conference. [19] OlegasVasilecas, “Ensuring Consistency of Information Systems Rules Models”, the International Multiconference on Computer Science and Information Technology, 2008. [20] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”, ICSOC'04, November 15–19, 2004, New York, New York, USA. [21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre, Switzerland. [22] GulnozaZiyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and Message Processing in Enterprise Service Bus”, International Conference on Convergence and Hybrid Information Technology, 2008 [23] en.wikipedia.org/wiki/Business_rule AUTHORS Thirumaran. M, working as Asst.Professor in Pondicherry Engineering College, Pondicherry, India, one of India’s premier institutions providing high quality education and a great platform for research. He pursued his B.Tech and M.Tech in Computer Science and Engineering from the Pondicherry University. The author is specialized in Web Services and Business Object Model and possesses a very profound knowledge in the same. He has worked on establishing the Business Object Model and Business Logic System with respect to Web Service Computation, Web Service Composition and Web Service Customization. His flair for research has made him explore deep in this domain and he has published more than 20 papers in various International Conferences, Journals and Magazines. Currently he is working on developing a model for Business Logic Systems for various E-Commerce systems. Ilavarasan.E, working as Associate Professor in Pondicherry Engineering College, Pondicherry, India. He received his Bachelor’s degree in Mathematics from the University of Madras in the year 1987 and Master’s degree in Computer Applications in the year 1990 from Pondicherry University. Later he completed his M.Tech., degree in Computer Science and Engineeering at Pondicherry University in the year 1997. He has published more than Twenty five research papers in the International Journals and Conferences. His area of specialization includes Parallel and Distributed Systems, Design of Operating System and Web Technology. Thanigaivel.K, studying in Pondicherry Engineering College, Pondicherry, India. He received his B.Tech degree in Computer Science and Engineering from the Pondicherry University in the year 2009. He currently pursuing M.Tech., degree in Computer Science and Engineering at Pondicherry University and he is currently working in the area of Webservices. Abarna.S, studying in Pondicherry Engineering College, Pondicherry, India. She currently pursuing M.Tech., degree in Computer Science and Engineering at Pondicherry University and she is currently working in the area of Webservices.
  • 5. A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT NODES Karthika S1 and Bose S2 1 Teaching Fellow 2 Assistant Professor Department of Computer Science and Engineering College of Engineering Guindy, Anna University, Chennai-600096 ABSTRACT This paper categories and compares various works done in the field of social networking for covert networks. It uses criminal network analysis to categorize various approaches in social engineering like dynamic network analysis, destabilizing covert networks, counter terrorism, key player, subgroup detection and homeland security. The terrorist network has been taken for study because of its network of individuals who spread from continents to continents and have an effective influence of their ideology throughout the globe. It also presents various metrics based on which the centrality of nodes in the graphs could be identified and it’s illustrated based on a synthetic dataset for 9/11 attack. This paper will also discuss various open problems in this area. KEYWORDS Criminal Network Analysis (CNA), Social Network Analysis (SNA), Terrorist Network. Original Source URL: http://airccse.org/journal/jwsc/papers/0911wsc06.pdf Volume Link: http://airccse.org/journal/jwsc/current2011.html
  • 6. REFERENCES [1] Jennifer J.Xu and Hsinchun Chen, “CrimeNet Explorer: A framework for criminal network knowledge discovery,” ACM Transactions on Information Systems, vol.23, no.2, pp. 201-226, April (2005). [2] Steve Ressler, “Social network analysis as an approach to combat terrorism: past, present, and future research,” Homeland Security Affairs, vol. II, no. 2, JULY (2006). [3] Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang Yi Qin and Michael Chau “Crime Data Mining: A general framework and some examples,” IEEE Computer Society, vol.37, no.4, pp.50-56, (2004). [4] NasrullahMemon and HenrikLegind Larsen “Practical approaches for analysis, visualization and destabilizing terrorist networks,” presented at first international conference on availability, reliability and security, (2006). [5] Jennifer Schroeder, Hsinchun Chen, Jennifer Xu and Michael Chau “Automated criminal link analysis based on domain knowledge,” Journal of the American society for information science and technology, vol. 58, no.6, pp. 842-855, (2007). [6] Robert D. Duval, Kyle Christenseny, ArianSpahiuz “Bootstrapping a terrorist network,” presented in the conference of Southern Illinois University Carbondale, (2010). [7] C. C. Yang and T. D. Ng, “Terrorism and crime related weblog social network: link, content analysis and information visualization,” presented in IEEE international conference on intelligence and security informatics, New Brunswick, NJ, (2007). [8] Xu J. J., Chen H., “Using shortest path algorithms to identify criminal associations,” Decision Support Systems, vol. 38, pp. 473-487, (2004). [9] Boongoen, T., Q. Shen, and C. Price. “Disclosing false identity through hybrid link analysis,” AI and Law, in press. [10] Yoshiharu Maeno and Yukio Ohsawa “Analyzing covert social network foundation behind terrorism disaster,” Int. J. Services Sciences, vol. 2, no. 2, (2007). [11] Yoshiharu Maeno “Node discovery problem for a social network,” Connections, vol. 29, pp. 62-76, (2009). [12] Dombroski, Matthew and Kathleen M. Carley “NETEST: Estimating a terrorist network’s structure,” Computational & Mathematical Organization Theory, vol.8, pp.235-241, (2002). [13] Christopher E. Hutchins and Marge Benham-Hutchins “Hiding in plain sight: criminal network analysis,” Computational & Mathematical Organization Theory, vol.16, no.1 pp.89-111, (2009). [14] Dombroski, M., P. Fischbeck, and K. Carley, “Estimating the shape of covert networks,” presented in the proceedings of 8th International Command and Control Research and Technology Symposium, Washington, DC, June (2003).
  • 7. [15] S. Appavu , R. Rajaram, M. Muthupandian, G. Athiappan, K.S. Kashmeera “ Data mining based on intelligent analysis of threatening e-mail,” Knowledge-Based Systems, vol. 22, pp.392–393, (2009). [16] Carley, K.M.” A dynamic network approach to the assessment of terrorist groups and the impact of alternative courses of action,” In Visualizing Network Information. Meeting Proceedings RTOMP- IST-063. Neuilly-sur-Seine, France: RTO, pp. KN1-1 – KN1-10, (2006). [17] Ian A. McCulloh and Kathleen M. Carley “Social network change detection,” Carnegie Mellon University, School of Computer Science, Technical Report, CMU-CS-08-116. [18] Carley, K. M. “Estimating vulnerabilities in large covert networks,” presentedin the proceedings of 9th International Command and Control Research and Technology Symposium held at Loews Corornado Resort, CA. Evidence Based Research, Vienna, VA, (2004). [19] BORGATTI, S. “The key player problem,” presented in the proceedings of the National Academy of Sciences Workshop on Terrorism. National Academy of Sciences, Washington DC, (2002). [20] Shou-de Lin and Hans Chalupsky “Discovering and explaining abnormal nodes in semantic graphs,” IEEE Transactions on knowledge and data engineering, vol. 20, no. 8, pp.1039-1052, (2008). [21] NasrullahMemon, Nicholas Harkiolakis and David L. Hicks “Detecting High-Value Individuals in Covert Networks: 7/7 London Bombing Case Study,” in the proceedings of the IEEE/ACS International Conference on Computer Systems and Applications, pp. 206-215, (2008). [22] NasrullahMemon, Abdul RasoolQureshi, UffeKockWiil, David L. Hicks “Novel algorithms for subgroup detection in terrorist networks,” presented in the International Conference on Availability, Reliability and Security, Fukuoka Institute of Technology, Fukuoka, Japan, (2009). [23] Yuval Elovici, BrachaShapira, Mark Last, Omer Zaafrany and Menahem Friedman, Moti Schneider and Abraham Kandel “Detection of access to terror-related web sites using an Advanced Terror Detection System (ATDS),” Journal of the American society for information science and technology, vol.61, no.2, pp.405–418, (2010). [24] AparnaBasu “Social network analysis of terrorist organizations in India,” paper presented at the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, Notre Dame, Indiana, pp. 26-28, (2005). [25] Sudhir Saxena, K. Santhanam, AparnaBasu “Application of Social Network Analysis (SNA) to terrorist networks in Jammu & Kashmir,” Strategic Analysis, vol. 28, no.1, (2004). [26] UffeKockWiil, NasrullahMemon and JolantaGniadek “Knowledge management processes, tools and techniques for counterterrorism,” presented in the International conference on Knowledge Management and Information Sharing, pp. 29-36, (2009). [27] C. Weinstein, W. Campbell, B. Delaney, and J. O’Leary, “Modeling and detection techniques for counter-terror social network analysis and intent recognition,” presented in the proceedings of the IEEE Aerospace Conference, (2009). [28] Christopher C. Yang, Nan Liu, and Marc Sageman “Analyzing the terrorist social networks with visualization tools,” Intelligence and Security Informatics, Lecture Notes in Computer Science, vol. 3975,pp. 331-342, (2006).
  • 8. [29] Rebecca Goolsby “Combating terrorist networks: An evolutionary approach,” presented in the proceedings of the 8th International Command and Control Research and Technology Symposium held at National Defense War College Washington DC, Evidence Based Research Vienna VA, (2003). [30] Hsinchun Chen, Wingyan Chung, Jialun Qin, Edna Reid, Marc Sageman, Gabriel Weimann “Uncovering the dark web: A case study of Jihad on the web,” Journal of the American society for information science and technology, vol.59, no.8, pp.1347–1359, (2008). [31] Valdis E. Krebs “Mapping networks of terrorist cells,” Connections, vol.24, no.3, pp. 43-52, (2002). [32] Linton C. Freeman “Centrality in Social Networks Conceptual Clarification,” Social Networks, vol.1, pp. 215-239, (1978/79).
  • 9. SURVEY OF CLOUD COMPUTING Amira. A. Elsonbaty High Institute of Engineering & Technology in New Damietta ABSTRACT With expanding volumes of knowledgeable production and the variability of themes and roots, shapes and languages, most detectable issues related to the delivery of storage space for the information and the variety of treatment strategies in addition to the problems related to the flow of information and methods go down and take an interest in the advantage of them face the researchers. In any case, such a great significance comes with a support of a great infrastructure that includes large data centers comprising thousands of server units and other supporting equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is based on the internet, an image from the internet. Cloud Computing is a developed technology, cloud computing, possibly offers an overall economic benefit, in that end users shares a large, centrally achieved pool of storing and computing resources, rather than owning and managing their own systems. But, it needs to be environment friendly also. This review paper gives a general overview of cloud computing, also it describes cloud computing, architecture of cloud computing, characteristics of cloud computing, and different services and deployment model of cloud computing. This paper is for anyone who will have recently detected regarding cloud computing and desires to grasp a lot of regarding cloud computing. KEYWORDS cloud computing; architecture of cloud computing; characteristics of cloud computing Original Source URL: http://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf Volume Link: http://airccse.org/journal/jwsc/current2018.html
  • 10. REFERENCES [1] BhartiWadhwa, “Energy Saving Approaches for Green Cloud Computing: A Review”, Proceedings of 2014 RAECS UIET Panjab University Chandigarh, 06 - 08 March, 2014 978-1-4799-2291- 8/14/$31.00 ©2014 IEEE [2] JasleenKaur, Ms. AnupmaSehrawat, Ms. NehaBishnoi, " Survey Paper on Basics of Cloud Computing and Data Security," International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [3] https://en.wikipedia.org/wiki/Cloud_computing,12-9-4:30pm [4] YashpalsinhJadeja, KiritModi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [5] Qi Zhang, Lu Cheng and RaoufBoutaba, “Cloud computing: state-of-the-art and research challenges”. Journal of Internet Services and Applications, Volume 1, Issue 1, pp 7–18, May 2010 [6] Ivanka Menken," Cloud Computing - The Complete Cornerstone Guide to Cloud Computing Best Practices Concepts, Terms, and Techniques for Successfully Planning, Implementing ... Enterprise IT Cloud ComputingTechnology", London, UK, UK ©2008 , ISBN:1921573007 9781921573002,2008. [7] Ms. Disha H. Parekh, Dr. R. Sridaran, “An Analysis of Security Challenges in Cloud Computing,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 4, No.1, 2013. [8] JasleenKaur, Ms.AnupmaSehrawat, Ms.NehaBishnoi ,"Survey Paper on Basics of Cloud Computing and Data Security", International Journal of Computer Science Trends and Technology (IJCST) – Volume 2 Issue 3, May-Jun 2014. [9] M. Armbrust, O. Fox, R. Griffith, A. D. Joseph, Y. Katz, A. Konwinski, et al., "M.: Above the clouds: A Berkeley view of cloud computing," 2009. [10] S. Subashini and V. Kavitha, "A survey on security issues in service delivery models of cloud computing," Journal of Network and Computer Applications, vol. 34, pp. 1-11, 2011. [11] Aniruddha S. Rumale, D.N.Chaudhari, ” Cloud Computing: Infrastructure as a Service,” International Journal of Inventive Engineering and Sciences (IJIES) ISSN: 2319–9598, Volume-1, Issue-3, February 2013. [12] Imran Ashrafa, "An Overview of Service Models of Cloud Computing," International Journal of Multidisciplinary and Current Research 27 Aug 2014, Vol.2 [8] YashpalsinhJadeja; KiritModi, “Cloud Computing - Concepts, Architecture and Challenges” in Proceeding of International Conference on Computing, Electronics and Electrical Technologies [ICCEET], 2012. [13] Xu Wang, Beizhan Wang, Jing Huang, “Cloud computing and its key techniques” in Proceeding of IEEE Conference, 2011.
  • 11. [14] Michael Boniface, Bassem Nasser, JuriPapay, Stephen C. Phillips, Arturo Servin, Xiaoyu Yang, ZlatkoZlatev, Spyridon V. Gogouvitis, Gregory Katsaros, KleopatraKonstanteli, George Kousiouris, Andreas Menychtas, DimosthenisKyriazis, “Platform-as-a-Service Architecture for Real-time Quality of Service Management in Clouds,” Fifth International Conference on Internet and Web Applications and Services, 2010.
  • 12. Mobile Web – Strategy for Enterprise Success JitendraMaan Tata Consultancy Services, TCS Towers, 249 D & E, UdyogVihar Phase IV, Gurgaon, Haryana, India – 122001 ABSTRACT Today, enterprises are faced with increased global competition in an environment where customers are demanding faster delivery, better service and also want to gain significant and immediate business value by increasing productivity and reducing operational cost. Spurred by unprecedented customer demand, each Industry cluster has developed its own source of comparative advantage. Even within a single organization, the business value chain is geographically fragmented. Such diversification and fragmentation of value chain drives the need for cross-platform Web applications over mobile channel. Mobile Web is the next logical transition in this evolutionary process and Mobile Web applications will continue to gain more prominence in the enterprises not just to improve the return on investment in their existing system landscape, but also to expand global reach and improve operational efficiency of their mobile workforce. This paper outlines the critical business needs to rapidly create flexible Mobile web solutions across all lines of business. The paper enlightens the benefits offered by enabling web applications on Mobile devices and also addresses the current business challenges in developing Mobile Web applications. This paper is intended for all business domains irrespective of application portfolios. KEYWORDS Mobile computing, Mobile Web, Mobile Internet, Enterprise Mobility, Mobile Solutions, Mobile Web Solutions, Mobile web experience, Mobile Web Services Original Source URL: http://airccse.org/journal/jwsc/papers/3112ijwsc04.pdf Volume Link: http://airccse.org/journal/jwsc/current2012.html
  • 13. REFERENCES [1] John Arne Saeteras, Mobile Web vs. Native Apps, Revisited, 2010 [2] Dana Moore, Raymond Budd and Edward Benson, Professional Rich Internet Applications: AJAX and Beyond, Wrox Press © 2007 Citation [3] Designing for the Mobile Web, Sitepoint -http://www.sitepoint.com/designing-for-mobile-web/ [4] Forrester Report - Making The Case For The Mobile Internet by Julie A. Ask and Seth Fowler with J.P. Gownder and Laura Wiramihardja [5] Gartner Report - Key Issues for Mobile Applications, 2010, William Clark, Publication Date: 25 June 2010, ID Number: G00201576 [6] Gens, F.: IDC Predictions 2010: Recovery and Transformation, Filing Information: IDC #220987, 1, 3-7 (2009) [7] Gartner Report - Key Issues for Mobile Applications, 2010, William Clark, Publication Date: 25 June 2010, ID Number: G00201576 [8] Sudesh Prasad “Emerging Trends Enterprise Mobility: Always Connected”, Voice & Data, First Quarter, 2006 [9] yungMun, Corporate Technology Strategist, Alcatel-Lucent: Mobile Cloud Computing Challenges, September 201, TechZine, Technology and Research e-zone (September 2001), http://www2.alcatellucent.com/blogs/techzine/2010/mobile-cloud-computing-challenges
  • 14. SPEEDING UP THE WEB CRAWLING PROCESS ON A MULTI-CORE PROCESSOR USING VIRTUALIZATION Hussein Al-Bahadili1 , Hamzah Qtishat2 , Reyadh S. Naoum2 1 Faculty of Information Technology, Petra University, Amman, Jordan 2 Faculty of Information Technology, Middle East University, Amman, Jordan ABSTRACT A Web crawler is an important component of the Web search engine. It demands large amount of hardware resources (CPU and memory) to crawl data from the rapidly growing and changing Web. So that the crawling process should be a continuous process performed from time-to-time to maintain up-to-date crawled data. This paper develops and investigates the performance of a new approach to speed up the crawling process on a multi-core processor through virtualization. In this approach, the multi-core processor is divided into a number of virtual-machines (VMs) that can run in parallel (concurrently) performing different crawling tasks on different data. It presents a description, implementation, and evaluation of a VM-based distributed Web crawler. In order to estimate the speedup factor achieved by the VM-based crawler over a non- virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling times for various numbers of documents. Furthermore, the average crawling rate in documents per unit time is computed, and the effect of the number of VMs on the speedup factor is investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs. KEYWORDS Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi- core processor; distribution methodologies; processor-farm methodology. Original Source URL: http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf Volume Link: http://airccse.org/journal/jwsc/current2013.html
  • 15. REFERENCES [1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in Practice. Addison Wesley. [2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison Wesley. [3] WorldWideWebSize (2012). The size of the World Wide Web. http://www.worldwidewebsize.com. [4] T. Calishain. (2004). Web Search Garage. Prentice Hall. [5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc. [6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search Engines. VDM Verlag. [7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling. Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp. 287- 296. [8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea. [9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H. Isahara(2006).Collaborative Web Crawler over High-speed Research Network. Proceedings of the 1st International Conference on Knowledge, Information and Creativity Support Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand. [10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 – 726. [11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th International Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii, USA. [12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance Distributed Web Crawler.Proceedings of the 18th International Conference on Data Engineering, pp.357-368. February 26-March 1. San Jose, CA, USA. [13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234 [14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education.
  • 16. [15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip Microprocessors. International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330. [16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall. [17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query Web Search Engine Model. International Journal of Information Technology and Web Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56. [18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and Processes. The Morgan Kaufmann Series in Computer Architecture and Design. [19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media. [20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System Administrator. 1st Edition. No Starch Press. [21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW 1998), April 14-18, Brisbane, Australia. [22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp. 1623–1640. [23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings of the ACM Conference on Information and Knowledge Management (CIKM’02), November 4–9. McLean, Virginia, USA. [24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185- 193. [25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web Crawler. Proceedings of the 11th International Conference on World Wide Web (WWW 2002), May 7-11, Honolulu, Hawaii, USA. [26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs. University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305. Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04- 1305. [27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04), pp. 299-306, October 10-16, New York, USA.
  • 17. [28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany. [29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online Social Networks. Proceedings of the International Conference on World Wide Web (WWW 2007). May 8-12. PP. 201-210. Banff, Alberta, Canada. [30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on Virtual Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp. 519-528. [31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA. [32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile Crawler. International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India. [33] Xen (2012). http://www.xen.org. [34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it- works.html. [35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media. [36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman, Jordan. [37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for Embedded Parallel Systems. John Wiley & Sons. [38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation. Springer Verlag. New York, USA.
  • 18. AUTHORS Hussein Al-Bahadili is an associate professor at Petra University. He received his PhD and M.Sc degrees from University of London (Queen Mary College) in 1991 and 1988. He received his B.Sc in Engineering from the University of Baghdad in 1986. He has published many papers in different fields of science and engineering in numerous leading scholarly and practitioner journals, and presented at leading world-level scholarly conferences. His research interests include computer networks design and architecture, routing protocols optimizations, parallel and distributed computing, cryptography and network security, data compression, software and Web engineering. HamzaAlqtaishat is a senior developer at Yahoo Arabia, Amman, Jordan. He received his B.Sc degree from Al-Balqa Applied University, Jordan in 2006 and his M.Sc degree in Computer Information Systems from the Middle-East University, Amman, Jordan in 2012 under the supervision of Dr. Hussein Al-Bahadili. His current research interests are Web Search Engine Architecture and techniques, Virtual Machines, Parallel and Distributed Processing and Methodologies, Websites Development, Web Services, Network Scalability, and Social Networks. ReyadhS. Naoum is a professor at Middle East University, Amman, Jordan. He received his PhD and M.Sc degree from University of Manchester in 1976 and 1973.He received his B.Sc degree in Mathematics from University of Basra in 1969. He published more than one hundred papers in the field of Computer Science and Mathematicshigh standard journals, and well- recognized international conferences. His current interest includes Neural Computing and Genetic Algorithms, Image Processing, Cloud Computing, Computer Security and Instruction Detection Systems, Numerical Analysis Computation and Software.
  • 19. USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES Selwa ELFIRDOUSSI EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150, Benguerir, Morocco, ABSTRACT Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed. KEYWORDS Mobile web service; smart industry; Supply chain management; Service Oriented Architecture. Original Source URL: http://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf Volume Link: http://airccse.org/journal/jwsc/current2018.html
  • 20. REFERENCES [1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia, «Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp. 1-25, 2001. [2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution & Materials Management, vol. 19, n° %18, pp. 3-8, 1989. [3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and Challenges,» International Journal of Advanced Computer Science and Applications, vol. 5, n° %13, pp. 173-188, 2014. [4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services Selection for Mobile,» chez The 9th International Conference on INFOrmatics and Systems, 2014. [5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile devicesimplementation and experience,» Mobile Computing Systems and Applications, pp. 100-109, 2003. [6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services from mobile hosts,» chez Internet and Web Applications and Services, 2010. [7] S. Hamida, Uneapprochebasée agent mobile pour le m-service web sémantique, BISKRA: Université Mohamed Khider, 2014. [8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for mobile web services,» Computer Communications, p. 1097–1105, 2007. [9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,» chez International Conference on Software Engineering, Honolulu, 2010. [10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John Wiley & Sons, 2007. [11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and Implementations,» Technical paper, 2005. [12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,»InformaticaEconomică, vol. 14, n° %13, pp. 98-105, 2010. [13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture design of an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18, 2005. [14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile environments,» chez International conferance on Web Services (ICWS), Anchorage, 2014. [15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic Applications,» AIS Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009.
  • 21. [16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery and invocation of Web Services from mobile devices,» IEEE Transactions on Services Computing, vol. 5, n° %11, pp. 99-115, 2012. [17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th International Conference on web service, Hawai, 2012. [18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez ACM/IFIP/USENIX International Middleware Conference, New York, 2007. [19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,» Pervasive and Mobile Computing, vol. 13, p. 67–84, 2014. [20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE Internet Computing, vol. 10, n° %13, pp. 58-65, 2006. [21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing Scalable Mobile Web Service Provisioning,» chez International conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications, 2008. [22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in peer to peer networks,» chez Internet and Web Applications and Services, 2008. [23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,» chez World Congress on Services, Santa Clara Marriott, CA, USA, 2013. [24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through Android Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n° %17, pp. 3182- 3185, 2013. [25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web services,» chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014. [26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service Composition,» chez arXiv preprint arXiv:, 1304.5045. [27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and solutions,» IEEE wireless communications, pp. 38-47, 2004. [28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services security,» chez 3rd International Conference on Web Information Systems and Technologies, 2007. [29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and management,» European Journal of Operational Research, vol. 159, n° %12, pp. 269-295, 2004. [30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management Processes,» The International Journal of Logistics Management, vol. 12, n° %12, pp. 13-36, 2001. [31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case study,» Journal of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013.
  • 22. [32] A. Light, S. Punnettet K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content, Services, and Applications, Toronto: Mobile Experience Innovation Centre, 2012. [33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536, 2006. [34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible Through Use of EIS Platforms,» chez Instrumentation and Measurement Technology Conference, USA, 2003. [35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using GPS technology solutions: a case study,» chez POMS conference, Vancouver, 2010. [36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,» International Journal of Modern Engineering Research, pp. 084-088, 2012. [37] R. Angeles, «supply-chain applications and implementation issues,» Information systems management, vol. 22, n° %11, pp. 51-65, 2005. [38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply chain,» Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007. [39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A critical review,» Automation in Construction., 2016. [40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile Industry,» Cisco, 2012. [41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine based on popularity: Architecture and Implementation,» International Journal of Software Engineering and Its Applications, pp. 213-228, 2014. [42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,» chez CS & IT CSCP, 2014. AUTHOR After obtaining a Degree as a computer science engineer from ENSIAS in 2000, I started my career as a consultant in the field of information system. In 2015, I obtained a PhD in Computer Engineering and Applied Mathematics from the Cadi Ayyad University of Marrakech in co- supervision with the Saint-Jérôme University of Marseille on the classification, discovery and composition of web services Based on popularity. Then, I joined the UM6P as a university professor at EMINES School of Industrial Management, where I am in charge of the computer science courses of the Integrated Preparatory Cycle and the Engineering Cycle. I am also a member of the EMINES industrial management research team. My research works focuses on the development of decision support systems for the advanced management of supply chains Integrating the Service Oriented Architecture (SOA).
  • 23. CONTEMPORARY SEMANTIC WEB SERVICE FRAMEWORKS: AN OVERVIEW AND COMPARISONS Keyvan Mohebbi1 , Suhaimi Ibrahim2 , Norbik Bashah Idris3 1 Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (UTM), Malaysia 2,3 Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia ABSTRACT The growing proliferation of distributed information systems, allows organizations to offer their business processes to a worldwide audience through Web services. Semantic Web services have emerged as a means to achieve the vision of automatic discovery, selection, composition, and invocation of Web services by encoding the specifications of these software components in an unambiguous and machine-interpretable form. Several frameworks have been devised as enabling technologies for Semantic Web services. In this paper, we survey the prominent Semantic Web service frameworks. In addition, a set of criteria is identified and the discussed frameworks are evaluated and compared with respect to these criteria. Knowing the strengths and weaknesses of the Semantic Web service frameworks can help researchers to utilize the most appropriate one according to their needs. KEYWORDS Web services, Semantic Web, Semantic Web services, Semantic Web service Frameworks Original Source URL: http://airccse.org/journal/jwsc/papers/3312ijwsc06.pdf Volume Link: http://airccse.org/journal/jwsc/current2012.html
  • 24. REFERENCES [1] D. Fensel, et al., "Web Services," in Semantic Web Services, ed: Springer Berlin Heidelberg, 2011, pp. 37-65. [2] T. Berners-Lee, et al., "Uniform Resource Identifiers (URI): Generic Syntax," 1998. [3] (2004, November 25). Web Services Architecture Requirements. Available: http://www.w3.org/TR/wsa-reqs/ [4] D. Fensel, et al., "Semantic Web," in Semantic Web Services, ed: Springer Berlin Heidelberg, 2011, pp. 87-104. [5] G. Meditskos and N. Bassiliades, "Structural and Role-Oriented Web Service Discovery with Taxonomies in OWL-S," Knowledge and Data Engineering, IEEE Transactions on, vol. 22, pp. 278-290, 2010. [6] L. Cabral, et al., "Approaches to Semantic Web Services: an Overview and Comparisons," in The Semantic Web: Research and Applications. vol. 3053, C. Bussler, et al., Eds., ed: Springer Berlin / Heidelberg, 2004, pp. 225-239. [7] D. Martin, et al. (2004, December 6). OWL-S: Semantic Markup for Web Services. Available: http://www.w3.org/Submission/OWL-S/ [8] J. d. Bruijn, et al., "Web Service Modeling Ontology (WSMO)," DERI, 2005. [9] R. Akkiraju, et al. (2005, December 6). Web Service Semantics - WSDL-S. Available: http://www.w3.org/Submission/WSDL-S/ [10] Joel Farrell and H. Lausen. (2007, March 3). Semantic Annotations for WSDL and XML Schema. Available: http://www.w3.org/TR/sawsdl/ [11] R. Lara, et al., "A Conceptual Comparison of WSMO and OWL-S," in Web Services, ed, 2004, pp. 254-269. [12] R. Akkiraju, "Semantic Web Services," in Semantic Web Services: Theory, Tools, and Applications, J. Cardoso, Ed., ed Hershey, NY: Information Science Reference, 2007, pp. 191-216. [13] N. Yacoubi Ayadi and M. Ben Ahmed, "An Enhanced Framework for Semantic Web Service Discovery," in Exploring Services Science. vol. 82, M. Snene, et al., Eds., ed: Springer Berlin Heidelberg, 2011, pp. 53-67. [14] (2003, March 12). Standard Upper Ontology Working Group (SUO WG) Home Page. Available: http://suo.ieee.org/
  • 25. [15] (2002, March 12). The Object Management Group: Meta-Object Facility (MOF™), version 1.4. Available: http://www.omg.org/technology/documents/formal/mof.htm [16] D. Fensel and C. Bussler, "The web service modeling framework WSMF," Electronic Commerce Research and Applications, vol. 1, pp. 113-137, 2002. [17] J. d. Bruijn, et al., "Web Service Modeling Language (WSML)," DERI, 2005. [18] C. Bussler, et al. (2005, March 12). Web Service Execution Environment (WSMX). Available: http://www.w3.org:80/Submission/WSMX/ [19] R. Chinnici, et al. (2007, November 27). Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language. Available: http://www.w3.org/TR/wsdl20 [20] (March 3). Semantic Annotations for WSDL Working Group. Available: http://www.w3.org/2002/ws/sawsdl/ [21] K. Iqbal, et al., "Semantic Service Discovery using SAWSDL and SPARQL," 2008. [22] N. Steinmetz, et al. (2008). Simplifying the Web Service Discovery Process. 1st Workshop on Semantic Metadata Management and Applications (SeMMA '08) at the 5th European Semantic Web Conference (ESWC '08) 346. Available: http://CEUR-WS.org/Vol- 346 [23] D. Fensel, et al., "Related Work in the Area of Semantic Web Service Frameworks," in Enabling Semantic Web Services, ed: Springer-Verlag Berlin Heidelberg, 2007, pp. 101-110. [24] J. Cardoso, Semantic Web Services: Theory, Tools, and Applications. Hershey, NY: Information Science Reference, 2007. [25] X. Du, "Semantic Service Description Framework for Efficient Service Discovery and Composition," Doctor of Philosophy PhD thesis, Department of Computer Sciences, University of Durham, 2009.