Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.
From these perspectives, this International Journal on Web Service Computing (IJWSC) is a quarterly open access peer-reviewed journal aims to act as a research platform to share and explore the main issues in Web Service Computing by publishing the current trends & technologies and research methods in the associated fields and thereby to promote the related research community.
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
October 2020 - Top Read Articles in Web Service Computing
1. OOccttoobbeerr 22002200:: TToopp RReeaadd
AArrttiicclleess iinn WWeebb SSeerrvviiccee
CCoommppuuttiinngg
International Journal on Web Service Computing
(IJWSC)
ISSN : 0976 - 9811 (Online) ; 2230 - 7702 (print)
http://airccse.org/journal/jwsc/ijwsc.html
2. BUSINESS RULE MANAGEMENT FRAMEWORK
FOR ENTERPRISE WEB SERVICES
Thirumaran.M1
and Ilavarasan.E2
and Thanigaivel.K3
and Abarna. S4
1
Department of Computer science and Engineering, Pondicherry Engg College, India.
2
Department of Computer science and Engineering, Pondicherry Engg College, India.
3
Department of Computer science and Engineering, Pondicherry Engg College, India.
4
Department of Computer science and Engineering, Pondicherry Engg College, India.
ABSTRACT
Making a business rule extraction more dynamic is an open issue, and we think it is feasible if
we decompose the business process structure in a set of rules, each of them representing a
transition of the business process. As a consequence the business process engine can be realized
by reusing and integrating an existing Rule Engine. We are proposing a way for extracting the
business rules and then to modify it at the runtime. Business rules specifies the constraints that
affect the behaviors and also specifies the derivation of conditions that affect the execution flow.
The rules can be extracted from use cases, specifications or system code. But since not many
enterprises capture their business rules in a structured, explicit form like documents or implicit
software codes, they need to be identified first, before being captured and managed. These rules
change more often than the processes themselves, but changing and managing business rules is a
complex task beyond the abilities of most business analysts. The capturing process focuses on
the identification of the potential business rules sources. As business logic requirements change,
business analysts can update the business logic without enlisting the aid of the IT staff. The new
logic is immediately available to all client applications. In current trend the rules are modified or
changed in the static time phase. But this paper provides to change the rules at the run time. Here
the rules are extracted from the services and can be a changed dynamically. The existing rules
are modified and attached to source code without hindering service to the end user which can be
achieved with source control systems. When the rules are revised, it provides a path in budding
new business logic. This new business logic can be adopted for the efficient software
development.
KEYWORDS
Dynamic Rule Execution, Business process, Business rules, Business Rules Approaches.
Original Source URL: http://airccse.org/journal/jwsc/papers/1210ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/currentissue.html
3. REFERENCES
[1] Chun Ouyang , “From Business Process Models to Process-Oriented Software Systems”
[2] Michael zurMuehlen, “Business Process and Business Rule Modeling Languages for Compliance
Management: A Representational Analysis”, Twenty-Sixth International Conference on Conceptual
Modeling - ER 2007 - Tutorials, Posters, Panels and Industrial Contributions, Auckland, New
Zealand.
[3] Josef Schiefer, “Event-Driven Rules for Sensing and Responding to Business Situations”.
[4] Claire Costello, “ Orchestrating Supply chain Interactions using Emerging Process Description
Languages and Business Rules”.
[5] AncaAndreescu, “ A General Software Development Process Suitable for Explicit Manipulation of
Business Rules”
[6] Milan Milanović1, “ Modeling Service Orchestrations with a Rule-enhanced Business Process
Language”
[7] OlegasVasilecas,” Ensuring Consistency of Information Systems Rules Models”.
[8] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”.
[9] Bruno de MouraAraujo, “ A method for Validating the Compliance of Business Processes to
Business Rules”.
[10] Nicholas Zsifkov, “ Business Rules Domains and Business Rules Modeling”.
[11] Antonio Oliveira, “ Filho Change Impact Analysis from Business Rules”.
[12] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach
Supported by Pattern Identification”.
[13] Timon C. Du and Hsing-Ling Chen ,“Building a Multiple-Criteria Negotiation Support System”,
IEEE transactions on knowledge and data engineering, vol. 19, no. 6, June 2007.
[14] Sam Weber, Hoi Chan, Lou Degenaro, Judah Diament, AchilleFokoue-Nkoutche, and Isabelle
Rouvellou, “Fusion: A System For Business Users To Manage Program Variability”, IEEE
Transaction on software engineering , Nov 2008.
[15] H. M. Sneed, “Extracting Business Logic from Existing COBOL Programs as a Basis for
Redevelopment”, 9th International Workshop on Program Comprehension, Toronto, Canada, 2001,
pp. 167-175.
[16] Sangseung Kang, “Design of Rule Object Model for Business Rule Systems”, 1996,pp. 818-822.
[17] Olga Levina, “Extracting Business Logic from Business Process Models”, 2010 IEEE.
4. [18] Mohammed Alawairdhi, “A Business-Logic Based Framework for Evolving Software Systems”,
2009 33rd Annual IEEE International Computer Software and Applications Conference.
[19] OlegasVasilecas, “Ensuring Consistency of Information Systems Rules Models”, the International
Multiconference on Computer Science and Information Technology, 2008.
[20] AnisCharfi, “ Hybrid Web Service Composition: Business Processes Meet Business Rules”,
ICSOC'04, November 15–19, 2004, New York, New York, USA.
[21] Jose F. Mejia Bernal, “ Dynamic Context-Aware Business Process: A Rule-Based Approach
Supported by Pattern Identification”, SAC’10, March 22-26, 2010, Sierre, Switzerland.
[22] GulnozaZiyaeva, Eunmi Choi, and Dugki Min, “Content-Based Intelligent Routing and Message
Processing in Enterprise Service Bus”, International Conference on Convergence and Hybrid
Information Technology, 2008
[23] en.wikipedia.org/wiki/Business_rule
AUTHORS
Thirumaran. M, working as Asst.Professor in Pondicherry Engineering College, Pondicherry,
India, one of India’s premier institutions providing high quality education and a great platform
for research. He pursued his B.Tech and M.Tech in Computer Science and Engineering from the
Pondicherry University. The author is specialized in Web Services and Business Object Model
and possesses a very profound knowledge in the same. He has worked on establishing the
Business Object Model and Business Logic System with respect to Web Service Computation,
Web Service Composition and Web Service Customization. His flair for research has made him
explore deep in this domain and he has published more than 20 papers in various International
Conferences, Journals and Magazines. Currently he is working on developing a model for
Business Logic Systems for various E-Commerce systems.
Ilavarasan.E, working as Associate Professor in Pondicherry Engineering College, Pondicherry,
India. He received his Bachelor’s degree in Mathematics from the University of Madras in the
year 1987 and Master’s degree in Computer Applications in the year 1990 from Pondicherry
University. Later he completed his M.Tech., degree in Computer Science and Engineeering at
Pondicherry University in the year 1997. He has published more than Twenty five research
papers in the International Journals and Conferences. His area of specialization includes Parallel
and Distributed Systems, Design of Operating System and Web Technology.
Thanigaivel.K, studying in Pondicherry Engineering College, Pondicherry, India. He received
his B.Tech degree in Computer Science and Engineering from the Pondicherry University in the
year 2009. He currently pursuing M.Tech., degree in Computer Science and Engineering at
Pondicherry University and he is currently working in the area of Webservices.
Abarna.S, studying in Pondicherry Engineering College, Pondicherry, India. She currently
pursuing M.Tech., degree in Computer Science and Engineering at Pondicherry University and
she is currently working in the area of Webservices.
5. A COMPARATIVE STUDY OF SOCIAL
NETWORKING APPROACHES IN IDENTIFYING
THE COVERT NODES
Karthika S1
and Bose S2
1
Teaching Fellow 2
Assistant Professor
Department of Computer Science and Engineering
College of Engineering Guindy, Anna University, Chennai-600096
ABSTRACT
This paper categories and compares various works done in the field of social networking for
covert networks. It uses criminal network analysis to categorize various approaches in social
engineering like dynamic network analysis, destabilizing covert networks, counter terrorism, key
player, subgroup detection and homeland security. The terrorist network has been taken for study
because of its network of individuals who spread from continents to continents and have an
effective influence of their ideology throughout the globe. It also presents various metrics based
on which the centrality of nodes in the graphs could be identified and it’s illustrated based on a
synthetic dataset for 9/11 attack. This paper will also discuss various open problems in this area.
KEYWORDS
Criminal Network Analysis (CNA), Social Network Analysis (SNA), Terrorist Network.
Original Source URL: http://airccse.org/journal/jwsc/papers/0911wsc06.pdf
Volume Link: http://airccse.org/journal/jwsc/current2011.html
6. REFERENCES
[1] Jennifer J.Xu and Hsinchun Chen, “CrimeNet Explorer: A framework for criminal network
knowledge discovery,” ACM Transactions on Information Systems, vol.23, no.2, pp. 201-226, April
(2005).
[2] Steve Ressler, “Social network analysis as an approach to combat terrorism: past, present, and future
research,” Homeland Security Affairs, vol. II, no. 2, JULY (2006).
[3] Hsinchun Chen, Wingyan Chung, Jennifer Jie Xu, Gang Wang Yi Qin and Michael Chau “Crime
Data Mining: A general framework and some examples,” IEEE Computer Society, vol.37, no.4,
pp.50-56, (2004).
[4] NasrullahMemon and HenrikLegind Larsen “Practical approaches for analysis, visualization and
destabilizing terrorist networks,” presented at first international conference on availability, reliability
and security, (2006).
[5] Jennifer Schroeder, Hsinchun Chen, Jennifer Xu and Michael Chau “Automated criminal link
analysis based on domain knowledge,” Journal of the American society for information science and
technology, vol. 58, no.6, pp. 842-855, (2007).
[6] Robert D. Duval, Kyle Christenseny, ArianSpahiuz “Bootstrapping a terrorist network,” presented in
the conference of Southern Illinois University Carbondale, (2010).
[7] C. C. Yang and T. D. Ng, “Terrorism and crime related weblog social network: link, content analysis
and information visualization,” presented in IEEE international conference on intelligence and
security informatics, New Brunswick, NJ, (2007).
[8] Xu J. J., Chen H., “Using shortest path algorithms to identify criminal associations,” Decision
Support Systems, vol. 38, pp. 473-487, (2004).
[9] Boongoen, T., Q. Shen, and C. Price. “Disclosing false identity through hybrid link analysis,” AI and
Law, in press.
[10] Yoshiharu Maeno and Yukio Ohsawa “Analyzing covert social network foundation behind terrorism
disaster,” Int. J. Services Sciences, vol. 2, no. 2, (2007).
[11] Yoshiharu Maeno “Node discovery problem for a social network,” Connections, vol. 29, pp. 62-76,
(2009).
[12] Dombroski, Matthew and Kathleen M. Carley “NETEST: Estimating a terrorist network’s structure,”
Computational & Mathematical Organization Theory, vol.8, pp.235-241, (2002).
[13] Christopher E. Hutchins and Marge Benham-Hutchins “Hiding in plain sight: criminal network
analysis,” Computational & Mathematical Organization Theory, vol.16, no.1 pp.89-111, (2009).
[14] Dombroski, M., P. Fischbeck, and K. Carley, “Estimating the shape of covert networks,” presented
in the proceedings of 8th International Command and Control Research and Technology
Symposium, Washington, DC, June (2003).
7. [15] S. Appavu , R. Rajaram, M. Muthupandian, G. Athiappan, K.S. Kashmeera “ Data mining based on
intelligent analysis of threatening e-mail,” Knowledge-Based Systems, vol. 22, pp.392–393, (2009).
[16] Carley, K.M.” A dynamic network approach to the assessment of terrorist groups and the impact of
alternative courses of action,” In Visualizing Network Information. Meeting Proceedings RTOMP-
IST-063. Neuilly-sur-Seine, France: RTO, pp. KN1-1 – KN1-10, (2006).
[17] Ian A. McCulloh and Kathleen M. Carley “Social network change detection,” Carnegie Mellon
University, School of Computer Science, Technical Report, CMU-CS-08-116.
[18] Carley, K. M. “Estimating vulnerabilities in large covert networks,” presentedin the proceedings of
9th International Command and Control Research and Technology Symposium held at Loews
Corornado Resort, CA. Evidence Based Research, Vienna, VA, (2004).
[19] BORGATTI, S. “The key player problem,” presented in the proceedings of the National Academy of
Sciences Workshop on Terrorism. National Academy of Sciences, Washington DC, (2002).
[20] Shou-de Lin and Hans Chalupsky “Discovering and explaining abnormal nodes in semantic graphs,”
IEEE Transactions on knowledge and data engineering, vol. 20, no. 8, pp.1039-1052, (2008).
[21] NasrullahMemon, Nicholas Harkiolakis and David L. Hicks “Detecting High-Value Individuals in
Covert Networks: 7/7 London Bombing Case Study,” in the proceedings of the IEEE/ACS
International Conference on Computer Systems and Applications, pp. 206-215, (2008).
[22] NasrullahMemon, Abdul RasoolQureshi, UffeKockWiil, David L. Hicks “Novel algorithms for
subgroup detection in terrorist networks,” presented in the International Conference on Availability,
Reliability and Security, Fukuoka Institute of Technology, Fukuoka, Japan, (2009).
[23] Yuval Elovici, BrachaShapira, Mark Last, Omer Zaafrany and Menahem Friedman, Moti Schneider
and Abraham Kandel “Detection of access to terror-related web sites using an Advanced Terror
Detection System (ATDS),” Journal of the American society for information science and
technology, vol.61, no.2, pp.405–418, (2010).
[24] AparnaBasu “Social network analysis of terrorist organizations in India,” paper presented at the
North American Association for Computational Social and Organizational Science (NAACSOS)
Conference, Notre Dame, Indiana, pp. 26-28, (2005).
[25] Sudhir Saxena, K. Santhanam, AparnaBasu “Application of Social Network Analysis (SNA) to
terrorist networks in Jammu & Kashmir,” Strategic Analysis, vol. 28, no.1, (2004).
[26] UffeKockWiil, NasrullahMemon and JolantaGniadek “Knowledge management processes, tools and
techniques for counterterrorism,” presented in the International conference on Knowledge
Management and Information Sharing, pp. 29-36, (2009).
[27] C. Weinstein, W. Campbell, B. Delaney, and J. O’Leary, “Modeling and detection techniques for
counter-terror social network analysis and intent recognition,” presented in the proceedings of the
IEEE Aerospace Conference, (2009).
[28] Christopher C. Yang, Nan Liu, and Marc Sageman “Analyzing the terrorist social networks with
visualization tools,” Intelligence and Security Informatics, Lecture Notes in Computer Science, vol.
3975,pp. 331-342, (2006).
8. [29] Rebecca Goolsby “Combating terrorist networks: An evolutionary approach,” presented in the
proceedings of the 8th International Command and Control Research and Technology Symposium
held at National Defense War College Washington DC, Evidence Based Research Vienna VA,
(2003).
[30] Hsinchun Chen, Wingyan Chung, Jialun Qin, Edna Reid, Marc Sageman, Gabriel Weimann
“Uncovering the dark web: A case study of Jihad on the web,” Journal of the American society for
information science and technology, vol.59, no.8, pp.1347–1359, (2008).
[31] Valdis E. Krebs “Mapping networks of terrorist cells,” Connections, vol.24, no.3, pp. 43-52, (2002).
[32] Linton C. Freeman “Centrality in Social Networks Conceptual Clarification,” Social Networks,
vol.1, pp. 215-239, (1978/79).
9. SURVEY OF CLOUD COMPUTING
Amira. A. Elsonbaty
High Institute of Engineering & Technology in New Damietta
ABSTRACT
With expanding volumes of knowledgeable production and the variability of themes and roots,
shapes and languages, most detectable issues related to the delivery of storage space for the
information and the variety of treatment strategies in addition to the problems related to the flow
of information and methods go down and take an interest in the advantage of them face the
researchers. In any case, such a great significance comes with a support of a great infrastructure
that includes large data centers comprising thousands of server units and other supporting
equipment. The cloud is not a small, undeveloped branch of it, it is a type of computing that is
based on the internet, an image from the internet. Cloud Computing is a developed technology,
cloud computing, possibly offers an overall economic benefit, in that end users shares a large,
centrally achieved pool of storing and computing resources, rather than owning and managing
their own systems. But, it needs to be environment friendly also. This review paper gives a
general overview of cloud computing, also it describes cloud computing, architecture of cloud
computing, characteristics of cloud computing, and different services and deployment model of
cloud computing. This paper is for anyone who will have recently detected regarding cloud
computing and desires to grasp a lot of regarding cloud computing.
KEYWORDS
cloud computing; architecture of cloud computing; characteristics of cloud computing
Original Source URL: http://aircconline.com/ijwsc/V9N4/9418ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
11. [14] Michael Boniface, Bassem Nasser, JuriPapay, Stephen C. Phillips, Arturo Servin, Xiaoyu Yang,
ZlatkoZlatev, Spyridon V. Gogouvitis, Gregory Katsaros, KleopatraKonstanteli, George Kousiouris,
Andreas Menychtas, DimosthenisKyriazis, “Platform-as-a-Service Architecture for Real-time
Quality of Service Management in Clouds,” Fifth International Conference on Internet and Web
Applications and Services, 2010.
12. Mobile Web – Strategy for Enterprise Success
JitendraMaan
Tata Consultancy Services, TCS Towers, 249 D & E, UdyogVihar Phase IV, Gurgaon,
Haryana, India – 122001
ABSTRACT
Today, enterprises are faced with increased global competition in an environment where
customers are demanding faster delivery, better service and also want to gain significant and
immediate business value by increasing productivity and reducing operational cost. Spurred by
unprecedented customer demand, each Industry cluster has developed its own source of
comparative advantage. Even within a single organization, the business value chain is
geographically fragmented. Such diversification and fragmentation of value chain drives the
need for cross-platform Web applications over mobile channel. Mobile Web is the next logical
transition in this evolutionary process and Mobile Web applications will continue to gain more
prominence in the enterprises not just to improve the return on investment in their existing
system landscape, but also to expand global reach and improve operational efficiency of their
mobile workforce. This paper outlines the critical business needs to rapidly create flexible
Mobile web solutions across all lines of business. The paper enlightens the benefits offered by
enabling web applications on Mobile devices and also addresses the current business challenges
in developing Mobile Web applications. This paper is intended for all business domains
irrespective of application portfolios.
KEYWORDS
Mobile computing, Mobile Web, Mobile Internet, Enterprise Mobility, Mobile Solutions, Mobile
Web Solutions, Mobile web experience, Mobile Web Services
Original Source URL: http://airccse.org/journal/jwsc/papers/3112ijwsc04.pdf
Volume Link: http://airccse.org/journal/jwsc/current2012.html
14. SPEEDING UP THE WEB CRAWLING PROCESS
ON A MULTI-CORE PROCESSOR USING
VIRTUALIZATION
Hussein Al-Bahadili1
, Hamzah Qtishat2
, Reyadh S. Naoum2
1
Faculty of Information Technology, Petra University, Amman, Jordan
2
Faculty of Information Technology, Middle East University, Amman, Jordan
ABSTRACT
A Web crawler is an important component of the Web search engine. It demands large amount of
hardware resources (CPU and memory) to crawl data from the rapidly growing and changing
Web. So that the crawling process should be a continuous process performed from time-to-time
to maintain up-to-date crawled data. This paper develops and investigates the performance of a
new approach to speed up the crawling process on a multi-core processor through virtualization.
In this approach, the multi-core processor is divided into a number of virtual-machines (VMs)
that can run in parallel (concurrently) performing different crawling tasks on different data. It
presents a description, implementation, and evaluation of a VM-based distributed Web crawler.
In order to estimate the speedup factor achieved by the VM-based crawler over a non-
virtualization crawler, extensive crawling experiments were carried-out to estimate the crawling
times for various numbers of documents. Furthermore, the average crawling rate in documents
per unit time is computed, and the effect of the number of VMs on the speedup factor is
investigated. For example, on an Intel® Core™ i5-2300 CPU @2.80 GHz and 8 GB memory, a
speedup factor of ~1.48 is achieved when crawling 70000 documents on 3 and 4 VMs.
KEYWORDS
Web search engine; Web crawler; virtualization; virtual machines; distributed crawling; multi-
core processor; distribution methodologies; processor-farm methodology.
Original Source URL: http://airccse.org/journal/jwsc/papers/4113ijwsc02.pdf
Volume Link: http://airccse.org/journal/jwsc/current2013.html
15. REFERENCES
[1] B. Croft, D. Metzler, &T. Strohman (2009). Search Engines: Information Retrieval in
Practice. Addison Wesley.
[2] M. Levene (2005). An Introduction to Search Engine and Web Navigation. Addison Wesley.
[3] WorldWideWebSize (2012). The size of the World Wide Web.
http://www.worldwidewebsize.com.
[4] T. Calishain. (2004). Web Search Garage. Prentice Hall.
[5] C. Olston&M. Najork (2010). Web Crawling. Now Publishers Inc.
[6] Q. Tan (2009). Designing New Crawling and Indexing Techniques for Web Search Engines.
VDM Verlag.
[7] W. Gao, H. C. Lee, &Y. Miao (2006). Geographically Focused Collaborative Crawling.
Proceedings of the 15th International Conference on World Wide Web (WWW’06), pp. 287-
296.
[8] D. Mukhopadhyay, S. Mukherjee, S.Ghosh, S. Kar, &Y. C. Kim(2006). Architecture of a
Scalable Dynamic Parallel WebCrawler with High Speed Downloadable Capability for a
Web Search Engine. Proceedings of the 6th International Workshop on Multimedia Signal
Processing & Transmission (MSPT’06). pp. 103-108. Jeonju, Korea.
[9] S. Tongchim, P.Srichaivattana, C.Kruengkrai, V.Sornlertlamvanich, &H.
Isahara(2006).Collaborative Web Crawler over High-speed Research Network. Proceedings
of the 1st International Conference on Knowledge, Information and Creativity Support
Systems, pp. 302-308. August 1-4. Ayutthaya, Thailand.
[10] Boldi, P., Codenotti, B., Santini, M., & Vigna, S. (2004). UbiCrawler: A Scalable Fully
Distributed Web Crawler. Software: Practice and Experience, Vol. 34, Issue 8, pp. 711 – 726.
[11] J. Cho,&H. Garcia-Molina (2002). Parallel Crawlers. Proceedings of the 11th
International Conference on World Wide Web (WWW’02). May 7-11. Honolulu, Hawaii,
USA.
[12] V. Shkapenyuk&T. Suel (2002).Design and Implementation of a High-Performance
Distributed Web Crawler.Proceedings of the 18th International Conference on Data
Engineering, pp.357-368. February 26-March 1. San Jose, CA, USA.
[13] I. Hernandez, C. R.Rivero, D. Ruiz, &R. Corchuelo (2012) An Architecture for Efficient
Web Crawling. Lecture Notes in Business Information Processing, Vol. 112, pp. 228-234
[14] S. Ghoshal (2011). Computer Architecture and Organization. Pearson Education.
16. [15] J. Laudon L.Spracklen (2007). The ComingWave of Multithreaded Chip
Microprocessors. International Journal of Parallel Programming, Vol. 35, No. 3, pp. 299-330.
[16] T. L. Floyd (2009). Digital Fundamentals. 10th Edition. Prentice Hall.
[17] H. Al-Bahadili&S. Al-Saab (2011).Development of a Novel Compressed Index-Query
Web Search Engine Model. International Journal of Information Technology and Web
Engineering (IJITWE), Vol. 6, No. 3, pp. 39-56.
[18] J. Smith &R. Nair (2005). Virtual Machines: Versatile Platforms for Systems and
Processes. The Morgan Kaufmann Series in Computer Architecture and Design.
[19] N. Smyth (2010). Xen Virtualization Essentials. Payload Media.
[20] C. Takemura &L. Crawford (2009). The Book of Xen: A Practical Guide for the System
Administrator. 1st Edition. No Starch Press.
[21] J. Cho, H. Garcia-Molina &L. Page (1998). Efficient Crawling Through URL
Ordering.Proceedings of the 7th International World-Wide Web Conference (WWW 1998),
April 14-18, Brisbane, Australia.
[22] S. Chakrabarti, M. van den Berg, &B. Dom (1999). Focused Crawling: A New Approach
to Topic-Specific Web Resource Discovery. Computer Networks, Vol 31, Issue 11-16, pp.
1623–1640.
[23] C. Chung &C. L. A. Clarke (2002). Topic-Oriented Collaborative Crawling. Proceedings
of the ACM Conference on Information and Knowledge Management (CIKM’02),
November 4–9. McLean, Virginia, USA.
[24] H. Yan, J. Wang, X. Li, & L. Guo (2002). Architectural Design and Evaluation of an
Efficient Webcrawling System. Journal of System and software, Vol. 60, Issue 3, pp.185-
193.
[25] T. Takahashi, H. Soonsang, K. Taura, & A. Yonezawa (2002). World Wide Web
Crawler. Proceedings of the 11th International Conference on World Wide Web (WWW
2002), May 7-11, Honolulu, Hawaii, USA.
[26] B. T. Loo, O. Cooper, & S. Krishnamurthy(2004). Distributed Web Crawling over DHTs.
University of California, Berkeley. EECS Technical Report Identifier: CSD-04-1305.
Retrieved on 12 August 2012 fromhttp://techreports.lib.berkeley.edu/accessPages/CSD-04-
1305.
[27] Y. Hafri&C. Djeraba(2004). High Performance Crawling System. Proceedings of the 6th
ACM SIGMM International Workshop on Multimedia Information Retrieval (MIR’04), pp.
299-306, October 10-16, New York, USA.
17. [28] J. Exposto, J. Macedo, A. Pina, A. Alves, &J. Rufino (2005). Geographical Partition for
Distributed Web Crawling. Proceedings of the 2nd International ACM Workshop on
Geographic Information Retrieval (GIR 2005), ACM Press, pp. 55-60, Bremen, Germany.
[29] D. H. P. Chau, S. Pandit, S. Wang, &C. Faloutsos (2007). Parallel Crawling for Online
Social Networks. Proceedings of the International Conference on World Wide Web (WWW
2007). May 8-12. PP. 201-210. Banff, Alberta, Canada.
[30] S. Ibrahim, H. Jin, L. Lu, L. Qi, S. Wu, &X. Shi (2009). Evaluating MapReduce on
Virtual Machines: The Hadoop Case. Lecture Notes in Computer Science, Vol. 5931, pp.
519-528.
[31] J. M. Hsieh, S. D. Gribble, &H. M. Levy (2010). The Architecture and Implementation of
an Extensible Web Crawler. Proceedings of the 7th USENIX Symposium on Networked
Systems Design and Implementation (NSDI '10). April 28-30. San Jose, California, USA.
[32] S. Anbukodi&K. M. Manickam (2011). Reducing Web Crawler Overhead Using Mobile
Crawler. International Conference on Emerging Trends in Electrical and Computer
Technology (ICETECT 2011). pp. 926-932. March 23-24. Nagercoil, India.
[33] Xen (2012). http://www.xen.org.
[34] F. Hartl (2012). Nutch How It Works. http://www.florianhartl.com/nutch-how-it-
works.html.
[35] T. White (2012). Hadoop: The Definitive guide. 3rd Edition. O'Reilly Media.
[36] H. M. Qtishat (2012). Developing a Virtual-Machine-Based Distributed Web Crawling
Model. MSc Thesis. Faculty of Information Technology, Middle East University, Amman,
Jordan.
[37] M. Fleury&A. Downton (2004). Pipelined Processor Farms: Structured Design for
Embedded Parallel Systems. John Wiley & Sons.
[38] S. Roosta (2000). Parallel Processing and Parallel Algorithms: Theory and computation.
Springer Verlag. New York, USA.
18. AUTHORS
Hussein Al-Bahadili is an associate professor at Petra University. He received his PhD and M.Sc
degrees from University of London (Queen Mary College) in 1991 and 1988. He received his
B.Sc in Engineering from the University of Baghdad in 1986. He has published many papers in
different fields of science and engineering in numerous leading scholarly and practitioner
journals, and presented at leading world-level scholarly conferences. His research interests
include computer networks design and architecture, routing protocols optimizations, parallel and
distributed computing, cryptography and network security, data compression, software and Web
engineering.
HamzaAlqtaishat is a senior developer at Yahoo Arabia, Amman, Jordan.
He received his B.Sc degree from Al-Balqa Applied University, Jordan in
2006 and his M.Sc degree in Computer Information Systems from the
Middle-East University, Amman, Jordan in 2012 under the supervision of
Dr. Hussein Al-Bahadili. His current research interests are Web Search
Engine Architecture and techniques, Virtual Machines, Parallel and
Distributed Processing and Methodologies, Websites Development, Web
Services, Network Scalability, and Social Networks.
ReyadhS. Naoum is a professor at Middle East University, Amman, Jordan.
He received his PhD and M.Sc degree from University of Manchester in
1976 and 1973.He received his B.Sc degree in Mathematics from University
of Basra in 1969. He published more than one hundred papers in the field of
Computer Science and Mathematicshigh standard journals, and well-
recognized international conferences. His current interest includes Neural
Computing and Genetic Algorithms, Image Processing, Cloud Computing,
Computer Security and Instruction Detection Systems, Numerical Analysis
Computation and Software.
19. USING MOBILE SERVICE FOR SUPPLY CHAIN
MANAGEMENT: A SURVEY AND CHALLENGES
Selwa ELFIRDOUSSI
EMINES, School of Industrial Management, University Mohamed 6 Polytechnic, 43150,
Benguerir, Morocco,
ABSTRACT
Efficient supply chain management calls for robust analytical and optimal models to automate its
process. Therefore, information technology is an essential ingredient that integrates these tools in
supply chain. With the emergence of wireless, the high technologies and the reliability of mobile
devices, mobile web services draw a promising horizon facing economic challenges. They offer
new personalized services to each actor in the supply chain on their mobile devices at anytime
and anywhere. This paper presents a literature review of mobile web service implemented on the
industry context based on the supply chain management approach. First, a large definition of
mobile web service and some proposal architecture are exposed. Then the paper discuss some
generic related work on mobile web service focusing on supply chain management. Finally some
challenges on m-service oriented supply chain management are proposed.
KEYWORDS
Mobile web service; smart industry; Supply chain management; Service Oriented Architecture.
Original Source URL: http://aircconline.com/ijwsc/V9N2/9218ijwsc01.pdf
Volume Link: http://airccse.org/journal/jwsc/current2018.html
20. REFERENCES
[1] J. T. Mentzer, W. DeWitt, J. S. Keebler, S. Min, N. W. Nix, C. D. Smith et Z. G. Zacharia,
«Defining Supply Chain Mangement,» Journal of Business logistics, vol. 22, n° %12, pp. 1-25,
2001.
[2] S. c. Graham, «Integrating the supply chain,» International Journal of Physical Distribution &
Materials Management, vol. 19, n° %18, pp. 3-8, 1989.
[3] K. Elgazzar, P. Martin et H. Hassanein, «Mobile Web Services: State of the Art and Challenges,»
International Journal of Advanced Computer Science and Applications, vol. 5, n° %13, pp. 173-188,
2014.
[4] E. Elabd, P. M. El-Kafrawy et E. M. Abou-Nassar, «Semantic-based Web Services Selection for
Mobile,» chez The 9th International Conference on INFOrmatics and Systems, 2014.
[5] S. Berger, S. Mcfaddin, C. Narayanaswami et M. Raghunath, «Web services on mobile
devicesimplementation and experience,» Mobile Computing Systems and Applications, pp. 100-109,
2003.
[6] F. AlShahwan et K. Moessner, «Providing SOAP Web services and RESTful Web services from
mobile hosts,» chez Internet and Web Applications and Services, 2010.
[7] S. Hamida, Uneapprochebasée agent mobile pour le m-service web sémantique, BISKRA:
Université Mohamed Khider, 2014.
[8] T. M. Voigt, T. Naumowicz, H. Ritter et J. Schiller, «Performance considerations for mobile web
services,» Computer Communications, p. 1097–1105, 2007.
[9] M. Treiber, C. Scherling et S. Dustdar, «Applying SOA Principles on Mobile Platforms,» chez
International Conference on Software Engineering, Honolulu, 2010.
[10] F. Hirsch, J. Kemp et J. Ilkka, Mobile web services: architecture and implementation, John Wiley &
Sons, 2007.
[11] S. Oh et G. C. Fox, «HHFR: A new architecture for Mobile Web Services Principles and
Implementations,» Technical paper, 2005.
[12] A. COBÂRZAN, «Consuming Web Services on Mobile Platforms,»InformaticaEconomică, vol. 14,
n° %13, pp. 98-105, 2010.
[13] M. Chen, D. Zhang et L. Zhou, «Providing web services to mobile users: the architecture design of
an m-service portal,» Int. J. Mobile Communications, vol. 3, n° %11, pp. 1-18, 2005.
[14] S. Abhishek et V. Rohit, «A novel web service directory framework for mobile environments,» chez
International conferance on Web Services (ICWS), Anchorage, 2014.
[15] V. D. a. W. L. Sonja Zaplata, «Realizing Mobile Web Services for Dynamic Applications,» AIS
Transactions on Enterprise Systems, vol. 2, n° %11, pp. 3-12, 2009.
21. [16] H. Artail, K. Fawaz et A. Ghandour, «A Proxy-Based architecture for dynamic discovery and
invocation of Web Services from mobile devices,» IEEE Transactions on Services Computing, vol.
5, n° %11, pp. 99-115, 2012.
[17] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Popularity based Web Service Search,» chez 19th
International Conference on web service, Hawai, 2012.
[18] S. N. Srirama, M. Jarke et W. Prinz, «Mobile web services mediation framework,» chez
ACM/IFIP/USENIX International Middleware Conference, New York, 2007.
[19] K. Elgazzar, H. Hassanein et P. Martin, «Cloud-based mobile Web service discovery,» Pervasive
and Mobile Computing, vol. 13, p. 67–84, 2014.
[20] M. Adacal et A. Bener, «Mobile Web services: a new agent-based framework,» IEEE Internet
Computing, vol. 10, n° %13, pp. 58-65, 2006.
[21] S. N. Srirama, M. Jarke et W. Prinz, «MWSMF: A Mediation Framework Realizing Scalable Mobile
Web Service Provisioning,» chez International conference on MOBILe Wireless MiddleWARE,
Operating Systems, and Applications, 2008.
[22] S. N. Srirama, M. Jarke, H. Zhu et H. Prinz, «Scalable mobile web service discovery in peer to peer
networks,» chez Internet and Web Applications and Services, 2008.
[23] K. Elgazzar, P. Martin et H. Hassanein, «Personalized Mobile Web Service Discovery,» chez World
Congress on Services, Santa Clara Marriott, CA, USA, 2013.
[24] R. Kumar et V. K. Kiran, «Dynamic Discovery and Invocation of Web services Through Android
Mobile,» International Journal of Engineering Trends and Technology, vol. 4, n° %17, pp. 3182-
3185, 2013.
[25] F. AlShahwan et M. Faisal, «Mobile cloud computing for providing complex mobile web services,»
chez Mobile Cloud Computing, Services, and Engineering, San Francisco, 2014.
[26] C. Chang et S. Ling, «Towards an Infrastructure-less SOA for Mobile Web Service Composition,»
chez arXiv preprint arXiv:, 1304.5045.
[27] H. YANG, H. LUO et F. YE, «Security in mobile ad hoc networks: challenges and solutions,» IEEE
wireless communications, pp. 38-47, 2004.
[28] S. N. Rirama, M. Jarke et Prinz, «A performance evaluation of mobile web services security,» chez
3rd International Conference on Web Information Systems and Technologies, 2007.
[29] A. Gunasekaran et E. W. Ngai, «Information systems in supply chain integration and management,»
European Journal of Operational Research, vol. 159, n° %12, pp. 269-295, 2004.
[30] K. Croxton , S. Garcia-Dastugue et D. M. Lambert, «The Supply Chain Management Processes,»
The International Journal of Logistics Management, vol. 12, n° %12, pp. 13-36, 2001.
[31] T. L. Rakestraw, R. V. Eunni et R. R. Kasuganti, «The mobile apps industry: A case study,» Journal
of Business Cases and Applications, vol. 9, n° %11, pp. 1-26, 2013.
22. [32] A. Light, S. Punnettet K. Webb, Mobile Innovation: Ontario’s Growing Mobile Content, Services,
and Applications, Toronto: Mobile Experience Innovation Centre, 2012.
[33] O. Irena et R. Knut, «Mobile Business in Logistics,» In GI Jahrestagung, pp. 530-536, 2006.
[34] Ö. Åke, S. Linus, L. Per et D. Jerker, «Mobile Medical Applications Made Feasible Through Use of
EIS Platforms,» chez Instrumentation and Measurement Technology Conference, USA, 2003.
[35] R. Michaelides, Z. Michaelides et D. Nicolaou, «Optimisation of logistics operations using GPS
technology solutions: a case study,» chez POMS conference, Vancouver, 2010.
[36] K. S. Chinchu et G. Selvakumar, «Web Service based e-logistics application,» International Journal
of Modern Engineering Research, pp. 084-088, 2012.
[37] R. Angeles, «supply-chain applications and implementation issues,» Information systems
management, vol. 22, n° %11, pp. 51-65, 2005.
[38] T. Kelepouris, K. Pramatari et G. Doukidis, «RFID-enabled traceability in the food supply chain,»
Industrial Management & Data Systems, vol. 107, n° %12, pp. 183-200, 2007.
[39] Q. Shi et X. Ding, «Mobile Internet based construction supply chain management: A critical
review,» Automation in Construction., 2016.
[40] S. Taylor, «The New Mobile World Order : Perspectives on the Future of the Mobile Industry,»
Cisco, 2012.
[41] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Discovery and Visual Interactive WS Engine based on
popularity: Architecture and Implementation,» International Journal of Software Engineering and Its
Applications, pp. 213-228, 2014.
[42] S. Elfrirdoussi, Z. Jarir et M. Quafafou, «Web Service Composition Based on Popularity,» chez CS
& IT CSCP, 2014.
AUTHOR
After obtaining a Degree as a computer science engineer from ENSIAS in
2000, I started my career as a consultant in the field of information system.
In 2015, I obtained a PhD in Computer Engineering and Applied
Mathematics from the Cadi Ayyad University of Marrakech in co-
supervision with the Saint-Jérôme University of Marseille on the
classification, discovery and composition of web services Based on
popularity. Then, I joined the UM6P as a university professor at EMINES
School of Industrial Management, where I am in charge of the computer
science courses of the Integrated Preparatory Cycle and the Engineering
Cycle. I am also a member of the EMINES industrial management research
team. My research works focuses on the development of decision support
systems for the advanced management of supply chains Integrating the
Service Oriented Architecture (SOA).
23. CONTEMPORARY SEMANTIC WEB SERVICE
FRAMEWORKS: AN OVERVIEW AND
COMPARISONS
Keyvan Mohebbi1
, Suhaimi Ibrahim2
, Norbik Bashah Idris3
1
Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia (UTM),
Malaysia
2,3
Advanced Informatics School (AIS), Universiti Teknologi Malaysia (UTM), Malaysia
ABSTRACT
The growing proliferation of distributed information systems, allows organizations to offer their
business processes to a worldwide audience through Web services. Semantic Web services have
emerged as a means to achieve the vision of automatic discovery, selection, composition, and
invocation of Web services by encoding the specifications of these software components in an
unambiguous and machine-interpretable form. Several frameworks have been devised as
enabling technologies for Semantic Web services. In this paper, we survey the prominent
Semantic Web service frameworks. In addition, a set of criteria is identified and the discussed
frameworks are evaluated and compared with respect to these criteria. Knowing the strengths and
weaknesses of the Semantic Web service frameworks can help researchers to utilize the most
appropriate one according to their needs.
KEYWORDS
Web services, Semantic Web, Semantic Web services, Semantic Web service Frameworks
Original Source URL: http://airccse.org/journal/jwsc/papers/3312ijwsc06.pdf
Volume Link: http://airccse.org/journal/jwsc/current2012.html
24. REFERENCES
[1] D. Fensel, et al., "Web Services," in Semantic Web Services, ed: Springer Berlin Heidelberg,
2011, pp. 37-65.
[2] T. Berners-Lee, et al., "Uniform Resource Identifiers (URI): Generic Syntax," 1998.
[3] (2004, November 25). Web Services Architecture Requirements. Available:
http://www.w3.org/TR/wsa-reqs/
[4] D. Fensel, et al., "Semantic Web," in Semantic Web Services, ed: Springer Berlin
Heidelberg, 2011, pp. 87-104.
[5] G. Meditskos and N. Bassiliades, "Structural and Role-Oriented Web Service Discovery with
Taxonomies in OWL-S," Knowledge and Data Engineering, IEEE Transactions on, vol. 22,
pp. 278-290, 2010.
[6] L. Cabral, et al., "Approaches to Semantic Web Services: an Overview and Comparisons," in
The Semantic Web: Research and Applications. vol. 3053, C. Bussler, et al., Eds., ed:
Springer Berlin / Heidelberg, 2004, pp. 225-239.
[7] D. Martin, et al. (2004, December 6). OWL-S: Semantic Markup for Web Services.
Available: http://www.w3.org/Submission/OWL-S/
[8] J. d. Bruijn, et al., "Web Service Modeling Ontology (WSMO)," DERI, 2005.
[9] R. Akkiraju, et al. (2005, December 6). Web Service Semantics - WSDL-S. Available:
http://www.w3.org/Submission/WSDL-S/
[10] Joel Farrell and H. Lausen. (2007, March 3). Semantic Annotations for WSDL and XML
Schema. Available: http://www.w3.org/TR/sawsdl/
[11] R. Lara, et al., "A Conceptual Comparison of WSMO and OWL-S," in Web Services, ed,
2004, pp. 254-269.
[12] R. Akkiraju, "Semantic Web Services," in Semantic Web Services: Theory, Tools, and
Applications, J. Cardoso, Ed., ed Hershey, NY: Information Science Reference, 2007, pp.
191-216.
[13] N. Yacoubi Ayadi and M. Ben Ahmed, "An Enhanced Framework for Semantic Web
Service Discovery," in Exploring Services Science. vol. 82, M. Snene, et al., Eds., ed:
Springer Berlin Heidelberg, 2011, pp. 53-67.
[14] (2003, March 12). Standard Upper Ontology Working Group (SUO WG) Home Page.
Available: http://suo.ieee.org/
25. [15] (2002, March 12). The Object Management Group: Meta-Object Facility (MOF™),
version 1.4. Available: http://www.omg.org/technology/documents/formal/mof.htm
[16] D. Fensel and C. Bussler, "The web service modeling framework WSMF," Electronic
Commerce Research and Applications, vol. 1, pp. 113-137, 2002.
[17] J. d. Bruijn, et al., "Web Service Modeling Language (WSML)," DERI, 2005.
[18] C. Bussler, et al. (2005, March 12). Web Service Execution Environment (WSMX).
Available: http://www.w3.org:80/Submission/WSMX/
[19] R. Chinnici, et al. (2007, November 27). Web Services Description Language (WSDL)
Version 2.0 Part 1: Core Language. Available: http://www.w3.org/TR/wsdl20
[20] (March 3). Semantic Annotations for WSDL Working Group. Available:
http://www.w3.org/2002/ws/sawsdl/
[21] K. Iqbal, et al., "Semantic Service Discovery using SAWSDL and SPARQL," 2008.
[22] N. Steinmetz, et al. (2008). Simplifying the Web Service Discovery Process. 1st
Workshop on Semantic Metadata Management and Applications (SeMMA '08) at the 5th
European Semantic Web Conference (ESWC '08) 346. Available: http://CEUR-WS.org/Vol-
346
[23] D. Fensel, et al., "Related Work in the Area of Semantic Web Service Frameworks," in
Enabling Semantic Web Services, ed: Springer-Verlag Berlin Heidelberg, 2007, pp. 101-110.
[24] J. Cardoso, Semantic Web Services: Theory, Tools, and Applications. Hershey, NY:
Information Science Reference, 2007.
[25] X. Du, "Semantic Service Description Framework for Efficient Service Discovery and
Composition," Doctor of Philosophy PhD thesis, Department of Computer Sciences,
University of Durham, 2009.