The aim of this paper is to propose a modeling framework, tailored to build efficient, elastic and autonomous applications from tasks and services. It includes integrated services to develop the software products, reusing on demand in-house services with specific requirements and flexible the representational state transfer (REST) services. The idea is to decouple authorization for reduced service dependency and to provide a possibility for developing the whole application by increasing the existing application flexibility. Based on the fact that there are different web application platforms that serve to offer services to users but they are not integrated; we propose a framework with high flexibility degree, especially integrating the most used services such: e-learning, administrative, and library services, as University services are concern.
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture
Study on Use Case Model for Service Oriented Architecture Developmentijcnes
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant endures business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture.
Contemporary research challenges and applications of service oriented archite...Dr. Shahanawaj Ahamad
Service Oriented Architecture (SOA) is distributed architectural framework that provides service-based
solutions for improving the effectiveness of enterprise’s IT infrastructure. In this framework, technical and
business processes are implemented as services. A service is an independent software application that has been
designed to perform a specific function with emphasis on loose coupling between interacting services and their
components. SOA permits developers to utilize many of the resources from existing services to form the
distributed applications. This study has investigated to highlight the emerging issues of SOA such as service
structures advancement, requirements of evolution for current age applications like mobile-cloud, medical and
mechanism for interoperable operations. The paper also uncovers the practical application domains of SOA. It
has identified research attentions in these domains with detection of issues to carry further research to
overcome constraints in current scenarios.
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise applications are in-capable of integrating with
different business silos lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using “Service Oriented Architecture” and its core technologyenables the business enterprise systems flexible, loosely coupled and improves agility. Enterprise business
systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here the definition of SOA, its layers and the core technologies have been discussed.
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture
Study on Use Case Model for Service Oriented Architecture Developmentijcnes
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant endures business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture.
Contemporary research challenges and applications of service oriented archite...Dr. Shahanawaj Ahamad
Service Oriented Architecture (SOA) is distributed architectural framework that provides service-based
solutions for improving the effectiveness of enterprise’s IT infrastructure. In this framework, technical and
business processes are implemented as services. A service is an independent software application that has been
designed to perform a specific function with emphasis on loose coupling between interacting services and their
components. SOA permits developers to utilize many of the resources from existing services to form the
distributed applications. This study has investigated to highlight the emerging issues of SOA such as service
structures advancement, requirements of evolution for current age applications like mobile-cloud, medical and
mechanism for interoperable operations. The paper also uncovers the practical application domains of SOA. It
has identified research attentions in these domains with detection of issues to carry further research to
overcome constraints in current scenarios.
BUSINESS SILOS INTEGRATION USING SERVICE ORIENTED ARCHITECTUREIJCSEA Journal
Agile integration satisfies the business agility and provides solutions for maintaining business changes and ensures that the enterprise survives in the current competition. Any business should be robust enough to respond to end user request. Existing traditional enterprise applications are in-capable of integrating with
different business silos lacks to improve the business agility. To address this issue, this paper is about the agile integration of different business silos using “Service Oriented Architecture” and its core technologyenables the business enterprise systems flexible, loosely coupled and improves agility. Enterprise business
systems have to adopt Service Oriented Architecture (SOA) as it promises to help them respond more rapidly to changing business requirements by composing new solutions from existing business services. Here the definition of SOA, its layers and the core technologies have been discussed.
Continuous Testing of Service-Oriented Applications Using Service Virtualizationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MV-SOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MV-SOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MVSOA. To reach such combination, the
MVSOA architecture was taken and we added to the client-side a private cloud in SaaS and DaaS.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
With the increasing usage of smartphones and other devices, digitization of banking sector is expected to catch up the increasing expectations of the customer. Banks have a significant role in our lives. Every one of us will execute at least a single financial transaction in a day. Hence, it becomes necessary for banks to enrich customer experience. Digitization becomes mandate feature for banks since it is being adopted in all industries in day to day life. Banks love mainframes because only mainframes can provide a single, unified, efficient solution to a host of different problems. Most of the banks uses Mainframe because of it robust, reliable and secured processing power. It also supports the new technologies like mobile, cloud etc., A business case is presented in this paper to explain Micro service and API framework for existing legacy system. Existing architecture is tightly coupled services with less standardization and fair performance. The aim of this paper is to provide solutions to convert the existing architecture to flexible service to support business for time-to-market, increase in performance and operational efficiency and improve customer experience.
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
Today electronic Governance (E-governance) is no more a buzzword but a reality as countries all over the
worldwide have shown interest in harnessing governance with state-of-the-art information and
communication technology(ICT), in order to foster better governance. However, the inherent complexities
of E-governance systems remain as a challenge for the architects to develop large scale, distributed, and
interoperable E-governance applications. Besides this the dynamic nature of such applications further
complicates the system design. In this paper, we present a design approach based on the service oriented
paradigm for building E-governance systems. We also formalize concepts like service environment, service
composition, and service collaboration which are some of the important ingredients of our design
approach. In the sequel we highlight the suitability of our approach through some E-governance service
provisioning scenarios
Stateful library service system design and implementation in Saudi ArabiaIJECEIAES
Service system has become one of the most challenging best practices in industry. Following this trend, most of the organizations in Saudi Arabia aggressively build their services. The services are mainly developed with a stateless technique to avoid several issues, although there are some acknowledged advantages of using a stateful technique. In library system, these issues are related to the number of visitors, the number of services, the storage capacity and the organization size. The purpose of this research is to develop and publish services that have a capability in reading all required data from library management system. It also aims to improve the service by applying a stateful technique. Technology acceptance model is used to measure the acceptance of a stateful service system through organizations and customers that gave thoughtful prediction to high level management in library to support them in decision making.
In this study, machine learning is examined in relation to commercial machine learning's resilience to the COVID-19 pandemic-related crisis. Two approaches are used to assess the pandemic's impact on machine learning risk, as well as a method to prioritize sectors according to the crisis's potential negative consequences. I conducted the study to determine Santander machine learning's resilience. The data mining area offers prospects for COVID-19's future. A total of 13 machine learning demos were selected for its organization. The Hellweg strategy and the technique for order preference by similarity to ideal solution (TOPSIS) technique were utilized as direct request strategies. Parametric assessment of machine learning versatility in business was based on capital sufficiency, liquidity proportion, market benefits, and share in an arrangement of openings with a perceived disability, and affectability of machine learning's credit portfolio to monetary hazard. As a result of the COVID-19 pandemic, these enterprises were ranked according to their threat. Based on the findings of the research, machine learning worked the best for the pandemic. Meanwhile, machine learning suffered the most during the downturn. It can be seen, for example, in conversations about the impact of the pandemic on developing business sector soundness and managing financial framework solidity risk.
Agriculture has since become a major source of livelihood for Nigerians. It also accounts for over 85% of the total food consumed within her borders. The sector has maintained improved productivity and profitability via a concerted effort to address critical issues such as an unorganized regulatory system, lack of food safety data, no standards in agricultural produce, non-adaptation to precision farming, and non-harmony via inventory trace supports. This study proposes blockchain-based trace-support in a continued effort to ensure food quality, consumer safety, and trading of food assets. It uses the radio frequency identification (RFID) sensor to register and track livestocks, farms/farmers, and abattoir processes as well as provisions a databank to trace livestock data. Results show the model adequately perform about 1,101 transactions per seconds with a response time of 0.21 s for queries and 0.28 s for https pages respectively for 2,500 users. Also, it yields a slightly longer time of 0.32 s for queries and 0.38 s for https pages respectively with an increased 5,000 users via the world-state as stored in the blockchain’s hyper-fabric ledger. Overall, the framework can directly query and retrieve data without it traversing the whole ledger. This, in turn, improves the efficiency and effectiveness of the traceability system.
Continuous Testing of Service-Oriented Applications Using Service Virtualizationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MV-SOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MV-SOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MVSOA. To reach such combination, the
MVSOA architecture was taken and we added to the client-side a private cloud in SaaS and DaaS.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
With the increasing usage of smartphones and other devices, digitization of banking sector is expected to catch up the increasing expectations of the customer. Banks have a significant role in our lives. Every one of us will execute at least a single financial transaction in a day. Hence, it becomes necessary for banks to enrich customer experience. Digitization becomes mandate feature for banks since it is being adopted in all industries in day to day life. Banks love mainframes because only mainframes can provide a single, unified, efficient solution to a host of different problems. Most of the banks uses Mainframe because of it robust, reliable and secured processing power. It also supports the new technologies like mobile, cloud etc., A business case is presented in this paper to explain Micro service and API framework for existing legacy system. Existing architecture is tightly coupled services with less standardization and fair performance. The aim of this paper is to provide solutions to convert the existing architecture to flexible service to support business for time-to-market, increase in performance and operational efficiency and improve customer experience.
A SERVICE ORIENTED DESIGN APPROACH FOR E-GOVERNANCE SYSTEMSijitcs
Today electronic Governance (E-governance) is no more a buzzword but a reality as countries all over the
worldwide have shown interest in harnessing governance with state-of-the-art information and
communication technology(ICT), in order to foster better governance. However, the inherent complexities
of E-governance systems remain as a challenge for the architects to develop large scale, distributed, and
interoperable E-governance applications. Besides this the dynamic nature of such applications further
complicates the system design. In this paper, we present a design approach based on the service oriented
paradigm for building E-governance systems. We also formalize concepts like service environment, service
composition, and service collaboration which are some of the important ingredients of our design
approach. In the sequel we highlight the suitability of our approach through some E-governance service
provisioning scenarios
Stateful library service system design and implementation in Saudi ArabiaIJECEIAES
Service system has become one of the most challenging best practices in industry. Following this trend, most of the organizations in Saudi Arabia aggressively build their services. The services are mainly developed with a stateless technique to avoid several issues, although there are some acknowledged advantages of using a stateful technique. In library system, these issues are related to the number of visitors, the number of services, the storage capacity and the organization size. The purpose of this research is to develop and publish services that have a capability in reading all required data from library management system. It also aims to improve the service by applying a stateful technique. Technology acceptance model is used to measure the acceptance of a stateful service system through organizations and customers that gave thoughtful prediction to high level management in library to support them in decision making.
In this study, machine learning is examined in relation to commercial machine learning's resilience to the COVID-19 pandemic-related crisis. Two approaches are used to assess the pandemic's impact on machine learning risk, as well as a method to prioritize sectors according to the crisis's potential negative consequences. I conducted the study to determine Santander machine learning's resilience. The data mining area offers prospects for COVID-19's future. A total of 13 machine learning demos were selected for its organization. The Hellweg strategy and the technique for order preference by similarity to ideal solution (TOPSIS) technique were utilized as direct request strategies. Parametric assessment of machine learning versatility in business was based on capital sufficiency, liquidity proportion, market benefits, and share in an arrangement of openings with a perceived disability, and affectability of machine learning's credit portfolio to monetary hazard. As a result of the COVID-19 pandemic, these enterprises were ranked according to their threat. Based on the findings of the research, machine learning worked the best for the pandemic. Meanwhile, machine learning suffered the most during the downturn. It can be seen, for example, in conversations about the impact of the pandemic on developing business sector soundness and managing financial framework solidity risk.
Agriculture has since become a major source of livelihood for Nigerians. It also accounts for over 85% of the total food consumed within her borders. The sector has maintained improved productivity and profitability via a concerted effort to address critical issues such as an unorganized regulatory system, lack of food safety data, no standards in agricultural produce, non-adaptation to precision farming, and non-harmony via inventory trace supports. This study proposes blockchain-based trace-support in a continued effort to ensure food quality, consumer safety, and trading of food assets. It uses the radio frequency identification (RFID) sensor to register and track livestocks, farms/farmers, and abattoir processes as well as provisions a databank to trace livestock data. Results show the model adequately perform about 1,101 transactions per seconds with a response time of 0.21 s for queries and 0.28 s for https pages respectively for 2,500 users. Also, it yields a slightly longer time of 0.32 s for queries and 0.38 s for https pages respectively with an increased 5,000 users via the world-state as stored in the blockchain’s hyper-fabric ledger. Overall, the framework can directly query and retrieve data without it traversing the whole ledger. This, in turn, improves the efficiency and effectiveness of the traceability system.
Diabetic retinopathy (DR) is one of the most common causes of blindness. The necessity for a robust and automated DR screening system for regular examination has long been recognized in order to identify DR at an early stage. In this paper, an embedded DR diagnosis system based on convolutional neural networks (CNNs) has been proposed to assess the proper stage of DR. We coupled the power of CNN with transfer learning to design our model based on state-of-the-art architecture. We preprocessed the input data, which is color fundus photography, to reduce undesirable noise in the image. After training many models on the dataset, we chose the adopted ResNet50 because it produced the best results, with a 92.90% accuracy. Extensive experiments and comparisons with other research work show that the proposed method is effective. Furthermore, the CNN model has been implemented on an embedded target to be a part of a medical instrument diagnostic system. We have accelerated our model inference on a field programmable gate array (FPGA) using Xilinx tools. Results have confirmed that a customized FPGA system on chip (SoC) with hardware accelerators is a promising target for our DR detection model with high performance and low power consumption.
As many countries experience the emergence of new waves of Covid-19, many governments around the world have reminded their citizens of the need for an engaging intervention that could improve compliance with Covid-19 safe behaviors using the media general public or social media. In the face of the serious threat of Covid-19, immunity issues are currently the subject of various research and studies. A promising approach is to use video game culture to educate and train citizens to healthily adopt eating habits to strengthen the immune system. The objective of this study is to develop a prototype of a serious game (SG) on how to strengthen the immune defenses in order to be able to fight a coronavirus infection and to constitute an antivirus barrier. After defining the learning objectives by interviewing the stakeholders, we searched the scientific literature to establish the relevant theoretical bases. The learning contents have been validated by biology teachers. The learning mechanisms were then determined based on the learning objectives. The obtained experimental results show that 92% of the participants in the study have appreciated the quality of the scenario and the way in which the concept of interaction between the different game elements was presented.
The need for automated speech recognition has expanded as a result of significant industrial expansion for a variety of automation and humanmachine interface applications. The speech impairment brought on by communication disorders, neurogenic speech disorders, or psychological speech disorders limits the performance of different artificial intelligencebased systems. The dysarthric condition is a neurogenic speech disease that restricts the capacity of the human voice to articulate. This article presents a comprehensive survey of the recent advances in the automatic dysarthric speech recognition (DSR) using machine learning (ML) and deep learning (DL) paradigms. It focuses on the methodology, database, evaluation metrics, and major findings from the study of previous approaches. From the literature survey it provides the gaps between exiting work and previous work on DSR and provides the future direction for improvement of DSR. The performance of the various machine and DL schemes is evaluated for the DSR on UASpeech dataset based on accuracy, precision, recall, and F1- score. It is observed that the DL based DSR schems outperforms the ML based DSR schemes.
The router is a network device that is used to connect subnetwork and packet-switched networking by directing the data packets to the intended IP addresses. It succeeds the traffic between different systems and allows several devices to share the internet connection. The router is applicable for the effective commutation in system on chip (SoC) modules for network on chip (NoC) communication. The research paper emphasizes the design of the two dimensional (2D) router hardware chip in the Xilinx integrated system environment (ISE) 14.7 software and further logic verification using the data packets transmitted from all input/output ports. The design evaluation is done based on the pre-synthesis device utilization summary relating to different field programmable gate array (FPGA) boards such as Spartan-3E (XC3S500E), Spartan-6 (XC6SLX45), Virtex-4 (XC4VFX12), Virtex-5 (XC5VSX50T), and Virtex-7 (XC7VX550T). The 64-bit data logic is verified on the different ports of the router configuration in the Xilinx and Modelsim waveform simulator. The Virtex-7 has proven the fast-switching speed and optimal hardware parameters in comparison to other FPGAs.
In this work, an internet of things (IoT) sensing and monitoring box has been developed. The proposed low-cost system is a portable device for smart buildings to measure vibrations, monitor, and control noise caused by the industrial machines. We will present an instrument and a method to measure the vibration and tilt of a mechanical system (air conditioner). The primary goal is to create a signal acquisition and monitoring system that is both userfriendly and affordable, while also delivering exceptional precision. The key concept is centered around acquiring and processing signals through the Raspberry Pi. We will use for the first time as an application, which does not exist before, a conversion method to control and monitor remotely the noise generated by the machines. Once the noise reaches a high value or the air conditioner is too much tilted, the system sends an alert in the form of an email. We will use the Python language to acquire and process the signal and send the alerts. The proposed approach is straightforward to implement, and the obtained results demonstrate a high level of accuracy that is consistent with the existing literature.
The use of a convolutional neural network (CNN) to analyze and classify electroencephalogram (EEG) signals has recently attracted the interest of researchers to identify epileptic seizures. This success has come with an enormous increase in the computational complexity and memory requirements of CNNs. For the sake of boosting the performance of CNN inference, several hardware accelerators have been proposed. The high performance and flexibility of the field programmable gate array (FPGA) make it an efficient accelerator for CNNs. Nevertheless, for resource-limited platforms, the deployment of CNN models poses significant challenges. For an ease of CNN implementation on such platforms, several tools and frameworks have been made available by the research community along with different optimization techniques. In this paper, we proposed an FPGA implementation for an automatic seizure detection approach using two CNN models, namely VGG-16 and ResNet-50. To reduce the model size and computation cost, we exploited two optimization approaches: pruning and quantization. Furthermore, we presented the results and discussed the advantages and limitations of two implementation alternatives for the inference acceleration of quantized CNNs on Zynq-7000: an advanced RISC machine (ARM) software implementation-based ARM, NN, software development kit (SDK) and a software/hardware implementation-based deep learning processor unit (DPU) accelerator and DNNDK toolkit.
A number of benefits have been reported for computer-based assessments over traditional paper-based exams, both in terms of IT support for question development, reduced distribution and test administration costs, and automated support. Possible for the ranking. However, existing computerized assessment systems do not provide all kinds of questions, namely open questions that require writing solutions. To overcome the challenges of the existing, the objective of this work is to achieve an intelligent evaluation system (IES) responding to the problems identified, and which adapts to the different types of questions, especially open-ended questions of which the answer requires sentence writing or programming.
Convolutional neural networks (CNN) trained using deep learning (DL) have advanced dramatically in recent years. Researchers from a variety of fields have been motivated by the success of CNNs in computer vision to develop better CNN models for use in other visually-rich settings. Successes in image classification and research have been achieved in a wide variety of domains throughout the past year. Among the many popularized image classification techniques, the detection of plant leaf diseases has received extensive research. As a result of the nature of the procedure, image quality is often degraded and distortions are introduced during the capturing of the image. In this study, we look into how various CNN models are affected by distortions. Corn-maze leaf photos from the 4,188-image corn or maize leaf Dataset (split into four categories) are under consideration. To evaluate how well they handle noise and blur, researchers have deployed pre-trained deep CNN models like visual geometry group (VGG), InceptionV3, ResNet50, and EfficientNetB0. Classification accuracy and metrics like as recall and f1-score are used to evaluate CNN performance.
In this research, we present a low phase noise (PN) and wide tuning range 175 GHz inductors and capacitors (LC) voltage-controlled oscillator (VCO) based on a differential Colpitts oscillator that was designed using a 0.13 μm bipolar complementary metal oxide semiconductor (BiCMOS) and simulated. The square of the tank Q-factor and the square of the oscillation amplitude were both maximized to reduce PN. With an extensive examination of parasitic, mathematical analysis of load impedances, and implementation of differential design, the PN was reduced, and the output power was enhanced. Using a supply voltage of 1.6 V, the VCO consumes 41.9 mA, resulting in a total power usage of 67 mW to prevent undesirable PN deterioration, an inter-stage LC filter at the VCO-buffer interface increases the swing at the buffer input. To make a better output, a buffer is used to isolate the load from the VCO core. In addition, the VCO has a high linearity and the overall, the VCO presented in this study demonstrates excellent performance and has the potential to be used in a wide range of applications that require a high-performance, low-power VCO.
Diseases in edible and industrial plants remains a major concern, affecting producers and consumers. The problem is further exacerbated as there are different species of plants with a wide variety of diseases that reduce the effectiveness of certain pesticides while increasing our risk of illness. A timely, accurate and automated detection of diseases can be beneficial. Our work focuses on evaluating deep learning (DL) approaches using transfer learning to automatically detect diseases in plants. To enhance the capabilities of our approach, we compiled a novel image dataset containing 87,570 records encompassing 32 different plants and 74 types of diseases. The dataset consists of leaf images from both laboratory setups and cultivation fields, making it more representative. To the best of our knowledge, no such datasets have been used for DL models. Four pretrained computer vision models, namely VGG-16, VGG-19, ResNet-50, and ResNet-101 were evaluated on our dataset. Our experiments demonstrate that both VGG-16 and VGG-19 models proved more efficient, yielding an accuracy of approximately 86% and a f1-score of 87%, as compared to ResNet-50 and ResNet-101. ResNet-50 attains an accuracy and a f1-score of 46.9% and 45.6%, respectively, while ResNet-101 reaches an accuracy of 40.7% and a f1-score of 26.9%.
In this proposed work, we identified the significant research issues on lung cancer risk factors. Capturing and defining symptoms at an early stage is one of the most difficult phases for patients. Based on the history of patients records, we reviewed a number of current research studies on lung cancer and its various stages. We identified that lung cancer is one of the significant research issues in predicting the early stages of cancer disease. This research aimed to develop a model that can detect lung cancer with a remarkably high level of accuracy using the deep learning approach (convolution neural network). This method considers and resolves significant gaps in previous studies. We compare the accuracy levels and loss values of our model with VGG16, InceptionV3, and Resnet50. We found that our model achieved an accuracy of 94% and a minimum loss of 0.1%. Hence physicians can use our convolution neural network models for predicting lung cancer risk factors in the real world. Moreover, this investigation reveals that squamous cell carcinoma, normal, adenocarcinoma, and large cell carcinoma are the most significant risk factors. In addition, the remaining attributes are also crucial for achieving the best performance.
Wirelessly based security applications have exploded as a result of modern technology. To build and/or implement security access control systems, many types of wireless communication technologies have been deployed. quick response (QR code) is a contactless technology that is extensively utilised in a variety of sectors, including access control, library book tracking, supply chains, and tollgate systems, among others. This paper combines QR code technology with Arduino and Python to construct an automated QR code-based access management system. After detecting a QR code, the QR scanner at the entry collects and compares the user's unique identifier (UID) with the UID recorded in the system. The results show that this system is capable of granting or denying access to a protected environment in a timely, effective, and reliable way. Security systems can protect physical and intellectual property by preventing unauthorized persons from entering the area. Many door locks, such as mechanical and electrical locks, were created to meet basic security needs but it also helps to create a data files structure of the authorized persons.
Localization is a critical concern in many wireless sensor network (WSN) applications. Furthermore, correct information regarding the geographic placements of nodes (sensors) is critical for making the collected data valuable and relevant. Because of their benefits, such as simplicity and acceptable accuracy, the based connectivity algorithms attempt to localize multi-hop WSN. However, due to environmental factors, the precision of localisation may be rather low. This publication describes an extreme learning machine (ELM) technique for minimizing localization error in range-free WSN. In this paper, we propose a Cascade-ELM to increase localization accuracy in range-free WSNs. We tested the proposed approaches in a variety of multi-hop WSN scenarios. Our research focused on an isotropic and irregular environment. The simulation results show that the proposed Cascade-ELM algorithm considerably improves localization accuracy when compared to previous algorithms derived from smart computing approaches. When compared to previous work, isotropic environments show improved localization results.
The study evaluated interference in a dense heterogeneous network using third-generation universal mobile telecommunication systems (UMTS) and fourth-generation long term evolution (LTE) networks LTE. The UMTs/LTE heterogeneous network determines the level of interference when the two communication systems coexist and how to improve the network by migrating from UMTs to LTE, which has a faster download speed and larger capacity. Techno lite 8 on third generation (3G) and Infinix Pro 6 on fourth generation (4G) were used to measure network the received signal strength (RSS) during site investigation. UE interference was detected and traced using a spectrum analyzer. UMTS and LTE path loss exponents are 2.6 and 3.2. Shannon's capacity theorem calculated LTE and UMTS capacity. When signal to interference and noise ratio (SINR) was used as a quality of service (QoS) indicator, MATLAB channel capacity plots did not match Shannon's due to neighboring interference. UMTS had an R2 of 0.54 and LTE 0.57 for the Shannon channel capacity equation. Adjacent channel interference (ACI) user devices reduce network capacity, lowering QoS for other customers.
The course activity log is where a learning management system (LMS) like Moodle keeps track of the various learning activities. The instructor may directly examine the log or use more complex method such as data mining to conduct a quicker and more in-depth examination of the student's behaviors. Most previous studies on analyzing this log data rely on predictive analysis. Instead of predictive analysis, this study investigates cluster analysis and association analysis. Cluster analysis based on k-means++ is utilized to organize students into groups, given their engagement in the learning course module. Association analysis based on apriori is utilized to extract the relationships between various student activities. A dashboard presentation of the findings is provided to facilitate clearer comprehension. Based on the analysis findings, it can be concluded that the structure of the student cluster is medium. In contrast, the association between student activities is positively correlated and well-balanced. The subjective review of the dashboard reveals that the visualization is already sufficient, but there are some recommendations for making it even better.
The software-defined network (SDN) controller adds and removes the contents of the flow table through secure channels to determine how packets are processed and how the flow table is managed. The controller pays attention to network intelligence and becomes the middle part, where the network manages the transfer data of the aircraft delivered via the OpenFlow (OF) switch. To this end, the controller provides an interface for managing, controlling, and managing this switch flow table. Run tests to calculate controller throughput and latency levels and test using the cbance tool, which can test transmission control protocol (TCP) and user datagram protocol (UDP) protocols. The tests are run by forcing the controller to run at maximum without any additional settings (default settings) in order to use the correct information about the controller’s capabilities. Because of this need, you need to test the performance of your controller. In this study, the tests were run on three popular controllers. Test results show that flowed controllers are more stable than open network operating dystem (ONOS) and open daylight (ODL) controllers in managing switch and host loads.
This study examined the influence of electronic government (e-government) implementation for the Ministry of Transport on fulfilling Saudi vision 2030 by transforming the Kingdom of Saudi Arabia (KSA) into a logistics center linking three continents. Saudi vision 2030 aims to cut transportation costs by improving infrastructure, shorten importing and exporting times by streamlining and automating operations, and increase supply chain transparency through sector reform. Implementing e-government would improve government services and engagement through information and communication technology (ICT). This article focuses on four primary areas: i) making KSA a logistics center; ii) increasing the chance of living throughout the Kingdom; and iii) promoting long-term financial sustainability. The study is founded on the idea that logistics is a crucial component for competitive advantage and transportation (by land, sea, or air) is a logistical sub-process for Saudi enterprises that benefit from transport networks similar to the best in the world. The Kingdom's strategic location at the junction of three continents gives its transport sector a geographical competitive advantage that provides access to important emerging markets and critical sea lanes. Despite the optimistic future of the transport and logistics industries in KSA, some important hurdles must be overcome.
Chronic disease (CD) such as kidney disease and causes severe challenging issues to the people all around the world. Chronic kidney disease (CKD) and diabetes mellitus (DM) are considered in this paper. Predicting the diseases in earlier stage, gives better preventive measures to the people. Healthcare domain leads to tremendous cost savings and improved health status of the society. The main objective of this paper is to develop an algorithm to predict CKD occurrence using machine learning (ML) technique. The commonly used classification algorithms namely logistic regression (LR), random forest (RF), conditional random forest (CRF), and recurrent neural networks (RNN) are considered to predict the disease at an earlier stage. The proposed algorithm in this paper uses medical code data to predict disease at an earlier stage.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
1. International Journal of Informatics and Communication Technology (IJ-ICT)
Vol. 12, No. 1, April 2023, pp. 12~22
ISSN: 2252-8776, DOI: 10.11591/ijict.v12i1.pp12-22 12
Journal homepage: http://ijict.iaescore.com
Architectural pattern for service collaboration
Agon Memeti1
, Betim Cico2
1
Department of Computer Sciences, Faculty of Natural Sciences and Mathematics, University of Tetova, Tetovo, North Macedonia
2
Department of Computer Engineering, Metropolitan University, Tirana, Albania
Article Info ABSTRACT
Article history:
Received Jan 13, 2022
Revised Jun 10, 2022
Accepted Jul 17, 2022
The aim of this paper is to propose a modeling framework, tailored to build
efficient, elastic and autonomous applications from tasks and services. It
includes integrated services to develop the software products, reusing on
demand in-house services with specific requirements and flexible the
representational state transfer (REST) services. The idea is to decouple
authorization for reduced service dependency and to provide a possibility for
developing the whole application by increasing the existing application
flexibility. Based on the fact that there are different web application
platforms that serve to offer services to users but they are not integrated; we
propose a framework with high flexibility degree, especially integrating the
most used services such: e-learning, administrative, and library services, as
University services are concern.
Keywords:
Flexibility
Interoperability
REST architecture
Service reuse
Web applications This is an open access article under the CC BY-SA license.
Corresponding Author:
Agon Memeti
Department of Computer Sciences, Faculty of Natural Sciences and Mathematics, University of Tetova
Street Ilinden, Tetovo, North Macedonia
Email: agon.memeti@unite.edu.mk
1. INTRODUCTION
The new economy is marginalizing the value of legacy software applications. Traditional software
involves significant up-front acquisition costs and requires recurring maintenance and support. Organizations
soon find that while traditional software can be customized, it often leads to version-lock and the inability to
preserve changes through an upgrade. Simple upgrades become costly, resource-intensive reimplementation
projects [1]. The discipline of service integration is quite new and in the focus of many research groups in
different institutions and around the world. It is presented during different software’s and application
implementations and the idea come for something new, innovative, and contemporary around the world. In
addition, it offers a new possibility of implementing web applications reusing existing applications providing
data accessibility of existing applications without having to request permission from the systems
administrators within the company.
The traditional e-services (applications), (such university services) as our case study are different
web application platforms that serve to offer services to users but they are not integrated. They are isolated in
psychical and business process aspects, and require specific authorization for rebuilding. In addition, the
existing system has several problems such as lack of mobility, accessibility, service flexibility and portability
apart from the necessity of physical presence of the administrator to ménage authorization when rebuilding
applications (services) is concerned.
As service integration is the biggest problematics and challenge which tends the use of software or
computer system architectural principles by linking in-house services (applications) of a single organization
in order to share date, exploring how we can incrementally integrate existing web applications to use the
same data, by exporting all the applications as simple services. While exporting them as basic services, the
next problem is service authorization. We are resolving it using our proposed framework.
2. Int J Inf & Commun Technol ISSN: 2252-8776
Architectural pattern for service collaboration (Agon Memeti)
13
The proposed and implemented framework provides integration of all in-house (existing) university
e-services by proposing a model/framework for web-based application (services) integration. This model will
reuse the existing services (applications) achieving reduced service (application) dependency by decoupling
authorization framework and providing integration of registered in-house services such as university services.
This will lead to, increasing service flexibility; preserving stability of services (applications) and increasing
portability and service (application) interoperability. The paper is composed in four sections, starts with
background, proposed framework/model, its implementation/results and a conclusion.
2. BACKGROUND
2.1. RESTful services
Representational state transfer ful (RESTful) services are an architectural style (collection of
principles), lighter than simple object access protocol (SOAP)-based web services, due to their simplicity,
heterogeneity and web-based format. Entities/resources are identified by unique universal resource locator
(URLs). Including how resource states are addressed and transferred over hypertext transfer–transfer protocol
(HTTP) by a wide range of clients written in different languages. A RESTful design constrains web
architecture for the purpose of simplifying usage, development, and deployment to the web. Firstly, this
design requires the use of a client-server architecture that separates the user interface from the data storage
concerns, and the biggest benefit is that development of components can proceed independently. The
stateless constraint requires application state to be maintained exclusively by the client [2].
The REST architectural style contrasts the remote procedure call (RPC/SOAP) architectural style,
since the great advantage of the REST, compared to other web services technologies, is that the message
exchanged is transmitted directly over the HTTP protocol without encapsulation need and without use of
envelopes. In this architecture, the focus is on resources and not on the call to the procedure/service. This
approach is interesting for applications where the focus on interoperability is greater than the formal contract
between the parties [3]. Fielding [4] REST architectural style describes six constraints which define the basis
of RESTful-style: i) the uniform interface is the interface between clients and servers, simplifying the
architecture, enabling each part to evolve independently; ii) stateless, as the key of REST services, refers to
the necessary state to handle the request whether as part of the uniform resource identifier (URI), query-
string parameters, body, or headers; iii) cacheable, as clients cache responses, eliminating some client-server
interactions further improving scalability and performance; iv) client-server-clients not concerned with data
storage, which remains internal to each server, so that the portability of client code is improved and servers
are not concerned with the user interface or user state, so that servers can be simpler and more scalable;
v) layered system-a client cannot ordinarily tell whether it is connected directly to the end server or to an
intermediary along the way and code on demand; and vi) the optional constraint [5].
These operations are defined directly in the HTTP method and are also known as HTTP verbs. In
the literature, there is a common association with the acronym create, retrieve, update, and delete (CRUD)
which means creates (POST), read (GET), update (PUT), and delete (DELETE). Create to add new entries,
read to retrieve existing entries, update to update existing entries and delete to remove entries [3].
2.2. RESTful service components
RESTful service includes the following components: i) RESTful service provider, it is the software
system that processes the request and provides data; ii) RESTful service client, the client that accesses the
RESTful service; iii) resource, fundamental concept of RESTful service; iv) URI, the URI that identifies a
domain resource; v) uniform interface, simplifies and decouples the architecture as a fundamental part to the
design of any REST service; and vi) HTTP, RESTful systems communicate over HTTP verbs (GET, POST,
PUT, and DELETE).
3. PROPOSED ARCHITECTURAL PATTERN
Since all REST traffic is HTTP using the standard operations, it is easy to view the data returned by
the services using a web browser, which is very useful when debugging. In addition, the short development
time and large freedom when coding, allows for a short time span from idea to implemented system as an
important factor [6]. The idea is to integrate the existing services by exporting applications as basic services
using open authorization (OAuth 2.0) [5], [7]–[11] and REST services with the aim of resolving service
authorization since while exporting applications as basic services the next problem that needs to be resolved
is service authorization. Using our proposed framework clients will request access token using its client
credentials when the client is requesting access to the protected resources under its control.
A client application will need a separate token for each service it accesses. Otherwise, a service
might misuse the clients token to access another service for which only the client has been authorized.
3. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 12, No. 1, April 2023: 12-22
14
Another service may also be considered as a client application (clients are also services) [2], [6], [12]–[14].
Each service should provide a possibility for developing the whole application before even being given any
permission. Once the application has been tested, then we may require the permissions and switch to the real
endpoints, with these steps: i) endpoints should be versioned for greater flexibility. It should be possible to
deploy newer versions without affecting the existing services; ii) discuss the scaling (load balancing and
similar) issues. Leaving this responsibility to the services it might be more flexible; iii) the proposed
sequence of execution is narratively explained in the steps below and further graphically represented in the
diagram in Figure 1; iv) the client(s) requires tokens to the coordinator for accessing one service (or more
services); v) the coordinator generates tokens (and saves them) and returns them to the client.
One token is valid for one client, for many services, as defined in the roles list of the coordinator; vi) the
client makes a request to a service using the token he has received for that service from the coordinator; and
vii) before granting the execution to the client, the service verifies the token by calling the coordinator.
Figure 1 represents the sequence diagram [15], where the client initiates the request to the
centralized coordinator for service access. The client includes its client identifier, requested service and the
local state. The coordinator authenticates him and sends him back, once access is granted (or denied), based
on the request. In order to speed up the step 4 and avoid multiple calls to the coordinator, the service can also
locally cache the token lifetimes, thus allowing multiple requests by client without invoking the coordinator
at all. Firstly all services should be registered to the coordinator in order to get access token for
authentication.
Figure 1. Proposed framework for flexible REST services-sequence diagram
3.1. Coordinating services
The proposed authorization flow between two communicating services and the coordinator handling
the authorization between them is defined below. Note that in this architecture, the trusted party is the
coordinator and each service delegates its authorization concerns to the coordinator. As a prerequisite, each
service should be registered in the coordinator. We leave out the aspects of registration and generation of
authentication credentials, since these aspects are not relevant to the coordination. The only important aspect
is that each service disposes its own credentials which are used to authenticate the service when it accesses
the coordinator. We illustrate this authentication using basic authentication principles, but any relevant
authentication method can be used in this context. In addition, tokens and similar data are abbreviated for
easier reading. Figure 2 depicts the authorization flow in a case when service 1 (A) wants to access a resource
in service 2 (B):
4. Int J Inf & Commun Technol ISSN: 2252-8776
Architectural pattern for service collaboration (Agon Memeti)
15
a. In order to access a resource, the client services (A) need to acquire a token from the coordinator. Since
the access to each service requires a separate token, the service for which we require a token should be
specified in the request.
POST /tokens HTTP/1.1
Host: coordinator.example.com
Authorization: Basic MzRoamdzZGY3NmczND...
...
{
"service": "B"
}
b. If the service 1 (A) is authorized for the requested resource, the coordinator will either create or return an
existing token, together with the time of validity.
HTTP/1.1 201 Created
...
Expires: Sat Mar 21 15:14:09 +0000 2015
...
{
"token": "802057ff762hdk3936...",
"expires": "Sat Mar 21 15:14:09 +0000 2015"
}
c. If the service 1 (A) is not authorized for specific service that was requested, the response will be as
follows:
HTTP/1.1 403 Forbidden
...
{
"reason": "Access to this service is not allowed "
}
d. After having retrieved a valid token, service 1 (A) requires a resource from the service 2 (B) by
authenticating using the previous token:
POST /courses HTTP/1.1
Authorization: Token 802057ff762hdk3936...
...
{
"code": 1234,
"name": "Service Oriented Applications",
...
}
e. The service 2 (B) validates the token by calling the coordinator, together with information about the
concrete required resource.
GET /authorization HTTP/1.1
...
{
"token": "802057ff762hdk3936...",
"method": "POST",
"resource": "/courses"
}
f. It is the coordinator’s responsibility to decide whether service 1 (A) is allowed to access this particular
resource on service 2 (B). If not authorized, it will send back a code 403 response:
HTTP/1.1 403 Forbidden
...
{
"reason": "You don’t have the necessary permission to access this resource."
}
g. If not authorized, service 2 (B) should transfer the same response to the service 1 (A).
h. If the service 1 (A) is authorized, the coordinator returns a 20× response.
5. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 12, No. 1, April 2023: 12-22
16
HTTP/1.1 200 OK
...
i. In this case the service 2 (B) should continue with processing the original request and eventually return
the corresponding response.
HTTP/1.1 201 Created
...
{
"id": 89,
"code": "1234",
"name": " Service Oriented Applications",
...
}
Figure 2. Coordinator REST interface-protocol
As we can see in the previous flow, the coordinator can define different policies for service access.
It can give permissions to a service for accessing all resources on a second service, or use a more fine-grained
policy in which he associates a list of resources to be accessed for any given service. This possibility, allows
permissions to be managed on a centralized level by authorized parties while developer’s responsibility is
reduced to calling the coordinator before each access.
A second important remark is that this flow is systematic. This allows implementing libraries for
managing the authorization on specific development technologies. In this way, the development of RESTful
services can be greatly simplified and reduced to declaratively importing a library. The usage of libraries
further diminishes the security risks related to incorrect implementations of the above protocol.
4. EVALUATION AND RESULTS
As we mentioned previously, our model is implemented in university area, and as cases there are
taken three university applications/services: administrator management system, learning management system
(LMS), and e-library.
4.1. Coordinator implementation
The role of our proposed coordinator is to maintain the application keys and generate tokens as
required. The coordinator will register a list of actions that each service provides. Given an endpoint, it
provides a list of possible URLs, with allowed HTTP verbs for each of them. The combination of the URL
(pattern) and the verb may be used as a description of services and for specifying simple permissions.
6. Int J Inf & Commun Technol ISSN: 2252-8776
Architectural pattern for service collaboration (Agon Memeti)
17
These tokens will be used by a client application to directly access different services. Services will
verify the authenticity of tokens through the coordinator. They may also check on the coordinator whether
the client has the necessary permissions to access a given action. The entity relationship diagram (ERD)
shown in Figure 3.
Figure 3. Coordinator ERD
4.2. Requests and REST implementation
In Table 1, service requests are presented with their methods, collection, and operation and business
operations based on the proposed framework.
Table 1. Service requests
From_service To_service HTTP method Collection Operation Business operation
1. A B GET programs retrieve Get list of study programs
2. A B POST faculties create Create new faculty
3. A B GET faculties retrieve Get list of faculties
4. C B GET books retrieve Get list of books
5. A B GET students retrieve Get list of students
As defined in the proposed framework, firstly, the application request with functions is presented
(request 1 and 3) with the function insertcourses ().
public function insertCourses()
{
$result = AdminModel::getdirections();
$faculties = RestService::requestServiceData('http://lms.dev', 'http://lms.dev/faculties');
$programs = RestService::requestServiceData('http://lms.dev',
'http://lms.dev/faculties/1/programs');
return View::make('admin/insert-courses')->with([
"data" => json_encode($result),
"faculties" => $faculties,
"programs" => $programs,
]);
}
7. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 12, No. 1, April 2023: 12-22
18
Then the application makes request to the coordinator with URL.
<?php
class RestService {
protected static $appCliendID = "ca0543153c75b8da6a9dcd7c43539df2c5bf3d01";
public static function requestServiceData($service, $requestUrl) {
$token = Session::get('access_token');
if ($token === NULL) {
$token = self::getAccessToken();
}
if ($token) {
$client = new GuzzleHttpClient();
$response = $client->post('http://coordinator.dev/authenticator/request-service', [
'form_params' => [
'appID' => $appCliendID,
'service' => $service,
'request_url' => $requestUrl,
'access_token' => $token]
]);
}
return json_decode($response->getBody()->getContents());
}
public static function getAccessToken() {
$client = new GuzzleHttpClient();
$response = $client->post('http://coordinator.dev/oauth/access_token', [
'form_params' => [
'grant_type' => 'client_credentials',
'client_id' => 'ca0543153c75b8da6a9dcd7c43539df2c5bf3d01',
'client_secret' => '1ce6299662bf88002804f34e413d82c26be9153e']
]);
$content = json_decode($response->getBody()->getContents());
$token = $content->access_token;
$expires_in = $content->expires_in;
Session::put('access_token', $token);
Session::put('expires_in', $expires_in);
return $token;
}
}
The coordinator controls the request and response to service request.
class AuthenticateController extends Controller {
public function construct()
{
//$this->middleware('oauth', ['only' => 'login']);
}
public function requestService(Request $request) {
$appID = Input::get('appID');
$serviceId = Input::get('service');
$requestUrl = Input::get('request_url');
$data = Input::get('faculty_name');
$app = Application::where('appid', $appID)->first();
if ($app) {
$endpoint = $permissions->where('endpoint', $serviceURL)->first();
$method = $endpoint->method;
try {
$response = $this->makeRequest($method, $requestUrl, $data);
$code = $response->getStatusCode();
if ($code === 200) {
return $response->getBody()->getContents();
} else {
return response()->json(['message' => 'not allowed', 'code' => '405']);
}
} catch (BadResponseException $e) {
return response()->json(['message' => $e->getMessage(), 'code' => '405']);
}
} else {
return response()->json(['message' => 'No Permissions', 'code' => '405']);
}
}
8. Int J Inf & Commun Technol ISSN: 2252-8776
Architectural pattern for service collaboration (Agon Memeti)
19
Figure 4 presents the implemented user interface where the administrator of the system can take rest
objects such as study programs and faculties from the other (A) service and add them in the (B) service such
LMS. In Figure 5 the implemented user interface is presented, where the administrator of the system such the
registered faculties can be saved also in other applications with post method, such from service (A) to service
(B).
Figure 4. UI for service response 1 and 3
Next, the function storeRest for the 2nd
service request is presented.
public function storeRest(Request $request)
{
$facultyName = $request->input('name');
$response = $this->requestServiceData("http://lms-usht.dev", "http://lms-
usht.dev/addFaculty", $facultyName);
return $response;
}
Figure 5. UI for 2nd
service response
9. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 12, No. 1, April 2023: 12-22
20
Here is presented the function for the 4th
service request.
public function dashboard()
{
$result = HomeModel::userdata();
$requestUrl = 'http://elibrary.dev/student/'.Session::get('userid').'/books';
$serviceData = RestService::requestServiceData('http://elibrary.dev', $requestUrl);
$hasServiceData = true;
if ( is_object($serviceData) && $serviceData->code === "405") {
$hasServiceData = false;
}
return View::make('student/dashboard')->with([
"data" => json_encode($result),
"serviceData" => $serviceData,
"hasServiceData" => $hasServiceData
]);;
}
In Figure 6 the implemented User Interface is presented such as the student panel of service (B) or
LMS using REST services enables students to see their borrowed books from service (C) or e-library. In
Figure 7 the implemented user interface is presented, such as, that the LMS professor panel which enables
professors to see their registered students to specific course using REST architecture and our implemented
framework and registered students from service (A) to service (B).
Figure 6. UI for 4th
service response
Last, the function for the 5th
service request is presented.
public function myCourse()
{
$c_id = base64_decode(Request::segment(2));
$validator = Validator::make(array('id' => $c_id), array(
'id' => 'required|integer'
));
if($validator->passes()){
$response = ProfessorModel::getCourseData($c_id, Session::get('userid'));
if($response->result === TRUE){
$course = Course::find(Request::segment(3));
$course_service = RestService::requestServiceData('http://lms.dev',
'http://lms.dev/courses/' . $course->id);
return View::make('professor/my-course')->with([
"data" => json_encode(intval($c_id)),
"course_name" => $course->course_name,
"course" => $course_service
]);
}else{
print_r($response->msg);die();
}
}else{
print_r("BAD URL");die();
}}
10. Int J Inf & Commun Technol ISSN: 2252-8776
Architectural pattern for service collaboration (Agon Memeti)
21
Figure 7. UI for 5th
service response
5. CONCLUSION
The suggested prototye promoted in this paper aimed at managing the technological needs of
universities effectively, especially integrating all services in a unique platform and having stable services.
The purpose was to demonstrate how to better integrate them, especially the interoperability issues between
services concerning their integration reusing existing services and changing one service by not attacking the
others. Using it in educational institutions will promote huge benefits such as high available services,
scalability, increasing portability, performance/cost and overall reliability improvements. As REST services
are a challenging task; improving the way that university services are implemented and maintained as well, in
this work we have described our proposed framework to use existing services for decoupling authorization
for reduced service dependency. Decoupling authorization from the actual implementation of web services
simplifies their development while allowing centralized management of permissions by third party
authorities. This allows for more flexibility in service implementation and its evolution. Services can be
developed and run independently, even when centralized management of permissions is a must. The
implemented coordinator handles aspects of registration and authorization of services and he also provides
libraries for developers to handle authorization concerns.
In this paper we present architecture (protocol) for in-house REST service coordinator for service
collaboration, by exporting data as basic services (resources) through SOA approach. Using the defined
protocol, resources are shared, based on the requirements, as what this paper is trying to resolve and propose.
A large number of services are designed in a manner to offer closed and isolated system interface and
resources due to their specific requirements they need to offer to the users. Later on, isolation consequences
are considered, taking University services as a typical in-house organization that dispose many data, where
students and faculty staff members need to have more freedom and access to different service resources. This
is done for developers to build new services and for students and staff to achieve their course activities,
duties and services that the faculty might require to apply and organize. The SOA approach, especially REST
services, offer flexible service solutions, first of all by sharing the computational resources based on the
service criteria’s where each service delivers its power value based on the environment and the technology
designed. It also develops easier and just in time solutions.
REFERENCES
[1] R. Mahowald, “A brief history of saaS,” 2009. http://www.computerworld.com/pdfs/Service-Now-BriefhistoryofSaaS.pdf
[2] S. Cholia, D. Skinner, and J. Boverhof, “NEWT: A RESTful service for building high performance computing web applications,”
in 2010 Gateway Computing Environments Workshop (GCE), Nov. 2010, pp. 1–11. doi: 10.1109/GCE.2010.5676125.
[3] N. A. C. Tavares and S. Vale, “A model driven approach for the development of semantic RESTful web services,” in Proceedings
of International Conference on Information Integration and Web-based Applications & Services - IIWAS ’13, 2013, pp. 290–299.
doi: 10.1145/2539150.2539193.
[4] R. T. Fielding, “Architectural styles and the design of network-based software architectures,” Journal of Chemical Information
and Modeling, vol. 53, no. 9, pp. 1689–1699, 2013.
[5] T. Fredrich, “RESTful service best practices,” REST API Tutorial, 2012. http://toddfredrich.com/restful-best-practices-v1-1.html
(accessed Mar. 23, 2015).
[6] W. Li and P. Svärd, “REST-based SOA application in the cloud: a text correction service case study,” in 2010 6th World
Congress on Services, Jul. 2010, pp. 84–90. doi: 10.1109/SERVICES.2010.86.
[7] E. Hammer, D. Recordon, and D. Hardt, “The oauth 2.0 authorization protocol,” 2011. http://tools.ietf.org/html/draft-ietf-oauth-
v2-25 (accessed Dec. 16, 2014).
11. ISSN: 2252-8776
Int J Inf & Commun Technol, Vol. 12, No. 1, April 2023: 12-22
22
[8] I. Claros, R. Cobos, E. Guerra, J. de Lara, A. Pescador, and J. Sanchez-Cuadrado, “Integrating open services for building
educational environments,” in 2013 IEEE Global Engineering Education Conference (EDUCON), Mar. 2013, pp. 1147–1156.
doi: 10.1109/EduCon.2013.6530253.
[9] IETF OAuth Working Group, “OAuth 2.0.” http://oauth.net/2/ (accessed Dec. 12, 2014).
[10] IBM WebSphere Application sServer, “OAuth 2.0 service provider and TAI,” IBM Corporation, 2012.
https://mediacenter.ibm.com/media/OAuth+2.0+service+provider+and+TAI/0_fgg4teki (accessed Dec. 16, 2014).
[11] Ping Identity, “The essential OAuth primer: understanding OAuth for securing cloud APIs,” Ping Identity, 2011.
https://www.pingidentity.com/en/resources/content-library/white-papers/3119-essential-oauth-primer.html (accessed Dec. 16,
2014).
[12] K. Togias and A. Kameas, “An ontology-based representation of the Twitter REST API,” in 2012 IEEE 24th International
Conference on Tools with Artificial Intelligence, Nov. 2012, pp. 998–1003. doi: 10.1109/ICTAI.2012.85.
[13] HSC Proprietary, “Securing RESTful web services using spring and OAuth 2.0,” Hughes Systique, 2011. https://hsc.com/About-
Us/News-Events/Securing-RESTful-Web-Services-Using-Spring-and-OAuth-20 (accessed Dec. 16, 2014).
[14] J. Meng, S. Mei, and Z. Yan, “RESTful web services: a solution for distributed data integration,” in 2009 International
Conference on Computational Intelligence and Software Engineering, Dec. 2009, pp. 1–4. doi: 10.1109/CISE.2009.5365234.
[15] A. Memeti, B. Selimi, A. Besimi, and B. Cico, “A framework for flexible REST services: decoupling authorization for reduced
service dependency,” in 2015 4th Mediterranean Conference on Embedded Computing (MECO), Jun. 2015, pp. 51–55. doi:
10.1109/MECO.2015.7181861.
BIOGRAPHIES OF AUTHORS
Agon Memeti received his B.Sc., M.Sc., and Ph.D. degree from SEE University,
Faculty of Contemporary Sciences and Technologies. He is currently an Associate Professor
of Computer Sciences at University of Tetova–North Macedonia. Presently he is also working
as a head of the office for scientific research and innovation. His main research interests focus
on software reuse, softare development, optimization algorithms, information retrieval, data
mining, and text mining. He can be contacted at email: agon.memeti@unite.edu.mk.
Betim Cico received his B.Sc., M.Sc., and Ph.D. degree from Polytechnic
University of Tirana, Albania. He is currently a Full time Professor of Computer Engineering
at Metropolitan University in Tirana. Currently he is also working in many research projects
dealing with artificial intelligence. His main research interests focus on software engineering,
softare development, optimization algorithms, information retrieval, data mining, and text
mining. He can be contacted at email: betim.cico@gmail.com.