The paper focuses on the architecture of JBoss Application Server and how it helps to automate the development, deployment, and operation of business-critical and mission-critical applications. The paper also describes about the Dynamic application implemented by JBoss.
The paper focuses on the architecture of JBoss Application Server and how it helps to automate the
development, deployment, and operation of business-critical and mission-critical applications. The paper
also describes about the Dynamic application implemented by JBoss.
The paper focuses on the architecture of JBoss Application Server and how it helps to automate the
development, deployment, and operation of business-critical and mission-critical applications. The paper
also describes about the Dynamic application implemented by JBoss.
Modern Enterprise Software Systems (MESS) is all
about envisioning, developing, managing and evolving
enterprise applications to fulfill business requirements. This
may entail many challenges like rapidly changing business
scenario, increase in complexity, shorter time to market and
business agility. In order to deal with this natural evolution,
achieving modularity across MESS is essential. In this paper,
we describe by way of an example application, some of the
common problems encountered while delivering & managing
enterprise software. We demonstrate that one of the root causes
for these is inadequate support for modularity at the physical
level viz. packaging & deployment. We look at the different
options available for extending the modularity across packaging
and deployment e.g. Impala and Open Service Gateway
initiative (OSGi). Based on our explorations and experiments
we provide a comparison between the two. We conclude the
paper with a note on the future directions for physical
modularity.
Chapter 10:Understanding Java Related Platforms and Integration TechnologiesIt Academy
Exam Objective 6.1 Distinguish the basic characteristics of the three Java platforms: J2SE, J2ME, and J2EE, and given a high-level architectural goal, select the appropriate Java platform or platforms.
This material prepared by Calance professionals is intended for Java technologists and IT professionals with some exposure to J2EE. Readers will discover key design considerations, implementation techniques, practicability, and some guiding principles of building an Enterprise Application. To find out what IT solutions and services Calance offers, visit http://www.calanceus.com.
Using WebSphere MQ with WebSphere Application Server and the Liberty Profilet_quigly
Presentation looking at the integration architecture between WebSphere MQ and WebSphere Application Server and the Liberty Profile.
Also details WebSphere Application Server properties which you must be aware of in order to use Multi-Instance Queue Managers with WebSphere Application Server.
CETPA INFOTECH PVT LTD is one of the IT education and training service provider brands of India that is preferably working in 3 most important domains. It includes IT Training services, software and embedded product development and consulting services.
This is a introductory lecture of J2EE for those who want to learn what is j2ee technology and about its basics.You can also fine coding exmples in this lecture
Modern Enterprise Software Systems (MESS) is all
about envisioning, developing, managing and evolving
enterprise applications to fulfill business requirements. This
may entail many challenges like rapidly changing business
scenario, increase in complexity, shorter time to market and
business agility. In order to deal with this natural evolution,
achieving modularity across MESS is essential. In this paper,
we describe by way of an example application, some of the
common problems encountered while delivering & managing
enterprise software. We demonstrate that one of the root causes
for these is inadequate support for modularity at the physical
level viz. packaging & deployment. We look at the different
options available for extending the modularity across packaging
and deployment e.g. Impala and Open Service Gateway
initiative (OSGi). Based on our explorations and experiments
we provide a comparison between the two. We conclude the
paper with a note on the future directions for physical
modularity.
Chapter 10:Understanding Java Related Platforms and Integration TechnologiesIt Academy
Exam Objective 6.1 Distinguish the basic characteristics of the three Java platforms: J2SE, J2ME, and J2EE, and given a high-level architectural goal, select the appropriate Java platform or platforms.
This material prepared by Calance professionals is intended for Java technologists and IT professionals with some exposure to J2EE. Readers will discover key design considerations, implementation techniques, practicability, and some guiding principles of building an Enterprise Application. To find out what IT solutions and services Calance offers, visit http://www.calanceus.com.
Using WebSphere MQ with WebSphere Application Server and the Liberty Profilet_quigly
Presentation looking at the integration architecture between WebSphere MQ and WebSphere Application Server and the Liberty Profile.
Also details WebSphere Application Server properties which you must be aware of in order to use Multi-Instance Queue Managers with WebSphere Application Server.
CETPA INFOTECH PVT LTD is one of the IT education and training service provider brands of India that is preferably working in 3 most important domains. It includes IT Training services, software and embedded product development and consulting services.
This is a introductory lecture of J2EE for those who want to learn what is j2ee technology and about its basics.You can also fine coding exmples in this lecture
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
Semantic annotation of images is an important research topic on both image understanding and database
or web image search. Image annotation is a technique to choosing appropriate labels for images with
extracting effective and hidden feature in pictures. In the feature extraction step of proposed method, we
present a model, which combined effective features of visual topics (global features over an image) and
regional contexts (relationship between the regions in Image and each other regions images) to automatic
image annotation.In the annotation step of proposed method, we create a new ontology (base on WordNet
ontology) for the semantic relationships between tags in the classification and improving semantic gap
exist in the automatic image annotation.Experiments result on the 5k Corel dataset show the proposed
method of image annotation in addition to reducing the complexity of the classification, increased accuracy
compared to the another methods
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
Constrained Nonlinear programming problems are hard problems, and one of the most widely used and
common problems for production planning problem to optimize. In this study, one of the mathematical
models of production planning is survey and the problem solved by cuckoo algorithm. Cuckoo Algorithm is
efficient method to solve continues non linear problem. Moreover, mentioned models of production
planning solved with Genetic algorithm and Lingo software and the results will compared. The Cuckoo
Algorithm is suitable choice for optimization in convergence of solution
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any
pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as
a router, forwarding information packets for other mobile nodes. There are many routing protocols that
possess different performance levels in different scenarios. The main task is to evaluate the existing routing
protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV,
OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational
conditions for each MANETs protocol. We study these five MANETs routing protocols by different
simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This
performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-End Delay,
Normalized Routing Load and Average Throughput.
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
In this study, which took place current year in the city of Maragheh in IRAN. Number of high school
students in the fields of study: mathematics, Experimental Sciences, humanities, vocational, business and
science were studied and compared. The purpose of this research is to predict the academic major of high
school students using Bayesian networks. The effective factors have been used in academic major selection
for the first time as an effective indicator of Bayesian networks. Evaluation of Impacts of indicators on
each other, discretization data and processing them was performed by GeNIe. The proper course would be
advised for students to continue their education.
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
Automatic image annotation has emerged as an important research topic due to its potential application on
both image understanding and web image search. This paper presents a model, which integrates visual
topics and regional contexts to automatic image annotation. Regional contexts model the relationship
between the regions, while visual topics provide the global distribution of topics over an image. Previous
image annotation methods neglected the relationship between the regions in an image, while these regions
are exactly explanation of the image semantics, therefore considering the relationship between them are
helpful to annotate the images. Regional contexts and visual topics are learned by PLSA (Probability
Latent Semantic Analysis) from the training data. The proposed model incorporates these two types of
information by MCDM (Multi Criteria Decision Making) approach based on WSM (Weighted Sum
Method). Experiments conducted on the 5k Corel dataset demonstrate the effectiveness of the proposed
model.
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
Research on information and communication technologies have been developed rapidly since it can be
applied easily to several areas like computer science, medical science, economics, environments,
engineering, among other. Applications of soft set theory, especially in information systems have been
found paramount importance. Recently, Mukherjee and Das defined some new operations in fuzzy soft
multi set theory and show that the De-Morgan’s type of results hold in fuzzy soft multi set theory with
respect to these newly defined operations. In this paper, we extend their work and study some more basic
properties of their defined operations. Also, we define some basic supporting tools in information system
also application of fuzzy soft multi sets in information system are presented and discussed. Here we define
the notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that every fuzzy
soft multi set is a fuzzy multi valued information system.
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data
mining techniques are used for extracting information from the web servers. The web data includes web
pages, web links, objects on the web and web logs. Web mining is used to understand the customer
behaviour, evaluate a particular website based on the information which is stored in web log files. Web
mining is evaluated by using data mining techniques, namely classification, clustering, and association
rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic business, security, crime investigation and digital library.
Retrieving the required web page from the web efficiently and effectively becomes a challenging task
because web is made up of unstructured data, which delivers the large amount of information and increase
the complexity of dealing information from different web service providers. The collection of information
becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In addition to this,
this paper also analyzed the web mining research challenges.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case
adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS),
Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for
the experimental evaluation of the classifier security in an adversarial environments, that combines and
constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as
legitimate (ham) or spam emails on the basis of thee text samples.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
The rapid growth of Internet has revolutionized online news reporting. Many users tend to use online news
websites to obtain news information. When considering Sri Lanka, there are numerous news websites,
which are subscribed on a daily basis. With the rise in this number of news websites, the Sri Lankan
authorities of media face the issue of lacking a proper methodology or a tool which is capable of tracking
and regulating publications made by different disseminators of news.
This paper proposes a News Agent toolbox which periodically extracts news articles and associated
comments with the aid of a concept called Mapping Rules; to classify them into Personalized Categories
defined in terms of keywords based Category Profiles. The proposed tool also analyzes comments made by
the readers with the aid of simple statistical techniques to discover the most popular news articles and
fluctuations in popularity of news stories.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and
disclosure of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
The design of silicon chips in every semiconductor industry involves the testing of these chips with other
components on the board. The platform developed acts as power on vehicle for the silicon chips. This
Printed Circuit Board design that serves as a validation platform is foundational to the semiconductor
industry.
The manual/repetitive design activities that accompany the development of this board must be minimized to
achieve high quality, improve design efficiency, and eliminate human-errors. One of the time consuming
tasks in the board design is the Trace Length matching. The paper aims to reduce the length matching time
by automating it using SKILL scripts.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table.
RESEARCH TRENDS İN EDUCATIONAL TECHNOLOGY İN TURKEY: 2010-2018 YEAR THESIS AN...ijcax
The purpose of this research is the analysis using meta-analysis of studies in the field of Educational
Technology in Turkey and in the field is to demonstrate how to get to that trend. For this purpose, a total of
263 studies were analyzed including 98 theses and 165 articles published between 2010-2018. Purpose
sampling method was used when selecting publications. In the research, while selecting articles and theses;
Turkey addressed; YOK Tez Tarama Database, Journal of Hacettepe University Faculty of Education,
Educational Sciences : Theory & Practice Journal, Education and Science Journal, Elementary Education
Online Journal, The Turkish Online Journal of Education and The Turkish Online Journal of Educational
Technology used in journals. Publications have been reviewed under 11 criteria. Index, year of
publication, research scope, method, education level, sample, number of samples, data collection methods,
analysis techniques, and research tendency, research topics in Educational Technology Research in Turkey
has revealed. The data is interpreted based on percentage and frequency and the results are shown using
the table
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
With the great development that, modern medical technology is witnessing today, medical devices and
equipment have become a basic pillar of any healthcare system in the world and cannot be dispensed with,
so we find competition between the major companies that manufacture medical devices and equipment
resulting in a huge variety of complex modern medical technologies. These medical devices and equipment
require high accuracy in manufacturing and packaging in addition to operation, maintenance, and followup, because any error in any of the previous stages will have bad consequences for the patients and the
health system, there are many accidents that have led to some deaths. Therefore, we find that many medical
device producers and medical companies in addition to health service providers seek to find systems and
protocols to reduce accidents resulting from medical devices. As a result, many systems have recently
appeared that seek to protect from the dangers of medical devices and equipment. This research aims to
conduct a study of the effects of international standards on the safety of medical devices and equipment
and reduce their risks. By counting the international standards in force in the Kingdom of Saudi Arabia
that are applied by the Saudi Food and Drug Authority, making questionnaires, and distributing them to
health service providers and regulatory bodies for medical devices and equipment, considering the data,
these data will be analysed and evaluated the effectiveness of quality systems and standards in maintaining
Effectiveness and quality of medical devices and equipment. The study will include governmental and
private health services sectors.
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
The Pattern classification system classifies the pattern into feature space within a boundary. In case adversarial applications use, for example Spam Filtering, the Network Intrusion Detection System (NIDS), Biometric Authentication, the pattern classification systems are used. Spam filtering is an adversary
application in which data can be employed by humans to attenuate perspective operations. To appraise the
security issue related Spam Filtering voluminous machine learning systems. We presented a framework for the experimental evaluation of the classifier security in an adversarial environments, that combines and constructs on the arms race and security by design, Adversary modelling and Data distribution under
attack. Furthermore, we presented a SVM, LR and MILR classifier for classification to categorize email as legitimate (ham) or spam emails on the basis of thee text samples
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
Order placingis a crucial phase of lifecycle of a Mass-customizable product and seeks improvement in
Mechanical industry. ‘Product Configurator’ is a good solution to bring in data transparency and speed
up the process. Configuration tools arebeing used on a very small scale,reasons being lack of awareness
and dearer costs of existing tools. In this research work a product configurator is developedfor
Hydraulic Actuator (HA).This method uses Applicable Programing Interface (API) of a CAD tool coupled
with Visual Basics (VB) and MS Excel.Itis a standaloneapplication of VB and its integration into web
portal can be the future scope. The final aim was to reduce time delay at CRM phase,bring more
transparency in the ordering system and to establish a method which, small and medium scale enterprises
canafford. Trails on the tool developed generated Part-Assembly drawings, BOM and JT files in
moments.
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
A large no. of automobile companies finding a convinient way to manage design changes with the use of
various PLM techniques. Change in any product is something that should occur on timely basis to match
up with customer requirement and cost reduction. The change made in the vehicle designs directly affects
various concerned agencies. Automobile Vehicle structures contains thousands of parts and if there is any
change is occurring in child parts then it becomes important to track that impacted part, propose a solution
on that part and release a new assembly structure with feasible changes such that all efforts need to be
done for cost reduction.
Visually impaired people face many problems in their day to day lives. Among them, outdoor navigation is
one of the major concerns. The existing solutions based on Wireless Sensor Networks(WSN) and Global
Positioning System (GPS) track ZigBee units or RFID (Radio Frequency Identification) tags fixed on the
navigation system. The issues pertaining to these solutions are as follows: (1) It is suitable only when the
visually impaired person is commuting in a familiar environment; (2) The device provides only a one way
communication; (3) Most of these instruments are heavy and sometimes costly. Preferable solution would
be to make a system which is easy to carry and cheap.
The objective of this paper is to break down the technological barriers, and to propose a system by
developing an Android App which would help a visually impaired person while traveling via the public
transport system like Bus. The proposed system uses an inbuilt feature of smart phone such as GPS
location tracker to track the location of the user and Text to Speech converter. The system also integrates
Google Speech to Text converter for capturing the voice input and converts them to text. This system
recommends the requirement of installing a GPS module in buses for real time tracking. With minor
modification, this App can also help older people for independent navigation.
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate
whether it is politics, societal reforms, commercialization, transportation, or educational innovations. In
every few second, technology grows either in the form of arrival of the new devices/gadgets with millions of
apps and these latest technological objects may be in the form of hardware/software devices. We are the
educationists, teachers, students and stakeholders of present Indian educational system. These
gadgets/devices are partly being used by us or most of them are still unaware of these innovative
technologies due to the mass media or economical factor. So, there is a need to improvise ourselves
towards utilizing the future gadgets in order to explore the educational uses, barriers and preparatoryneeds of these available devices for educational purposes. This paper aims to study the opinion of the
teacher-educators about the usage of future gadgets in higher education. It will also contribute towards
establishing the list of latest technological devices, and how it can enhances the process of teachinglearning system.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
1. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
25
A DYNAMIC APPLICATION USING JBOSS
Mrs.Dhanamma Jagli and Anupama Aher
V.E.S.Institute of Technology, University of Mumbai, India.
ABSTRACT
The paper focuses on the architecture of JBoss Application Server and how it helps to automate the
development, deployment, and operation of business-critical and mission-critical applications. The paper
also describes about the Dynamic application implemented by JBoss.
KEYWORDS
JBoss, Application, server, EJB, JVM
1.INTRODUCTION
An application server software platform (ASSP) is middleware that congregates application logic
and offers service that allows an application to be installed and managed successfully. Since most
application logic exists in the middle tier, application servers usually manage connectivity with
users, database servers, and additional runtime settings that are required by the application. By
expending an application server, developers achieve access to services that take account of
connectivity amongst the presentation layer, network, operating system, and database as well as
through other application servers as fragment of a distributed system. In addition, the application
server provides provision on behalf of actions including transaction processing, in elevation
accessibility, scalability, security, besides application management. The greatest prominent
application server affords livelihood instead of one or more languages and their component
models, for example JEE and Microsoft's .NET.
The Red Hat JBoss Enterprise Application Platform 6 (JBoss EAP 6) is Red Hat's reaction to
noteworthy variations in the manner organizations progress plus deploy innovativeness
applications. The organizations search for lesser operational charges and decrease time to market
for new-fangled applications, JBoss EAP 6 has been reconstructed for a dream of the future,
boastfulness an innovative modular, cloud-ready architecture, commanding management and
automation, in addition to domain class developer throughput.
The JBoss EAP 6 is Java EE 6 specialized as well as landscapes powerful however springy
management, improved performance plus scalability. Many new features are introduced to
improve developer throughput. Altogether with Red Hat's market-leading standing for
certification and support, confirming administration in addition to development. It needs
continuation improvement to drive forward into the future and its beyond. JBoss AS is treasured
by means of developers used for its ability to deliver powerful enterprise key features wanting
sacrifice the simplicity of Java objects. The JBoss turns within a completely integrated plus tested
JBoss Enterprise Middleware System, or else JEMS. The JEMS is comparable in latitude to
2. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
26
the integrated platform suite contributions beginning the supplementary major commercial
vendors; on the other hand it evades the monolithic nature of its challengers through providing a
modular architecture that funds unfettered plug and play.
2.PROPOSED SYSTEM ARCHITECTURE
Following diagram describes the application platform architecture of JBoss Application Server.
Architecture include following components.
Figure 1: Proposed System Architecture
2.1.Web Server
The chief purpose of a web server is to hoard process as well as transport web pages to clients.
The communication concerning client and server receipts place spending the Hypertext Transfer
Protocol (HTTP). The Pages conveyed are the greatest habitually HTML documents, which may
consist of images, style sheets and scripts moreover to text content.
2.2.EJB Container
An Enterprise JavaBeans (EJB) container delivers a dynamic environment in place of enterprise
surrounded by the application server. The container holders completely characteristics of an
enterprise procedure within the application server in addition to actions. An intermediary flanked
by the user-written business logic within the bean and the rest of the application server
environment.A JMS provider is a messaging arrangement that apparatuses the JMS interfaces
then provide administrative and control features. An implementation of the J2EE platform at
release 1.3 includes a JMS provider.JMS clients are the programs or components, written in the
JavaTM programming language, that produce and consume messages. Messages are the
substances that communicate figures among JMS clients.
3. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
27
2.3.Java Virtual Machine
The Java virtual machine (JVM) understands accumulated Java binary code (called bytecode) for
a computer's processor or hardware platform consequently that it can perform Java programs
instructions. The James Gosling planned Java to allow programmers to write code that could run
on at all platforms without the essential designed for redrafting otherwise recompilation for
distinctly separate platform. A Java virtual machine types this conceivable because of its
awareness of the detailed instruction lengths and supplementary discriminations of the platform.
2.4.Web Container
The Web container correspondingly known as a Servlet container is the component of a web
server that intermingles with Java servlets. A web container is answerable for managing the
lifecycle of servlets, representing a URL to a particular servlet and ensuring that the URL
requester has the correct access rights. A web container handles requests for servlets, Java Server
Pages (JSP) files, plus additional types of files that include server-side code. The Web container
generates servlet instances, loads - unloads servlets, creates and manages request and response
objects, besides performs other servlet management tasks. A web container outfits the web
component convention of the Java EE architecture, postulating a runtime environment for web
components that reside of safekeeping, concurrency, lifecycle management, transaction,
deployment, and other services.
2.5.AJP Connector
The AJP Connector component signifies a connector component that interconnects a web
connector via the AJP protocol. This is used for belongings wish to invisibly participate JBoss
Web addicted to an existing or innovative Apache installation, plus want Apache to handle the
stationary relaxed contained in the web application, and/or utilize Apache's SSL processing.
2.6.J2EE Connector Architecture (JCA)
The JCA is a resource supervisor integration API whose objective is to standardize admission to
non-relational properties in the identical approach the JDBC API standardized admittance to
relational data. The perseverance of this interval is to introduce the utility of the JCA APIs then
designate the architecture of JCA in JBoss.
2.7.Transaction Manager
The JBoss construction permits for slightly Java Transaction API (JTA) transaction manager
execution to be used. JBossTX embraces a profligate in-VM enactment of a JTA well-matched
transaction manager that is used as the defaulting transaction manager.
3.FEATURES & BENEFITS
3.1.Totally modular Class Loading System
The Classes are encumbered as required for a minor footprint plus efficient use of system
resources. This marks the container slight by non-payment and intensifications security by
revealing individual the APIs actually in usage.
4. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
28
3.2.Flexible Management
It can be managed the Enterprise Application Platform by means of the Web-based
Administration Console, the Management CLI, or the Management API, which uses a REST-like
interface and JSON output. It can be used batch handwritings or convention applications to
easiness administration.
3.3.Managed Domains
The Managed domains syndicate servers’ crossways carnal hosts hooked on server collections,
which segment configurations in addition to deployments which broadcast automatically.
Altogether configurations are performed centrally starting the domain controller. That can also
run manifold instances on similar physical host effortlessly outstanding to the opening
compulsory clutches in addition to automatic port counterweights.
3.4.Fast server starts and restarts
The Developers resolve intensify how speedily JBoss Enterprise Application Platform jumps and
resumes. This has assistances in manufacture environments but then is crucial in development
surroundings where recurrent resumes are compulsory. Fewer time spent coming up means more
time spent developing.
3.5. Assistive Technologies
Assistive technology is sunshade tenure that takes in assistive, adaptive, plus rehabilitative
campaigns for society with disabilities and also comprises the procedure recycled in choosing,
discovering, and expending them. Assistive technology endorses superior independence by
empowering people to achieve tasks that they were formerly unable to complete, or had great
trouble achieving, by supporting enhancements to, or altering methods of interrelating with, the
technology wanted to realize such tasks. The JBoss enterprise request platform 6 remains
grievance with section 508 of the Americans through incapacities act for effortlessness of custom
for operators of assistive technologies.
3.6. Internationalization
The JBoss Enterprise Application Platform 6 is Web-based Management Edge besides journal
messages are internationalized and contained into Japanese, Shortened Chinese, French, German,
Portuguese, in addition to Spanish.
4.SYSTEM FEATURES AND BENEFIT
The JBoss AS attains scalability besides responsibility tolerance finished the situation clustering
technology. This marks it appropriate for arrangement transversely boundless statistics of slight
budget servers.
4.1 Accessible and Dependable
The Clustering technology delivers dependability finished fail-over plus burden complementary
intended for JNDI, RMI, Entity Beans, besides Stateful Session Beans counting persons through
in-memory state repetition.
5. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
29
4.2 Relaxed to Deploy
The clustering technology continued considered towards remain translucent to the presentation.
The Cluster protuberances repeatedly determine one an additional happening boot up through no
additional conformation. Furthermore, they automatically harmonise their state with the relaxation
of the group. Somewhat application can be completed to run on a JBoss cluster. The Clustering
stands encompassed through the ordinary JBoss AS dissemination as well as it can be triggered by
virtuously situation a solitary standard in a JBoss distribution descriptor, which is sufficient to
empower burden complementary, state duplication as well as nosedive finished for Java beans.
4.3 Easy to Manage
The JBoss JMX microkernel forms the basis of JBoss Farming. With a JBoss farm, copying a
deployable component to one node’s deployment directory causes it to be deployed across the
entire cluster, with no downtime. Similarly, components can be updated or uninstalled. Since this
is a microkernel level feature, not only can your applications be hot-deployed, the entire cluster
could update the version of the JBoss AS, Tomcat, or any other JEMS component in this fashion.
All of these components are configured and managed through a standard Java Management
eXtensions (JMX) interface.
5.CONCLUSION
JBoss AS is a key component, alongside MySQL database and Apache Web Server, of the open
source infrastructure for grid computing. This infrastructure enables blade servers to reliably and
cost-effectively run standard J2EE applications on hundreds of Linux powered CPUs without
incurring prohibitive per-CPU licensing costs. JBoss AS has the fastest growing user base and by
some measures is the most popular J2EE application server. This is in part due to the developer
enthusiasm for the simple, standards-based approach that JBoss Inc. refers to as “Transparent
Middleware”. This provides for the maximum power of Enterprise-Class infrastructure services
while retaining the cleanliness of pure Java programming. Completing the picture, JBoss AS is a
part of the robust JBoss Enterprise Middleware System (JEMS) which is comparable in scope to
leading closed source commercial Application Platform Suites. Customers of JBoss can deploy
any JEMS product with world class Enterprise Software support, and a single point of
accountability for key business infrastructure. With JBoss AS and JBoss Professional Open
Source, organizations can reap the cost and quality benefits of open source while retaining the
accountability of closed source commercial solutions.
REFERENCES
[1] Boss Enterprise Application Platform 6.3 release notes by Red hat.
[2] Configuring LiveCycle ES2 Application Server Clusters Using JBoss.
[3] The JBoss 4 Application Server Guide - JBoss
[4] Comparing Oracle Glassfish Server and JBoss.
[5] Configuring Application Server Clusters - JBoss - Support
[6] http://en.wikipedia.org/wiki/WildFly
[7] http://www.redhat.com/en/technologies/jboss-middleware/application-platform
[8] https://developer.jboss.org/wiki/JBossapplicationserverofficialdocumentationpage?_sscc=t
[9] http://www.mastertheboss.com/jboss-server/
[10]http://en.wikipedia.org/wiki/JBoss_Enterprise_Application_Platform
6. International Journal of Computer-Aided technologies (IJCAx) Vol.1,No.2/3,October 2014
30
Authors
Mrs. Dhanamma Jagli, Asst. Professor in V.E.S Institute of Technology and Research
Schol ar from Jawaharlal Nehru Technological University, having total 10 years of
teaching experience for Post graduate and under graduate students in different
Engineering Institutes. She Published research papers in various refereed journals and
Conferences in the area of Data Mining, Cloud Computing, Database Systems, Software
Engineering and Embedded Real Time systems.
My name is Ms.Anupama Arun Aher.I have completed Bachelor’s Degree in Computer
Science from Mumbai University. As a measure of Master’s Degree I did my
Internship program in Newgen Software’s Technologies Private Limited. Presently I am
working with National Bulk Handling Corporation Limited a s a Trainee Software
Engineer. My area of interest is Business Process Management System and Document
Management System. I wish to research Document Content Management System and
wish to develop software module which will help organization go paperless.