Service discovery is a critical issue in Service Oriented Computing (SOC).Service discovery protocols used to detect and discover services offered by the nodes in the network. It must be scalable, reliable and robust service discovery mechanism. In traditional discovery mechanism uses decentralized service discovery approach named as chord4s.This method suffer from some problems such as scalability, node failure and efficient query routing. This paper addresses additional functionalities of chord4s protocol. In this paper data availability in chord4s protocol is improved by distributing functionally equivalent services to different successor nodes. If one node fails service consumer gets equivalent services from the other successor nodes. In this paper efficient query routing can be improved by getting multiple services with single query. Quality of service also improved by qos aware service discovery methods. Semantic information of services is integrated in order to increase flexibility, accuracy of service discovery.
A Chord based Service Discovery Approach for Peer- to- Peer NetworksIJMER
The document proposes a Chord-based decentralized service discovery approach called Chord4S. Chord4S improves on the basic Chord P2P overlay network by distributing descriptions of functionally equivalent services across different nodes. This improves availability in volatile environments by allowing services to still be discovered even if a node fails. Chord4S also supports wildcard queries to search multiple service categories at once and considers quality of service information during discovery. The approach aims to enable more robust and scalable service discovery compared to traditional centralized registry methods.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET Journal
This document describes the design of an anonymous publish-subscribe messaging system on a peer-to-peer network architecture. The key aspects of the design are:
1) It uses a service coordinator to bootstrap the network and distribute public keys while preserving anonymity. The coordinator tracks network health but does not see real peer identities.
2) Peers are assigned virtual addresses based on their public keys, rather than using IP addresses, to conceal their real identities.
3) A variant of distance vector routing is used to route messages between peers based on virtual addresses, in a way that trades off speed for anonymity by not revealing the full path of message forwarding.
4) Encryption provides confidentiality of messages while
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
This document summarizes a research article about a textual retrieval system using Bloom filters in unstructured peer-to-peer networks. It discusses how Bloom Cast replicates document content across the network using Bloom filters to encode documents. This allows for efficient full-text searches with guaranteed recall rates while reducing communication costs compared to replicating raw documents. The system samples nodes randomly using a lightweight distributed hash table to support searches in an unstructured P2P network where the network size is unknown.
This document discusses using Snort as a tool for deep packet inspection. It provides background on Snort, describing how it can operate in different modes like sniffer, packet logger, and network intrusion detection system modes. The document outlines Snort's functionality, how rules are used, and discusses implementing Snort by creating rules to detect specific network traffic and applications. It examines using Snort to analyze network traffic in detail, including classifying protocols and calculating bandwidth usage of web applications.
A Chord based Service Discovery Approach for Peer- to- Peer NetworksIJMER
The document proposes a Chord-based decentralized service discovery approach called Chord4S. Chord4S improves on the basic Chord P2P overlay network by distributing descriptions of functionally equivalent services across different nodes. This improves availability in volatile environments by allowing services to still be discovered even if a node fails. Chord4S also supports wildcard queries to search multiple service categories at once and considers quality of service information during discovery. The approach aims to enable more robust and scalable service discovery compared to traditional centralized registry methods.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
The International Journal of Engineering and Science (IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The document compares two handoff management protocols for 4G wireless networks: Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). MIPv6 allows nodes to change their point of attachment to the Internet while maintaining ongoing communications. However, it causes high signaling traffic and latency during handoffs. HMIPv6 addresses this by separating local and global mobility management. It reduces signaling costs for intra-domain handoffs by using a mobility anchor point for local registration instead of the home agent. The document analyzes and compares the handoff latency of MIPv6 and HMIPv6, finding that HMIPv6 has lower latency for intra-domain handoffs by avoiding signaling to the home agent or correspondents
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET Journal
This document describes the design of an anonymous publish-subscribe messaging system on a peer-to-peer network architecture. The key aspects of the design are:
1) It uses a service coordinator to bootstrap the network and distribute public keys while preserving anonymity. The coordinator tracks network health but does not see real peer identities.
2) Peers are assigned virtual addresses based on their public keys, rather than using IP addresses, to conceal their real identities.
3) A variant of distance vector routing is used to route messages between peers based on virtual addresses, in a way that trades off speed for anonymity by not revealing the full path of message forwarding.
4) Encryption provides confidentiality of messages while
Routing performance of structured overlay in Distributed Hash Tables (DHT) fo...journalBEEI
This paper presents a routing performance analysis of structured P2P overlay network. Due to the rapid development and hectic life, sharing data wirelessly is essential. P2P allows participating peers move freely by joining and leaving the network at any convenience time. Therefore, it exists constraint when one measuring the network performance. Moreover, the design of structured overlay networks is fragmented and with various design. P2P networks need to have a reliable routing protocol. In order to analyse the routing performance, this work simulates three structured overlay protocols-Chord, Pastry and Kademlia using OMNeT++ with INET and OverSim module. The result shows that Pastry is the best among others with 100% routing efficiency. However, Kademlia leads with 12.76% and 18.78% better than Chord and Pastry in lookup hop count and lookup success latency respectively. Hence, Pastry and Kamelia architectures will have a better choice for implementing structured overlay P2P network.
Textual based retrieval system with bloom in unstructured Peer-to-Peer networksUvaraj Shan
This document summarizes a research article about a textual retrieval system using Bloom filters in unstructured peer-to-peer networks. It discusses how Bloom Cast replicates document content across the network using Bloom filters to encode documents. This allows for efficient full-text searches with guaranteed recall rates while reducing communication costs compared to replicating raw documents. The system samples nodes randomly using a lightweight distributed hash table to support searches in an unstructured P2P network where the network size is unknown.
This document discusses using Snort as a tool for deep packet inspection. It provides background on Snort, describing how it can operate in different modes like sniffer, packet logger, and network intrusion detection system modes. The document outlines Snort's functionality, how rules are used, and discusses implementing Snort by creating rules to detect specific network traffic and applications. It examines using Snort to analyze network traffic in detail, including classifying protocols and calculating bandwidth usage of web applications.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
Anonymous Communication for Providing More Privacy and Securityijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe Systemtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The document discusses optimizing bloom filters for peer-to-peer (P2P) networks to improve multi-keyword search efficiency. It proposes automatically updating bloom filters by polling peers for current service availability and using expiry dates. This reduces stale data and false positives. Evaluation shows the optimized bloom filter approach reduces search time for intersection and union queries by around 185 times compared to regular bloom filters.
This document provides an overview of wide area networks (WANs) including what they are, how they have evolved, common connection technologies and options. A WAN connects devices over a broader geographic area than a local area network (LAN) using carriers. As networks grow, hierarchical designs must also grow to aggregate WAN traffic and provide scalability, availability and user access. Common WAN connection technologies include dedicated leased lines, circuit-switched options like ISDN, and packet-switched options like Frame Relay, ATM, DSL, cable broadband and wireless. Virtual private networks (VPNs) provide secure, encrypted connections between private networks over public networks like the Internet.
Network services are services that specialize in the handling of network-related or network-resident resources. Examples of network services are data transport service, network advance reservation service, network Quality of Service (QoS) service, network information service, network monitoring service, and AAA1 service.
This informational draft describes how several network services combine and yield a rich mediation function—a resource manager—between grid applications and legacy networks. Complements of these services, the network resource is seen joining CPU and storage as a first-class, grid-managed resource (and handled, as such, by a community scheduler, or other OGSA services).
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processe
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
This document summarizes previous work on integrating Mobile IP with mobile ad hoc networks (MANETs) to provide Internet connectivity. It discusses several proposals that implemented Mobile IP on different MANET routing protocols, including proactive protocols like DSDV and reactive protocols like AODV. The document then reviews related work that evaluated the performance of Mobile IP on MANETs using simulations. It concludes by stating that this thesis will further evaluate and compare the performance of Mobile IP implemented on AODV, AOMDV and DSDV routing protocols using the NS2 simulator.
Architecture and Evaluation on Cooperative Caching In Wireless P2PIOSR Journals
The document summarizes research on cooperative caching in wireless peer-to-peer (P2P) networks. It proposes using an asymmetric cooperative caching approach with Dynamic Source Routing (DSR) to improve performance. DSR routing is chosen over AODV routing because it supports one-way links and source routing. The key aspects of the proposed approach are:
1) Data requests follow the normal routing path but data responses can follow a different path if intermediate nodes need to cache the data. This reduces overhead.
2) Only nodes that need to cache data receive the full data, others just get the routing layer, minimizing copying overhead.
3) Route discovery in DSR works by broadcasting route requests
A decentralized service discovery approach on peer to-peer networksJPINFOTECH JAYAPRAKASH
This document proposes a decentralized service discovery approach called Chord4S that uses a peer-to-peer network based on the Chord protocol. Traditional centralized service discovery approaches have problems with scalability and single points of failure. Chord4S improves availability by distributing descriptions of equivalent services across different nodes, so failure of one node does not prevent discovery of those services. It also supports wildcard queries and quality of service aware discovery. Experimental results showed Chord4S achieves higher data availability with reasonable overhead compared to traditional approaches.
New approaches with chord in efficient p2p grid resource discoveryijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through
Internet. It not only allows us to share files but also most of the software and hardware resources. An
efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it
supports resource management and scheduling of applications. Among various discovery mechanisms,
Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is
efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to
find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup
performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made
on Chord Structured P2P protocol and present our proposed methods in which we use the address of
Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time
complexity.
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows us to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports resource management and scheduling of applications. Among various discovery mechanisms, Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made on Chord Structured P2P protocol and present our proposed methods in which we use the address of Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time complexity.
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
This document proposes using Border Gateway Protocol (BGP) and inter-domain packet filters (IDPFs) to limit IP spoofing on the internet. IDPFs would be constructed using information from BGP route updates and deployed on border routers. IDPFs aim to minimize IP spoofing without requiring global routing information. The framework is designed so that it does not incorrectly discard packets with valid source addresses. With even partial deployment, IDPFs could reduce the level of IP spoofing on the internet.
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally
Anonymous Communication for Providing More Privacy and Securityijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Proposal for End-to-End QoS Provisioning in Software-Defined NetworksIJECEIAES
This paper describes a framework application for the control plane of a network infras- tructure; the objective is to feature end-user applications with the capability of requesting at any time a customised end-to-end Quality-of-Service profile in the context of dynamic Service-Level-Agreements. Our solution targets current and future real-time applications that require tight QoS parameters, such as a guaranteed end-to-end delay bound. These applications include, but are not limited to, health-care, mobility, education, manufacturing, smart grids, gaming and much more. We discuss the issues related to the previous Integrated Service and the reason why the RSVP protocol for guaranteed QoS did not take off. Then we present a new signaling and resource reservation framework based on the cutting-edge network controller ONOS. Moreover, the presented system foresees the need of considering the edges of the network, where terminal applications are connected to, to be piloted by distinct logically centralised controllers. We discuss a possible inter-domain communication mechanism to achieve the end-to-end QoS guarantee.
KANSA: high interoperability e-KTP decentralised database network using distr...TELKOMNIKA JOURNAL
e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
This document summarizes a research paper that proposes a framework for continuous query processing for mobile users in peer-to-peer environments without centralized servers. The framework allows users to specify quality of service parameters for query answers and collaborate with peers to continuously maintain answers. Key aspects of the framework include allowing users to specify desired levels of coverage and accuracy for query answers, and designing a continuous answer maintenance scheme where users collaborate with peers to refine answers if local caches do not satisfy quality requirements. Experimental results showed the framework was efficient and scalable while providing a tradeoff between communication overhead and answer quality.
Ontology-Based Routing for Large-Scale Unstructured P2P Publish/Subscribe Systemtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
IRJET- Adopting Encryption for Intranet File Communication SystemIRJET Journal
This document discusses the design and implementation of an encrypted file communication system within an intranet. It aims to securely share files between users of an organization in a controlled manner without using external file sharing services.
The key aspects of the system design covered are the database schema, file storage method, and encryption algorithm. To allow for fast querying, the database schema refreshes old records periodically instead of having one large table. Files are stored on the server rather than in the database to avoid file format changes. AES encryption with 256-bit keys is used due to its fast speeds and strong security compared to alternatives like DES and RSA.
The system architecture has three layers - a user interface layer for login/registration and a
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
The document discusses optimizing bloom filters for peer-to-peer (P2P) networks to improve multi-keyword search efficiency. It proposes automatically updating bloom filters by polling peers for current service availability and using expiry dates. This reduces stale data and false positives. Evaluation shows the optimized bloom filter approach reduces search time for intersection and union queries by around 185 times compared to regular bloom filters.
This document provides an overview of wide area networks (WANs) including what they are, how they have evolved, common connection technologies and options. A WAN connects devices over a broader geographic area than a local area network (LAN) using carriers. As networks grow, hierarchical designs must also grow to aggregate WAN traffic and provide scalability, availability and user access. Common WAN connection technologies include dedicated leased lines, circuit-switched options like ISDN, and packet-switched options like Frame Relay, ATM, DSL, cable broadband and wireless. Virtual private networks (VPNs) provide secure, encrypted connections between private networks over public networks like the Internet.
Network services are services that specialize in the handling of network-related or network-resident resources. Examples of network services are data transport service, network advance reservation service, network Quality of Service (QoS) service, network information service, network monitoring service, and AAA1 service.
This informational draft describes how several network services combine and yield a rich mediation function—a resource manager—between grid applications and legacy networks. Complements of these services, the network resource is seen joining CPU and storage as a first-class, grid-managed resource (and handled, as such, by a community scheduler, or other OGSA services).
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Networkijwmn
We developed a new content routing based on the virtual backbone structure, which groups wireless nodes and contents into a virtual architecture. Our approach is scalable, works with local information, and does not rely on address information. The naming system uses flat naming to identify nodes and contents, and organizes these identifiers together. Backbone nodes can be selected automatically or predefined to direct their associated normal nodes in a local area. The normal nodes are guided by the backbone nodes to full fill the searching and routing processe
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
This document summarizes previous work on integrating Mobile IP with mobile ad hoc networks (MANETs) to provide Internet connectivity. It discusses several proposals that implemented Mobile IP on different MANET routing protocols, including proactive protocols like DSDV and reactive protocols like AODV. The document then reviews related work that evaluated the performance of Mobile IP on MANETs using simulations. It concludes by stating that this thesis will further evaluate and compare the performance of Mobile IP implemented on AODV, AOMDV and DSDV routing protocols using the NS2 simulator.
Architecture and Evaluation on Cooperative Caching In Wireless P2PIOSR Journals
The document summarizes research on cooperative caching in wireless peer-to-peer (P2P) networks. It proposes using an asymmetric cooperative caching approach with Dynamic Source Routing (DSR) to improve performance. DSR routing is chosen over AODV routing because it supports one-way links and source routing. The key aspects of the proposed approach are:
1) Data requests follow the normal routing path but data responses can follow a different path if intermediate nodes need to cache the data. This reduces overhead.
2) Only nodes that need to cache data receive the full data, others just get the routing layer, minimizing copying overhead.
3) Route discovery in DSR works by broadcasting route requests
A decentralized service discovery approach on peer to-peer networksJPINFOTECH JAYAPRAKASH
This document proposes a decentralized service discovery approach called Chord4S that uses a peer-to-peer network based on the Chord protocol. Traditional centralized service discovery approaches have problems with scalability and single points of failure. Chord4S improves availability by distributing descriptions of equivalent services across different nodes, so failure of one node does not prevent discovery of those services. It also supports wildcard queries and quality of service aware discovery. Experimental results showed Chord4S achieves higher data availability with reasonable overhead compared to traditional approaches.
New approaches with chord in efficient p2p grid resource discoveryijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through
Internet. It not only allows us to share files but also most of the software and hardware resources. An
efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it
supports resource management and scheduling of applications. Among various discovery mechanisms,
Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is
efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to
find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup
performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made
on Chord Structured P2P protocol and present our proposed methods in which we use the address of
Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time
complexity.
NEW APPROACHES WITH CHORD IN EFFICIENT P2P GRID RESOURCE DISCOVERYijgca
Grid computing is a type of distributed computing which allows sharing of computer resources through Internet. It not only allows us to share files but also most of the software and hardware resources. An efficient resource discovery mechanism is the fundamental requirements for grid computing systems, as it supports resource management and scheduling of applications. Among various discovery mechanisms, Peer-to-Peer (P2P) technology witnessed rapid development and the key component for this success is efficient lookup applications of P2P. Chord is a P2P structural model widely used as a routing protocol to find resources in grid environment. Plenty of ideas are implemented by researchers to improve the lookup performance of chord protocol in Grid environment. In this paper, we discuss the recent researches made on Chord Structured P2P protocol and present our proposed methods in which we use the address of Recently Visited Node (RVN) and fuzzy technique to locate the grid resources to reduce message and time complexity.
Energy- Aware QoS Based Routing Protocols for Heterogeneous WSNs: A Survey ...............................1
Sridevi S., Rumeniya G. and Usha M.
Optimization of Outsourcing ICT Projects in Public Organizations; Case Study: Public Center of Iranian
ICT Studies ................................................................................................................................................. 20
Majid Nili Ahmadabadi, Abbas Bagheri and Fariba Abolghasemi
An Optimized CBIR Using Particle Swarm Optimization Algorithm ......................................................... 40
Subhakala S., Bhuvana S. and Radhakrishnan R.
Study of Satisfaction Assessment Techniques for Textual Requirements .............................................. 56
K. S. Divya, R. Subha and Dr. S. Palaniswami
Survey of MAC Protocols for Heterogeneous Traffic in Wireless Sensor Networks ............................... 67
Sridevi S., Priyadharshini R. and Usha M.
Harnessing Social Media for Business Success. Case Study of Zimbabwe ............................................... 80
Musungwini Samuel, Zhou Tinashe Gwendolyn, Zhou Munyaradzi and Ruvinga Caroline
Quality Platforms for Innovation and Breakthrough................................................................................ 90
Dr. Hima Gupta
Development of Virtual Experiment on Waveform Conversion Using Virtual Intelligent SoftLab ...... 107
Bhaskar Y. Kathane
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
This document proposes using Border Gateway Protocol (BGP) and inter-domain packet filters (IDPFs) to limit IP spoofing on the internet. IDPFs would be constructed using information from BGP route updates and deployed on border routers. IDPFs aim to minimize IP spoofing without requiring global routing information. The framework is designed so that it does not incorrectly discard packets with valid source addresses. With even partial deployment, IDPFs could reduce the level of IP spoofing on the internet.
Evaluating feasibility of using wireless sensor networks in a coffee crop thr...IJCNCJournal
A Wireless Sensor Networks is a network formed with sensors that have characteristics to sensor an area to
extract a specific metric, depending of the application.
We would like to analyse the feasibility to use sensors in a coffee crop.In this work we are evaluating routing protocolsusing real dimensions and characteristics of a coffee crop. We evaluate, through simulation, AODV, DSDV and AOMDV and two variants known in this work as AODVMOD and AOMDVMOD with 802.15.4 MAC Protocol
.For this comparison, we defined three performance metrics: Packet Delivery Ratio (PDR), End-to-End Delay
and Average Energy Consumption. Simulation results show that AOMDVMOD overall, outperforms others
routing protocols evaluated, showing that is possible to use WSN in a real coffee crop environment.
Web Service Discovery Mechanisms Based on IR ModelsIRJET Journal
This document discusses various approaches for web service discovery that employ information retrieval (IR) methods. It describes five main approaches:
1. Using singular value decomposition (SVD) to find similar services by representing them as vectors and calculating cosine similarity.
2. Applying the vector space model of IR to represent services and queries as vectors and calculate cosine similarity to discover analogous services.
3. Combining the vector space model with a structure matching algorithm to refine service discovery results.
4. Measuring semantic similarity of services instead of structural similarity by representing data types as trees and calculating edit distances.
5. Enhancing service requests and descriptions with ontologies, representing them as vectors using latent semantic
A Review on Traffic Classification Methods in WSNIJARIIT
In a wireless network it is very important to provide the network security and quality of service. To achieve these parameters there must be proper traffic classification in the wireless network. There are many algorithms used such as port number, deep packet inspection as the earlier methods and now days KISS, nearest cluster based classifier (NCC), SVM method and used to classify the traffic and improve the network security and quality of service of a network.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
The document discusses the Open Grid Services Architecture (OGSA) and Open Grid Services Infrastructure (OGSI) standards for grid computing. OGSA defines the overall structure and services for grid environments using a distributed computing model. OGSI specifies a set of service primitives and behaviors for grid services. These standards leverage existing web service standards like WSDL to provide interfaces for grid services.
The document discusses OGSI (Open Grid Services Infrastructure), which defines mechanisms for creating, managing, and exchanging information among grid services. OGSI builds on web services standards like SOAP, XML, and WS-Security to provide a common way to access grid services. The Open Grid Services Architecture (OGSA) defines the overall structure and services provided in grid environments. OGSI further specifies the behaviors and interfaces that define how clients interact with grid capabilities. Standards are important for making grid computing practical by enabling interoperability, application portability, and efficient resource sharing across systems.
THE DEVELOPMENT AND STUDY OF THE METHODS AND ALGORITHMS FOR THE CLASSIFICATIO...IJCNCJournal
This document summarizes a study on developing methods and algorithms for classifying data flows of cloud applications in the network of a virtual data center. The researchers developed a hybrid approach using data mining and machine learning methods to classify traffic flows in real-time. They created an algorithm for classifying and adaptively routing cloud application traffic flows, which was implemented as a module in the software-defined network controller. This solution aims to improve the efficiency of handling user requests to cloud applications and reduce response times.
Flexible bloom for searching textual contentUvaraj Shan
This document describes BloomCast, a system that uses Bloom filters to encode document content and replicate it across peers in an unstructured peer-to-peer (P2P) network. BloomCast aims to achieve high recall for search queries at low communication cost. It hybridizes a lightweight distributed hash table (DHT) with the P2P overlay to enable random node sampling and network size estimation. The DHT helps meet two constraints: query and document replicas are randomly distributed across the network, and peers know the network size. By uniformly replicating content across the network, BloomCast can guarantee search recall. It utilizes Bloom filters to compress document replicas and reduce replication costs.
Flexible bloom for searching textual contentUvaraj Shan
This document presents the BloomCast scheme for efficient full-text retrieval in unstructured peer-to-peer networks. BloomCast replicates document content across the network in the form of Bloom filters to reduce communication costs while still guaranteeing recall. It hybridizes a lightweight distributed hash table with the unstructured overlay to support random node sampling and network size estimation. Queries are evaluated based on Bloom filter membership verification to support full-text searches with the potential for false positives but no false negatives. The system aims to provide efficient and effective full-text retrieval in unstructured P2P networks.
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
This document discusses implementing trust-based route selection in mobile ad hoc networks. It proposes a system to store and update trust values for nodes based on their behavior. Different strategies are designed to evaluate routes based on the trust values of their constituent nodes. The performance of applying trust-based route selection to DSR, AODV and DYMO routing protocols is evaluated using the QualNet simulator in terms of metrics like throughput, packet delivery ratio and average jitter. The evaluation aims to improve routing performance and security in the presence of malicious nodes.
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
This document discusses pervasive computing service discovery in a secure framework environment. It describes the objectives and features of service discovery, including service description, discovery architecture, announcement and querying of services, service usage, configuration updates, and various industry approaches to service discovery like SLP and Jini. It also discusses designing a taxonomy for the environment setup and the importance of security and privacy in service discovery, including user authentication, authorization, confidentiality, integrity, availability, and privacy. Security technology is a central feature for the success of pervasive computing systems.
Project - UG - BTech IT - Cluster based Approach for Service Discovery using ...Yogesh Santhan
Abstract— Web services that are appropriate to a user specific request are usually not considered in discovering the exact service since they are present without explicit related semantic descriptions. In our approach, we deal with the issue of service discovery provided non-explicit service description semantics that match a particular service request. We propose a system that involves semantic-based service categorization which is performed at the UDDI with a key for achieving the service categorization at functional level based on an ontology skeleton. Also, clustering is used for literally systemizing the web services based on functionality which is achieved by using analytic algorithm. An efficient matching for the relevant services is achieved by the enhancing the service request semantically and involves expanding the additional functionality (obtained from ontology) that are related for the requested service. The pattern recognition algorithm is used to select appropriate service from the cluster formation of related (grouped) web services.
This is my UG Final Year Project - BTech Information Technology.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to An Enhanced P2P Architecture for Dispersed Service Discovery (20)
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearson’s correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
The document presents a dynamic two-phase model for a fluidized bed reactor used to produce polypropylene. The model divides the reactor into an emulsion phase and bubble phase, with reaction assumed to occur in both phases. Simulation results show the temperature profile is lower than previous single-phase models due to considering both phases. Approximately 13% of the produced polymer comes from the bubble phase, demonstrating the importance of accounting for both phases.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39°C-42°C and the boiling point is in
the range 70 °C - 533 °C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
The document analyzes positioning errors in differential precision workbenches and proposes a compensation method. It discusses sources of error in workbench transmission systems and guides. Through theoretical analysis and experimentation, it is shown that positioning errors increase with travel distance due to factors like guideway errors. A method is developed to sample positioning at multiple points, compare values to identify errors, and implement reverse error correction through motion control cards. This allows positioning accuracy better than 15 micrometers over 150mm of travel to be achieved. The compensation method can improve precision for a range of machine tool designs.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15℃ and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63℃ The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
This study examines the critical closing pressure of fractures in mudstone reservoir cores from the Daqing oilfield in China. Laboratory experiments subjected fractured and unfractured mudstone cores to increasing external pressures while measuring permeability. The critical closing pressure is defined as the pressure when fractured core permeability matches unfractured permeability, indicating fracture closure. Results show fractured cores have higher permeability than unfractured cores due to fractures. Permeability generally decreases exponentially with increasing pressure. By calculating sensitivity equations relating permeability and production pressure difference, the study estimates critical closing pressures under reservoir conditions are lower than values from external pressure experiments. The study provides guidance but notes limitations in fully simulating complex in-situ stress conditions.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40℃ to 125℃, experimental
results implemented with SMIC 0.18μm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/℃ and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/℃.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNT’s whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Inconsistent user experience and siloed data, high costs, and changing customer expectations – Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their “modern digital bank” experiences.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
Dandelion Hashtable: beyond billion requests per second on a commodity server
An Enhanced P2P Architecture for Dispersed Service Discovery
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 2 Issue 6 ǁ June. 2014 ǁ PP.01-07
www.ijres.org 1 | Page
An Enhanced P2P Architecture for Dispersed Service Discovery
M. Divya, A. Anbumani
Department of Computer & Communication Mahendra Institute of Technology, Tiruchencode,Tamilnadu.
Department of Computer & Communication Mahendra Institute of Technology, Tiruchencode, Tamilnadu.
Abstract
Service discovery is a critical issue in Service Oriented Computing (SOC).Service discovery protocols used to
detect and discover services offered by the nodes in the network. It must be scalable, reliable and robust service
discovery mechanism. In traditional discovery mechanism uses decentralized service discovery approach named
as chord4s.This method suffer from some problems such as scalability, node failure and efficient query routing.
This paper addresses additional functionalities of chord4s protocol. In this paper data availability in chord4s
protocol is improved by distributing functionally equivalent services to different successor nodes. If one node
fails service consumer gets equivalent services from the other successor nodes. In this paper efficient query
routing can be improved by getting multiple services with single query. Quality of service also improved by qos
aware service discovery methods. Semantic information of services is integrated in order to increase flexibility,
accuracy of service discovery.
Index Terms- Service Oriented Computing, Chord4s
I. INTRODUCTION
Web services are becoming an emerging technology for developing distributed applications. Service
discovery is an important issue in service oriented computing (SOC).Service Discovery protocols are used to
detect and discover services offered by the nodes in a network. SOC is being adopted by major computer uses,
including banks (Web banking services), retailers (Web shopping services), and airlines (Web booking
services).
Traditional service discovery approaches based on UDDI Business Registries(UBR).This registries
uses Centralized service discovery approach. This method uses Web Service Crawler Engine (WSCE) [2] to
discover web services in effective manner. This method is not suitable for large scale distributed environment. It
produces many problems such as performance bottleneck and vulnerability to failures.
Number of service consumers and requests increase in an open SOC environment. SOC is a large scale
distributed environment. Centralized registries are not suitable for large scale networks. To avoid these
problems decentralized service discovery approach is used to discover and distribute services in large scale,
distributed SOC environment. In
Centralized service discovery approach-h each and every service request and response depends on that
centralized registries only. In decentralized service discovery approach each and every service request and
response does not depends on the centralized registries. Each and every node in the network shares its details
with other nodes. The Peer-to-Peer (P2P) technology is a type of decentralized and distributed network. In that
individual nodes in the peers act as both service consumers and service providers. This method is a universal
approach to improving reliability, scalability, and robustness of distributed, systems by removing centralized
infrastructures. Emerging applications of peer to peer technologies are content distribution, file sharing, web
search engines and real time communication like skype[3]. Service discovery method uses some of the
Structured P2P systems such as Chord [21], CAN [16],Pastry[18],andTapstry[ 23]
In this paper uses chord4s protocol for discover services in decentralized manner. Chord4s is suitable
for large scale distributed networks. Chord4s is selected for its scalability. Traditional service discovery
approach each and every request depends on UBR central registry. If no of request is increased, response from
the central registry is decreased. Service consumer cannot get required service.
In decentralized service discovery approach each and every request does not depends on the other
nodes Service descriptions are distributed in the peers in networks. Each and every node is having all
information about that services which can provided by the service providers. Service query can be submitted by
the service consumer it is distributed in the network by using distributed hash function. It can produce hash
value for each service descriptions; this hash value is stored in its repository.
Query submitted by the service consumer is compared with the information stored in the repository. If
it is matched that particular information is given to the service consumer otherwise that query can be routed into
other distributed nodes. In that functionally equivalent services are distributed in different successor nodes. If
one node fails service consumer gets equivalent services from the other successor nodes .It improves availability
2. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 2 | Page
of data to the service consumers. This method produces efficient query routing. Service consumer can get
multiple services with single query. Service query from the consumer is segregated into three main parts that is
service identifiers, qos specification and syntax specification. Service identifiers are further divided into two
parts that is functional bits and provider bits. Using this provider bits service provider can provide multiple
services with single query. In Chord4s semantic information of services is integrated in order to increase
flexibility, accuracy of service discovery.
The rest of the paper is organized as follows. Section 2 introduces major related work. Section 3
presents the unique service description of Chord4S. Then, Section 4 addresses the service publication approach.
After that, the new routing protocol of Chord4S for service discovery is proposed in Section 5, followed by
discussion of experimental results in Section 6. Finally, Section 7 summarizes the major contribution of this
paper and outlines future work.
II. RELATED WORKS
This section briefly summarizes related work. Our research aims at providing a scalable, reliable, and
robust approach for web service discovery.
Traditional Service Discovery Method
Traditional service discovery approaches based on UDDI Business Registries (UBR)[2].This registries
uses Centralized service discovery approach. This method uses Web Service Crawler Engine to discover web
services in effective manner. This method is not suitable for large scale distributed environment. It produces
many problems such as performance bottleneck and vulnerability to failures. Number of service consumers and
requests increase in an open SOC environment. SOC is a large scale distributed environment. Centralized
registries are not suitable for large scale networks. To avoid these problem Decentralized service discovery
approach is used to discover and distribute services in large scale, distributed SOC environment.
Decentralized Service Discoveries
Traditional decentralized approach uses chord protocol which is a distributed hash table protocol. This
protocol is well suitable for peer to peer networks which effectively locate the node that stores the particular
data items. Joining of new nodes and leaving of old nodes can be effectively performed in the peer to peer circle
in the network by using chord protocol. It needs routing of information about the other nodes.
Finger table is used to store the routing information about the other nodes. It maintains the details about
predecessor and successor nodes. The node with the highest identifier less than n’s identifier, allowing for
wraparound is called predecessor. The node with the lowest identifier greater than n’s identifier, allowing for
wraparound is called successor nodes. Finding predecessor and successor nodes are main critical issue in chord
protocol. So, this method is not So, this method is not suitable for large scale distributed environment.
One of the structured p2p systems Content Addressable network (CAN) is used for peer to peer file
sharing. The CAN is scalable, fault tolerance and completely self organizing. It is used in large scale storage
management systems. This system requires efficient insertion and retrieval of content in large scale systems.
Departure of the nodes and recovery is the main issue in the construction of CAN[16]. Multiple hash functions
are used in CAN. It produces replicated data items
Li et al. [13] present PSWD, a distributed web service discovery architecture based on an extended
Chord algorithm called XChord. .In this paper XML is used to web service description and service query.
Schmidt and Parashar [20] describe a system that implements an Internet-scale DHT .This system supports
search using keys and partial key .M-Chord [15] provides Chord with the ability to perform metric-based
similarity search
III.SERVICE DESCRIPTION
Chord4s protocol describes how to distribute and discover services in decentralized manner, query
routing and how to provide quality of services to the service consumers.
Chord4s Implementation
Chord4s protocol supports one operation; given a key, it will determine the node responsible for storing
the key value. It uses consistent hashing which is used to assign hash keys to the nodes. It defines the node
responsible for a key to be that keys successor. The node with the lowest identifier greater than n’s identifier,
allowing for wraparound is called successor nodes. Finding successor nodes is primary task in chord4s
protocol.Basic operations used in the chord4s protocol are insert(key,value),lookup(key),join(n) and leave(n)
3. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 3 | Page
Service Descriptions
The service description supported by Chord4S consists of three main parts: service identifier, QoS
specification, and syntax specification. The service identifiers are used for routing query messages. Service
identifiers consist of provider bits and functional bits .Provider bits are used to provide information and
functional bits are used to refer the functionality of services.Chord4S supports distribution and query for
hierarchical service description, e.g., “Booking. Hotel.America.USA.Texas.Huston” and “Multimedia.
Video.Encoder.AVI2RM.” Service consumer sends this query to the service provider, the description of the
service is stored in its repository. Service identifiers are generated to route the query. Functional bits and
provider bits are generated depending upon the functions and behavior of the query. Depending upon the
provider bits the functionally equivalent services are stored in the same successor nodes. If one node fails
service consumer gets equivalent services from the other successor nodes
Fig 1: Service identifier generated from hierarchical service descriptions
A sample of service identifier consisting of five layers is presented in Fig. 1. The function bits are used
for the functional service matchmaking in service discovery. The main function of the provider bits is to
distinguish and distribute functionally equivalent services. Using SHA-1[21]one of the general consistent
hashing functions, the probability of hashing two service descriptions to a same value is negligible as long as the
length of the provider bits is large enough. Identifiers generated from functionally equivalent services differ
from each other in a certain number of the lowest bits, i.e., the provider bits. For example, in an application with
a maximum of five layered (four layers for functional bits and one layer for provider bits) service description, a
service description like “Multimedia.Video.AVIPlayer” is also acceptable. When generating service identifier
for this service description, the first three layers of the service identifier will be generated by using hashm1
(“Multimedia”), hashm2 (“Video”), and hashm3 (“AVIPlayer”). The fourth layer would be zero by default. In
this case, the service description will be placed in a virtual segment containing all the service descriptions
starting with “Multimedia.Video.”
QoS Specification
QoS awareness is a critical issue in an SOC environment. QoS-aware service discovery used to provide
quality of service to the service consumers.It only returns the service which will meet the requirements of the
service consumer. Chord4S allows service providers to publish their services with quality specifications
attached as advertisements. However, the quality specifications are not involved in the generation of service
identifier. After finding a service description that matches its functional requirements according to the service
identifier, the service consumer can look over the attached quality specification. Chord4S supports three types of
QoS attributes, defined as follows:
1. Numeric QoS attributes, e.g., <; >;<¼;> ¼ etc, are often used to specify service consumer’s QoS
requirements of this type, such as “Price < ¼ $1; 000:00” and “Availability > ¼ 0:95”.
2. Boolean QoS attributes. A Boolean QoS attribute is a QoS attribute that can be assigned with one of the two
values: true and false. Two comparison operators, ¼¼ and ! ¼ can be used to specify QoS requirements of this
type, such as “Cancellable = = True.”
3. Enumerated type. An enumerated type of QoS attribute is a QoS attribute that can be assigned with any of
the enumerators as a value. For example, the types of an international postal service can be declared an
enumerated type of QoS attribute that can be assigned with one of the three enumerators: Airmail, Registered
Mail, or Express Mail. Two comparison operators, ¼¼ and ! ¼, as well as set operators can be used to specify
4. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 4 | Page
QoS requirements of this type, such as “Type = = Registered Mail” and “Type C_ {Registered Mail, Express
Mail}.” For example, a service consumer that requires an registered or express mail to be delivered at a price no
more than $100.00 can specify a combination of QoS requirements as “Type _ {Registered Mail, Express Mail}
AND Price < ¼ $100:00. Besides QoS specifications, other service-specific information can be published by
service providers, e.g. the behavior of services in the context, such as how a web service is used in a business
process and how services interact with each other in a service composition scenario. This kind of information
can be taken into consideration when looking up service providers in complicated applications. To name a few,
BPEL and OWL-S descriptions can be converted to finite automata through several methods [5], [8], [14]. Then
the results from hashing the finite automata or the Path Finite Automata (PFA) generated from the finite
automata can be incorporated into the service description to enable semantic-enhanced service discovery [7].
IV.SERVICE PUBLICATIONS
In this section, we present the mechanisms for distributed service publication.
Traditional Approach in Chord
Traditional decentralized approach uses chord protocol which is a distributed hash table protocol. This
protocol is well suitable for peer to peer networks which effectively locate the node that stores the particular
data items. Joining of new nodes and leaving of old nodes can be effectively performed in the peer to peer circle
in the network by using chord protocol. It needs routing of information about the other nodes. Finger table is
used to store the routing information about the other nodes. It maintains the details about predecessor and
successor nodes. The node with the highest identifier less than n’s identifier, allowing for wraparound is called
predecessor. The node with the lowest identifier greater than n’s identifier, allowing for wraparound is called
successor nodes
Fig 2: Routing path between A and B
Chord is used to find locations of the key, joining new nodes in a network and used to recover from
failure and departure of existing nodes. Hash function assigns each node and key an m-bit identifier using a
base hash function such as SHA-1
ID(node) = hash(IP, Port)
ID(key) = hash(key)
Forexample“Multimedia.Video.Encoder.AVI2RM.” When these service descriptions are hashed, the
returned dentifiers will be the same. Hence, these service descriptions will be stored at the same successor node.
Similar to single point failure, failure of this successor node will lead to inaccessibility of all the services of
“Multimedia.Video.Encoder.AVI2RM.”
Service Publication in Chord4S
Two approaches are available in chord4s service publication. Replication and Redundancy storage of
multiple copies of a service description at different nodes is called as replication. Storage of redundant
information long with the service description is called as redundancy. The replication approach needs to
maintain data availability. The redundancy approach requires significant change to the original service
descriptions which may not be acceptable by the service providers. Both approaches may result in a
considerably large burden on the system. Chord4S improves data availability by distributing descriptions of
functionally equivalent services to different nodes. In this way, a failed node would just have limited impact on
data availability. A service consumer has the opportunity to locate the functionally equivalent services from
those available nodes.
5. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 5 | Page
V. SERVICE QUERY
This section presents how routing of query messages is performed in Chord4S based on the service
publication approach Query Types
Chord4S supports two types of query: service-specific queries and queries with wildcard(s).
Service-Specific Query
A service-specific query contains complete details of a service description and is used to look up a
specific service. In a system that allows four-layered function bits in the service descriptions,
“Multimedia.Video.Encoder.AVI2RM” is a typical example of service-specific query
Query with Wildcard(s)
Sometimes service consumers need to search for categories of services. For example, an amplifier
service that amplifies the audio of an RM movie file can be composed using three component services which
correspond to three specific steps: audio extraction, audio amplification, and video/audio combination.
Therefore, the service consumer needs to find the component services from three categories: “Multimedia.
Video.AudioExtractor,” Multimedia.Audio.Amplifier,” and “Multimedia.Combiner,” and select the ones whose
inputs and outputs match. In such cases, service queries using wildcard(s) are necessary, e.g.,
Multimedia.Video. AudioExtractor.*”, “Multimedia. Audio.Amplifier.*”, and Multimedia.Combiner.*.*”.
When solving a query with wildcard(s), it is actually looking up a virtual segment composed by nodes
succeeding service descriptions that fall into the target service category. The generation of target service
identifier or more specifically target service category identifier—for a query with wildcard(s) is similar to that
for a service specific query. The difference is that the layers corresponding to the wildcard(s) will be stuffed
with 0s.
VI.EXPERIMENTAL EVALUATIONS
To evaluate the performance of Chord4S, a Chord simulator is extended to support Chord4S topology
control, data distribution and routing protocol
Data Availability
A unique feature, and also a main design goal of Chord4S is the high data availability in volatile
environments. To set up the volatile environments, we randomly select a fraction of nodes participating in the
network to fail in each experiment increasing from 5 to 60 percent by steps of 5 percent. Then the remaining
nodes were randomly selected to send queries for services. The number of required functionally equivalent
services in each query is randomly picked from the interval [1], [12]. To evaluate the data availability, we
measured the fraction of the failed queries. We conducted two sets of experiments, one with Chord and the other
with Chord4S. Fig.4 compares the results from the two sets of experiments, where the Chord4S curves always
start at a much lower point and continue to stay at lower points compared to Chord. It can be observed that the
fractions of ailed queries are higher than the fraction of failed nodes. This result indicates that other than the
service descriptions loss along the failed nodes something else also caused failed queries. The reason is that
without stabilization some entries in existing nodes’ finger tables became invalid. Those invalid entries yielded
some failed queries and decreased the data availability in both cases of Chord and Chord4S because some
queries could not be forwarded correctly. To conclude, the experimental results demonstrate that Chord4S
provides better data availability than Chord in different volatile environments on different scales
a) In networks consisting of 27
nodes
6. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 6 | Page
b) In networks consisting of 211
nodes
Fig 4 Data Availability
VII. CONCLUSION
Chord4s which is the P2P based decentralized service discovery approach that utilizes data distribution
and lookup capabilities of Chord to distribute and discover services in a decentralized manner. Data availability
is improved by distributing descriptions of functional equivalent services to different successor nodes It is
extended to support efficient discovery of multiple services with single query. Thus Chord4s achieves higher
data availability and efficient query with reasonable overhead. Semantic information of services is integrated in
chord4s to increase flexibility, accuracy of service discovery. In the future, integration of semantic information
of services into Chord4s using popular tools such as Petri net, WSMO to improve efficiency and reduce
overhead.
REFERENCES
[1] “North American Industrial Classification Scheme (NAICS) codes,” http://www.naics.com/, 2012.
[2] E. Al-Masri and Q.H. Mahmoud, “Crawling Multiple UDDI Business Registries,” Proc. 16th Int’l Conf. World Wide Web
(WWW ’07), pp. 1255-1256, 2007.
[3] S. Baset and H. Schulzrinne, “An Analysis of the Skype Peer-to- Peer Internet Telephony Protocol,” Proc. IEEE INFOCOM, pp.
1- 11, 2006.
[4] J. Beatty, G. Kakivaya, D. Kemp, T. Kuehnel, B. Lovering, B. Roe, C. St.John, J. Schlimmer, G. Simonet, D. Walter, J. Weast,
Y. Yarmosh, and P. Yendluri, “Web Services Dynamic Discovery (WS-Discovery),” http://specs.xmlsoap.org/ws/2005/04/
discovery/ws-discovery.pdf, 2005.
[5] Z. Cheng, M.P. Singh, and M.A. Vouk, “Verifying Constraints on Web Service Compositions,” Real World Semantic Web
Applications, June 2002.
[6] L. Clement, A. Hately, C. von Riegen, and T. Rogers, “UDDI Version 3.0.2,” OASIS, http://www.uddi.org/pubs/uddi_v3.htm,
2004.
[7] F. Emekc¸i, O.D. Sahin, D. Agrawal, and A.E. Abbadi, “A Peer-to- Peer Framework for Web Service Discovery with Ranking,”
Proc. IEEE Int’l Conf. Web Services (ICWS ’04), pp. 192-199, 2004.
[8] H. Foster, S. Uchitel, J. Magee, and J. Kramer, “Model-Based Verification of Web Service Compositions,” Proc. IEEE 18th Int’l
Conf. Automated Software Eng. (ASE ’03), pp. 152-163, 2003.
[9] V. Gopalakrishnan, B.D. Silaghi, B. Bhattacharjee, and P.J. Keleher, “Adaptive Replication in Peer-to-Peer Systems,” Proc. 24th
Int’l Conf. Distributed Computing Systems (ICDCS ’04), pp. 360-369, 2004.
[10] T.H.-T. Hu and A. Seneviratne, “Autonomic Peer-to-Peer Service Directory,” IEICE Trans. Information System, vol. E88-D, no.
12, pp. 2630-2639, 2005.
[11] H.V. Jagadish, B.C. Ooi, K.-L.Y. Tan, and R. Cui Zhang, “iDistance: An Adaptive B+-Tree Based Indexing Method for Nearest
Neighbor Search,” ACM Trans. Database Systems, vol. 30, no. 2, pp. 364-397, 2005.
[12] L.-j. Jin, V. Machiraju, and A. Sahai, “Analysis on Service Level Agreement of Web Services,” technical report, HP
Laboratories, http://www.hpl.hp.co.uk/techreports/2002/HPL-2002-180.pdf. 2002.
[13] Y. Li, F. Zou, Z. Wu, and F. Ma, “PWSD: A Scalable Web Service Discovery Architecture Based on Peer-to-Peer Overlay
Network,” Proc. Sixth Asia-Pacific Web Conf. Advanced Web Technologies and Applications (APWeb ’04), pp. 291-300, 2004.
[14] S. Narayanan and S.A. McIlraith, “Simulation, Verification and Automated Composition of Web Services,” Proc. 11th Int’l
Conf. World Wide Web (WWW ’02), pp. 77-88, 2002.
[15] D. Novak and P. Zezula, “M-Chord: A Scalable Distributed Similarity Search Structure,” Proc. First Int’l Conf. Scalable
Information Systems, 2006.
[16] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A Scalable Content-Addressable Network,” Proc. Conf.
SIGCOMM, pp. 161-172, 2001.
[17] P. Rompothong and T. Senivongse, “A Query Federation of UDDI Registries,” Proc. First Int’l Symp. Information and Comm.
Technologies, pp. 561-566, 2003.
[18] A.I.T. Rowstron and P. Druschel, “Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer
Systems,” Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms (Middleware ’01), pp. 329-350, 2001.
[19] B. Sapkota, D. Roman, S.R. Kruk, and D. Fensel, “Distributed Web Service Discovery Architecture,” Proc. Advanced Int’l Conf.
Telecomm. and Int’l Conf. Internet and Web Applications and Services, p. 136, 2006.
7. An Enhanced P2P Architecture for Dispersed Service Discovery
www.ijres.org 7 | Page
[20] C. Schmidt and M. Parashar, “A Peer-to-Peer Approach to Web Service Discovery,” World Wide Web, vol. 7, no. 2, pp. 211-
229,2004.
[21] I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, and H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for
Internet Applications,” Proc. ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm.
(SIGCOMM ’01), pp. 149-160, 2001.
[22] L. Wu, Y. He, D. Wu, and J. Cui, “A Novel Interoperable Model of Distributed UDDI,” Proc Int’l Conf. Networking,
Architecture, and Storage (NAS ’08), pp. 153-154, 2008. COMPUTING, VOL. 6, NO. 1, JANUARY-
[23] B.Y. Zhao, J. Kubiatowicz, and A.D. Joseph, “Tapstry: An Infrastructure for Fault-Tolerant Wide-Area Location and Routing,”
Computer Science Division of Univ. California, 2001.