This document discusses approaches for extracting and modeling distributed data from integrated web technologies based on set theory. It proposes a management approach for distributed information that involves data warehousing techniques, data fragmentation, and distributed query optimization. A mathematical model is developed using concepts from set theory to conceptualize how data from different sources can be combined into an integrated environment. An algorithm is also proposed to compute the execution time of queries on this distributed data based on the set theory composition model.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
Semantic domain ontologies are increasingly seen as the key for enabling
interoperability across heterogeneous systems and sensor-based applications.
The ontologies deployed in these systems and applications are developed by
restricted groups of domain experts and not by semantic web experts. Lately,
folksonomies are increasingly exploited in developing ontologies. The
“collective intelligence”, which emerge from collaborative tagging can be
seen as an alternative for the current effort at semantic web ontologies.
However, the uncontrolled nature of social tagging systems leads to many
kinds of noisy annotations, such as misspellings, imprecision and ambiguity.
Thus, the construction of formal ontologies from social tagging data remains
a real challenge. Most of researches have focused on how to discover
relatedness between tags rather than producing ontologies, much less domain
ontologies. This paper proposed an algorithm that utilises tags in social
tagging systems to automatically generate up-to-date specific-domain
ontologies. The evaluation of the algorithm, using a dataset extracted from
BibSonomy, demonstrated that the algorithm could effectively learn a
domain terminology, and identify more meaningful semantic information for
the domain terminology. Furthermore, the proposed algorithm introduced a
simple and effective method for disambiguating tags.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...IAEME Publication
Cloud computing is a new on-demand delivery of software and hardware resources to consumers over the internet. It has been proposed as a preferred solution for future systems of education. Furthermore, using cloud computing grows rapidly on various applications in different education fields such as E-learning. It has become a critical point on any institutional deploying, creating a remote educations system and designing of the perfect web-based learning environment. Cloud computing is distinguished by providing large storage resources with cost savings and faster data transfer. Nowadays, data of several social networks (photos, music, videos etc.) are stored in their own purchased cloud. As a consequence of using these applications, cloud computing is indirectly used is our life. Therefore, cloud computing (or cloud technology). In other words, the services that one can easily access these applications in electronic devices is called cloud computing.
E-learning systems basically require many software and hardware resources to implement education tasks effectively. Therefore, adopting available cloud-based application can make the tasks more affordable. Cloud offers the opportunity to work from anywhere and combines software, hardware and hosting services in a single structure with a technology that collects solutions for organizations. To achieve this goal, it facilitates the operation by enabling customers to reach the same data simultaneously. This article, thus, investigates barriers to implement cloud e-learning adoption in Iraqi education institutions.
Rethinking Multi-Agent Systems for the World-Wide WebAndrei Ciortea
The World Wide Web has emerged as the middleware of choice for most distributed systems. Recent standardization efforts for the Web of Things and Linked Data are now turning hypermedia into a homogenous information fabric that interconnects everything — physical objects, information resources, abstract concepts, and even holographic resources. The latest standards allow clients not only to browse, but also to observe and act on this hypermedia fabric. Researchers and practitioners are already looking for means to build more "intelligent" clients able to meet their design objectives through flexible autonomous use of this hypermedia fabric. Such autonomous agents have been studied to large extent in research on distributed artificial intelligence and, in particular, multi-agent systems (MAS). In this talk, we present our vision for integrating hypermedia systems and MAS, which we call Hypermedia MAS — a new class of MAS that are: (i) aligned with the Web architecture to inherit the properties of the Web as a world-wide, open, and long-lived system, and (ii) transparent and accountable to support acceptance by people. We believe Hypermedia MAS could break new ground in both Web and MAS research, and their potential applications would cut across society.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
Semantic domain ontologies are increasingly seen as the key for enabling
interoperability across heterogeneous systems and sensor-based applications.
The ontologies deployed in these systems and applications are developed by
restricted groups of domain experts and not by semantic web experts. Lately,
folksonomies are increasingly exploited in developing ontologies. The
“collective intelligence”, which emerge from collaborative tagging can be
seen as an alternative for the current effort at semantic web ontologies.
However, the uncontrolled nature of social tagging systems leads to many
kinds of noisy annotations, such as misspellings, imprecision and ambiguity.
Thus, the construction of formal ontologies from social tagging data remains
a real challenge. Most of researches have focused on how to discover
relatedness between tags rather than producing ontologies, much less domain
ontologies. This paper proposed an algorithm that utilises tags in social
tagging systems to automatically generate up-to-date specific-domain
ontologies. The evaluation of the algorithm, using a dataset extracted from
BibSonomy, demonstrated that the algorithm could effectively learn a
domain terminology, and identify more meaningful semantic information for
the domain terminology. Furthermore, the proposed algorithm introduced a
simple and effective method for disambiguating tags.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
EXPLORATION OF INSTITUTIONAL CHALLENGES FOR ADOPTING CLOUD COMPUTING IN E-LEA...IAEME Publication
Cloud computing is a new on-demand delivery of software and hardware resources to consumers over the internet. It has been proposed as a preferred solution for future systems of education. Furthermore, using cloud computing grows rapidly on various applications in different education fields such as E-learning. It has become a critical point on any institutional deploying, creating a remote educations system and designing of the perfect web-based learning environment. Cloud computing is distinguished by providing large storage resources with cost savings and faster data transfer. Nowadays, data of several social networks (photos, music, videos etc.) are stored in their own purchased cloud. As a consequence of using these applications, cloud computing is indirectly used is our life. Therefore, cloud computing (or cloud technology). In other words, the services that one can easily access these applications in electronic devices is called cloud computing.
E-learning systems basically require many software and hardware resources to implement education tasks effectively. Therefore, adopting available cloud-based application can make the tasks more affordable. Cloud offers the opportunity to work from anywhere and combines software, hardware and hosting services in a single structure with a technology that collects solutions for organizations. To achieve this goal, it facilitates the operation by enabling customers to reach the same data simultaneously. This article, thus, investigates barriers to implement cloud e-learning adoption in Iraqi education institutions.
Rethinking Multi-Agent Systems for the World-Wide WebAndrei Ciortea
The World Wide Web has emerged as the middleware of choice for most distributed systems. Recent standardization efforts for the Web of Things and Linked Data are now turning hypermedia into a homogenous information fabric that interconnects everything — physical objects, information resources, abstract concepts, and even holographic resources. The latest standards allow clients not only to browse, but also to observe and act on this hypermedia fabric. Researchers and practitioners are already looking for means to build more "intelligent" clients able to meet their design objectives through flexible autonomous use of this hypermedia fabric. Such autonomous agents have been studied to large extent in research on distributed artificial intelligence and, in particular, multi-agent systems (MAS). In this talk, we present our vision for integrating hypermedia systems and MAS, which we call Hypermedia MAS — a new class of MAS that are: (i) aligned with the Web architecture to inherit the properties of the Web as a world-wide, open, and long-lived system, and (ii) transparent and accountable to support acceptance by people. We believe Hypermedia MAS could break new ground in both Web and MAS research, and their potential applications would cut across society.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTcsandit
Cloud computing is gaining prominence and popularity in three important forms: Software as a Service, Platform as a Service, and Infrastructure as a Service. In this paper, we will present
an empirical study of how these cloud-based services were used in an undergraduate Computer Science capstone class to enable agile and effective development, testing, and deployment of sophisticated software systems, facilitate team collaborations among students, and ease the project assessment and grading tasks for teachers. Especially, in this class, students and teachers could leverage time, talent, and resources collaboratively and distributedly on his/her own schedule, from his/her convenient location, and using heterogeneous programming platforms thanks to such a completely All-In-Cloud environment, which eliminated the necessity of spending valuable development time on local setup, configuration, and maintenance, streamlined version control and group management, and greatly increased the collective productivity of student groups. Despite of the relatively steep learning curve in the beginning of the semester, all nine groups of students benefitted tremendously from such an All-In-Cloud experience and eight of them completed their substantial software projects successfully. This paper is concluded with a vision on expandin and standardizing the adoption of the Cloud ecosystem in other Computer Science classes in the future.
LoCloud - D1.1: Report on the State-of-the Art Monitoring and Situation Analysislocloud
This document provides a state-of-the art of cloud computing with a specific focus on the uptake of cloud computing by small and medium-sized institutions in the European Union.
Authors:
Kristine Hoff Meyer (KUAS)
Mikkel Christoffersen (KUAS)
Henk Alkemade (RCE)
Maria Luisa Martinez-Conde (MECD)
Rimvydas Lauzikas (VUFK)
Ingrida Vosyliute (VUFK)
Martin Krajnak (PriUF KAEG)
Tatiana Shamarina-Heidenreich (UDE)
Adam Dudczak (PSNC)
Megha, the Federated Cloud pilot running in Spain (2010 - 2013), and previous successful projects such as OSMOSE (Open Source Middleware for Open Systems in Europe 2003-2005), OSIRIS (Open Source Infrastructure fun Run-Time Integration of Services 2005-2008) and OSAmI-Commons (Open Source Ambient Intelligence Commons 2008-2011) have constituted excellent foundations for further steps. However, while software is becoming more open, more software will be needed. Managing the increasing amount of software requires new approaches beyond technical scalability issues. Previous running initiatives and recent initiated projects are presented as well as their benefits in the development of an expanding digital universe.
Assessing the Readiness for Cloud Computing in Higher Education Institutions ...IJMIT JOURNAL
There is a great potential for cloud computing adoption in Bahrain, something which will power exciting innovations and touch every area of people's lives, especially in the education sector. The current study investigates the critical success factors for implementing cloud computing into learning activities in higher institutions in Bahrain and how can effectively enhance the digital educational environment. The data sample of the current research consists of academic and administrative staff from nine universities in Bahrain, both private and public universities. The findings revealed that the adoption of cloud computing has proven to help build a digital educational environment in the Kingdom of Bahrain. Cloud computing can help in making digital research and digital learning and teaching. Besides offering more excellent student choices in education, cloud computing can provide good opportunities for enhancing research in these universities.
ASSESSING THE READINESS FOR CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTIONS ...IJMIT JOURNAL
There is a great potential for cloud computing adoption in Bahrain, something which will power exciting innovations and touch every area of people's lives, especially in the education sector. The current study investigates the critical success factors for implementing cloud computing into learning activities in higher institutions in Bahrain and how can effectively enhance the digital educational environment. The data sample of the current research consists of academic and administrative staff from nine universities in Bahrain, both private and public universities. The findings revealed that the adoption of cloud computing has proven to help build a digital educational environment in the Kingdom of Bahrain. Cloud computing can help in making digital research and digital learning and teaching. Besides offering more excellent student choices in education, cloud computing can provide good opportunities for enhancing research in these universities.
“Recognizing Value from a Shared RM/DM Repository: Canadian Government Perspe...Cheryl McKinnon
2003 ARMA Conference Proceedings paper outlining Canadian government examples in content and information management. A historical piece, with focus on Canadian Federal RDIMS initiative up to 2003 and City of Coquitlam. Background to ARMA session co-delivered by Cheryl McKinnon and Heather Gordon
Using the Technology Organization Environment Framework for Adoption and Impl...theijes
Many Institutions of higher learning in developing countries are adopting and implementing cloud computing in their efforts to provide information technology support necessary for administrative, educational, and research activities. Cloud computing delivers on demand provisioning of IT resources on a pay per use basis. This study discusses the adoption and implementation of Cloud Computing using the TOE framework. To achieve the purpose of the study, a critical analysis of relevant literature was conducted. An overview of the institutions technological, environmental and organizational issues that need consideration is done and suggestions for adoption and implementation strategies made. The study concludes that the TOE Framework is appropriate for the technological adoption of cloud computing in institutions of higher learning
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTINGIJNSA Journal
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and
applicable areas in information risk management
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONINGijaia
The Web, as communication channel, has had variety of development that allows information to be published and accessed in a scaleable approach. With the revolution of the information, some research studies have conducted to boost the present situation and propose advance version of the Web. Therefore, it is important to look into the new version of the Web in order to improve the way that information is expressed, to make more intelligent choices and to obtain a better meaning of the information over the Web. That is, future web would require specific architecture in order to support the extracting of better
meaning or "reasoning". With Web 1.0 and Web 2.0, the current information over the Web is not understandable for the machines. Understanding is big shift for wide open door for innovatoion and reasoning. In this work, we research the progress of the Web from Web 1.0, Web 2.0, Web 3.0, Web 4.0, to Web 5.0. We are pointing out document types and technologies employed to understand the changes from
Web 1.0 to Web 3.0 and to predicate the future of the Web (Web 4.0 and Web 5.0). Also, we present the current status and concerns about the Web as an information source and communication channel.
a. compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges (CS_ICT11/12-ICTPT-Ia-b-1);
b. share plans on how to use your knowledge on the different trends in ICT; and
c. independently compose an insightful reflection on the nature of ICT in the context of your life, society, and professional tracks (Arts, TechVoc, Sports, Academic).
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
A survey of models for computer networks managementIJCNCJournal
The virtualization concept along with its underlyin
g technologies has been warmly adopted in many fiel
ds
of computer science. In this direction, network vir
tualization research has presented considerable res
ults.
In a parallel development, the convergence of two d
istinct worlds, communications and computing, has
increased the use of computing server resources (vi
rtual machines and hypervisors acting as active
network elements) in network implementations. As a
result, the level of detail and complexity in such
architectures has increased and new challenges need
to be taken into account for effective network
management. Information and data models facilitate
infrastructure representation and management and
have been used extensively in that direction. In th
is paper we survey available modelling approaches a
nd
discuss how these can be used in the virtual machin
e (host) based computer network landscape; we prese
nt
a qualitative analysis of the current state-of-the-
art and offer a set of recommendations on adopting
any
particular method.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN EMPIRICAL STUDY OF USING CLOUD-BASED SERVICES IN CAPSTONE PROJECT DEVELOPMENTcsandit
Cloud computing is gaining prominence and popularity in three important forms: Software as a Service, Platform as a Service, and Infrastructure as a Service. In this paper, we will present
an empirical study of how these cloud-based services were used in an undergraduate Computer Science capstone class to enable agile and effective development, testing, and deployment of sophisticated software systems, facilitate team collaborations among students, and ease the project assessment and grading tasks for teachers. Especially, in this class, students and teachers could leverage time, talent, and resources collaboratively and distributedly on his/her own schedule, from his/her convenient location, and using heterogeneous programming platforms thanks to such a completely All-In-Cloud environment, which eliminated the necessity of spending valuable development time on local setup, configuration, and maintenance, streamlined version control and group management, and greatly increased the collective productivity of student groups. Despite of the relatively steep learning curve in the beginning of the semester, all nine groups of students benefitted tremendously from such an All-In-Cloud experience and eight of them completed their substantial software projects successfully. This paper is concluded with a vision on expandin and standardizing the adoption of the Cloud ecosystem in other Computer Science classes in the future.
LoCloud - D1.1: Report on the State-of-the Art Monitoring and Situation Analysislocloud
This document provides a state-of-the art of cloud computing with a specific focus on the uptake of cloud computing by small and medium-sized institutions in the European Union.
Authors:
Kristine Hoff Meyer (KUAS)
Mikkel Christoffersen (KUAS)
Henk Alkemade (RCE)
Maria Luisa Martinez-Conde (MECD)
Rimvydas Lauzikas (VUFK)
Ingrida Vosyliute (VUFK)
Martin Krajnak (PriUF KAEG)
Tatiana Shamarina-Heidenreich (UDE)
Adam Dudczak (PSNC)
Megha, the Federated Cloud pilot running in Spain (2010 - 2013), and previous successful projects such as OSMOSE (Open Source Middleware for Open Systems in Europe 2003-2005), OSIRIS (Open Source Infrastructure fun Run-Time Integration of Services 2005-2008) and OSAmI-Commons (Open Source Ambient Intelligence Commons 2008-2011) have constituted excellent foundations for further steps. However, while software is becoming more open, more software will be needed. Managing the increasing amount of software requires new approaches beyond technical scalability issues. Previous running initiatives and recent initiated projects are presented as well as their benefits in the development of an expanding digital universe.
Assessing the Readiness for Cloud Computing in Higher Education Institutions ...IJMIT JOURNAL
There is a great potential for cloud computing adoption in Bahrain, something which will power exciting innovations and touch every area of people's lives, especially in the education sector. The current study investigates the critical success factors for implementing cloud computing into learning activities in higher institutions in Bahrain and how can effectively enhance the digital educational environment. The data sample of the current research consists of academic and administrative staff from nine universities in Bahrain, both private and public universities. The findings revealed that the adoption of cloud computing has proven to help build a digital educational environment in the Kingdom of Bahrain. Cloud computing can help in making digital research and digital learning and teaching. Besides offering more excellent student choices in education, cloud computing can provide good opportunities for enhancing research in these universities.
ASSESSING THE READINESS FOR CLOUD COMPUTING IN HIGHER EDUCATION INSTITUTIONS ...IJMIT JOURNAL
There is a great potential for cloud computing adoption in Bahrain, something which will power exciting innovations and touch every area of people's lives, especially in the education sector. The current study investigates the critical success factors for implementing cloud computing into learning activities in higher institutions in Bahrain and how can effectively enhance the digital educational environment. The data sample of the current research consists of academic and administrative staff from nine universities in Bahrain, both private and public universities. The findings revealed that the adoption of cloud computing has proven to help build a digital educational environment in the Kingdom of Bahrain. Cloud computing can help in making digital research and digital learning and teaching. Besides offering more excellent student choices in education, cloud computing can provide good opportunities for enhancing research in these universities.
“Recognizing Value from a Shared RM/DM Repository: Canadian Government Perspe...Cheryl McKinnon
2003 ARMA Conference Proceedings paper outlining Canadian government examples in content and information management. A historical piece, with focus on Canadian Federal RDIMS initiative up to 2003 and City of Coquitlam. Background to ARMA session co-delivered by Cheryl McKinnon and Heather Gordon
Using the Technology Organization Environment Framework for Adoption and Impl...theijes
Many Institutions of higher learning in developing countries are adopting and implementing cloud computing in their efforts to provide information technology support necessary for administrative, educational, and research activities. Cloud computing delivers on demand provisioning of IT resources on a pay per use basis. This study discusses the adoption and implementation of Cloud Computing using the TOE framework. To achieve the purpose of the study, a critical analysis of relevant literature was conducted. An overview of the institutions technological, environmental and organizational issues that need consideration is done and suggestions for adoption and implementation strategies made. The study concludes that the TOE Framework is appropriate for the technological adoption of cloud computing in institutions of higher learning
In the context of the 4.0 revolution, technology applications, especially cloud computing will have strong impacts on all areas, including accounting systems of enterprises. Cloud computing contributes to helping the enterprise accounting apparatus become compact, help automate the input process, improve the accuracy of the input data. Besides, the issur of accounting, reporting, risk control and information security also became better, contributing to improving the effectiveness of accounting. However, besides the positive impacts, businesses also face many difficulties in deploying and applying cloud computing. However, this application requirement will become an inevitable trend contributing to improving the operational efficiency of enterprises. To promote this process requires from the State as well as businesses themselves must have awareness and appropriate decisions. Breakthroughs in information technology have dramatically changed the accounting industry and the creation of financial statements. The Internet and the technologies that use the power of the Internet are playing an important role in the management and accounting activities of businesses - who always tend to be ready to receive and use public innovations technology in collecting, storing, processing and reporting information.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN OVERVIEW OF THE SECURITY CONCERNS IN ENTERPRISE CLOUD COMPUTINGIJNSA Journal
Deploying cloud computing in an enterprise infrastructure bring significant security concerns. Successful implementation of cloud computing in an enterprise requires proper planning and understanding of emerging risks, threats, vulnerabilities, and possible countermeasures. We believe enterprise should analyze the company/organization security risks, threats, and available countermeasures before adopting this technology. In this paper, we have discussed security risks and concerns in cloud computing and enlightened steps that an enterprise can take to reduce security risks and protect their resources. We have also explained cloud computing strengths/benefits, weaknesses, and
applicable areas in information risk management
Advanced Computing: An International Journal (ACIJ) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the advanced computing. The journal focuses on all technical and practical aspects of high performance computing, green computing, pervasive computing, cloud computing etc. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding advances in computing and establishing new collaborations in these areas.
WEB EVOLUTION - THE SHIFT FROM INFORMATION PUBLISHING TO REASONINGijaia
The Web, as communication channel, has had variety of development that allows information to be published and accessed in a scaleable approach. With the revolution of the information, some research studies have conducted to boost the present situation and propose advance version of the Web. Therefore, it is important to look into the new version of the Web in order to improve the way that information is expressed, to make more intelligent choices and to obtain a better meaning of the information over the Web. That is, future web would require specific architecture in order to support the extracting of better
meaning or "reasoning". With Web 1.0 and Web 2.0, the current information over the Web is not understandable for the machines. Understanding is big shift for wide open door for innovatoion and reasoning. In this work, we research the progress of the Web from Web 1.0, Web 2.0, Web 3.0, Web 4.0, to Web 5.0. We are pointing out document types and technologies employed to understand the changes from
Web 1.0 to Web 3.0 and to predicate the future of the Web (Web 4.0 and Web 5.0). Also, we present the current status and concerns about the Web as an information source and communication channel.
a. compare and contrast the nuances of varied online platforms, sites, and content to best achieve specific class objectives or address situational challenges (CS_ICT11/12-ICTPT-Ia-b-1);
b. share plans on how to use your knowledge on the different trends in ICT; and
c. independently compose an insightful reflection on the nature of ICT in the context of your life, society, and professional tracks (Arts, TechVoc, Sports, Academic).
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
SEMANTIC TECHNIQUES FOR IOT DATA AND SERVICE MANAGEMENT: ONTOSMART SYSTEMijwmn
In 2020 more than50 billions devices will be connected over the Internet. Every device will be connected to
anything, anyone, anytime and anywhere in the world of Internet of Thing or IoT. This network will
generate tremendous unstructured or semi structured data that should be shared between different
devices/machines for advanced and automated service delivery in the benefits of the user’s daily life. Thus,
mechanisms for data interoperability and automatic service discovery and delivery should be offered.
Although many approaches have been suggested in the state of art, none of these researches provide a fully
interoperable, light, flexible and modular Sensing/Actuating as service architecture. Therefore, this paper
introduces a new Semantic Multi Agent architecture named OntoSmart for IoT data and service
management through service oriented paradigm. It proposes sensors/actuators and scenarios independent
flexible context aware and distributed architecture for IoT systems, in particular smart home systems.
From Stand Alone Computers to Big Data Technology: Proposing a New Model for ...CrimsonpublishersMedical
Change is said to be constant but despite the benefits of change to Information Technology Infrastructure (ITI), managers, researchers and enthusiasts are uncertain about the future. A survey of literature shows that the association between ITI and change management are divergent in interrelationships. Many ITI consumers find it difficult to accommodate change due to several challenges involved. Technological developments coming into play has led to whole lot gradual changes. This paper describes the journey of ITI from standalone computers to cloud of things, the motivation for their transition alongside merits and demerits. It also discusses each of this method in brief and also provides their applications. It states the importance of computer networks today using fast and novel approaches. Finally, this paper presents a new model for managing change in ITI.
Geochronos File Sharing Application Using CloudIJERA Editor
Accessing, running and sharing applications and data at present face many challenges. Cloud Computing and Social Networking technologies have the potential to simplify or eliminate many of these challenges. Social Networking technologies provide a means for easily sharing applications and data. Now a day’s people want to be connected 24x7 to the world around them. Networking and Communication have come together to make the world a small place to live in. People want to be in constant touch with their subordinates where ever they are and avail emergency services whenever needed. In this paper we present an on-line/on-demand interactive application service (Software as a Service). The service is built on a cloud computing basement that provisions virtualized application servers based on user demand. An open source social networking platform is leveraged to establish a portal front-end that enables applications and results to be easily shared between users. In the proposed system users can access the documents uploaded into the cloud by others and provide any data they have in hand to other users through the same cloud. This also allows the users to have an interactive session through the chat screens present in the cloud. The paper also highlights some major security issues existing in current cloud computing environment.
Big Data And Analytics: A Summary Of The X 4.0 EraJohnWilson47710
Recent years have seen a huge increase in data and analytics capabilities as a result of the fast exponential rise of data and the development of increasingly complex algorithms. Computational power has risen in lockstep with the growth in storage capacity. Visit: https://myassignmenthelp.com/free-samples/com6905-research-methods-and-professional-issues/data-and-analytics-capabilities-file-A1D38CD.html
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today’s technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
CLOUD COMPUTING IN EDUCATION: POTENTIALS AND CHALLENGES FOR BANGLADESHIJCSEA Journal
Cloud Computing is an emerging technology. It is a growing technology which can change traditional IT systems. It plays a major role in today’s technology sector. People are using it every day through one way or another. Education sector is not out of this phenomenon. At the present time the teaching method is changing and students are becoming much technology based and therefore it is necessary that we think about the most recent technologies to incorporate in the teaching and learning methods. By sharing Information technology related services in the cloud, educational institutions can better concentrate on offering students, teachers, faculty and staff the essential instruments. Bangladesh is a developing country. So applying this technology on education sector is a huge challenge for Bangladesh. In this paper it is discussed that how Bangladesh can be benefited by applying cloud in education and its challenges followed by some case studies and success stories.
To share the huge amount of heterogeneous information to the large-scale of heterogeneous users, the Internet on the computing level should be reconstructed since such a crucial infrastructure was designed without proper understandings. To upgrade, it must consist of five layers from the bottom to the top, including the routing, the multicasting, the persisting, the presenting and the humans. The routing layer is responsible for establishing the fundamental substrate and finding resources in accordance with social disciplines. The multicasting layer disseminates data in a high performance and low cost way based on the routing. The persisting layer provides the services of storing and accessing persistent data efficiently with the minimum dedicated resources. The presenting layer absorbs users’ interactions to guide the adjustments of the underlying layers other than shows connected local views to users. Completely different from the lower software layers, the topmost one is made up totally with humans, i.e., users, including individual persons or organizations, which are social capital dominating the Internet. Additionally, within the upgraded infrastructure, besides the situation that a lower layer supports its immediate upper one only, the humans layer influences the lower ones in terms of transferring its social resources to them. That is different from any other traditional layer-based systems. Those resources lead to adaptations and adjustments of all of the software layers since each of them needs to follow social rules. Eventually, the updated underlying layers return latest consequences to users upon those modifications
THE SOCIALIZED INFRASTRUCTURE OF THE INTERNET ON THE COMPUTING LEVEL ijcsit
To share the huge amount of heterogeneous information to the large-scale of heterogeneous users, the Internet on the computing level should be reconstructed since such a crucial infrastructure was designed without proper understandings. To upgrade, it must consist of five layers from the bottom to the top,
including the routing, the multicasting, the persisting, the presenting and the humans. The routing layer is responsible for establishing the fundamental substrate and finding resources in accordance with social disciplines. The multicasting layer disseminates data in a high performance and low cost way based on the routing. The persisting layer provides the services of storing and accessing persistent data efficiently with
the minimum dedicated resources. The presenting layer absorbs users’ interactions to guide the adjustments of the underlying layers other than shows connected local views to users. Completely different from the lower software layers, the topmost one is made up totally with humans, i.e., users, including individual persons or organizations, which are social capital dominating the Internet. Additionally, within
the upgraded infrastructure, besides the situation that a lower layer supports its immediate upper one only, the humans layer influences the lower ones in terms of transferring its social resources to them. That is different from any other traditional layer-based systems. Those resources lead to adaptations and
adjustments of all of the software layers since each of them needs to follow social rules. Eventually, the updated underlying layers return latest consequences to users upon those modifications.
Using of Cloud Technologies in the Process of Preparing Future Specialists fo...ijtsrd
As part of the study, the specifics of the functioning of modern high tech enterprises related to the organization and automation of production processes through the use of various types of information systems are analyzed, and the growing importance of cloud technologies as the optimal means of implementing these processes is determined. Usanov Mehriddin Mustafayevich "Using of Cloud Technologies in the Process of Preparing Future Specialists for Professional Activity" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31715.pdf Paper Url :https://www.ijtsrd.com/humanities-and-the-arts/education/31715/using-of-cloud-technologies-in-the-process-of-preparing-future-specialists-for-professional-activity/usanov-mehriddin-mustafayevich
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Basic phrases for greeting and assisting costumers
AN APPROACH TO EXTRACTING DISTRIBUTED DATA FROM THE INTEGRATED ENVIRONMENT OF WEB TECHNOLOGIES BASED ON SET THEORY
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
DOI: 10.5121/ijcsit.2019.11303 29
AN APPROACH TO EXTRACTING DISTRIBUTED DATA
FROM THE INTEGRATED ENVIRONMENT OF WEB
TECHNOLOGIES BASED ON SET THEORY
Cheikh Ould El Mabrouk and Karim Konaté
Department of Mathematics and Computing, University Cheikh Anta DIOP,
Dakar - Senegal
ABSTRACT
The composition and extraction of the information distributed by the different web technologies allow a
design of a multifunction imported data environment. However, the problems of integration and
communication between the heterogeneous data web always (lodges) on distributed servers.
In fact, Web technologies have been proposed to meet certain needs related to heterogeneous and
distributed information systems for communicating and exchanging computerized data on the Web. Further
more, web generations go through client-server communication (from a static, dynamic and semantic web
human client) to server-server communication.
For this purpose, Web services are technology application integration by excellence across the Internet.
They operate independently of the heterogeneities of the system components on which they are based and
are weakly coupled software components interacting with each other.
This paper aims to achieve a management approach to extracting and modeling distributed information
based on set theory and calculate the execution time of a query to this distributed data.
KEYWORDS
Web Technologies, Data, Distribution, Integration, Modeling, Query, Optimization
1. INTRODUCTION
The distribution of company data across multiple servers requires thinking about creating some
homogeneous web technology architectures to integrate data at what distance the company itself
from its objects.
Web Technologies are a model for integration systems. This integration model is an important
evolution compared to previous models such as Electronic Data Interchange (EDI) that relied on
exchange of ownership formats and each Information System. [1] Indeed, the typologies of the
Company Information System are generally based on software and heterogeneous data sources
and distributed on several computers, consecutive by the use of the various information and
communication technologies.
This distribution has considered the problem of integration as a major issue when companies have
sought to communicate the different departments or services between them or between other
external companies to optimize their business processes of their production chain.
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
30
This physical distribution is achieved through a distribution of data and / or applications allowing
the implementation at the local level of certain data and / or certain treatments of the information
system.
In this context, there are online information systems playing an important role in the distribution
of web integrations (e.g., e-commerce, e-learning, e-government and e-health ...) [20].
Companies need to make different applications of their information systems. The techniques of
cooperation between these various proprietary systems can be studied as an information system
whose content is heterogeneous and distributed.
These interaction or cooperation techniques between business processes and applications are
generally referred to as computer data integration techniques within an organization's Information
System. For example:
-An application A which periodically and / or regularly needs access to the data of application B;
-An application A which requires a function of the application B;
- A and B applications that need to share a set of data to avoid redundancies;
- Applications A and B which must collaborate by data exchange;
- Applications A and B which are orchestrated by an ad hoc application (workflow engine) to
carry out a business process;
– etc. [21]
Figure 1: integration and exchange of data and applications
Integrated environment is an interdisciplinary approach which has concepts now on which it is
possible to build new data and applications. It’s a collaborative and interdisciplinary
composition process, supporting on knowledge, methods and techniques resulting from the
sciences and experiment put in to define a system which satisfies a need identifies, and is
acceptable for the environment, while seeking has to balance total economy of the solution, on all
the aspects of the problem in all the phases of the development and the life of the system.
Integrated environment concept for the complex problems passes by their decomposition under
more limiting problems to which one can bring a solution. [23]
In this paper, we make a breakdown of our work as follows: the first part is this introduction.
The second part illustrates the state of art on the evolution of web technologies. The third part of
this paper focuses primarily on a conception of mathematical models of set theory. The fourth
part makes the proposed procedure for managing and optimizing distributed data queries.
Finally, the fifth part presents the conclusion and the report of the work of this paper.
2. STATE OF THE ART ON THE EVOLUTION OF WEB TECHNOLOGIES
The Web which had been developed at CERN in Switzerland in 1989 is a phenomenal source of
information. It is a hypermedia information system allowing access to the resources of the
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
31
internet network. Which supports heterogeneous and distributed multimedia documents (text,
image, video,..). The web today leads a new normative production mode of information exchange
in the world, more than a billion connected individuals. [2]
The web has known a remarkable evolution in recent years which have passed by the three
generations below:
- The Static Web produce by HTML technologies the contents of the sites do not change and
remain the same on each page when using a browser, the webmaster the only one authorized to
modify the contents.
- The Dynamic Web: set of technologies (HTML + CGI: Common Gateway Interface) allowing
Internet users to produce, publish, broadcast; share any type of multimedia information content.
- The Semantic Web: set of technologies (HTML + Data models + Server script language) to
create a web page anywhere in the world and share with anyone. What has the merit of being
practical, simple, useful, fast and effective…
The table below summarizes the main existing web technologies of each type of generation and
the date of publication:
Table 1: Evolution of technology web
web technologies type of generation the date of publication
HTML The Static Web 1989
(X)HTML The Static Web 1992
CSS The Static Web 1996
PERL The Dynamic Web 1986
PHP The Dynamic Web 1994
COLDFUSION The Dynamic Web 1995
JAVA The Dynamic Web 1995
ASP The Dynamic Web 1996
JSP The Dynamic Web 1996
RDF Model The Semantic Web 2004
RDF SCHEMA The Semantic Web 2004
OWL The Semantic Web 2007
SPARQ The Semantic Web 2008
2.1 Web 1.0
It’s the first generation of Web applications (Web 1.0) before 2003 [4] [5]. The contents of the
multimedia information (text, image, video, sound…) are produced and hosted by a company that
owns the site. They are static; the content of the pages is rarely changed. The user is only the
reader of the information. The user is passive. However, the appearance of new scripting
languages (such as PHP or ASP) coupled with databases, some sites have become dynamic. That
content of the multimedia information is managed by a Content Management System (CMS).
They allow multiple individuals to work and edit information on a single document. These
technologies also allow the separation of management from form and content. [6]
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
32
2.2 Web 2.0
The second generation of web applications (Web 2.0) after web 1.0 [from 2003 to 2008] [4] [5] is
an information system visible all over the world and in which any user can be active. Internet
users became actors of all types of multimedia content (text, image, video, sound…). The author
[7] defines the privileges of Web 2.0 by: “Write, comment, copy and paste, mix, publish, share or
exchange photos, videos, links and tags, on sites presenting self and its world relational ...” In
this context, appeared social networks and the phenomenon of syndication appeared: the famous
RSS feeds, AJAX, MySpace, ..
Web 2.0 is an integral part of corporate information and is redefining how organizations and
individuals communicate and collaborate with each other for content management and new ways
of communicating and interacting with users. [8] [9]
2.3 Web 3.0
The third generation of the web produced after web 2.0 from 2008 to today [4] [5]. Web 3.0 could
be detached from the servers to promote exchanges between Peer to Peer Internet users, an
interactivity that would happen in real time. In addition, Web 3.0 enhances Data mining of
distributed and heterogeneous databases, and intelligent search options across different types of
multimedia information. [10] As soon as you type the first letter of the search, the Google
instantly proposes the list of the most frequently searched terms starting with this letter. In
addition, one could simply click on Google Maps and get images that others have uploaded to
Flickr.... [3] In this context, a series of new Web services appears (such as Second Life, Twitter,
Exalted...). Web 3.0 is considered the next frontier of intelligent Web technology (Web 4.0) that
sees the potential of intelligent information and semantic web. [11].
The figure below represents this evolution of the different generations of web and its forward-
looking web 4.0 (smart web):
Figure 2: Evolution of Web generations in source time (Source: Nova Spivack Site)
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
33
3. DESIGN MODEL FOR AN INTEGRATED ENVIRONMENT
3.1 Design of an Information Environment
The computerized data environment is the set of computer files grouped in a directory. It also
includes the databases and its models of design and implementation of the company.
In this context, the integration today is involved in the implementation of applications to ensure
the development and deployment of data. The integration of information systems has become a
necessity due to the fact that large companies have developed over time, for the most part,
distributed web information. [17] However, an integrated information environment becomes a
development space, offering a way to enrich the value of the operational process. It must manage
the movement of their data from different information systems. [18] As for example, a data table
looks a lot like rows and columns to a paper chart: it consists of rows of data. Then, tables are the
central objects of a design of a computerized data environment. But these are not the only objects
that exist in an information system. Several other types of objects can be created in order to make
the use and management of data more efficient or practical such as:
Views, query requests
Functions, Operators,
Data Types,
Domains Triggers and rewrite rules
Management rules
As a result, the evolution of the tools of an information environment is the design of a new tool or
the replacement of an existing tool, based on the import of web data. For this fact, the structure of
the integrated environment brings together common object bases and the tools of data integration
and reuse of existing objects.
3.2 Mathematical Model
In this section we have made mathematical reminders of set theory and discussion of our model of
creating a data environment based on information imported by web technologies:
3.2.1 Recall of Set Theory
Definition (1): A mathematical model is a translation of reality in order to apply mathematical
tools, techniques and theories, the translation of mathematical results obtained into predictions or
operations in the real world.
Definition (2): A set A is a subset or part of a set B or B is superset of A, if every element of
subset A is also element of superset B.
∀ e A ==> e B
Definition (3): We call combination of (p) elements of a finite set E {a1, ..., an} of (n) elements,
every subset A of (p) elements of E.
The number of combinations of p elements of a set of n elements is:
!
( )! !
p
n
n
C
n p p
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
34
3.2.2 Discussion of the Model
The model of the creation of a set of n elements expresses how is constituted a relation or a
structured file: the number of attributes is a different name for each attribute, the domain in which
it takes its values in our constitutive environment by recurrence.
For n = 1, E = {a1} the number of possible non-empty files is unique x = 1 = 21
- 1
For n = 2, E = {a1, a2} the possible files are {a1}, {a2}, {a1, a2} x = 3 = 22
- 1
For n = 3, E = {a1, a2, a3} the possible files are {a1}, {a2}, {a3}, {a1, a2},
{a1, a3}, {a2, a3}, {a1, a2, a3} the number is x = 7 = 23
– 1.
In general, n elements of the set E = {a1, a2, ..., ap, ..., an} can construct the non-empty files of
the numbers of different properties p Ep = {ai, ..., ap}
! ( 1)...( 1)
( )! ! !
p
n
n n n n p
C
n p p p
The sum of all possible non-empty files is the sum of all elementary compositions of the set E =
{a1, a2, ..., ap, ..., an} such that (i ≤p ≤ n)
0
1 0
!
2 1
! !
n n
p n
n n
p p
n
x C C
p n p
So, X = 2n
– 1.
As a consequence of this conceptual modeling based on set theory:
n: elements, attributes, properties, columns ...
x: sets, files, tables, relationships, entities ...
The table below gathers the relation between the number of the elements (n) and the number
of the possible composition sets (x) and not empty.
Table 2: Result of the composition following set theory
Elements 1 2 3 4 5 … n
Sets 1 3 7 15 31 … 2n
-1
4. DISTRIBUTED INFORMATION MANAGEMENT PROCEDURE
Computerized data is generally stored in web databases distributed on several sites,
geographically distant, connected by a network, which are often heterogeneous in technical,
syntactic and semantic mode, ... [12] [14]
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
35
The meeting and integration of these data by web technologies form a complete database.
However, the problems of web data integration are characterized by the heterogeneity of different
distributions of web data sources.
Web services are a tremendous technological evolution, ensuring the interoperability of
heterogeneous and distributed data on the Internet.
In this section, we have managed the distribution of web information by data warehouse, data
fragmentation techniques and distributed query optimization techniques, and finally an algorithm
is proposed for computation of the execution time by the composition and the distribution
according to the overall set of theory.
4.1 Data Warehouse and Distribution
The Data Warehouse is a database dedicated to the storage of all data used in decision-making
and decision analysis. The Data Warehouse is exclusively for this purpose. It is fed with data
from the production bases thanks in particular to ETL Extract Transform Load tools. The Data
Warehouse is not just a copy of the production data. It refers to a kind of database used to collect
and store temporary information from other databases. Each piece of information collected is
assigned a date, or a version number, to avoid overwriting information already in the database and
to track the evolution of this information over time. In fact, integration of Data Warehouse
requires Extraction, Transformation and Loading processes (ETL). These must consider several
data quality related distribution, as for instance duplicated data, possible data inconsistency,
creation of new variables using transformations, and the integrated environment etc. [25]
The information collected can come from several databases. Sometimes, information from
different databases of an enterprise is collected in a single data warehouse, or there are different
breakdowns of data warehouses depending on the subject or business related to each information
data (Data Mart) and according to the distribution multi-dimensional (Cube Data). [22]
4.1.1 Subset Distribution (Data Mart)
A Data Mart (data warehouse) is a subset of a relational database used in business intelligence. It
is used in companies to provide information targeted to a specific business and constituting for
the latter, a set of indicators to guide an activity and decision support. Data Marts are also called
Decision Warehouses.
Data Marts are simplified extracts the detail of the company data, they are of interest only for
identified and repetitive requests; it is easier for the system to query a Data Mart that contains
only the necessary than to have to identify and sort the entire database. In addition, Data Marts
classify and clarify information, so that each business has access to figures corresponding to its
functional expectations, without being polluted by contiguous data.
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
36
Figure 3: Data Mart
4.1.2 Multidimensional Distribution (Data Cube)
The multidimensional distribution of data makes it possible to observe the data in several views.
Its analysis views facilitate access to the data. In this distribution, rows and columns are replaced
by dimensions, as representative concepts, and by measures that act as quantitative values. The
multidimensional distribution assumes that the major objective is the multidimensional view of
the data by the data cube provides a distribution very close to the way the analyst sees and
interrogates the data. It organizes the data into one or more dimensions that determine a measure
of interest. A dimension indicates how one looks at the data to analyze it, whereas a measurement
is an object of analysis. Each dimension is formed by a set of attributes and each attribute can
take different values.
Dimensions typically have associated hierarchies that organize attributes at different levels to
observe data at different granularities. A dimension can have multiple associated hierarchies, each
specifying different order relationships between its attributes. As for example Time {Day, Month,
Year}.
Figure 4: Data Cube
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
37
4.2 Data Fragmentation Techniques
Web data fragmentation is a distributed data management technique without loss of information,
if the logical database can be fully reconstructed from multiple fragments. This technique is
expressed using the instructions of the data manipulation language associated with the data model
used (for example, algebra or SQL for a relational Database). Indeed, fragmentation consists of
division into several fragments (subsets of the relationship) that can be non-disjoint. [12].
In general, a database can be fragmented from different possible segments, both at the
representation schema and at the data level. The fragmentation unit determines the type of
distribution element of fragmented horizontal, vertical, and hybrid (combination of horizontal and
vertical) data.
Figure 5: Fragments of Web Data
Fragmentation is the task of dividing a table into a set of smaller tables. The subsets of the table
are called fragments. Fragmentation can be of three types: horizontal, vertical, and hybrid
Horizontal fragmentation can further be classified into two techniques: primary horizontal
fragmentation and derived horizontal fragmentation. In fact, fragmentation should be done in a
way so that the original table can be reconstructed from the fragments. This is needed so that the
original table can be reconstructed from the fragments whenever required.
Advantages of Data Fragmentation
Since data is stored close to the site of usage, efficiency of the database system is
increased.
Local query optimization techniques are sufficient for most queries since data is locally
available.
Since irrelevant data is not available at the sites, security and privacy of the database
system can be maintained.
Disadvantages of Data Fragmentation
When data from different fragments are required, the access speeds may be very high.
In case of recursive fragmentations, the job of reconstruction will need expensive
techniques.
Lack of back-up copies of data in different sites may render the database ineffective in
case of failure of a site. [24]
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
38
4.2.1 Vertical Fragmentation
In vertical fragmentation, the fields or columns of a table are grouped into fragments. In order to
maintain constructiveness, each fragment should contain the primary key field(s) of the table.
Vertical fragmentation can be used to enforce privacy of data.
For example, let us consider that a University database keeps records of all registered students in
a Student table having the following schema.
STUDENT (Regd_No, Name, Course, Address, Semester, Fees, Marks)
Now, the fees details are maintained in the accounts section. In this case, the designer will
fragment the database as follows –
CREATE TABLE STD_FEES AS
SELECT Regd_No, Name, Fees
FROM STUDENT;
4.2.2 Horizontal Fragmentation
Horizontal fragmentation groups the tuples of a table in accordance to values of one or more
fields. Horizontal fragmentation should also confirm to the rule of constructiveness. Each
horizontal fragment must have all columns of the original base table.
For example, in the student schema, if the details of all students of Computer Science Course
needs to be maintained at the School of Computer Science, then the designer will horizontally
fragment the database as follows –
CREATE COMP_STD AS
SELECT * FROM STUDENT
WHERE COURSE = "Computer Science";
4.2.3 Hybrid Fragmentation
In hybrid fragmentation, a combination of horizontal and vertical fragmentation techniques are
used. This is the most flexible fragmentation technique since it generates fragments with minimal
extraneous information. However, reconstruction of the original table is often an expensive task.
Hybrid fragmentation can be done in two alternative ways –
At first, generate a set of horizontal fragments; then generate vertical fragments from one
or more of the horizontal fragments.
At first, generate a set of vertical fragments; then generate horizontal fragments from one
or more of the vertical fragments. [24]
In this paper, we have compared the execution times of a query before and after fragmentation by
the results of the author’s work [13] [14] [19] [24]. The advantage is a great different on the input
/ output time and response time based on the minimization of information search space after each
horizontal, vertical and hybrid fragmentation. Nevertheless, the disadvantage is the obligation to
homogenize the structure of heterogeneous files for horizontal and hybrid fragmentation and the
requirement to increase the storage space by duplicating the foreign key of all the files structured
for the vertical and hybrid fragmentation.
11. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
39
4.3 Optimization of Distributed Queries
In web database query processing, we generate the algebraic tree of the SQL query that we
optimize with the same criteria. Each leaf of the tree represents a relation, and each intermediate
node represents a logical operation (and, or ...) to interpret the algebraic clauses. The optimization
of an algebraic query imposes to minimize the complexity of the execution on the various sites of
the distributed data, and then to enrich the results of the distribution of the data on the distributed
sites, and on the place (site) where each operation the query must be executed.
Suppose that the optimization of a query (SELECT Attributes (A1, A2, ... An), FROM Relations
(R1, R2, ... ..Rn), WHERE (C1, C2, ... .Cn) is a composition of integrated query in web
services.
There are therefore no tools yet fewer models to check the integration time of the web data, and
the time T remains estimated.
The total execution time of a distributed query is the sum of the CPU calculation time needed to
execute the algebraic operations (joins, selections, projections ...) on different relations (R1, R2,
... ..Rn) for each site Si (Ti), with the transfer times (Query Transformation) data between two
distinct sites Si and Sj (Tij). So the time T is:
1 1
( )
n n
i ij
i j
T T T
Processing consists of executing a set of system tasks simultaneously. The expression of time will
be:
T [site] = max (T1, T2, ..., Tn)
T [transfer] = max (Ti1, Ti2, ..., Tin)
T = T [site] + T [transfer].
The work of the authors [15], [16], preferred to give a comparison of the execution time values of
a query before and after optimization in some DBMS. The advantage is that calculating the
execution time of a distributed query automatically adjusts its execution plan to the most efficient
solution, regardless of different writes. However, the disadvantage is that with this random
estimated value, some DBMS would not be able to make some transformations by themselves;
the use of the most efficient scripts will increase the transfer times.
4.4 The Proposed Algorithm
In this contribution, we proceeded to a new procedure proposed for the problem solving of the
distribution: called optimal integration procedure.
As a result of research, we have grouped in a calculation algorithm the execution time of a query
of the distributed data with the distribution calculated by the set theory.
12. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
40
4.4.1 Distribution Management Algorithm
BEGIN
Definition of the query (Relations (R1, R2, ... ..Rn), attributes (A1, A2, ... An),
conditions (C1, C2, ... .Cn))
The X distribution according to the set of theory:
0
1 0
!
2 1
! !
n n
p n
n n
p p
n
x C C
p n p
FOR i from 1 to x do
BEGIN
Management of the distribution (Ri relationship of the Si site)
Algebraic Tree Representation (Root, Nodes, Leaves)
Optimization of the request (specific treatment of each site before the grouping)
The time required for the aggregation of the sum of all data transfer times between
Sites (Tij).
IF simultaneous execution
FOR i from 1 to n do
T[site] = max (T1, T2, …,Tn)
T[transfer] = max (Ti1, Ti2, …,Tin)
T = T[site] + T[transfer].
Else
1 1
( )
n n
i ij
i j
T t t
END FOR
END IF
END
END FOR
END
4.4.2 Example of Query
Relations R1(A,B,C,K) , R2(A,D,G), … , Rn(B,E,F)
Select R1.A, R1.B, R2.D, …, Rn.E
From R1, R2, … , Rn
Where (R1.A = R2.A) and (R1.B= Rn.B) and C > c and D = d and E <> e
13. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
41
Data distribution
Figure 6: Data Distribution
Algebraic tree
Figure 7: Algebraic Tree of Presentation
14. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
42
Optimization
Figure 8: Algebraic Tree Optimization
4.4.3 Discussion
The solution we propose offers a distribution management algorithm, which looks like all the
processes needed to optimize the integration of distributed data across multiple sites. In our
algorithm, we proceeded to the combination of the two optimization approaches: set of theory and
algebraic tree processing.
This combination will allow a design of any possible composition of partial gatherings towards
the global integration of the information environment. By integrating the identification and
description of databases distributed by projection, selection and join properties and assignments
that groups together the data environment.
The process begins with the application of set theory, which is considered a preparatory step of
the possible division phase, where we will decide whether it is possible or even recurrence to
continue the given composition given to an information environment. This step is very important
for composing and managing this distribution of a data environment, hence the clear and thorough
understanding of the queries of the data distribution, link trees and their optimizations.
In the same run, we calculate the execution time on the time value of grouping by the transfer
time between the district sites. From these we estimate the transfer time by the maximum of the
simultaneous execution times. This distribution of data bases is realized by the set theory
modeling. The final phase is then the integration of the data in the optimal distribution of the
information system.
15. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
43
5. CONCLUSION AND FUTURE WORK
In this paper, we made a presentation of all developments in web technologies, the different
generations and uses of static web, dynamic, semantic, and modes of operation, as well as the
most recent tools used for communications between Internet users.
Likewise, we have approached the theory of sets for the composition of an information
environment and data imported by web services then, a web data management procedure and the
advantages and disadvantages of each optimization technique. This paper ends with a proposed
algorithm for calculating the execution time of a query based on the composition generated by set
of theory and the data transfer times between the distributed sites. This approach will allow a
design of any possible composition of partial gatherings towards the global integration of the
information environment.
Our future work will address the security issues of imported data, changing the properties of each
system relative to another system, recovering data after a site crash, calculations and
concatenations, and exploring virtual properties of distributed database.
We hope that this work will be useful, especially for distributed data, which must
formulate and manage integrations between the data distribution of the company, because
it is clear that the proposed approach must be supported in the evolution web
technologies to manage new sources and data distributed on multiple sites.
REFERENCES
[1] Nabil Ahmed Sultan, The Evolving Model for Software Delivery: The Case of Web and Semantic
Services International Journal of Web Services Practices, Vol. 3, No.1-2 (2008), pp. 57-65
[2] Anderson, P. (2007). All That Glisters Is Not Gold' -- Web 2.0 And The Librarian. Journal of
Librarianship and Information Science, 39 (4), 195–198.
[3] Isaías, P., Miranda, P., & Pífano, S. (2009). Critical Success Factors for Web 2.0 – A Reference
Framework. Heidelberg: Springer-Verlag Berlin.
[4] Web 1.0 à Web 3.0 les étapes d’évolution, 2008, L'Atelier Informatique – Référencement –
Création de sites http://www.atelier-informatique.org/internet/evolution-web-10-web-20-web-
30/358/
[5] Macnamara, Jim (2010). University of Technology Sydney, Public communication practices in the
Web 2.0-3.0 mediascape: The case for PRevolution. PRism 7(3): http://www.prismjournal.org
[6] Le monde du web Gérard Savoie, 2010 http://gerardsavoie.ca/web.html
[7] Laurence Allard, Revue MediaMorphoses n°21, septembre 2007, Armand Colin/INA Synthèses sur
le Web 2.0
[8] Sankar, K., & Bouchard, S. A. (2009). Enterprise Web 2.0 Fundamentals. Indianapolis: Cisco
Systems, Inc,.
[9] Boulakfouf, S., & Zampunieris, D. (2008). Integrating Web 2.0 Features into a Learning
Management System. Paper presented at the 7th European Conference on e-Learning (ECEL'08),
(pp. 127-133). Cyprus.
[10] Myhill, M., Shoebridge, M., & Snook, L. (2009). Virtual research environments – A Web 2.0
cookbook? Library Hi Tech , 27 (2), 228-238.
16. International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 3, June 2019
44
[11] Dwivedi, Yogesh; Williams, Michael; Mitra, Amit; Niranjan, Suraj; and Weerakkody, Vishanth,
"Understanding advances in web technologies: evolution from web 2.0 to web 3.0" (2011). ECIS
2011 Proceedings. Paper 257.
[12] Principles of Distributed Database Systems M. T. Ozsu and P. Valduriez.: Second Edition. Prentice
Hall, 1999.
[13] Techniques d'optimisation des requêtes dans les data warehouses Ladjel Bellatreche LISI/ENSMA,
2003
[14] Optimisation de requêtes OLAP en entrepôts de données Approche basée sur la fragmentation
génétique, El houssain ZIYATI, 2010
[15] Pearson Education France – Optimisation des bases de données – Laurent Navarro, 2010
http://www.pearson.fr/resources/titles/27440100612040/extras/2412_chap06.pdf
[16] Abdul Mateen, Basit Raza, Mian Muhammad Awais, Muhammad Sher Selection of the Best DBMS:
A Fuzzy based Multi-objective Decision Making Approach, Proceedings of the International
MultiConference of Engineers and Computer Scientists 2011 vol I IMECS 2011, March 16 – 18,
Hong Kong
[17] D. Litan, M. Velicanu, L. Copcea (Teohari), M. Teohari, A. M. Mocanu (Virgolici), I. Surugiu, and
O. Raduta, Business’ New Requirement:Information Systems Integration – Methods and
Technologies, INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS
Issue 3, Volume 5, 2011
[18] Inter systèmes Ensemble: Intégration pour l’entreprise en évolution rapide d’aujourd’hui, livre blanc,
Sandra Rogers, IDC, Décembre 2003.
[19] BARR Mohamed, BELLATRECHE Ladjel, Approche dirigée par les fourmis pour la fragmentation
horizontale dans les entrepôts de données relationnels, Nature & Technologie, page, 16 – 24, 2012
[20] Web Services in Distributed Information Systems: Availability, Performance and Composition; Zhao
Xia, and al.,International Journal of Distributed Systems and Technologies, one (1), 1-16, January-
March 2010 1
[21] Erl T., "Service-Oriented Architecture - A Field Guide to Integrating XMLand Web Services".
Printice Hal., 2004.
[22] A.M. LAW & W.D. KELTON, Simulation Modelling and Analysis. Edition Mac Graw Hill Book
Company, 1999
[23] FROM PLM TO ERP : A SOFTWARE SYSTEMS ENGINEERING INTEGRATION
Nafisa Osman1 and Abd-El-Kader Sahraoui AlmedtechInc..and University SUST Khartoum,
Sudan 2LAAS-CNRS, Université de Toulouse, UT2J, Toulouse, France International Journal of
Software Engineering & Applications (IJSEA), Vol.9, No.1, January 2018
[24] DISTRIBUTED DBMS - DESIGN STRATEGIES
HTTPS://WWW.TUTORIALSPOINT.COM/DISTRIBUTED_DBMS/DISTRIBUTED_DBMS_DE
SIGN_STRATEGIES.HTM
[25] DATA WAREHOUSE AND BIG DATA INTEGRATION Sonia Ordoñez Salinas and Alba
Consuelo Nieto Lemus Faculty of Engineering, Distrial F.J.C University, Bogotá, Colombia,
International Journal of Computer Science & Information Technology (IJCSIT) Vol 9, No 2, April
2017