The future of Open Distributed Processing systems (ODP) will see an increasing of components number, these components are sharing resources. In general, these resources are offering some kind of services. Due to the huge number of components, it is very difficult to offer the optimum Quality of service (QoS). This encourages us to develop a model for QoS negotiation process to optimize the QoS in an ODP system. In such system, there is a High risk of software or hardware failure. To ensure good performance of a system based on our model, we develop it using a formal method. In our case, we will use Event-B to get in the end of our development a system correct by construction.
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...Chun-Kai Wang
This document proposes a mobility-aware distributed service composition framework for service-oriented architecture (SOA) based mobile ad hoc networks (MANETs). The framework consists of four phases: broker arbitration, service discovery, service integration, and service execution. In the broker arbitration phase, a broker node is selected based on its resources. Services are then discovered, integrated to compose new services, and executed to fulfill requests. Fault tolerance is provided through replica brokers.
In this paper, a review for consistency of data replication protocols has been investigated. A brief
deliberation about consistency models in data replication is shown. Also we debate on propagation
techniques such as eager and lazy propagation. Differences of replication protocols from consistency view
point are studied. Also the advantages and disadvantages of the replication protocols are shown. We
advent into essential technical details and positive comparisons, in order to determine their respective
contributions as well as restrictions are made. Finally, some literature research strategies in replication
and consistency techniques are reviewed.
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
The document discusses the objectives, feasibility study, and implementation specifications for an Income Tax Department Management System project. The objectives are to overcome paper-based problems and easily manage records of PAN card holders and employees. A feasibility study assesses the technical, operational, and economic feasibility of the proposed system. The implementation will use ASP.NET on Windows with a SQL Server database. Hardware requirements include a Pentium PC with 512MB RAM and 80GB hard drive.
Study on Use Case Model for Service Oriented Architecture Developmentijcnes
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant endures business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture.
Fulfillment request management (the approach)ijcsit
In this paper we introduce the term FRM (Fulfillment Request Management). According to the FRM in a
BSS / OSS environment we can use a unified approach to implement a SOA in order to integrate BSS with
OSS and handle 1. Orders 2. Events 3. Processes. So in a way that systems like ESB, Order Management,
and Business Process Management can be implemented under a unified architecture and a unified
implementation. We assume that all the above mentioned are 'requests' and according to the system we
want to implement, the request can be an event, an order, a process etc. So instead of having N systems we
have 1 system that covers all the above (ESB, Order Management, BPM etc) With the FRM we can have
certain advantages such as: 1. adaptation 2. Interoperability. 3. Re-usability 4. Fast implementation 5.
Easy reporting. In this paper we present a set of the main principles in order to build an FRM System.
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
Dynamic Interface Adaptability in Service Oriented Software
M. Ketfi and N. Belkhatir
8th International Workshop on Component-Oriented Programming (WCOP'03),
Darmstadt, Germany, July 2003.
Mobility Aware Distributed Service Composition Framework in SOA based MANET A...Chun-Kai Wang
This document proposes a mobility-aware distributed service composition framework for service-oriented architecture (SOA) based mobile ad hoc networks (MANETs). The framework consists of four phases: broker arbitration, service discovery, service integration, and service execution. In the broker arbitration phase, a broker node is selected based on its resources. Services are then discovered, integrated to compose new services, and executed to fulfill requests. Fault tolerance is provided through replica brokers.
In this paper, a review for consistency of data replication protocols has been investigated. A brief
deliberation about consistency models in data replication is shown. Also we debate on propagation
techniques such as eager and lazy propagation. Differences of replication protocols from consistency view
point are studied. Also the advantages and disadvantages of the replication protocols are shown. We
advent into essential technical details and positive comparisons, in order to determine their respective
contributions as well as restrictions are made. Finally, some literature research strategies in replication
and consistency techniques are reviewed.
Study on Use Case Model for Service Oriented Architecture Developmentijbuiiir1
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture
Study on Use Case Model for Service Oriented Architecture Developmentijwtiir
The recent trends in the computer industry are the one
and only thing i.e., web services. Because of the common
availability and open technologies web services are relevant to
all. Service-oriented architecture (SOA) helps organizations to
transform their business processes for high performance by
simplifying the underlying information systems. The most
challenging aspect of building successful software applications is
clearly understanding and specifying the requirements that an
application must satisfy. Use case modeling is an increasingly
popular approach for identifying and defining requirements for
software applications of all types. Use cases describe the
behavior of the system as its users interact with it. This approach
helps to place the software requirements in the framework of a
user doing some useful work with the system. This type of
approach helps to map software requirements to the relevant enduser business processes, a very powerful concept. This paper
presents how the relationship between use case model and
Service oriented architecture.
The document discusses the objectives, feasibility study, and implementation specifications for an Income Tax Department Management System project. The objectives are to overcome paper-based problems and easily manage records of PAN card holders and employees. A feasibility study assesses the technical, operational, and economic feasibility of the proposed system. The implementation will use ASP.NET on Windows with a SQL Server database. Hardware requirements include a Pentium PC with 512MB RAM and 80GB hard drive.
Study on Use Case Model for Service Oriented Architecture Developmentijcnes
The recent trends in the computer industry are the one and only thing i.e., web services. Because of the common availability and open technologies web services are relevant to all. Service-oriented architecture (SOA) helps organizations to transform their business processes for high performance by simplifying the underlying information systems. The most challenging aspect of building successful software applications is clearly understanding and specifying the requirements that an application must satisfy. Use case modeling is an increasingly popular approach for identifying and defining requirements for software applications of all types. Use cases describe the behavior of the system as its users interact with it. This approach helps to place the software requirements in the framework of a user doing some useful work with the system. This type of approach helps to map software requirements to the relevant endures business processes, a very powerful concept. This paper presents how the relationship between use case model and Service oriented architecture.
Fulfillment request management (the approach)ijcsit
In this paper we introduce the term FRM (Fulfillment Request Management). According to the FRM in a
BSS / OSS environment we can use a unified approach to implement a SOA in order to integrate BSS with
OSS and handle 1. Orders 2. Events 3. Processes. So in a way that systems like ESB, Order Management,
and Business Process Management can be implemented under a unified architecture and a unified
implementation. We assume that all the above mentioned are 'requests' and according to the system we
want to implement, the request can be an event, an order, a process etc. So instead of having N systems we
have 1 system that covers all the above (ESB, Order Management, BPM etc) With the FRM we can have
certain advantages such as: 1. adaptation 2. Interoperability. 3. Re-usability 4. Fast implementation 5.
Easy reporting. In this paper we present a set of the main principles in order to build an FRM System.
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
Dynamic Interface Adaptability in Service Oriented Software
M. Ketfi and N. Belkhatir
8th International Workshop on Component-Oriented Programming (WCOP'03),
Darmstadt, Germany, July 2003.
An E-Business Integration And Collaboration Platform For B2B E-CommerceAndrew Parish
This document describes an application platform for B2B e-commerce that addresses integration and collaboration challenges. The platform is composed of several cooperating frameworks, including an interaction management framework, business process integration framework, trust and access framework, and application integration framework. It provides an integrated user experience, common security, supports business process integration, and uses a common messaging infrastructure.
The document is the final paper for SSW-565A that discusses testability in software systems. It elaborates on various architectural tactics to achieve testability like well-defined interfaces, record/playback, abstract data sources, and limiting complexity. It then discusses how these tactics could be applied to a ration shop web application to make it more testable, such as using local test data instead of a real database, mocking external dependencies, and ensuring high cohesion and loose coupling between classes. The paper concludes that testability relies on factors like controllability, observability, and complexity being addressed at the architectural level to facilitate effective testing.
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesMustafa Salam
We propose a model-driven approach, based on Web services standards, for modeling and integrating agile business processes using Web services. The choice of focusing on Web services technology was not arbitrary. The large and broad adoption of this technology by enterprises will lead most business processes to be performed using Web services. Besides, the added value of Web services and their great interest to business process management are beyond doubt. Web services produce, on the one hand, loosely coupled applicative components.
On the other hand, they are the most widely used implementation technology of SOA (Service-Oriented Architecture), which is based on the large experiences of software and distributed component technologies. Being founded on the XML (eXtensible Markup Language) language, the SOAP (Simple Object Access Protocol) protocol and the UDDI (Universal Description Discovery and Integration) repository, this technology can be considered as an appropriate mean to ensure interoperability, data exchange and the publication and discovery of business processes when they can be implemented as Web services.
This document provides guidelines for clients utilizing managed cloud services from a data center. It discusses key considerations including a shift in responsibility and ownership of components to the service provider. It also notes that more parties will be involved and systems need to be integrated. The document outlines roles in a cloud-enabled data center and types of service agreements like SLAs, OLAs, and UCs that define responsibilities. It provides steps for creating service agreements, elements that should be included, and tasks to complete before implementation like defining governance and compliance requirements.
This document discusses the requirements workflow in software development. It describes capturing and managing requirements to design a user-focused system. The goals are to establish agreement on what the system should do, provide understanding of requirements to developers, define system boundaries, and provide a basis for planning, estimating, and defining the user interface. Requirements include functional requirements specifying system actions and non-functional requirements related to qualities like usability, reliability, performance, and supportability. Requirements come from stakeholders' requests and needs and are expressed as system features.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them. There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to
exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them.
There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them. There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A SurveyIJERA Editor
In order to achieve ideal status and meet demands of stakeholders, each organization should follow their vision and long term plan. Goals and strategies are two fundamental basis in vision and mission. Goals identify framework of organization where processes, rules and resources are designed. Goals are modelled based on a graph structure by means of extraction, classification and determining requirements and their relations and in form of graph. Goal graph shows goals which should be satisfied in order to guarantee right route of organization. On the other hand, these goals can be called as predefined sub projects which business management unit should consider and analyse them. If we know approximate size and time of each part, we will design better management plans resulting in more prosperity and less fail. This paper studies how use case points method is used in calculating size and time in goal graph.
In recent years there has been an exponential growth of e-Governance in India. It is growing to such a
scale that requires full attention of the Government to ensure collaboration among different government
departments, private sectors and Non-Governmental Organisations(NGOs). In order to achieve successful
e-Governance, Government has to facilitate delivery of services to citizens, business houses and other
public or private organisations according to their requirements. In this paper, we have proposed
integration of different government departments using a Service Oriented e-Governance(SOeGov)
approach with web services technology and Service Oriented Architecture(SOA). The proposed approach
can be effectively used for achieving integration and interoperability in an e-Governance system.We have
demonstrated the working of our approach through a case study where integration of several departments
of the provincial Government of Odisha (India) has been made possible.
This document describes SWORD, a toolkit for composing web services. SWORD represents each service as a rule specifying its inputs and outputs. When a user wants to create a composite service, SWORD uses a rule engine to determine if it can be realized by composing existing services. If so, SWORD generates a composition plan specifying the sequence of services to invoke. SWORD has been implemented in a prototype and can compose information-providing services like those providing data about people, movies, etc. without requiring emerging standards like WSDL or SOAP.
The aim of this paper is to propose a modeling framework, tailored to build efficient, elastic and autonomous applications from tasks and services. It includes integrated services to develop the software products, reusing on demand in-house services with specific requirements and flexible the representational state transfer (REST) services. The idea is to decouple authorization for reduced service dependency and to provide a possibility for developing the whole application by increasing the existing application flexibility. Based on the fact that there are different web application platforms that serve to offer services to users but they are not integrated; we propose a framework with high flexibility degree, especially integrating the most used services such: e-learning, administrative, and library services, as University services are concern.
This document discusses requirements engineering for software systems. It covers topics such as functional and non-functional requirements, the software requirements document, requirements specification processes, and requirements elicitation, validation, and management. It describes requirements engineering as establishing customer needs and operational constraints. Requirements can range from abstract to detailed and serve different purposes. Both functional and non-functional requirements are important, and natural language, structured, and other techniques can be used for specification.
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
This document proposes a novel framework for providing reliable and fault tolerant web services. The framework uses replication and a replication manager to select a primary web service from among multiple replicas. When the primary web service fails or becomes unavailable, the replication manager switches to a new primary by updating the WSDL registration to ensure uninterrupted service for consumers. The replication manager continuously monitors the web services and can trigger recovery, reconfiguration or restart processes to maintain reliability. The proposed approach aims to achieve high performance and reliability for web services.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
This document proposes a new heuristic approach for web service discovery and selection using an algorithm inspired by honey bee behavior called the Bees Algorithm. The approach structures service registries by domain to simplify discovery. It uses the Bees Algorithm as an intelligent search method to efficiently find the optimal service matching a client's request and quality of service requirements from the relevant registry in least time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
Service Discovery – A Survey and Comparison ijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
A Novel Testing Framework for SOA Based ServicesAbhishek Kumar
The document proposes a novel testing framework for testing SOA (Service Oriented Architecture) based services. The framework focuses on test case selection, finalizing test cases, identifying missed coverage items between different versions of a service, and generating test reports. It describes roles of different stakeholders like service developers, providers, and testers. It involves generating test cases and data from WSDL and XML schemas, selecting test cases to cover changes between versions, and producing reports on test execution for the service provider.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Formal Specification of QoS Negotiation in ODP System
An E-Business Integration And Collaboration Platform For B2B E-CommerceAndrew Parish
This document describes an application platform for B2B e-commerce that addresses integration and collaboration challenges. The platform is composed of several cooperating frameworks, including an interaction management framework, business process integration framework, trust and access framework, and application integration framework. It provides an integrated user experience, common security, supports business process integration, and uses a common messaging infrastructure.
The document is the final paper for SSW-565A that discusses testability in software systems. It elaborates on various architectural tactics to achieve testability like well-defined interfaces, record/playback, abstract data sources, and limiting complexity. It then discusses how these tactics could be applied to a ration shop web application to make it more testable, such as using local test data instead of a real database, mocking external dependencies, and ensuring high cohesion and loose coupling between classes. The paper concludes that testability relies on factors like controllability, observability, and complexity being addressed at the architectural level to facilitate effective testing.
Web Services-Enhanced Agile Modeling and Integrating Business ProcessesMustafa Salam
We propose a model-driven approach, based on Web services standards, for modeling and integrating agile business processes using Web services. The choice of focusing on Web services technology was not arbitrary. The large and broad adoption of this technology by enterprises will lead most business processes to be performed using Web services. Besides, the added value of Web services and their great interest to business process management are beyond doubt. Web services produce, on the one hand, loosely coupled applicative components.
On the other hand, they are the most widely used implementation technology of SOA (Service-Oriented Architecture), which is based on the large experiences of software and distributed component technologies. Being founded on the XML (eXtensible Markup Language) language, the SOAP (Simple Object Access Protocol) protocol and the UDDI (Universal Description Discovery and Integration) repository, this technology can be considered as an appropriate mean to ensure interoperability, data exchange and the publication and discovery of business processes when they can be implemented as Web services.
This document provides guidelines for clients utilizing managed cloud services from a data center. It discusses key considerations including a shift in responsibility and ownership of components to the service provider. It also notes that more parties will be involved and systems need to be integrated. The document outlines roles in a cloud-enabled data center and types of service agreements like SLAs, OLAs, and UCs that define responsibilities. It provides steps for creating service agreements, elements that should be included, and tasks to complete before implementation like defining governance and compliance requirements.
This document discusses the requirements workflow in software development. It describes capturing and managing requirements to design a user-focused system. The goals are to establish agreement on what the system should do, provide understanding of requirements to developers, define system boundaries, and provide a basis for planning, estimating, and defining the user interface. Requirements include functional requirements specifying system actions and non-functional requirements related to qualities like usability, reliability, performance, and supportability. Requirements come from stakeholders' requests and needs and are expressed as system features.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them. There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to
exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them.
There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
EVALUATION OF COMPUTABILITY CRITERIONS FOR RUNTIME WEB SERVICE INTEGRATIONijwscjournal
T Today’s competitive environment drives the enterprises to extend their focus and collaborate with their business partners to carry out the necessities. Tight coordination among business partners assists to share and integrate the service logic globally. But integrating service logics across diverse enterprises leads to exponential problem which stipulates developers to comprehend the whole service and must resolve suitable method to integrate the services. It is complex and time-consuming task. So the present focus is to have a mechanized system to analyze the Business logics and convey the proper mode to integrate them. There is no standard model to undertake these issues and one such a framework proposed in this paper examines the Business logics individually and suggests proper structure to integrate them. One of the innovative concepts of proposed model is Property Evaluation System which scrutinizes the service logics and generates Business Logic Property Schema (BLPS) for the required services. BLPS holds necessary information to recognize the correct structure for integrating the service logics. At the time of integration, System consumes this BLPS schema and suggests the feasible ways to integrate the service logics. Also if the service logics are attempted to integrate in invalid structure or attempted to violate accessibility levels, system will throw exception with necessary information. This helps developers to ascertain the efficient structure to integrate the services with least effort.
Size and Time Estimation in Goal Graph Using Use Case Points (UCP): A SurveyIJERA Editor
In order to achieve ideal status and meet demands of stakeholders, each organization should follow their vision and long term plan. Goals and strategies are two fundamental basis in vision and mission. Goals identify framework of organization where processes, rules and resources are designed. Goals are modelled based on a graph structure by means of extraction, classification and determining requirements and their relations and in form of graph. Goal graph shows goals which should be satisfied in order to guarantee right route of organization. On the other hand, these goals can be called as predefined sub projects which business management unit should consider and analyse them. If we know approximate size and time of each part, we will design better management plans resulting in more prosperity and less fail. This paper studies how use case points method is used in calculating size and time in goal graph.
In recent years there has been an exponential growth of e-Governance in India. It is growing to such a
scale that requires full attention of the Government to ensure collaboration among different government
departments, private sectors and Non-Governmental Organisations(NGOs). In order to achieve successful
e-Governance, Government has to facilitate delivery of services to citizens, business houses and other
public or private organisations according to their requirements. In this paper, we have proposed
integration of different government departments using a Service Oriented e-Governance(SOeGov)
approach with web services technology and Service Oriented Architecture(SOA). The proposed approach
can be effectively used for achieving integration and interoperability in an e-Governance system.We have
demonstrated the working of our approach through a case study where integration of several departments
of the provincial Government of Odisha (India) has been made possible.
This document describes SWORD, a toolkit for composing web services. SWORD represents each service as a rule specifying its inputs and outputs. When a user wants to create a composite service, SWORD uses a rule engine to determine if it can be realized by composing existing services. If so, SWORD generates a composition plan specifying the sequence of services to invoke. SWORD has been implemented in a prototype and can compose information-providing services like those providing data about people, movies, etc. without requiring emerging standards like WSDL or SOAP.
The aim of this paper is to propose a modeling framework, tailored to build efficient, elastic and autonomous applications from tasks and services. It includes integrated services to develop the software products, reusing on demand in-house services with specific requirements and flexible the representational state transfer (REST) services. The idea is to decouple authorization for reduced service dependency and to provide a possibility for developing the whole application by increasing the existing application flexibility. Based on the fact that there are different web application platforms that serve to offer services to users but they are not integrated; we propose a framework with high flexibility degree, especially integrating the most used services such: e-learning, administrative, and library services, as University services are concern.
This document discusses requirements engineering for software systems. It covers topics such as functional and non-functional requirements, the software requirements document, requirements specification processes, and requirements elicitation, validation, and management. It describes requirements engineering as establishing customer needs and operational constraints. Requirements can range from abstract to detailed and serve different purposes. Both functional and non-functional requirements are important, and natural language, structured, and other techniques can be used for specification.
A Novel Framework for Reliable and Fault Tolerant Web ServicesAbhishek Kumar
This document proposes a novel framework for providing reliable and fault tolerant web services. The framework uses replication and a replication manager to select a primary web service from among multiple replicas. When the primary web service fails or becomes unavailable, the replication manager switches to a new primary by updating the WSDL registration to ensure uninterrupted service for consumers. The replication manager continuously monitors the web services and can trigger recovery, reconfiguration or restart processes to maintain reliability. The proposed approach aims to achieve high performance and reliability for web services.
A HEURISTIC APPROACH FOR WEB-SERVICE DISCOVERY AND SELECTIONijcsit
This document proposes a new heuristic approach for web service discovery and selection using an algorithm inspired by honey bee behavior called the Bees Algorithm. The approach structures service registries by domain to simplify discovery. It uses the Bees Algorithm as an intelligent search method to efficiently find the optimal service matching a client's request and quality of service requirements from the relevant registry in least time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
Service Discovery – A Survey and Comparison ijujournal
The document summarizes and compares several major service discovery approaches. It provides an overview of service discovery objectives and techniques, then surveys prominent protocols including SLP, Jini, and UPnP. Each approach is analyzed based on features like service description, discovery architecture, announcement/query mechanisms, and how they handle service usage and dynamic network changes. The comparison aims to identify strengths and limitations to guide future research in improving service discovery.
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
A Novel Testing Framework for SOA Based ServicesAbhishek Kumar
The document proposes a novel testing framework for testing SOA (Service Oriented Architecture) based services. The framework focuses on test case selection, finalizing test cases, identifying missed coverage items between different versions of a service, and generating test reports. It describes roles of different stakeholders like service developers, providers, and testers. It involves generating test cases and data from WSDL and XML schemas, selecting test cases to cover changes between versions, and producing reports on test execution for the service provider.
Similar to Formal Specification of QoS Negotiation in ODP System (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
This presentation is about Food Delivery Systems and how they are developed using the Software Development Life Cycle (SDLC) and other methods. It explains the steps involved in creating a food delivery app, from planning and designing to testing and launching. The slide also covers different tools and technologies used to make these systems work efficiently.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
2. ISSN: 2088-8708
IJECE Vol. 7, No. 4, August 2017 : 2045 – 2053
2046
construction [6]. In the beginning, we present the proposed negotiation approach, this approach is based on
trader. Then, we define the system requirement along two axes: FUN and ENV. After that, we present our
refinement strategy that we will use after that to specify our system. Lastly, we end this paper with a
conclusion presenting an abstract about the work done and our expectation about future works.
2. RELATED WORKS
―Using Event B to Specify QoS in ODP Enterprise Language‖ [1] like our work, is specifying QoS
negotiation using event-B, it presents a specification for the different actors of the system and their states and
it also present negotiation values. However, it doesn’t present a specification of how the system acts exactly
such as how the system is able to negotiate with multiple servers.
―End-to-end QoS negotiation in network federations‖ [9] is another work presenting QoS
negotiation, it presents a good specification of the negotiation process, and in addition it presents a
mathematical modeling. Yet, mathematical model doesn’t prove that the specification is correct. Also, it
limits the study in telecommunication domain.
―An example of dynamic QoS negotiation‖ [10] presents an example of QoS negotiation applied to
a video streaming application, this example is presented with mathematical models and statistics results. The
same as the previous paper, there is nothing proving the correctness of the system.
Our work is presenting a formal specification using Event-B, this allows us to ensure the correctness
of our system using poof obligations, it also presents a modeling of negotiation in more details. Also, our
work is proved using Rodin platform [7] which avoid human mistakes during proving proof obligations.
3. NEGOTIATION APPROACH
Quality of Service (QoS) is a management concept that aims to optimize network resources or
process and ensure good performance of an Open Distributed Processing (ODP) system, this concept is
fundamental in many fields such as transmission protocols [11], routing algorithms [12], resources allocation
algorithms [13] and web service [14]. In our negotiation process, we will base our study on the trader concept
[1]. This means that in addition of the client and servers, we will have a third actor, it is the trader. The trader
is playing the role of a controller who is able to get the best QoS possible for a client. In the beginning, a
client propose a value of quality of service P to the trader, the trader may modify the QoS proposed by the
client or not, after that the trader send the value P’ of QoS to the server, when the server gets the required
value it may either refuse the request or may propose the value V that it may offers, at this stage the trader
will either modify the value proposed by the server or returns it directly to the client, if the client is satisfied
with the proposed value he accepts it or else he refuses it, in this case the trader will automatically start
negotiation with another server and proceed in the same way. The Figure 1 below presents the process of
negotiation with a server basing on a UIT form [15]:
Figure 1. Negotiation Process [1]
4. FORMAL SPECIFICATION OF QOS NEGOCIATION
4.1. Requirement Document
To present the requirement document correctly, we present it along two main axes. The first axis
expresses the main functions of system "FUN", and the second describes these functions and provides some
details regarding the environment "ENV". We present our requirement document as follows:
The system allows for the negotiation of QoS
between a client and one or more servers
FUN 1
3. IJECE ISSN: 2088-8708
Formal Specification of QoS Negotiation in ODP System (Abdessamad Jarrar)
2047
ENV 1: The trader is an intermediate between client and server.
Negotiation end if the client accepts the QoS or if
he refuses it
FUN 2
ENV 2: A client can be in one of three states (propose, accept or refuse).
The client can only accept negotiation if the trader
proposes a value of quality of service
FUN 3
ENV 3: A trader can either propose a value of QoS or refuses to offer the service.
the trader can only refuse negotiation if all the
servers refuse to offer any QoS or if the client
refuse all the proposed values of QoS
FUN 4
ENV 4: a server can propose or refuse to offer any QoS
The value proposed by the server is always less
than or equal the value given by the trader
FUN 5
ENV 5: values of QoS are always positive.
The trader always propose values less than or
equal the value proposed by the client
FUN 6
The client propose the value he wants, then the
trader seeks the best value less than or equal to that
value in all servers
FUN7
4.2. Refinement Strategy
After specifying our negotiation process correctly, we present our refinement strategy. We start by
creating an abstract model (first refinement) containing the principal functions of our system, then we will
enrich it by adding more function and environment assumptions (second refinement and third refinement). In
more details, here is our refinement strategy:
a. First refinement: In the beginning, we present the various actors states (client, trader and servers) and the
basic logic of the system (FUN 1, FUN 2, FUN 3, FUN 4, ENV 1, ENV 2, ENV 3 and ENV 4)
b. Second refinement: in this refinement, we include negotiation values and how the actors may change it
while negotiating with a server (FUN 5, ENV 5 and ENV 6).
c. Third refinement: lastly, the system is able to negotiate with multiple servers (FUN 7).
4.3. First Refinement: Specifying Actors States
As it is mentioned before, we start by modeling the various states of the system actors. Here is our
first context of the first refinement:
In this context which is the static part of a refinement, we define the set STATE as a partition of the
all the possible states in the system of an actors. In addition, we add an additional state that we have called
―wait‖; this state is the initialization state. We present the dynamic part of the first refinement (machine); we
start by the invariant that are the properties that must be preserved during system occurrence:
CONTEXT
context0
SETS
STATE
CONSTANTS
propose
refuse
accept
wait
AXIOMS
axm1:partition(STATE,{propose},{refuse}, {accept},{wait})
END
4. ISSN: 2088-8708
IJECE Vol. 7, No. 4, August 2017 : 2045 – 2053
2048
In these invariants, we define S_st (Server state) as an element of STATE that is not equal accept,
the same go for T_st (Trader state) as the server and the trader are not allowed to accept the negotiation, the
client is the only actor that may accept the negotiation this is why C_st may be equal any state. In addition,
we present some invariant that control the possible state combinations, for example, if the client is in the
accept state the trader must be in the state propose (inv6), which mean that a client cannot accepts a
negotiation if the trader did not proposes a QoS value. Now we can initialize our variable with ―wait‖ value.
Beside the initialization event we have more events that are able to change the states of the actors
while preserving all the invariants. Client_propose is the event that starts a new negotiation; we can start a
new negotiation only if we end the previous one, which means that the trader is not in the state ―propose‖.
When a client proposes a value of QoS, the trader switches his state to ―propose‖ to start negotiation
with servers.
The server proposes or refuses negotiation if and only if the trader proposes.
The only case where the trader will refuse negotiation is when all servers refuse negotiation, and
then the trader ends negotiation and informs client.
The client refuses a negotiation if he is not satisfied with negotiation value proposed by the trader.
VARIABLES
S_st
C_st
T_st
INVARIANTS
inv1: S_st ∈ STATE
inv2: S_st ≠ accept
inv3: C_st ∈STATE
inv4: T_st ∈ STATE
inv5: T_st ≠ accept
inv6: C_st = accept ⇒ T_st = propose
inv7: T_st = refuse ⇒ C_st ≠ accept
inv8: T_st = refuse ⇒ S_st = refuse
inv9: S_st = propose ⇒ T_st = propose
INITIALISATION:
THEN
act1: S_st ≔ wait
act2: C_st ≔ wait
act3: T_st ≔ wait
END
Client_propose:
WHERE
grd1: C_st = wait
grd2: T_st ≠ propose
THEN
act1: C_st ≔ propose
END
Trader_propose:
WHERE
grd1: C_st = propose
THEN
act1: T_st ≔propose
END
Server_refuse:
WHERE
grd1: T_st = propose
THEN
act1: S_st ≔ refuse
END
Trader_refuse:
WHERE
grd1: C_st = propose
grd2: S_st = refuse
THEN
act1: T_st ≔ refuse
act2: C_st ≔ refuse
END
5. IJECE ISSN: 2088-8708
Formal Specification of QoS Negotiation in ODP System (Abdessamad Jarrar)
2049
Also, if the client is satisfied with the proposed value by the trader, he accepts negotiation.
4.4. Second Refinement: Modeling Negotiation Values
In this refinement, we present the negotiation values. A client propose a value of quality of service P
to the trader, the trader may modify the QoS proposed by the client or may keep it, after that the trader send
the value P’ of QoS to the server, when the server get the required value it may either refuse the request or
may propose the value V that it is able to offer, at this stage the trader will either modify the value proposed
by the server or return it directly to the client. Before modeling these events, we present the context below
presenting the maximum value of QoS that a server may offer Vserver_max:
In machine1, we have new variables representing the negotiation values (Vclient, Vtrader, Vserver
and Vservice which is the value of QoS offered in case of accepting the negotiation). Moreover, we have
additional invariant for the negotiations values:
Furthermore, we refine the events of refinement 0 by adding actions responsible for dealing with
QoS values such as these actions setting negotiation values to 0 in the initialization event:
The value proposed by the client Vclient must be a not null natural number.
Client_refuse:
WHERE
grd1: C_st = propose
grd2: T_st = propose
THEN
act1: C_st≔ refuse
act2: T_st ≔ refuse
act3: S_st≔ refuse
END
Client_accept:
WHERE
grd1: T_st = propose
THEN
act1: C_st ≔ accept
END
CONTEXT
context1
EXTENDS
context0
CONSTANTS
Vserver_max
AXIOMS
axm1: Vserver_max ∈ℕ
axm2: Vserver_max > 0
END
INVARIANTS
inv1: Vclient ∈ℕ
inv2: Vserver ∈ℕ
inv3: Vtrader ∈ℕ
inv4: Vservice ∈ℕ
inv5: Vclient ≥ Vtrader
inv6: Vtrader ≥ Vserver
inv7: T_st = propose ⇔ Vtrader ≠ 0
inv8: S_st = propose ⇔ Vserver ≠ 0
inv9: (C_st = propose ∨ C_st = accept) ⇔ Vclient ≠ 0
inv10: Vserver ≤ Vserver_max
act4: Vclient ≔ 0
act5: Vserver ≔0
act6: Vtrader ≔0
act7: Vservice≔ 0
6. ISSN: 2088-8708
IJECE Vol. 7, No. 4, August 2017 : 2045 – 2053
2050
The value proposed by the trader must be a positive number less than or equal the value proposed by
the client.
A server proposes a value less than or equal the value proposed by the trader, and this value is
always less than or equal a predefined maximum value of the Qos.
When a trader proposes a value of QoS, the server may be unable to offer any QoS, in this case the
server refuses the process of negotiation.
If a server refuse to offer a QoS, the trader try to negotiate with another server until it find a valid
QoS, however in some cases all the servers are unable to offerQoS, which mean that the trader will stop
negotiation, which mean that we reset the value of Vtrader and Vclient to 0 in the event Trader_refuse:
Even if the trader find a server that may offer a Qos, the client may be not satisfied, in this case the
client may refuse the negotiation by resetting all the negotiation values to 0 in the event Client_refuse:
In the other hand, if the client is satisfied with the offered QoS, he may accept negotiation. In this
case, the value of service will be the value that the trader proposes, which means that we have one additional
action in the event Client_accept:
Client_propose:
ANY
val ›
WHERE
…
grd3: val ∈ℕ
grd4: val ≠ 0
THEN
act1: C_st ≔ propose
act2: Vclient ≔ val
END
Trader_propose:
ANY
val
WHERE
grd1: C_st = propose
grd2: val ∈ℕ
grd3: val ≤ Vclient
grd4: val ≥ Vserver
grd5: val ≠ 0
THEN
act1: T_st ≔propose
act2: Vtrader ≔ val
END
Server_propose:
ANY
val
WHERE
grd1: T_st = propose
grd2: val ∈ℕ
grd3: val ≤ Vtrader
grd4: val ≠ 0
grd5: val ≤ Vserver_max
THEN
act1: S_st ≔propose
act2: Vserver ≔ val
END
Server_refuse:
WHERE
grd1: T_st = propose
THEN
act1: S_st ≔ refuse
act2: Vserver ≔ 0
END
act3: Vtrader ≔ 0
act4: Vclient≔ 0
act4: Vclient ≔ 0
act5: Vtrader ≔ 0
act6: Vserver ≔ 0
7. IJECE ISSN: 2088-8708
Formal Specification of QoS Negotiation in ODP System (Abdessamad Jarrar)
2051
4.5. Third Refinement: Negotiation with Multiple Servers
In this last refinement, we allow the system to negotiate with multiple servers. In other words, when
the client gets the QoS value proposed he may be not satisfied with it and refuses the negotiation. In this case,
the trader starts negotiating with another server that may offer a better QoS. To model this, we need to define
a set of servers in our system illustrated in the context below:
Similarly, we define new two variables. The first variable is server which represents the current
server that we are negotiating with. The second is Servers_Not_Tested which represents the set of servers
that we have not negotiated with yet. More than that, we have additional invariant:
In the same way as the previous refinement, we refine also the events of machine 1. In the
beginning, we refine the initialization event:
In the beginning of every new negotiation, the client proposes a QoS as mentioned before, at this
stage, we initiate the set Servers_Not_Tested as all the servers of our network in the event Client_propose :
The trader is the one responsible for choosing the server to negotiate with; this server is chose from
the set Servers_Not_Tested, which mean that we need to check if this set is not empty in the event
Trader_propose using the following guard:
Also, this action picks a server from Servers_Not_Tested:
When a server refuses to offer a QoS, we remove it from Servers_Not_Tested to ensure that we
won’t negotiate with the same sever over and over again. The action allowing removing the server from
Servers_Not_Tested in the event Server_refuse is the following:
The trader refuses negotiation if and only if all the servers refuse to offer a QoS which mean that we
removed all the servers from Servers_Not_Tested, this mean that Servers_Not_Tested is empty. This means
that the Trader_refuse will never be occurred unless Servers_Not_Tested is empty; this is done by the
following guard:
The client accepts the negotiation if there is a server in Servers_Not_Tested that may offer a QoS
and the client is satisfied with it. This means that we will have a new guard in the event Client_accept:
5. PROVING SYSTEM CORRECTNESS
Proof obligations are a set of evidence that ensures the validity of the system, the most important
among them is the preservation of invariants proofs that validates the preservation of all the invariant
condition before and after each event, all this can be done manually. Most of the proofs are easy and are not
act2: Vservice ≔ Vtrader
CONTEXT
context2
EXTENDS
context1
SETS
Servers
AXIOMS
axm1: Servers ≠ ∅
END
inv1: server ∈ Servers
inv2: Servers_Not_Tested ∈ℙ(Servers)
INITIALISATION:
THEN
…
act8: server :∈ Servers
act9: Servers_Not_Tested ≔ Servers
END
act4: Servers_Not_Tested ≔ Servers
grd6: Servers_Not_Tested ≠ ∅
act3: server :∈ Servers_Not_Tested
act3: Servers_Not_Tested ≔ Servers_Not_Tested ∖{server}
grd3: Servers_Not_Tested=∅
grd2: server ∈ Servers_Not_Tested
8. ISSN: 2088-8708
IJECE Vol. 7, No. 4, August 2017 : 2045 – 2053
2052
the kind of demonstrations that could interest a mathematician because the difficulty of modeling in event-B
is not the complexity of proof but demonstrations of consistency despite the huge number of events and
invariants, all events must preserve all the invariant. This mean that the problem is that the amount of proof
to prove is very big, in our case we have 21 invariants (9 in machine 0, 10 in the machine 1 and 2 for the
machine 2) and we have 10 events this mean that we have 210 proof to be done. Luckily there is a platform
to do the most of these proofs automatically, this framework is called Rodin. The Rodin platform is an IDE
based on Eclipse for Event- B which provides effective support for refinement and mathematical proof. The
platform is open source, contributes to the Eclipse platform and is more extensible with plugging very
effective (Atelier, ProB ...). In the Table 1 below the statistics of proofs done by Rodin:
Table 1. Proof Statistics
Elements Total Auto manual Reviewed Undischarged
Qosnegot 92 91 1 0 0
Context0 0 0 0 0 0
Context1 0 0 0 0 0
Context2 0 0 0 0 0
Machine0 38 38 0 0 0
Machine1 51 50 1 0 0
Machine2 3 3 0 0 0
6. CONCLUSION
we have developed the process of negotiation of QoS between objects in an ODP system, using the
trading function. We have proposed to introduce a dynamic trading assistant in the user's terminal to help,
firstly, to choose the best service provider and, secondly, to dynamically negotiate the quality parameters of
service (QoS) responsive to the user's requirements and application. The model we have developed is based
on the formal method Event-B. The interest of the Event-B in our study lies in its modeling to formally
express properties validated by evidence during the design of system models, but also in its refinement
principle to master the complexity of the system by progressive and safe development. For future works, we
are working on specifying formally aircraft landing process; we also will develop a model of an abstract
complex adaptive system.
REFERENCES
[1] Y. Balouki AND Al, ―Using Event B to Specify QoS in ODP Enterprise Language‖, Collaborative Networks for a
Sustainable World, IFIP Series Advances in Information and Communication Technology, Vol. 336, pp. 478-485,
Springer, 2010.
[2] Cristophe Métayer et Laurent Voisin, ―The Event-B Mathematical Language‖, Mars 26 2009.
[3] Biggs, N, ―Discrete Mathematics‖M Second Edition. New Delhi: Oxford University Press, ISBN-10:
0198507178, 2003.
[4] R. W. Butler, ―What is Formal Methods?‖, Retrieved 2006-11-16, 2001-08-06.
[5] Jean-Raymond Abrial, ―The B Tool (Abstract)‖, (PDF), In Robin E. Bloomfield and Lynn S. Marshall and Roger
B. Jones. VDM — The Way Ahead, Proc. 2nd VDM-Europe Symposium. Lecture Notes in Computer Science.
328. Springer. pp. 86–87. ISBN 3-540-50214-9. 1988.
[6] Jean-Raymond Abrial, ―Modeling in Event-B: System and Software Design‖, Cambridge University Press, 2008.
[7] Michael Jastram (Editor) Foreword by Prof. Michael Butler, ―Rodin User's Handbook‖ , Covers Rodin v.2.8.
[8] Thai Son Hoang, Hironobu Kuruma, David Basin, Jean-Raymond Abrial, ― Developing Topology Discovery in
Event-B‖, 2009.
[9] Helia Pouyllau, Richard Douville, ―End-to-end QoS negotiation in network federations‖, ICT ETICS project, Grant
agreement, FP7-248567 Contract Number: INFSO-ICT-248567, 2010.
[10] P. Cremonese , S.Giordano, ―An example of dynamic QoS negotiation‖, Finsiel S.p.A via Matteucci 34 Pisa Italy.
[11] Augustin WAYAWO, ―The Transmission Multicast and The Control of QoS for IPV6 Using the Insfrastructure
MPLS‖, International Journal of Information and Network Security (IJINS), Vol 1 No 1, pages 9-27. 2012.
[12] Liu Hui, ―A Novel QoS Routing Algorithm in Wireless Mesh Networks‖, TELKOMNIKA Indonesian Journal of
Electrical Engineering, Vol 11 No 3, pages 1652-1664. 2013.
[13] Dac-Nhuong Le, ―PSO and ACO Algorithms Applied to Optimization Resource Allocation to Support QoS
Requirements in NGN‖, International Journal of Information and Network Security (IJINS), Vol 2 No 3, pages
216-228. 2013.
[14] Naji Hasan.A.H, Gao Shu, AL-Gabri Malek and Jiang Zi-Long, ―An Optimal Semantic NetworkBased Approach
for Web Service Composition with QoS‖, TELKOMNIKA Indonesian Journal of Electrical Engineering, Vol 11
No 8, pages 4505-4511. 2013.
9. IJECE ISSN: 2088-8708
Formal Specification of QoS Negotiation in ODP System (Abdessamad Jarrar)
2053
[15] UIT-T, ―Série X: Réseaux Pour Données Etcommunication Entre Systèmes Ouverts, Technologies de l'information
– Qualité de service – Guide pour les méthodes et les mécanismes Recommandation‖, X642 09/1998.
BIOGRAPHIES OF AUTHORS
Abdessamad Jarrar is a PhD candidate at IIMCS Laboratory which stands for Informatics, Imaging
and Modeling of Complex Systems in Faculty of Sciences and Technologies Hassan 1st University,
Settat, Morocco, his research interests center around modeling of complex systems using formal
methods, he is currently in his second year of his PhD. his currect research focus on modeling an abstract
complex adaptive system, in addition, he is working on a method to solve the problem of infinte cycles
in complex systems.
Youssef Balouki is currently a professor of computer and information science at the Faculty of Sciences
and Technologies, Hassan Ist University, Settat, Morocco. He holds a PhD in Computer Science (2010)
from MohammedV University, Rabat, Morocco and he graduated in Computer Science (1995) in Cadi
Ayyad University, Marrakech, Morocco where he got his Master’s degree in computer Science.
According to Google Scholar, DBLP digital library (as at May 2016) he has several publications which
have been cited quite a few times. Finally, his main research interests lie in the Databases, Distributed &
Parallel Computing and Scientific Computing.
Gadi Taoufiq is a Professor on computer science at the faculty of science and technologies (Hassan
First University of Settat Morocco). Since 2014, he is the Director of the Informatics, Imaging and
Modeling of Complex Systems Laboratory. He has conducted more than tens PhD theses and written a
fifty of scientific papers in the domain of 3D models analysis, models Driving Architecture, Datamining
and Database Analysis, Modeling of Complex Systems. He is recipient of the best paper awards at the
IMP Session of IEEE CIST’ 2016.