IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
AN ARCHITECTURE FOR WEB SERVICE SIMILARITY EVALUATION BASED ON THEIR FUNCTION...ijwscjournal
By increasing popularity of SOC, using Web services in applications has increased too. SOC creates a loosely coupled environment in which the actual execution environment might differ significantly from the one with the presupposed conditions during application design. Therefore, although an appropriate Web service might have been selected, by passing time, the Web service may not be efficient enough or may not be applicable under specific conditions.
For service-oriented systems to be flexible and self-adaptive, it is necessary to automatically select and use a similar service instead of the one which causes the above mentioned problems. Finding a similar service means specifying the proper services which fulfill the same requirements as those fulfilled by the problematic service.
In most of the previous works, a number of the best services (k) are selected and ordered based on functional similarity. The user must select one of these services based on his/her preferences. One important metric in selecting a similar service is considering QoS properties and user preferences about QoS. Because of the importance of this issue, in the present paper, an architecture is proposed in which, in addition to functional similarity, QoS properties and user preferences are also considered in selecting a similar service.
CLUSTERING-BASED SERVICE SELECTION FOR DYNAMIC SERVICE COMPOSITIONIJwest
The increase in the number of available web services led to the increase in the similarity of services functionality offered by different providers each with different QoS parameters. Therefore, in web service composition, the selection of the optimal service to satisfy the QoS values required by user is one of the significant requirements. Moreover, the dynamic nature of web services adds more challenges to obtain the accuracy of the selection process. Most of the existing service composition approaches deal with services changes during composition execution, causing a re-planning or re-selection that affecst the service composition performance. In this paper, we introduce the clustering-based service selection model that outperforms the existing ones. The proposed model has the ability to detect and recover the changes in service repository by monitoring the composition process from a global point of view. The approach is a two-levels-based web service clustering. The proposed model encompasses a clustering process, a planning process, a selection process and a recovery process.
QOS Aware Formalized Model for Semantic Web Service SelectionIJwest
Selecting the most relevant Web Service according to a client requirement is an onerous task, as innumerous number of functionally same Web Services(WS) are listed in UDDI registry. WS are functionally same but their Quality and performance varies as per service providers. A web Service Selection Process involves two major points: Recommending the pertinent Web Service and avoiding unjustifiable web service. The deficiency in keyword based searching is that it doesn’t handle the client request accurately as keyword may have ambiguous meaning on different scenarios. UDDI and search engines all are based on keyword search, which are lagging behind on pertinent Web service selection. So the search mechanism must be incorporated with the Semantic behavior of Web Services. In order to strengthen this approach, the proposed model is incorporated with Quality of Services (QoS) based Ranking of semantic web services.
This paper focuses on various concepts of Quality of Service associated with web services. Various QoS parameters like performance, availability, reliability and stability etc. are formalized in order to enhance the pertinence of web service selection. A QoS mediator agent based Web Service Selection Model is proposed where QoS Consultant acts as a Mediator Agent between clients and service providers. Model suggests user’s preferences on QoS parameter selection. The proposed model helps to select pertinent Web Service as per user’s requirement and reduce the human effort.. Further process of adding ontology with semantic web services is also illustrated here.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDYcscpconf
Web service composition development is a complex and dynamic process. It is one of the challenges in distributed dynamic environments. Although, SOA (Service Oriented Architecture) facilitates service composition process through standard protocols in searching and binding with web services. Yet composition in SOA paradigm faces many challenges. One of the main challenges is the environment in which composition services are developed. Nowadays the environment becomes more dynamic due to the increase in the number of web services that are frequently changing. Therefore, the need for self-adapted composition methods that acts according to environment changes is advocated. In this paper, we will study the existe researches that address the web service composition in a dynamic environment to state the art in this area and assist future research.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
AN ARCHITECTURE FOR WEB SERVICE SIMILARITY EVALUATION BASED ON THEIR FUNCTION...ijwscjournal
By increasing popularity of SOC, using Web services in applications has increased too. SOC creates a loosely coupled environment in which the actual execution environment might differ significantly from the one with the presupposed conditions during application design. Therefore, although an appropriate Web service might have been selected, by passing time, the Web service may not be efficient enough or may not be applicable under specific conditions.
For service-oriented systems to be flexible and self-adaptive, it is necessary to automatically select and use a similar service instead of the one which causes the above mentioned problems. Finding a similar service means specifying the proper services which fulfill the same requirements as those fulfilled by the problematic service.
In most of the previous works, a number of the best services (k) are selected and ordered based on functional similarity. The user must select one of these services based on his/her preferences. One important metric in selecting a similar service is considering QoS properties and user preferences about QoS. Because of the importance of this issue, in the present paper, an architecture is proposed in which, in addition to functional similarity, QoS properties and user preferences are also considered in selecting a similar service.
CLUSTERING-BASED SERVICE SELECTION FOR DYNAMIC SERVICE COMPOSITIONIJwest
The increase in the number of available web services led to the increase in the similarity of services functionality offered by different providers each with different QoS parameters. Therefore, in web service composition, the selection of the optimal service to satisfy the QoS values required by user is one of the significant requirements. Moreover, the dynamic nature of web services adds more challenges to obtain the accuracy of the selection process. Most of the existing service composition approaches deal with services changes during composition execution, causing a re-planning or re-selection that affecst the service composition performance. In this paper, we introduce the clustering-based service selection model that outperforms the existing ones. The proposed model has the ability to detect and recover the changes in service repository by monitoring the composition process from a global point of view. The approach is a two-levels-based web service clustering. The proposed model encompasses a clustering process, a planning process, a selection process and a recovery process.
QOS Aware Formalized Model for Semantic Web Service SelectionIJwest
Selecting the most relevant Web Service according to a client requirement is an onerous task, as innumerous number of functionally same Web Services(WS) are listed in UDDI registry. WS are functionally same but their Quality and performance varies as per service providers. A web Service Selection Process involves two major points: Recommending the pertinent Web Service and avoiding unjustifiable web service. The deficiency in keyword based searching is that it doesn’t handle the client request accurately as keyword may have ambiguous meaning on different scenarios. UDDI and search engines all are based on keyword search, which are lagging behind on pertinent Web service selection. So the search mechanism must be incorporated with the Semantic behavior of Web Services. In order to strengthen this approach, the proposed model is incorporated with Quality of Services (QoS) based Ranking of semantic web services.
This paper focuses on various concepts of Quality of Service associated with web services. Various QoS parameters like performance, availability, reliability and stability etc. are formalized in order to enhance the pertinence of web service selection. A QoS mediator agent based Web Service Selection Model is proposed where QoS Consultant acts as a Mediator Agent between clients and service providers. Model suggests user’s preferences on QoS parameter selection. The proposed model helps to select pertinent Web Service as per user’s requirement and reduce the human effort.. Further process of adding ontology with semantic web services is also illustrated here.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE COMPOSITION IN DYNAMIC ENVIRONMENT: A COMPARATIVE STUDYcscpconf
Web service composition development is a complex and dynamic process. It is one of the challenges in distributed dynamic environments. Although, SOA (Service Oriented Architecture) facilitates service composition process through standard protocols in searching and binding with web services. Yet composition in SOA paradigm faces many challenges. One of the main challenges is the environment in which composition services are developed. Nowadays the environment becomes more dynamic due to the increase in the number of web services that are frequently changing. Therefore, the need for self-adapted composition methods that acts according to environment changes is advocated. In this paper, we will study the existe researches that address the web service composition in a dynamic environment to state the art in this area and assist future research.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
Testing of web services Based on Ontology Management ServiceIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...ijwscjournal
Service Oriented Architecture facilitates automatic execution and composition of web services in
distributed environment. This service composition in the heterogeneous environment may suffer from
various kinds of service failures. These failures interrupt the execution of composite web services and
lead towards complete system failure. The dynamic recovery decisions of the failed services are
dependent on non-functional attributes of the services. In the recent years, various methodologies
have been presented to provide recovery decisions based on time related QoS (Quality of Service)
factors. These QoS attributes can be categorized further. Our paper categorized these attributes as
space and time. In this paper, we have proposed an affinity model to quantify the location affinity for
composition of web services. Furthermore, we have also suggested a replication mechanism and
algorithm for taking recovery decisions based on time and space based QoS parameters and usage
pattern of the services by the user.
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in
business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade.
Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in
safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It
checks user requirements change continuously and dynamically adopts architecture model. Also it checks
providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection
adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit.
Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result
an optimised decision. Finally we illustrated that using of it has a good performance for web service based
applications.
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYijwscjournal
Web services are playing dominant role on Internet for e-business. The compositions of these services are used to meet business objectives. The web service choreography describes the external observable behavior
of these compositions. Many compositions may available for same functionality. These compositions cannot be distinguished on the basis of functional properties. This Quality of services (QoS) may help the user to select web services and to analyze composition of the web services. Web service choreography is going to dictate implementation of workflow. This workflow consists of several tasks. Each task is implemented by web services. These services are hosted in large numbers by different service providers on different service clusters. The mapping of service and task is difficult issue in run time environment. The interoperability between services is also a great problem. The selection of services is very big issue. In this paper we have proposed a bio-inspired selection algorithm based on dominant role and proposed a discovery infrastructure. We have also used the client behavior to improve the failure of the composition of the service.
A review on framework and quality of service based web services discoveryMustafa Algaet
In consequence these services are nowadays accessible to the final clients. In the last few years, more
and more Web Services providing the same functionalities are available in the environment. In order to
select the best service adapted to client’s requests, we need some method capable to evaluate and
compare different services providing the same functionalities. In this context, Quality of service can be defined as the capability to respond to the requirements (constraints) of a client and to fulfill these
needs with the best criteria (preferences) established by the client. It is calculated based on the non-
functional properties of the service. This paper provides an overview of a research progress in Quality
of Service Based Web Services Discovery; it also highlights the issues that need to be investigated in
Quality of Service Based Web Services
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
In service oriented computing, services are the basic construct that aims to facilitate building of business application in a more flexible and interoperable manner for enterprise collaboration. To satisfy the needs of clients and to adapt to changing needs, service composition is performed in order to compose the various capabilities of available services. With the proliferation of services offering similar functionalities around the web, the task of service selection for service composition is complicated. It is vital to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or quality of service (QoS). Therefore, the process of service selection is complicated due to divergent view of service consumers and service providers on the quality of services. The objective of this paper presents the exploration of various techniques of Quality of Service based Service Selection (QSS) approach in the literature. To evaluate the service selection process, a number of criteria for QSS approach have been identified and presented in this paper.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
In cloud environment, many functionally similar cloud services are available. But, the ser- vices differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
Semantic Web: A Study on Web Service Composition Approachesijtsrd
A Web service is a collection of open protocols and standards used for exchanging data between applications and systems. Web Service discovery, selection and composition are the important tasks of the any automated business processes. In a web service composition set of web services are collectively executed to achieve the objectives. This study reveals the existing approaches used for web service composition in both syntactic and semantic environments. We have reviewed more than 40 articles in this domain and concluded with merits and demerits of the methodologies applied for the implementation of the web service composition. Michael Raj TF, | Siva Prakasam. P"Semantic Web: A Study on Web Service Composition Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd115.pdf http://www.ijtsrd.com/computer-science/world-wide-web/115/semantic-web-a-study-on-web-service-composition-approaches/michael-raj-tf-
Service selection in service oriented architecture using probabilistic approa...IJECEIAES
In service Oriented Architecture, many services are offered with similar functionality but with different service quality parameters. Thus the service selection using a deterministic approach causes conflicts and inefficient results. We use asynchronous queue to model the service inventory architecture avoiding unnecessary locking of resources and thus allowing a provision to consumers to get their required services without intervening and with temporally decoupled fashion. Actually this kind of service selection strategy is considered in regards with game theory to eliminate fluctuations of queue length. It offers a discrete random service which is equal to some request requested by consumers, it means service can be provided based on probability mass function as a substitute of deterministic decisions for selecting a proper service provider as of the consumers. Once the request is taken out from the queue, it is delivered to the interceptor that has validation and sanitization module. It thus reduces the peak queue length and reduces periodic fluctuations in the queue length.
Secure Spatial Top-k Query Processing via Untrusted Location- Based Service P...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Computational Dynamic Trust Model for User Authorization1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
User-Defined Privacy Grid System for Continuous Location-Based Services1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Software Puzzle: A Countermeasure to Resource-Inflated Denial- of-Service Att...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Designing High Performance Web-Based Computing Services to Promote Telemedici...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Secure Distributed Deduplication Systems with Improved Reliability1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Testing of web services Based on Ontology Management ServiceIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...ijwscjournal
Service Oriented Architecture facilitates automatic execution and composition of web services in
distributed environment. This service composition in the heterogeneous environment may suffer from
various kinds of service failures. These failures interrupt the execution of composite web services and
lead towards complete system failure. The dynamic recovery decisions of the failed services are
dependent on non-functional attributes of the services. In the recent years, various methodologies
have been presented to provide recovery decisions based on time related QoS (Quality of Service)
factors. These QoS attributes can be categorized further. Our paper categorized these attributes as
space and time. In this paper, we have proposed an affinity model to quantify the location affinity for
composition of web services. Furthermore, we have also suggested a replication mechanism and
algorithm for taking recovery decisions based on time and space based QoS parameters and usage
pattern of the services by the user.
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in
business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade.
Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in
safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It
checks user requirements change continuously and dynamically adopts architecture model. Also it checks
providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection
adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit.
Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result
an optimised decision. Finally we illustrated that using of it has a good performance for web service based
applications.
SERVICE SELECTION BASED ON DOMINANT ROLE OF THE CHOREOGRAPHYijwscjournal
Web services are playing dominant role on Internet for e-business. The compositions of these services are used to meet business objectives. The web service choreography describes the external observable behavior
of these compositions. Many compositions may available for same functionality. These compositions cannot be distinguished on the basis of functional properties. This Quality of services (QoS) may help the user to select web services and to analyze composition of the web services. Web service choreography is going to dictate implementation of workflow. This workflow consists of several tasks. Each task is implemented by web services. These services are hosted in large numbers by different service providers on different service clusters. The mapping of service and task is difficult issue in run time environment. The interoperability between services is also a great problem. The selection of services is very big issue. In this paper we have proposed a bio-inspired selection algorithm based on dominant role and proposed a discovery infrastructure. We have also used the client behavior to improve the failure of the composition of the service.
A review on framework and quality of service based web services discoveryMustafa Algaet
In consequence these services are nowadays accessible to the final clients. In the last few years, more
and more Web Services providing the same functionalities are available in the environment. In order to
select the best service adapted to client’s requests, we need some method capable to evaluate and
compare different services providing the same functionalities. In this context, Quality of service can be defined as the capability to respond to the requirements (constraints) of a client and to fulfill these
needs with the best criteria (preferences) established by the client. It is calculated based on the non-
functional properties of the service. This paper provides an overview of a research progress in Quality
of Service Based Web Services Discovery; it also highlights the issues that need to be investigated in
Quality of Service Based Web Services
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
In service oriented computing, services are the basic construct that aims to facilitate building of business application in a more flexible and interoperable manner for enterprise collaboration. To satisfy the needs of clients and to adapt to changing needs, service composition is performed in order to compose the various capabilities of available services. With the proliferation of services offering similar functionalities around the web, the task of service selection for service composition is complicated. It is vital to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or quality of service (QoS). Therefore, the process of service selection is complicated due to divergent view of service consumers and service providers on the quality of services. The objective of this paper presents the exploration of various techniques of Quality of Service based Service Selection (QSS) approach in the literature. To evaluate the service selection process, a number of criteria for QSS approach have been identified and presented in this paper.
Service-oriented computing is meant to support loose relationships between organizations; Serviceoriented
architectures often have the goal to integrate various distributed services of one or more
organizations in a flexible way to be able to quickly react on business changes.
Distributed services provided a new way of distributed computing that achieve the interoperability between
heterogonous application through platform and language independent interfaces. The creation of value
added services by composition of existing ones is gaining a significant momentum. Distributed service
composition is meant to support loose relationships between implemented services in order to provide new
functions. A composite service is the one resulting from the integration, coordination and synchronization
of different service components. In this paper, we generated A Services Composition Model (SCM) that
provides a general solution for the services composition problem by realizing the requirements of a new
service using the requirements of the already existing service. We explained in details all the steps of the
composition process; services registration, services discovery, services selection, services invoking, and
services integration. Although the SCM is not bounded to one particular algorithm to compose services, we
generated an application as an example to test our Service Composition Model.
We also generated the Services Composition Language (SCL) as a simple text-based language which
allows the user to express the requirements of his request, the inserted request will then be analyzed using
our Parsing Algorithm to determine the name of the requested services, after that our Service Composition
Algorithm will execute all the steps of the composition process and return the result of the composition to
the user.
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
In cloud environment, many functionally similar cloud services are available. But, the ser- vices differ in Quality of Service (QoS) levels, offered by them. There is a diversity in user requirements about the expected qualities of cloud services. Trust is a measure to understand whether a cloud service can adequately meet the user requirements. Consequently, trust assessment plays a significant role in selecting the suitable cloud service. This paper proposes preferences based customized trust model (PBCTM) for trust assessment of cloud services. PBCTM takes into account user requirements about the expected quality of services in the form of preferences. Accordingly, it performs customized trust assessment based on the evidences of various attributes of cloud service. PBCTM enables elastic trust computation, which is responsive to dynamically changing user preferences with time. The model facilitates dynamic trust based periodic selection of cloud services according to varying user preferences. Experimental results demonstrate that the proposed preferences based customized trust model outperforms the other model in respect of accuracy and degree of satisfaction.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
Semantic Web: A Study on Web Service Composition Approachesijtsrd
A Web service is a collection of open protocols and standards used for exchanging data between applications and systems. Web Service discovery, selection and composition are the important tasks of the any automated business processes. In a web service composition set of web services are collectively executed to achieve the objectives. This study reveals the existing approaches used for web service composition in both syntactic and semantic environments. We have reviewed more than 40 articles in this domain and concluded with merits and demerits of the methodologies applied for the implementation of the web service composition. Michael Raj TF, | Siva Prakasam. P"Semantic Web: A Study on Web Service Composition Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd115.pdf http://www.ijtsrd.com/computer-science/world-wide-web/115/semantic-web-a-study-on-web-service-composition-approaches/michael-raj-tf-
Service selection in service oriented architecture using probabilistic approa...IJECEIAES
In service Oriented Architecture, many services are offered with similar functionality but with different service quality parameters. Thus the service selection using a deterministic approach causes conflicts and inefficient results. We use asynchronous queue to model the service inventory architecture avoiding unnecessary locking of resources and thus allowing a provision to consumers to get their required services without intervening and with temporally decoupled fashion. Actually this kind of service selection strategy is considered in regards with game theory to eliminate fluctuations of queue length. It offers a discrete random service which is equal to some request requested by consumers, it means service can be provided based on probability mass function as a substitute of deterministic decisions for selecting a proper service provider as of the consumers. Once the request is taken out from the queue, it is delivered to the interceptor that has validation and sanitization module. It thus reduces the peak queue length and reduces periodic fluctuations in the queue length.
Secure Spatial Top-k Query Processing via Untrusted Location- Based Service P...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Computational Dynamic Trust Model for User Authorization1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
User-Defined Privacy Grid System for Continuous Location-Based Services1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Software Puzzle: A Countermeasure to Resource-Inflated Denial- of-Service Att...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Designing High Performance Web-Based Computing Services to Promote Telemedici...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Secure Distributed Deduplication Systems with Improved Reliability1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Improved Privacy-Preserving P2P Multimedia Distribution Based on Recombined F...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Contributory Broadcast Encryption with Efficient Encryption and Short Ciphert...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Framework for Secure Computations with Two Non-Colluding Servers and Multip...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Cost-Effective Authentic and Anonymous Data Sharing with Forward Security1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multih...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Effective Key Management in Dynamic Wireless Sensor Networks1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Secure Data Aggregation Technique for Wireless Sensor Networks in the Presenc...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
A Proximity-Aware Interest-Clustered P2P File Sharing System 1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
AN ARCHITECTURE FOR WEB SERVICE SIMILARITY EVALUATION BASED ON THEIR FUNCTION...ijwscjournal
By increasing popularity of SOC, using Web services in applications has increased too. SOC creates a loosely coupled environment in which the actual execution environment might differ significantly from the one with the presupposed conditions during application design. Therefore, although an appropriate Web service might have been selected, by passing time, the Web service may not be efficient enough or may not be applicable under specific conditions.
For service-oriented systems to be flexible and self-adaptive, it is necessary to automatically select and use a similar service instead of the one which causes the above mentioned problems. Finding a similar service means specifying the proper services which fulfill the same requirements as those fulfilled by the problematic service.
In most of the previous works, a number of the best services (k) are selected and ordered based on functional similarity. The user must select one of these services based on his/her preferences. One important metric in selecting a similar service is considering QoS properties and user preferences about QoS. Because of the importance of this issue, in the present paper, an architecture is proposed in which, in addition to functional similarity, QoS properties and user preferences are also considered in selecting a similar service.
AN ARCHITECTURE FOR WEB SERVICE SIMILARITY EVALUATION BASED ON THEIR FUNCTION...ijwscjournal
By increasing popularity of SOC, using Web services in applications has increased too. SOC creates a loosely coupled environment in which the actual execution environment might differ significantly from the one with the presupposed conditions during application design. Therefore, although an appropriate Web service might have been selected, by passing time, the Web service may not be efficient enough or may not be applicable under specific conditions.
For service-oriented systems to be flexible and self-adaptive, it is necessary to automatically select and use a similar service instead of the one which causes the above mentioned problems. Finding a similar service means specifying the proper services which fulfill the same requirements as those fulfilled by the problematic service.
In most of the previous works, a number of the best services (k) are selected and ordered based on functional similarity. The user must select one of these services based on his/her preferences. One important metric in selecting a similar service is considering QoS properties and user preferences about QoS. Because of the importance of this issue, in the present paper, an architecture is proposed in which, in addition to functional similarity, QoS properties and user preferences are also considered in selecting a similar service.
An effective method for clustering-based web service recommendationIJECEIAES
Normally web services are classified by the quality of services; however, the term quality is not absolute and defined relatively. The quality of web services is measured or derived using various parameters like reliability, scalability, flexibility, and availability. The limitation of the methods employing these parameters is that sometimes they are producing similar web services in recommendation lists. To address this research problem, the novel improved clustering-based web service recommendation method is proposed in this paper. This approach is mainly dealing with producing diversity in the results of web service recommendations. In this method, functional interest, quality of service (QoS) preference, and diversity features are combined to produce a unique recommendation list of web services to end-users. To produce the unique recommendation results, we propose a varied web service classification order that is clustering-based on web services’ functional relevance such as non-useful pertinence, recorded client intrigue importance, and potential client intrigue significance. Additionally, to further improve the performance of this approach, we designed web service graph construction, an algorithm of various widths clustering. This approach serves to enhance the exceptional quality, that is, the accuracy of web service recommendation outcomes. The performance of this method was implemented and evaluated against existing systems for precision, and f-score performance metrics, using the research datasets.
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Informationchennaijp
We are good IEEE java projects development center in Chennai and Pondicherry. We guided advanced java technologies projects of cloud computing, data mining, Secure Computing, Networking, Parallel & Distributed Systems, Mobile Computing and Service Computing (Web Service).
For More Details:
http://jpinfotech.org/final-year-ieee-projects/2014-ieee-projects/java-projects/
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...IJwest
Service-oriented computing (SOC) is an interdisciplinary paradigm that revolutionizes the very fabric of
distributed software development applications that adopt service-oriented architectures (SOA) can evolve
during their lifespan and adapt to changing or unpredictable environments more easily. SOA is built
around the concept of Web Services. Although the Web services constitute a revolution in Word Wide Web,
they are always regarded as non-autonomous entities and can be exploited only after their discovery. With
the help of software agents, Web services are becoming more efficient and more dynamic.
The topic of this paper is the development of an agent based approach for Web services discovery and
selection in witch, OWL-S is used to describe Web services, QoS and service customer request. We develop
an efficient semantic service matching which takes into account concepts properties to match concepts in
Web service and service customer request descriptions. Our approach is based on an architecture
composed of four layers: Web service and Request description layer, Functional match layer, QoS
computing layer and Reputation computing layer.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their
functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcscpconf
In today’s scenario, most of the organizations provide the services through the web. This makes the web service an important research area. In addition, early design and building web services, it is necessary to concentrate on the quality of web services. Performance is an important quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system. Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services
User-Rating Based QoS Aware Approach for Selection of Updated Web Services to...IDES Editor
The concept of dynamic composition of Web services
has been given major importance in the recent years. While
there are many systems available to select the services with
the highest QoS score, very little thought has been given to
the fact of constructing a model which takes in the user’s
rating of a service as a major input for selection. A robust
system for fetching the most updated version of the selected
services and selection of the services based on users’ ratings
of the QoS values rather than on the actual QoS values has
been presented in our paper.
USER-CENTRIC OPTIMIZATION FOR CONSTRAINT WEB SERVICE COMPOSITION USING A FUZZ...ijwscjournal
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound value-added service. Since, there may be a number of compositions to create the requested service, it is important to find one which its properties are close to user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem. Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of web service composition easier and more efficient.
USER-CENTRIC OPTIMIZATION FOR CONSTRAINT WEB SERVICE COMPOSITION USING A FUZZ...ijwscjournal
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound value-added service. Since, there may be a number of compositions to create the requested service, it is important to find one which its properties are close to user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem. Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of web service composition easier and more efficient.
User-Centric Optimization for Constraint Web Service Composition using a Fuzz...ijwscjournal
ABSTRACT
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed
environments. In such systems, however each service responds the user request independently, it is
essential to compose them for delivering a compound value-added service. Since, there may be a number of
compositions to create the requested service, it is important to find one which its properties are close to
user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or
response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on
quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem.
Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of
web service composition easier and more efficient.
Similar to Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation (20)
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
2. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
2 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
optimize the accuracy and time efficiency of QoS predic-
tion, there is still room for improvement.
Previous CF-based Web service recommendation
methods have rarely taken into account the peculiar char-
acteristics of Web service QoS when making QoS predic-
tions. QoS attributes of Web services such as response
time and throughput highly depend on the underlying
network conditions, which, however, are usually ignored
by the previous work. In this study, we explored several
influential factors of Web service QoS (such as user loca-
tion, service location and QoS variation) and incorporate
them into our QoS prediction method. Extended from its
preliminary conference version [10], the contribution of
this paper is three-fold:
We proposed an enhanced measurement for compu-
ting QoS similarity between different users and be-
tween different services. The measurement takes into
account the personalized deviation of Web services’
QoS and users’ QoS experiences, in order to improve
the accuracy of similarity computation.
Based on the above enhanced similarity measurement,
we proposed a location-aware CF-based Web service
QoS prediction method for service recommendation.
We conducted a set of comprehensive experiments
employing a real-world Web service dataset, which
demonstrated that the proposed Web service QoS
prediction method significantly outperforms previous
well-known methods.
The remainder of this paper is organized as follows.
Section 2 discusses the background and related work of
service recommendation. Section 3 presents the motiva-
tion of this work. Section 4 gives an overview of our loca-
tion-aware Web service recommendation method. Section
5 discusses location information representation, acquisi-
tion, and processing. Section 6 introduces similarity com-
putation and similar neighbor selection. Section 7 de-
scribes both QoS prediction and Web service recommen-
dation. Section 8 presents the experimental results and
Section 9 concludes the paper.
2 RELATED WORK
Collaborative filtering is one of the most popular recom-
mendation techniques, which has been widely used in
many recommender systems. In this section, we give a
brief survey of CF algorithms, and summarize recent
work on CF-based Web service recommendation.
2.1 Collaborative Filtering (CF)
Collaborative filtering is a method of making automatic
predictions (filtering) about the interests of a user by col-
lecting preferences or taste information from many users
(collaborating) [11]. Formally, a CF domain consists of a
set of users U, a set of items I, and users’ ratings on items.
The last is often represented by a user-item matrix R,
where each entry r(x,y) ( Ux , Iy ) represents user x’s
rating on item y. The rating r(x,y) is empty if user x has
not yet rated item y. Because the number of items that are
collected and rated by a user is usually very small, the
user-item matrix R is likely to be very sparse. Under this
formulation, the task of CF is to predict the values for
specific empty entries (i.e., predict a user’s rating for an
item). Table 1 is a simple example of a user-rating matrix,
where predictions are computed for missing ratings.
CF techniques can be generally decomposed into two
categories: model-based and memory-based [12],[13].
Memory-based CF is also named neighborhood-based CF.
Depending on whether user neighborhood or item neigh-
borhood is considered, neighborhood-based CF can fur-
ther be classified into user-based [14],[15],[16] and item-
based [17],[18],[19]. In user-based CF, a subset of appro-
priate users is chosen as neighbors based on their similar-
ities to the active user. Then, a weighted aggregate of
their ratings is used to generate predictions for the target
user. In item-based CF, a subset of appropriate items is
chosen as neighbors based on their similarities to the tar-
get item. Then, a weighted aggregate of the target user’s
ratings on those items is used to generate predictions for
the target user. Pearson Correlations and Cosine Similari-
ty are two fundamental methods for measuring the simi-
larity between users or items. Their basic idea is that, two
users are similar if they have similar ratings on their
commonly rated items.
TABLE 1
A TOY EXAMPLE OF USER-ITEM MATRIX
User 1 User 2 User 3 User 4 User 5
Item 1 3 5 5 4 4
Item 2 - 4 4 - -
Item 3 - - 4 - 2
Many efforts have been made in recent years to im-
prove the CF technique. McLaughlin and Herlocker [20]
improved the user similarity computation by modifying
the conventional Pearson’s Correlation Coefficient (PCC).
They adjusted PCC by multiplying it with a weight which
is dependent on the number of item ratings in common
between the concerned users. The more the item ratings
in common, the larger the weight would be. Liu et al. [21]
explored the personalized influence of items when meas-
uring the user similarity based on their commonly rated
items. They argued that items with more users (i.e., more
popular items) should have more effects on the user simi-
larity than those with fewer users (i.e., less popular items).
Their argumentation is based on the observation that, two
users co-selecting a popular item (e.g., film) is less mean-
ingful than co-selecting an unpopular item regarding
whether they share common tastes. Adomavicius and
Tuzhilin [22] incorporated additional contextual infor-
mation (such as time and location) into recommender
systems. For example, using the temporal context, a travel
recommender system would provide a vacation recom-
mendation in winter very different from the one provided
in summer. They demonstrated that incorporating contex-
tual information in essence would improve both the effec-
tiveness and the efficiency of a recommender system.
2.2 Web Service Recommendation
Various recommendation techniques have recently been
applied to Web service recommendation, such as the con-
tent-based [23],[24], link prediction-based [25],[26], and
3. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 3
CF-based [7],[8],[9].CF has attracted the most attention for
its simplicity and effectiveness. Shao et al. [7] proposed a
user-based CF method for QoS-aware Web service rec-
ommendation. Zheng et al. [8], [9] combined both user-
based and item-based CF algorithm to predict Web ser-
vice QoS values. Their argued that, for every pair of ac-
tive user and target Web service, both the QoS experience
of the users similar to the active user and the QoS values
of the services similar to the target service can be em-
ployed for QoS prediction. However, these previous ap-
proaches failed to exploit the characteristics of QoS in the
similarity computation.
Based on the traditional CF approaches, several en-
hanced methods have been proposed to improve the pre-
diction accuracy. Wu et al. [27] proposed an improved CF
method by using data smoothing for the user-service QoS
matrix. Qiu et al. [28] incorporated users’ reputation into
CF for Web service QoS prediction and recommendation.
Chen et al. [29] recognized the influence of user location
in Web service QoS prediction and proposed a scalable
CF method. The method groups users into a set of regions
according to users’ IP addresses and QoS similarities.
When identifying similar users for a target user, instead
of searching the entire user set, the method searches the
region set. Thus, the time efficiency of QoS prediction is
improved. Measuring two users’ closeness by comparing
their IP addresses, however, may not be accurate. Moreo-
ver, Chen et al. did not take into account the Web service
location in the Web service QoS prediction.
Recently, Matrix Factorization (MF) has been success-
fully employed for accurate and scalable Web service QoS
prediction [30], [31], [32]. However, these model-based CF
methods may have difficulties in handling dynamics of
the user-service interaction matrix. When new interac-
tions between users and services occur, the MF model has
to be recomputed from scratch to perform QoS prediction.
Therefore, this work focuses on improving memory-
based CF by exploiting the characteristics of Web services
and service users.
3 MOTIVATION
Now we give a further explanation regarding the motiva-
tion of our work. Section 3.1 discusses why QoS variation
should be incorporated into user and service similarity
measurement. Section 3.2 discusses why location infor-
mation is helpful in improving QoS prediction.
3.1 Incorporating QoS Variation into User and
Service Similarity Measurement
Previous QoS prediction methods assume that the co-
invoked Web services have equal contribution weights
when computing similarity between two users. We argue
that the personalized characteristics (e.g., QoS variation)
of both Web services and users should be incorporated
into measuring the similarity among users and services.
Web service QoS factors, such as response time, avail-
ability and reliability, are usually user-dependent. From
different Web services, we can derive different personal-
ized characteristics, based on their QoS values, as per-
ceived by a variety of users. Some Web services may have
a very good QoS for all users. For example, the availabil-
ity is always 100%. This is probable if the Web services
are deployed in a high performance Cloud environment.
If the QoS is good enough (as in this instance), a small
variation of QoS values over all users is likely to be ob-
served. Some Web services may have a very poor QoS for
all users. For example, the availability is always below
50%. This is probable if the Web services are deployed in
a network environment with poor performance and
bandwidth. These Web services are also likely to have
small variation of QoS values over different users. Many
other Web services may have a relatively large variation
of QoS over different users. For example, the availability
varies from 50% to 100% for different users. These Web
services are considered to be user-sensitive. The following
example explains why Web services with different QoS
variations could contribute differently when computing
the similarity between service users.
Suppose user a and user b have both invoked Web ser-
vice 1 and 2, and they perceived similar QoS values on
them. Provided that the variation of QoS values of Web
service 1 among all users is very small (i.e., the QoS of
Web service 1 is almost the same to all users), similar per-
ceived QoS however does not indicate that User a and
User b are very similar. Therefore, the contribution of
Web service 1, to the degree of similarity between User a
and User b, is small. On the contrary, if Web service 2 is a
user-sensitive service, (i.e., the QoS of Web service 2 var-
ies from user to user), similar perceived QoS really indi-
cates that the two users are similar. Therefore, the contri-
bution of Web service 2 to the similarity between Users a
and b is larger than Web service 1.
Likewise, variations of service QoS perceived by ser-
vice users should also be taken into consideration when
computing the similarity between Web services. There
could be some service users locating in the hot spots of
Internet and with high bandwidth who are likely to ob-
serve good performance on most services, and there also
could be some service users locating in the less popular
spots of Internet and with low bandwidth who are likely
to observe poor performance on most services. These ser-
vice users are considered less service-sensitive, and there-
fore should contribute less to the service similarity com-
putation. The other users with more normal QoS varia-
tion should contribute more to the service similarity com-
putation.
3.2 Incorporating Locations of Users and Services
into Similar Neighbor Selection
Web services are deployed on the Internet. Thus, QoS of
Web services (such as response time, reliability and
throughput) is highly dependent on the performance of the
underlying network [33]. If the network between a target
user and a target Web service is of high performance, the
probability that the user will observe high QoS on the tar-
get service will increase. There are several factors affecting
the network performance between the target user and the
target service. The most important factors include network
distance and network bandwidth, which are highly rele-
4. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
4 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
vant to locations of the target user and the target service.
When the user and the service are located at different net-
works which are far away from each other on the Internet,
network performance is likely to be poor due to both the
Fig. 1. Influence of user location on QoS prediction
transfer delay and the limited bandwidth of links between
different networks. In contrast, when the user and the Web
service are located in the same network, the user is more
likely to observe high network performance. Therefore, the
locations of user and service are crucial factors affecting
QoS. Fig. 1 provides an example to illustrate why locations
of two users can be exploited to improve both the accuracy
and efficiency of QoS prediction. Similar examples can also
be found to illustrate why service location is also very im-
portant for QoS prediction. For the sake of conciseness, we
only focus on user location in this example.
Suppose Bob and Alice are two users located in different
networks that are far from each other (see Fig. 1). Each
observed similar QoS, such as response time and through-
put, on two Web services, e.g., Service 1 and Service 2 (The
two services might be deployed in some networks that
have similar performance to Alice and Bob). According to
conventional CF-based QoS prediction methods, the two
users are somewhat similar. Thus, they are likely to ob-
serve similar QoS on other Web services (e.g., Service 3).
However, provided Service 3 was deployed in the same
network as Bob, thus being close to Bob but far away from
Alice, it’s highly likely that the two users will observe quite
different QoS values on Service 3. This is in contradiction
with the expectation of conventional CF-based prediction
methods. Actually, Alice and Bob are not really similar, but
happen to have similar QoS experiences on a few Web ser-
vices. Conventional QoS prediction methods mishandle
this case. By taking locations of users into consideration,
we can avoid choosing inappropriate neighbors for the
target user, thus improving the accuracy of QoS prediction.
4 OVERVIEW OF OUR WEB SERVICE
RECOMMENDATION METHOD
We consider the following scenarios where an active user
is searching for high-quality Web services in a Web ser-
vice discovery system or the system is recommending
high-quality Web services to an active user. In these sce-
narios, predicting QoS values for Web services unknown
to the active user is firstly required; then, Web services
with satisfactory QoS can be identified and recommended
to the user. This work focuses on predicting QoS values of
Web services for recommendation. As shown in Figure 2,
our Web service recommendation method consists of the
following main ingredients:
Active user
User set
Web service set
User-Service
matrix
User location
information
handler
Service location
information
handler
Find similar
users
Find similar
services
User-based
QoS
prediction
Service-
based QoS
prediction
Recomm-
ender
Hybrid
QoS
prediction
Fig. 2. Overview of our Web service recommendation method
(1) User location information handler: This module obtains
location information of a user including the network
and the country according to the user’s IP address. It al-
so provides support for efficient user-querying based
on location.
(2) Service location information handler: This handler ac-
quires additional location information of Web services
according to either their URLs or IP addresses. The lo-
cation information includes the network and the coun-
try in which the Web service are located. It also pro-
vides functionalities for supporting efficient location-
based Web service query.
(3) Find similar users: This module finds users who are
similar to the active user by considering both the users’
QoS experiences and locations. For accurate user simi-
larity measurement and scalable similar user selection,
we propose a weighted user-based PCC via exploring
QoS variation of Web services and incorporate user
locations into similar user selection.
(4) Find similar services: In contrast to finding similar users,
this module finds similar Web services for a target
service, considering both QoS of Web services as well
as service locations. A weighted service-based PCC for
measuring similarity between services is proposed.
(5) User-based QoS prediction: After a certain number of
similar users are identified for the active user, this
function aggregates the QoS values they perceived on
target Web services, and predicts the missing QoS
values for the active user.
(6) Service-based QoS prediction: After a certain number of
similar services are identified for a target Web service,
this function aggregates their QoS values to predict
the missing QoS values for the active user.
(7) Hybrid QoS prediction: This function combines the user-
based QoS prediction and the service-based QoS pre-
diction results, making final QoS predictions. The
cold-start problem and data-sparsity problem in QoS
predictions are also addressed in this module (details
will be provided in Section 7.3).
(8) Recommender: After predicting missing QoS values for
all candidate Web services, this function recommends
Web services with optimal QoS to the active user.
Internet
Service 1 Service 2Service 3
Bob Alice
5. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 5
5 LOCATION INFORMATION REPRESENTATION,
ACQUISITION, AND PROCESSING
This section discusses how to represent, acquire, and pro-
cess location information of both Web services and ser-
vice users, which lays a necessary foundation for imple-
menting our location-aware Web service recommendation
method.
5.1 Location Representation
We represent a user’s location as a triple (IPu, ASNu,
CountryIDu), where IPu denotes the IP address of the user,
ASNu denotes the ID of the Autonomous System (AS)1
that IPu belongs to, and CountryIDu denotes the ID of the
country that IPu belongs to.
Typically, a country has many ASs and an AS is within
one country only. The Internet is composed of thousands
of ASs that inter-connected with each other. Generally
speaking, intra-AS traffic is much better than inter-AS
traffic regarding transmission performance, such as re-
sponse time [34]. Also, traffic between neighboring ASs is
better than that between distant ASs. Therefore, the Inter-
net AS-level topology has been widely used to measure
the distance between Internet users [34]. Note that users
located in the same AS are not always geographically
close, and vice versa. For example, two users located in
the same city may be within different ASs. Therefore,
even if two users are located in the same city, they may
look distant on the Internet if they are within different
ASs. This explains why we choose AS instead of other
geographic positions, such as latitude and longitude, to
represent a user’s location.
Similarly, we model a Web service’s location as (IPs,
ASNs, CountryIDs), where IPs denotes the IP address of the
server hosting the service, ASNs denotes the ID of the AS
that IPs belongs to, and CountryIDs denotes the ID of the
country that IPs belong to.
The above representation for locations of both users
and Web services enables us accurately and easily meas-
ure closeness between both users and Web services. We
will demonstrate this later in this section.
5.2 Location Information Acquisition
Acquiring the location information of both Web services
and service users can be easily done. Because the users’ IP
addresses are already known, to obtain full location in-
formation of a user, we only need to identify both the AS
and the country in which he is located according to his IP
address. A number of services and databases are available
for this purpose (e.g. the Whois lookup service2). In this
work, we accomplished the IP to AS mapping and IP to
country mapping using the GeoLite Autonomous System
Number Database3. The database is updated every month,
ensuring that neither the IP to AS mapping nor the IP to
country mapping will be out-of-date.
Acquiring the location information of Web services is
1 An autonomous system (AS) is either a single network or a group of
networks within the Internet that is controlled by a common network
administrator on behalf of a single administrative entity (such as a uni-
versity and a business enterprise). Each autonomous system has a global-
ly unique ID, named as autonomous system number (ASN).
2 http://www.whois.net
3 http://www.maxmind.com
similar to acquiring the location information of users. Be-
cause the services’ URLs or DSNs are already known,
only a prior DSN name to IP address translation is re-
quired. This is also easy to be implemented. Table 2 illus-
trates real IP to AS and IP to country mappings. Each
row of the table consists of an IP address block and its
associated AS number and country name.
TABLE 2
EXAMPLES OF IP TO AS AND IP TO COUNTRY MAPPING
Start IP Address End IP Address AS Number Country Name
4.56.0.0 4.67.63.255 AS863 Canada
4.67.64.0 4.67.67.255 AS9996 Japan
4.67.68.0 4.68.247.255 AS863 Canada
4.68.248.0 4.68.249.31 AS1148 Netherlands
4.68.294.32 4.71.36.3 AS863 Canada
4.71.36.4 4.71.36.7 AS1148 Netherlands
5.3 Location Information Processing
To efficiently determine which user is close to the target
user, we group users according to their location infor-
mation so that those within the same group are really close.
Likewise, we group Web services according to their loca-
tion information so that those within the same group are
close to each other.
In work [29], users are grouped mainly according to the
similarity of their IP addresses. That is, if two users have
close IP addresses, they are considered close in location.
This seems reasonable but may, in reality, cause inaccura-
cies. Due to several factors, such as the shortage of IPv4
addresses and the wide application of provider-
independent IP addresses, fragmentation of IP prefixes (i.e.,
IP address blocks allocated to ASs) are increasing [35].
Therefore, two IP addresses with close values do not neces-
sarily belong to the same AS or country. Table 2 shows an
example that the IP addresses possessed by a network (e.g.
AS 863) are unnecessarily continuous. The IP prefixes that
are close in value are unnecessarily belonged to the same
network or country (e.g. 4.67.68.0 and 4.67.64.0 in Table 2).
This indicates that identifying either near users or near
Web services using only IP addresses could be problematic.
Different from work [29], we cluster users within the
same AS into a group. The group is represented by the AS
number and identified as the AS-level group. The AS-level
group may be very sparse since there are thousands of ASs
in the Internet. We thus further cluster users within the
same country into a group. The group is represented by the
country ID and identified as the country-level group. Fig-
ure 3 illustrates the hierarchy of groups. In a similar matter,
we also cluster Web services into groups. In our method, if
two users or Web services are located in the same AS, we
regard them as close. Likewise, if two users (or Web ser-
vices) are located in the same country, they are regarded as
close. However, the latter has less closeness than the for-
mer. In order to efficiently search for both close-by users
and Web services, in our implementation, we employ a
data structure of hash tables to map every AS number or
country ID to the group it represents. Therefore, given the
AS number or country ID of a user (or Web service), it costs
very little time to retrieve close-by users (or Web services).
6. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
6 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
Fig. 3. Hierarchy of user groups
6 SIMILARITY COMPUTATION AND SIMILAR
NEIGHBOR SELECTION
In this section, we first formally define notations for the
convenience of describing our method and algorithms.
We then present a weighted PCC for computing similari-
ty between both users and Web services, which takes
their personal QoS characteristics into consideration. Fi-
nally, we discuss incorporating locations of both users
and Web services into the similar neighbor selection.
6.1 Notations and Definitions
The following defines notations which will be employed
in the rest of this paper:
},...,,{ 21 muuuU is a set of Web service users,
where uj ( mj 1 ) represents a service user and m is
the total number of service users.
},...,,{ 21 niiiI is a set of Web service items with
similar functionality, where ij ( nj 1 ) represents a
Web service and n is the total number of Web services.
Iu represents the subset of Web service items invoked
by user u. Ui represents the subset of users that co-
invoked Web service i.
},|),({ IiUuiurR is a user-item matrix, where
),( iur represents a record of invocation (QoS values,
e.g., response time, throughput, etc.) generated by the
interaction between user u and Web service i. ),( sur =
null if u has not invoked i yet. For easy presentation,
assume that ),( iur only contains a single QoS value.
},...,,{ 21 saaaA is a set of AS numbers, where s is
the total number of ASs detected from all users and
Web services. Let a
U represent the subset of users lo-
cated in the AS numbered a. Similarly, let a
I repre-
sent the subset of Web services located in the AS
numbered a.
},...,,{ 21 tcccC is a set of country IDs, where t is the
total number of countries detected from all users and
Web services. Let c
U represent the subset of users lo-
cated in the country with ID c. Similarly, let c
I repre-
sent the subset of Web services located in the country
with ID c.
( , ) { ( , ) | ( , ) }a a
r U i avg r u i R u U r u i null is the
average QoS value of Web service i observed by the
subset of users a
U . If no users in a
U has invoked i,
( , )a
r U i =null. Similarly, ),( iUr c
is the average QoS
value of Web service i observed by the subset of users
c
U . ),( iUr (also abbreviated as )(ir ) is the average
QoS value of Web service i observed by all users in U.
( ) { ( , )| }a a
r U r U i i I is the vector of the average QoS
values of different Web services observed by the sub-
set of users a
U (also referred to as the average QoS
vector of a
U ). In a similar manner, we define ( )c
r U
and ( )r U as the vectors of the average QoS values of
different Web services observed by all users in c
U and
U respectively.
}),(|),({),( iurIiRiuravgIur aa
is the average
QoS value of Web services in a
I observed by u. Simi-
larly, ),( c
Iur is the average QoS values of Web ser-
vices in c
I observed by u. ),( Iur (also abbreviated as
)(ur ) is the average QoS value of Web services in I
perceived by u.
( ) { ( , )| }a a
r I r u I u U is the vector of the average
QoS values observed by different users on all Web
services in a
I (also referred to as the average QoS vec-
tor of a
I ). In a similar manner, we define ( )c
r I and
( )r I as the vectors of the average QoS values observed
by different users on all Web services in c
I and in I re-
spectively.
6.2 Similarity Computation based on Weighted PCC
The Pearson Correlation Coefficient (PCC) has been ap-
plied in many recommendation systems to compute the
similarity between both users and items. In user-based
collaborative filtering, the standard PCC used to measure
similarity between two users is computed as:
uvuv
uv
IIiIIi
IIi
vrivruriur
vrivruriur
vuPCC
22
)(),()(),(
)(),()(),(
, (1)
where uv II is the set of Web services that are co-
invoked by both user v and user u, and )(vr and )(ur
represent the average QoS values that user v and user u
have perceived from all Web services they invoked, re-
spectively. The similarity value calculated in Eq. (1) is
within the continuous range of [-1, 1]. The larger the val-
ue is, the more similar two users are.
However, Eq. (1) fails to consider the personal influ-
ence of Web services on similarity measurement. That is,
co-invoked Web services are always given equivalent
weights in the measurement of similarity between users.
As discussed in Section 3, we argue that Web services
with more steady QoS values for all of their users should
contribute less to the degree of similarity between users,
and vice versa. Therefore, we developed a weighted PCC
that incorporates the personality of Web services into
similarity computation for users.
We introduce here a deviation-based weight to repre-
sent each Web service’s personal contribution when com-
puting the similarity between users. The following steps
are used for computing the weight of Web service i based
on its QoS deviation:
Step 1: QoS normalization. In this step, we transform
each QoS value of service i, r(u,i), to a real number be-
tween 0 and 1 by comparing it with the maximum and
minimum QoS values of i. There are two cases to be
considered. If the QoS criterion concerned is positive,
The User Set
Country 1 Country 2 Country t
AS 1 AS 2 AS 3 AS s
Country
level
AS
level
Top
level
User 1 User 2 User 3 User k User m
7. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 7
i.e., a larger QoS value indicates better QoS, Eq. (2) is
used to normalize r(u,i); otherwise, if the QoS criterion
is negative, i.e., a smaller QoS value indicates better
QoS, Eq. (3) is used to normalize r(u,i)
( , ) min ( )
( , )
max ( ) min ( )
r u i r i
n u i
r i r i
(2)
max ( ) ( , )
( , )
max ( ) min ( )
r i r u i
n u i
r i r i
(3)
where r(i) represents the set of QoS values of Web ser-
vice i. In the case of max ( ) min ( )r i r i , we set n(u,i)=1.
Step 2: Standard deviation computation based on
normalized QoS values. For a Web service i, its stand-
ard QoS deviation after QoS normalization is comput-
ed as
2
2
( ( , ) ( )) / | | , if | |
( ( , ) ( )) / | | | | / , if | |
i
i
i iu U
i
i i iu U
n u i n i U U
d
n u i n i U U U
(4)
where ( )n i is the average QoS value of Web service i,
is a threshold for the number of users that have in-
voked i, i.e., iU . If iU is very small, the standard de-
viation is likely to be overestimated by the original
standard deviation computation formula. The is
used to address the above issue.
Step 3: Weigh generation. For a Web service i, its
weight is straightforwardly obtained using
i iw d (5)
The value of iw is always in the range [0, 1).
After computing the weight of contribution for every Web
service, we develop the following formula for computing
similarity degree between users u and v by extending Eq.
(1):
2 2
( , ) ( ) ( , ) ( )
,
( , ) ( ) ( , ) ( )
v u
v u v u
i
i I I
i i
i I I i I I
w r u i r u r v i r v
Sim u v
w r u i r u w r v i r v
(6)
Eq.(6) incorporates the personalized influence of Web
services into user similarity measurement, and implies
that Web services with larger weights will contribute
more to the two users’ similarity.
As similar as user-based collaborative filtering, previ-
ous item-based collaborative filtering methods also often
adopt the standard PCC to measure similarity between
items. The formula for computing PCC between Web ser-
vice i and j is
jiji
ji
UUuUUu
UUu
jrjuririur
jrjuririur
jiPCC
22
)(),()(),(
)(),()(),(
, (7)
where ji UU is a subset of users that invoked both ser-
vice i and j, ),( iur and ),( jur represent the QoS values of
service i and j respectively, as perceived by user u. )(ir
and )( jr represent the average QoS values of Web service
i and j respectively. Similar to the user similarity meas-
urement, we also develop a weighted PCC to measure the
similarity between Web services. It takes into account the
influence of user personality and computes the similarity
between two Web services i and j as:
2 2
( , ) ( ) ( , ) ( )
,
( , ) ( ) ( , ) ( )
i j
i j i j
u
u U U
u u
u U U u U U
w r u i r i r u j r j
Sim i j
w r u i r i w r u j r j
(8)
where wu is the contribution weight of user u, which is
defined to be the standard deviation of the normalized
QoS values of u. Eq.(8) implies that users with larger
weights will contribute more to Web services’ similarity.
6.3 Similar Neighbor Selection
Similar neighbor selection is a very important step of CF.
Selecting the neighbors right similar to the active user is
necessary for accurate missing value prediction. In con-
ventional user-based CF, the Top-K similar neighbor se-
lection algorithm is often employed [8]. It selects K users
that are most similar to the active user as his/her neigh-
bors. Similarly, the Top-K similar neighbor selection algo-
rithm can be employed to select K Web services that are
most similar to the target Web service.
There are several problems involved, however, when
applying the Top-K similar neighbor selection algorithm
to Web service recommendation. Firstly, in practice, some
service users have either few similar users or no similar
users due to the data sparsity. Traditional Top-K algo-
rithms ignore this problem and still choose the top K
most ones. Because the resulting neighbors are not actual-
ly similar to the target user (service), doing this will im-
pair the prediction accuracy. Therefore, removing those
neighbors from the top K similar neighbor set is better if
the similarity is no more than 0. Secondly, as previously
mentioned, Web service users may happen to perceive
similar QoS values on a few Web services. But they are
not really similar. Considering the location-relatedness of
Web service QoS, we incorporate the locations of both
users and Web services into similar neighbor selection.
Let N(u) denote the resulting subset of similar neigh-
bors for the active user u. We propose a similar neighbor
selection algorithm for constructing N(u) as follows:
Step 1: Obtain the subset of users within the same AS
numbered a as user u, denoting them with a
iU . Use
Eq. (6) to compute the similarity between user u and
each other users a
iUv . Search a
iU for the top K
most similar users to u with similarity greater than 0,
and use them to construct N(u). If fewer than K users
are found, proceed to Step 2; else, return N(u) as the
result.
Step 2: Obtain the subset of users within the same
country numbered c as u, denoting them with c
iU .
Use Eq. (6) to compute the similarity degrees between
user u and each other users c
iUv . Search c
iU for the
top K most similar users to u with similarity greater
than 0, and use them to construct N(u). If fewer than K
users are found, proceed to Step 3; else, return N(u) as
the result.
Step 3: Find the subset of users in U that have in-
voked Web service i, denoting them with iU . Use Eq.
(6) to compute the QoS similarity degrees between u
and v for every user (v) in iU . Search iU for the top
K most similar users to u with similarity greater than 0,
and use them to construct N(u). If fewer than K users
8. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
8 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
are obtained, use the actual number of similar users
(with similarity greater than 0) found to construct N(u).
From the above process, we can see that the algorithm
first searches local users for similar users. It will search a
larger range of users if not enough similar users are found
at the previous step. Due to the observation that local us-
ers are likely to observe similar QoS on co-invoked Web
services, this algorithm has a high probability of finding
users similar to the active user in his/her local region.
Therefore, the above algorithm is also likely to be more
efficient than conventional CF algorithms, which always
search the entire user set for similar users.
Fig. 4. Location-aware similar neighbor selection for a target user
Figure 4 is an example illustrating how we select simi-
lar neighbors for a target user. Suppose that u0 is the tar-
get user. Let the inner circle represent the range of users
located in the same AS as u0, the outer circle represent the
range of users located in the same country as u0, and the
outest rectangle represent the range of all users. Let K=5,
and it indicates that five similar neighbors are need to be
found for u0. With our proposed location-aware neighbor
selection algorithm, we first search for similar neighbors
in the inner circle. Suppose that u1, u2, and u3 are the only
three similar neighbors in the inner circle, which are few-
er than 5, we therefore turn to the outer circle to find simi-
lar neighbors for u0. Suppose that u1, u2, u4, u5, and u6 are
the most similar five neighbors found in the country of u0,
and they all satisfy our similarity threshold, the neighbor
selection algorithm will stop here and return them as the
results. The user u3, though was selected in the first round,
will eventually be filtered because it is not among the top-
5 most similar users to u0 in the second-round search.
The similar neighbor selection algorithm for a target
Web service is similar to the selection process described
above. That is, we first search for similar services in the
same AS where the target service is deployed, and then
search in the same country where the target service is
located, and finally turn to the entire service set when the
number of similar services found is still fewer than K.
7 QOS VALUE PREDICTION AND WEB SERVICE
RECOMMENDATION
7.1 User-based QoS Value Prediction
In this subsection, we present a user-based location-aware
CF method, named as ULACF. Traditional user-based CF
methods usually adopt
, ( , ) ( )
ˆ ( , ) ( )
,
v N u
u
v N u
Sim u v r v i r v
r u i r u
Sim u v
(9)
for missing value predictions. This equation, however,
may be inaccurate for Web service QoS value prediction
for the following reasons. Web service QoS factors such as
response time and throughput, which are objective pa-
rameters and their values vary largely. In contrast, user
ratings used by traditional recommender systems are sub-
jective and their values are relatively fixed [29]. Therefore,
predicting QoS values based on the average QoS values
perceived by the active user (i.e., )(ur ) is flawed. More-
over, Eq. (9) does not distinguish local and remote users
that are similar to the active user. Intuitively, given two
users that have the same estimated similarity degree to
the target user, the user closer to the target user should be
placed more confidence in QoS prediction than the other.
Based on the above consideration, we use Eq. (10) to
compute the predicted QoS value for the active user
based on the QoS experience of his/her similar users
( , ) ( , ) ( , )
ˆ ( , )
( , ) ( , )
v N u
u
v N u
Conf u v Sim u v r v i
r u i
Conf u v Sim u v
(10)
where ( , )Conf u v is the confidence of ,Sim u v in the
view of u. This work computes the value of ( , )Conf u v by
considering whether u and v are located in the same AS
or country, or neither of them. In detail, for different user
v in N(u), ( , )Conf u v is computed as follows (Suppose that
user u has AS number a and country ID c):
(1) If a
v U (u and v are within the same AS a),
( , )Conf u v is computed with the PCC similarity between
the QoS vector of u and the average QoS vector of a
U , i.e.,
( , ) ( ( ), ( ))a
Conf u v PCC r u r U (11)
where ( )a
r U is the average QoS vector of a
U , as defined
in Section 6.1.
(2) If a c
v U v U (u and v are within the same
country c), ( , )Conf u v is computed with the PCC similari-
ty between the QoS vector of u and the average QoS vec-
tor of c
U , i.e.,
( , ) ( ( ), ( ))c
Conf u v PCC r u r U (12)
where ( )c
r U is the average QoS vector of c
U , as defined
in Section 6.1.
(3) Otherwise, ( , )Conf u v is computed with the PCC
similarity between the QoS vector of u and the average
QoS vector of U , i.e.,
( , ) ( ( ), ( ))Conf u v PCC r u r U (13)
where ( )r U is the average QoS vector of U , as defined in
Section 6.1.
Usually, the confidence of ,Sim u v will be larger
when u and v is in the same AS or country than when
they are in different countries, since nearby users are like-
ly to have more similar QoS experiences than those fara-
The AS of u0
The country of u0
u0
The entire user set (U)
u1
u2
u4
u5
u6
u3
9. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 9
way from each other, as we indicated in our experiments.
Employing Eq. (10) to predict missing QoS values for
active user u and target service i may fail when N(u) is
empty or no users in it has invoked service i. In this case,
we will use ),( iUr a
, ),( iUr c
, or )(ir to estimate ( , )r u i .
Considering that the closer users’ experiences are likely
more reliable, the three values should be in order of de-
creasing priority. Only when the prior value is null, will
the posterior value be used for ˆ ( , )ur u i . If ),( iUr a
,
),( iUr c
, and )(ir are all null (when Web service i is nev-
er invoked), we set nulliuru ),(ˆ .
7.2 Item-based QoS Value Prediction
In this subsection, we present an item-based location-
aware CF method, named as ILACF. Based on the similar
consideration as ULACF’s, we use Eq. (11) to compute the
predicted QoS value for a service based on the QoS values
of its similar services
( , ) ( , ) ( , )
ˆ( , )
( , ) ( , )
j N i
i
j N i
Conf i j Sim i j r u i
r u i
Conf i j Sim i j
(14)
where ( , )Conf i j is the confidence of ,Sim i j to Web
service i. Similarly, we compute the value of ( , )Conf i j
by considering whether i and j are located in the same AS
or country, or neither of them. In detail, for different ser-
vice j in N(u), ( , )Conf i j is computed as follows (Suppose
that Web service i has AS number a and country ID c):
(1) If a
j I (i and j are within the same AS a),
( , )Conf i j is computed with the PCC similarity between
the QoS vector of i and the average QoS vector of a
I , i.e.,
( , ) ( ( ), ( ))a
Conf i j PCC r i r I (15)
where ( )a
r I is the average QoS vector of a
I , as defined
in Section 6.1.
(2) If a c
j I j I ( i and j are within the same coun-
try c), ( , )Conf i j is computed with the PCC similarity
between the QoS vector of i and the average QoS vector of
c
I , i.e.,
( , ) ( ( ), ( ))c
Conf i j PCC r i r I (16)
where ( )c
r I is the average QoS vector of c
I , as defined
in Section 6.1.
(3) Otherwise, ( , )Conf i j is computed with the PCC
similarity between the QoS vector of u and the average
QoS vector of I , i.e.,
( , ) ( ( ), ( ))Conf i j PCC r i r I (17)
where ( )r I is the average QoS vector of I , as defined in
Section 6.1.
Employing Eq. (14) to predict missing QoS values for u
and i may fail when N(i) is empty or no services in it has
been invoked by u. In this case, we will use ),( a
Iur ,
),( c
Iur ,or )(ur to estimate ( , )r u i . Considering that the
closer services’ QoS values are likely more reliable, the
three values should also be in order of decreasing priority.
Only when the prior value is null, will the posterior value
be used for prediction. If ),( a
Iur , ),( c
Iur , and )(ur are
all null (when u has never invoked any service), set
nulliuri ),(ˆ .
7.3 Integrating QoS Predictions
Due to the sparsity of the user-item matrix, to make the
missing value prediction as accurate as possible, it’s bet-
ter to fully explore the information of similar users as well
as similar services. Therefore, we develop a hybrid loca-
tion-aware CF, named as HLACF, which integrated the
user-based QoS prediction with the item-based QoS pre-
diction. The following four cases will be considered in
integrating QoS predictions:
(1) Case 1: Neither ),(ˆ iuru
nor ),(ˆ iuri
are null. In this
case, we integrate the user-based prediction with item-
based prediction as:
),(ˆ)1(),(ˆ),(ˆ iuriuriur iu (18)
where ),(ˆ iur is the final prediction value and is a tun-
able parameter to balance the user-based prediction with
the item-based prediction. The parameter makes this
prediction adaptable to different environments.
(2) Case 2: ),(ˆ iuru
is null while ),(ˆ iuri
is not. Let
),(ˆ),(ˆ iuriur i .
(3) Case 3: ),(ˆ iuri
is null while ),(ˆ iuru
is not. Let
),(ˆ),(ˆ iuriur u .
(4) Case 4: Both ),(ˆ iuri
and ),(ˆ iuru
are null. This only
occurs when both the active user and the target service
are new and have never experienced any invocations. In
this case, the missing QoS values will not be predicted.
However, this case is very rare.
The above description implies that HLACF can ad-
dress the data sparsity and cold start problems very well.
In traditional CF-based recommendation methods, the
data sparsity problem occurs because there are insuffi-
cient data in the user-item matrix for CF to measure simi-
larity and identify similar neighbors accurately. However,
in HLACF, the data sparsity problem can be greatly re-
lieved, because it exploits not only the QoS information of
similar users and similar services, but also the additional
location information of users and services. Therefore,
even no similar users and services are found by CF be-
cause of data sparsity, the QoS data of local users or ser-
vices can be employed for QoS value prediction. The cold
start problem can be viewed as a special case of the data
sparsity problem, being caused by the introduction of
new users or new items that have insufficient data.
The cold start problem can also be well addressed in our
method, since it’s easy to find users or services close to a
new user or services. The performance of our method
under data sparsity was verified in experience, and will
be presented later.
7.4 Web Service Recommendation
The QoS values can be used for different Web service rec-
ommendation scenarios after predicting the missing QoS
values for an active user. For instance, when an active
user is searching for Web services with specified func-
tionality, the predicted QoS values can help the users dis-
cover the Web service with optimal QoS value from a set
of candidate services. The QoS prediction method can
also identify a set of high-quality Web services, and di-
10. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
10 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
rectly recommend them to an active user for selection.
8 EXPERIMENTS
We have conducted a set of experiments to evaluate the
performance of our QoS prediction method. We also have
conducted experiments to verify the relation between
users’ (or Web services’) locality and QoS similarity. More
specifically, we addressed the following questions:
Is there a correlation between location closeness and
QoS similarity for either Web services or users? How
strong is it?
Do the parameters and top-K influence the predic-
tion accuracy? The parameter determines how
much the hybrid QoS prediction method relies on the
user-based prediction or the service-based prediction,
each contributes to the prediction accuracy.
How does the data density affect the performance of
the QoS prediction? What is the performance of our
method under different data sparseness conditions?
How much better is our approach when compared
with other CF-based QoS prediction methods? We
compared our approach with several previous, well-
known methods, in both prediction accuracy and pre-
diction time.
All experiments were developed with Matlab. They
were performed on an HP desktop computer with the
following configuration: Intel Core i3 3.20GHz CPU, 2GB
RAM with the Windows 7 operating system.
TABLE 3
TOP 5 COUNTRIES WITH MOST USERS
Rank Country Name Number of Users
Proportion of
Users
1 United States 161 47.49%
2 Germany 41 12.09%
3 Japan 16 4.72%
4 Canada 12 3.54%
5 Poland 12 3.54%
TABLE 4
TOP 5 AUTONOMOUS SYSTEMS WITH MOST USERS
Rank AS Number Number of Users
Proportion of
Users
1 AS680 31 9.14%
2 AS2500 9 2.65%
3 AS559 9 2.65%
4 AS786 9 2.65%
5 AS25 6 1.77%
8.1 Dataset
During our experiments, we adopted a real-world Web
service dataset, WSDream dataset 2 [36], published in
www.wsdream.com. This dataset contained the QoS records
of service invocations on 5825 Web services from 339 us-
ers. The dataset can be transformed into a user-service
matrix. Each item of the user-service matrix is a pair of
values: response time (also called Round Trip Time, RTT)
and throughput (TP). Therefore, the original user-service
matrix can be decomposed into two simpler matrices:
RTT matrix and TP matrix. We used either the RTT ma-
trix or the TP matrix to compute both the user and the
service similarities.
This dataset also contained both the IP addresses of all
users and the URLs of all Web services. Through analysis,
we found that all 339 users were distributed within 137
ASs and 31 countries. Among the 5825 Web services, 5102
Web services are distributed within 1021 ASs and 74
countries. The AS numbers and country names of the oth-
er 723 services is unknown because we either failed to
transform their URLs into IP addresses or failed to obtain
their AS numbers and country names. Table 3 and Table 4
show the top five countries and top five ASs respectively,
of users in the dataset. Table 5 and Table 6 show the top
five countries and top five ASs respectively, of Web ser-
vices in the dataset.
TABLE 5
TOP 5 COUNTRIES WITH MOST WEB SERVICES
Rank Country Name
Number of Web
Services
Proportion of
Web Services
1 United States 2389 41.01%
2 United Kingdom 510 8.76%
3 Canada 432 7.42%
4 Germany 298 5.12%
5 China 271 4.65%
TABLE 6
TOP 5 AUTONOMOUS SYSTEMS WITH MOST WEB SERVICES
Rank AS Number
Number of Web
Services
Proportion of
Web Services
1 AS271 281 4.82%
2 AS786 257 4.41%
3 AS4134 160 2.75%
4 AS26496 155 2.66%
5 AS11426 125 2.15%
8.2 Correlation between Location Closeness and
QoS Similarity
In this subsection, we present experimental results on the
relation between the location closeness and QoS similarity
for both users and Web services. The QoS similarity both
between users and between Web services is computed
with PCC. To correctly evaluate this relationship, we de-
veloped the following two series of experiments:
1) For a user, we first identified its top K similar neigh-
bors based on the QoS similarity measurement. We
then calculated the proportion of the user’s similar
neighbors that are within the same AS or country of
the user. A higher proportion indicates a stronger
correlation between location closeness and QoS simi-
larity with respect to users. Because most ASs and
countries have only a few users (as mentioned pre-
viously), in this experiment we therefore choose the
top 5 ASs and countries with the most users, per-
forming calculation for each user in them and taking
the average proportion as the result. In a similar
manner, we also tested the correlation between loca-
tion closeness and QoS similarity for Web services.
2) We computed the average QoS similarity between
11. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 11
every pair of users within the same AS or country,
which is referred to as Local User Similarity (LUS),
denoted by either A-LUS (AS-based) or C-LUS (Coun-
try-based). On the other hand, we computed the av-
erage QoS similarity between every pair of users
across different ASs or countries, which is referred to
as Global User Similarity (GUS). Again, depending
whether AS or country is regarded, GUS is denoted
by A-GUS or C-GUS. Likewise, we also computed
both the local service similarity (denoted by either A-
LSS or C-LSS) and the global service similarity (de-
noted by either A-GSS or C-GSS). If each type of local
similarity is significantly greater than the corre-
sponding global similarity, the location closeness is
considered highly correlated with the QoS similarity.
Figure 5 illustrates the results of the first series of ex-
periments described above. The results present how
probable the top K similar neighbors of a user are within
either the same AS or country as the user. The results also
present how probable the top K similar neighbors of a
Web service are within either the same AS or country as
(a) (b)
Fig. 5. The proportion of a user’s (service’s) top-K similar neighbors
that are located in the same AS or country as the user (service): (a)
regarding country; (b) regarding AS.
the Web service. Note that similarity between either users
or services is computed using each QoS attribute sepa-
rately (for simplicity). As a result, we obtained four kinds
of QoS similarities:
User similarity based on RTT (denoted rtt-user) ;
User similarity based on TP (denoted tp-user) ;
Service similarity based on RTT (denoted rtt-service);
Service similarity based on TP (denoted tp-service).
We can see from Figure 5(a) that the top K similar
neighbors of either a user or a Web service are highly
likely to be located in the same country as the user or the
service. For example, when K=10, taking tp-service into
consideration, on average, more than 90% of the top K
similar neighbors of a Web service are located in the same
country as the service. Figure 5(b) illustrates the propor-
tion of the top K similar neighbors of either a user or a
Web service being located in the same AS as the user or
the service. The proportion is also quite high when K is
small. As K increases, however, the proportion with re-
spect to user (e.g., rtt-user and tp-user) decreases signifi-
cantly. This decrease can be explained from Table 4,
which indicates that even the 2nd most-user AS has no
more than 10 users, not to say the other low-ranked ASs.
Hence, with a larger K (e.g., K=10), a user is likely to have
not enough similar neighbors in his AS, which indeed
will reduce the proportion calculated.
Table 7 presents the results from the second series of
experiments. For simplicity, we again used both RTT and
TP separately to calculate the local user (or service) simi-
larity and the global user (or service) similarity respec-
tively. We compared the local user similarity with the
global one, regarding both AS and country. We also com-
pared the local service similarity with the global one, re-
garding both AS and country. We can see in Table 7 that
every type of local similarity is significantly greater than
its corresponding global similarity. The results therefore
justify the relation between the location closeness and the
QoS similarity.
From the above results, we can conclude that our loca-
tion-aware QoS prediction method has a solid basis, be-
cause of the strong relation between the locations of users
(or Web services) and the Web services’ QoS perceived by
the users.
TABLE 7
COMPARISON BETWEEN LOCAL SIMILARITY AND GLOBAL SIMI-
LARITY OF BOTH USERS AND SERVICES
C-LUS,
C-GUS
A-LUS,
A-GUS
C-LSS,
C-GSS
A-LSS,
A-GSS
RTT
0.6357,
0.4153
0.8164,
0.4526
0.4774,
0.2494
0.4502,
0.2784
TP
0.7786,
0.4303
0.6336,
0.4488
0.5869,
0.0828
0.5710,
0.0985
8.3 Prediction Accuracy Evaluation
The Mean Absolute Error (MAE) is often used in collabo-
rative filtering methods to measure the prediction accura-
cy. MAE is defined as
N
iuriur
MAE iu
,
),(ˆ),(
(19)
where ),( iur denotes the actual QoS values of Web ser-
vice i , observed by service user u , ),(ˆ iur represents the
predicted QoS values, and N denotes the number of pre-
dicted values. Because different Web service QoS factors
have distinct value ranges, we also used the Normalized
Mean Absolute Error (NMAE) metric to measure the pre-
diction accuracy. NMAE is defined as
Niur
MAE
NMAE
iu
/),(,
(20)
A smaller NMAE value represents higher prediction ac-
curacy.
We compared our method with several well-known
prediction methods. These methods include user-based
method using PCC (UPCC) [14], item-based method us-
ing PCC (IPCC) [17], hybrid CF method WSRec [8], loca-
tion-aware method RegionKNN [29], and Latent Factor
Model (LFM) [37].
The 339 service users were divided into two groups: 20
test (active) users and 319 training users. The test users
are randomly selected from the top 5 ASs with most users,
and all the other users are considered training users.
Based on training users and testing users, both the RTT
matrix and the TP matrix were divided into a training
matrix and a test matrix. To simulate the real-world situa-
2 4 6 8 10
0.4
0.5
0.6
0.7
0.8
0.9
1
Top-k
Propotion
tp-service
tp-user
rtt-service
rtt-user
2 4 6 8 10
0.4
0.5
0.6
0.7
0.8
0.9
1
Top-k
Propotion
tp-service
tp-user
rtt-service
rtt-user
12. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
12 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
tion, we randomly remove entries from both the training
matrix and the test matrix to reduce the data density to
20%. The entries removed from the test matrix were used
to evaluate the prediction quality. Empirically, we set the
parameters used in our method as K=10, 20 , and
0.9 . Each experiment was performed 10 times, with
an average value taken as the result. To get a reliable er-
ror estimate, we evaluate the prediction accuracy by us-
ing the average MAE and NMAE value generated from
all test users.
Table 8 displays the prediction accuracy of various
methods. ULACF represents the proposed user-based
location-aware CF method. ILACF represents the pro-
posed item-based location-aware CF method. HLACF
represents the hybrid, location-aware QoS prediction
method. Let rttmae and rttnmae respectively represent the
MAE and NMAE performance of RTT, and tpmae and
tpnmae respectively represent the MAE and NMAE per-
formance of TP. From Table 8, we can see that HLACF
has significantly smaller MAE and NMAE values than the
other methods, indicating better prediction performance.
The slightly better performance of HLACF compared to
ULACF and ILACF also validates the usefulness of com-
bining user-based CF with item-based CF.
TABLE 8
PERFORMANCE COMPARISON OF VARIOUS METHODS IN BOTH
MAE AND NMAE
TABLE 9
PREDICTION TIME OF VARIOUS METHODS (SECOND)
8.4 Prediction Time Evaluation
In addition to the prediction accuracy, another advantage
of our method is its high efficiency of QoS prediction.
This indicates that our method is more scalable than tra-
ditional CF methods when applied to large-scale service
recommender systems. The reason is that, in most cases
we can limit similar neighbor searching to a small subset
of users (or Web services), especially when K is small.
Instead, traditional CF methods have to search the entire
user set or Web service set to locate similar neighbors. We
conducted an experiment to evaluate the prediction time
of our method, and compare it with some existing meth-
ods. Given K=10 and matrix density=20%, we randomly
choose 20 test users from the matrix and perform QoS
predictions for these users using different methods. We
compute the average prediction time for each missing
QoS value of the test users.
Table 9 compares the average prediction time for a
missing QoS value produced by various methods such as
UPCC, IPCC, WSRec, RegionKNN, LFM, ULACF, ILACF
and HLACF. We can see that our proposed methods (in-
cluding ULACF, ILACF and HLACF) are very efficient
and significantly outperform the traditional CF methods
such as UPCC, IPCC and WSRec. RegionKNN and LFM
are also very efficient. But RegionKNN needs considera-
ble time to build and maintain user clusters, and LFM
needs much time to train its model when new QoS values
are added to the matrix.
8.5 Impact of
Different datasets have different data correlation charac-
teristics. Parameter determines how much the hybrid
location-aware prediction relies on either the user-based
prediction, ULACF, or the item-based prediction, ILACF.
Parameter makes the prediction feasible for various
environments. If 0 , only ILACF is involved in QoS
prediction. If 1 , only ULACF is involved in QoS pre-
diction. In other cases, ULACF and ILACF are combined
to predict the missing QoS values for active users.
To study the influence of on our hybrid location-
aware CF method, we conducted an experiment, in which
we set K=10 and varied the value of from 0 to 1, with a
step value of 0.1. Figure 6(a) illustrates the influence of
on the prediction accuracy of both RTT and TP. Our
method achieved the best prediction accuracy when
=0.9 for both the RTT and the TP prediction. This indi-
cates that ULACF is likely more accurate than ILACF for
the Web service dataset we employed.
8.6 Impact of K
We are also interested in whether K has significant influ-
ence on the prediction accuracy when employing the Top-
K similar neighbor selection algorithm. To evaluate the
impact of K, we conducted an experiment on our pro-
posed method with =0.9. The experimental results are
shown in Fig. 6(b). We can see, for the RTT matrix, with
the increase of K, the prediction accuracy grows initially,
then decreases slightly; as for the TP matrix, the predic-
tion accuracy first grows rapidly with the increase of K,
then reaches a steady status. These indicate that K is no
need to give a large value for obtaining optimal perfor-
mance in our method. This could be caused by that, when
a large K is used, many of the similar neighbors selected
are from regions other than just the target user’s AS and
country. Therefore, those that are not really similar to the
target user or service will likely to be involved.
(a) Impact of λ (b) Impact of K
Fig. 6. Impact of and K on the prediction accuracy
Metrics UPCC ULACF IPCC ILACF WSRec
Region
-KNN
LFM HLACF
rttmae 0.5972 0.4162 0.8223 0.5620 0.5220 0.4905 0.5193 0.4124
rttnmae 1.0465 0.7479 1.5836 1.0099 0.9384 0.8814 0.9128 0.7410
tpmae 56.1644 26.9475 49.2627 47.3596 41.4691 37.2570 29.3558 26.7892
tpnmae 1.1508 0.5614 1.0262 0.9866 0.8626 0.7749 0.6106 0.5581
UPCC ULACF IPCC ILACF WSRec
Region-
KNN
LFM HLACF
RTT 0.0549 0.0021 0.0261 0.0078 0.0816 0.0089 0.0045 0.0105
TP 0.0540 0.0018 0.0279 0.0081 0.0825 0.0093 0.0047 0.0108
0 0.2 0.4 0.6 0.8 1
0.5
0.6
0.7
0.8
0.9
1
1.1
1.2
NMAE
tp
rtt
5 10 15 20 25 30 35 40
0.4
0.5
0.6
0.7
0.8
0.9
Top-K
NMAE
tp
rtt
13. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
LIU ET AL.: PERSONALIZED WEB SERVICE RECOMMENDATION VIA LOCATION-AWARE QOS PREDICTION 13
(a) TP (b) RTT
Fig. 7. Impact of matrix density on the prediction accuracy
(a) K=10 (b) K=20
Fig. 8. Impact of matrix density on the prediction coverage
8.7 Impact of Data Sparseness
We investigated the impact of data sparseness on the
prediction performance from two aspects: prediction ac-
curacy and coverage. The prediction coverage is defined
as the percent of the missing QoS values in the user-
service matrix that we can compute a prediction. We set
=0.9, K=10 or 20, and vary the matrix density from 5%
to 30% with a step of 5%. Fig. 7 reports the experimental
results of our method (HLACF) on both the TP and the
RTT matrices. We can see that the data sparseness indeed
has significant influence on the prediction accuracy.
Prediction coverage is also an important metric for
evaluating a QoS prediction algorithm. Traditional CF is
likely to suffer from low prediction coverage when the
data used for prediction is very sparse. However, we im-
prove the traditional CF by using not only similar neigh-
bors but also local neighbors to predicting QoS values for
an active user. We conducted an experiment to evaluate
the impact of data sparseness on the prediction coverage,
in which, our proposed methods (including ULACF,
ILACF and HLACF) were compared with the traditional
CF methods such as UPCC and IPCC. Fig. 8 reports the
experimental results. We find that, our methods can al-
ways achieve nearly 100% prediction coverage, when the
matrix density varies from 5% to 30%. By contrast, the
traditional CF methods have significantly lower predic-
tion coverage, especially when K is small.
9 CONCLUSION AND FUTURE WORK
This paper presents a personalized location-aware collab-
orative filtering method for QoS-based Web service rec-
ommendation. Aiming at improving the QoS prediction
performance, we take into account the personal QoS
characteristics of both Web services and users to compute
similarity between them. We also incorporate the loca-
tions of both Web services and users into similar neighbor
selection, for both Web services and users. Comprehen-
sive experiments conducted on a real Web service dataset
indicate that our method significantly outperforms previ-
ous CF-based Web service recommendation methods.
In the future, we will take more detailed location in-
formation into consideration for QoS prediction, such as
the Internet’s AS topology. We will also consider incorpo-
rating the time factor into QoS prediction, and plan to
obtain bigger datasets for evaluating our methods.
ACKNOWLEDGMENT
The authors appreciate the anonymous reviewers for their
valuable feedback on this manuscript. The work was
supported by the National Natural Science Foundation of
China (No. 61100054, 61272063 and 61402168).
REFERENCES
[1] L.-J. Zhang, J. Zhang, and H. Cai, Service Computing. Springer and
Tsinghua UniversityPress, 2007.
[2] M. P. Papazoglou and D. Georgakopoulos, “Service-Oriented compu-
ting,” Communicationsof theACM, 2003, pp. 46(10):24–28.
[3] M. Alrifai, and T. Risse, “Combining Global Optimization with Local
Selection for Efficient QoS-aware Service Composition,” in Proc. of the
International World WideWebConference, Apr. 2009, pp.881-890.
[4] Y. Zhang, Z. Zheng, M. R. Lyu, “WSExpress: a QoS-aware search en-
gine for Web services”, in Proc. 8th IEEE International Conference on Web
Services, Miami, FL, USA, July,2010, pp.83-90.
[5] S. S. Yau, Y. Yin, “QoS-based service ranking and selection for servic-
based systems,” in Proc. of the International conferenceon Services Compu-
ting, WashingtonDC, USA, July,2011,pp.56 -63.
[6] G. Kang, J. Liu, M. Tang, X.F. Liu, and K. K. Fletcher, “Web Service
Selection for Resolving Conflicting Service Requests,” in Proc. 9th Inter-
nationalConferenceonWebServices, Washington, DC, USA, July, 2011, pp.
387-394.
[7] L. Shao, J. Zhang, Y. Wei, J. Zhao, B. Xie, andH. Mei, “PersonalizedQoS
prediction for Web services via collaborative filtering, ” in Proc. 5th In-
ternationalConferenceonWebServices,2007, pp. 439-446.
[8] Z. Zheng, H. Ma, M.R. Lyu, and I. King. “WSRec: A Collabora-tive
Filtering Based Web Service Recommendation System,” in Proc. 7th In-
ternational Conference on Web Services , Los Angeles, CA, USA, pp. 437-
444, 2009.
[9] Z. Zheng, H. Ma, M. R. Lyu, and I. King “QoS-Aware Web Service
Recommendation by Collaborative Filtering”, IEEE Trans. on Services
Computing,2011,vol.4, no.2, pp.140-152.
[10] M. Tang,Y. Jiang, J. Liu, X. F. Liu: Location-Aware Collaborative Filter-
ing for QoS-Based Service Recommendation. in Proc. 10th International
ConferenceonWebServices,Hawaii, USA, June2012, pp.202-209.
[11] http://en.wikipedia.org/wiki/Collaborative_filtering.
[12] J. L. Herlocker, J. A. Konstan, J. Riedl, “An Empirical Analysis ofDesign
Choices in Neighborhood-based Collaborative Filtering Algorithms,”
InformationRetrieval,No.5,2002, pp.287-310.
[13] G. Adomavicius, and A. Tuzhilin, “Toward the next generation of
recommender systems: a survey of the state-of-the-art and possible ex-
tensions,” IEEE Trans. Knowledge and Data Engineering, 2005, pp.734 –
749.
[14] J. S. Breese, D. Heckerman, and C. Kadie, “Empirical analysis of predic-
tive algorithms for collaborative filtering,” in Proc. of the UAI, 1998,
pp.43-52.
[15] R. Jin, J. Y. Chai, andL. Si, “Anautomatic weighting scheme forcollabo-
rative filtering,” in Proc. of the 27th annual international ACM SIGIR con-
0.05 0.1 0.15 0.2 0.25 0.3
0.45
0.5
0.55
0.6
0.65
0.7
Matrix Density
NMAE
K=10
K=20
0.05 0.1 0.15 0.2 0.25 0.3
0.65
0.7
0.75
0.8
0.85
0.9
0.95
1
Matrix Density
NMAE
K=10
K=20
0.05 0.10 0.15 0.20 0.25 0.30
0.00
0.20
0.40
0.60
0.80
1.00
Matrix Density
Coverage
UPCC
IPCC
ULACF
ILACF
HLACF
0.05 0.10 0.15 0.20 0.25 0.30
0.00
0.20
0.40
0.60
0.80
1.00
Matrix Density
Coverage
UPCC
IPCC
ULACF
ILACF
HLACF
14. 1939-1374 (c) 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TSC.2015.2433251, IEEE Transactions on Services Computing
14 IEEE TRANSACTIONS ON SERVICES COMPUTING, MANUSCRIPT ID
ference on Research and development in information retrieval, 2004.doi:
10.1145/1008992.1009051.
[16] G. Xue, C. Lin, Q. Yang, W. Xi, H. Zeng, Y. Yu, and Z. Chen,”Scalable
Collaborative Filtering Using Cluster-Based Smoothing,” in Proc. 28th
Int’l ACM SIGIR Conf. Research and Development in Information Retrieval,
2005, pp.114-121.
[17] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Item-Based Collabora-
tive Filtering Recommendation Algorithms,” in Proc. 10th Int’l Conf.
World WideWeb,2001, pp.285-295.
[18] M. Deshpande and G. Karypis, “Item-Based Top-N Recommenda-tion,”
ACMTrans. InformationSystem,2004, vol. 22, no. 1, pp. 143-177.
[19] G. Linden, B. Smith, and J. York, “Amazon.com Recommenda-tions:
Item-to-Item Collaborative Filtering,” IEEEInternetComputing, 2003, vol.
7, no.1, pp. 76-80.
[20] M. R. McLaughlin and J. L. Herlocker, “A collaborative filtering algo-
rithm andevaluationmetric that accurately model the user experience,”
in SIGIR,2004.
[21] R. Liu, C.X. Jia, T. Zhou, D, Sun, and B.H. Wang, “Personal recommen-
dation via modified collaborative filtering,” Physics and Society 388(4):
2009, pp.462-468.
[22] G. Adomavicius and A. Tuzhilin. Recommender Systems Handbook,
chapterContext-awareRecommenderSystems. Springer,2010.
[23] G. Kang, J. Liu, M. Tang, X. Liu, B. Cao, and Y. Xu, “AWSR: Active web
service recommendation based on usage history,” in Proc. Int. Conf.
WebServices,2012, pp. 186–193.
[24] L. Liu, F. Lecue, and N. Mehandjiev, “Semantic content-based recom-
mendation of software services usingcontext,” ACMTrans. Web, vol.7,
no.3, pp.17–20, 2013.
[25] K. Huang, Y. Fan, W. Tan. Recommendation in an Evolving Service
Ecosystem Based on Network Prediction. IEEE T. Automation Science
andEngineering11(3): 906-920 (2014)
[26] Y. Ni, Y. Fan, K. Huang, J. Bi, W. Tan. Negative-Connection-Aware
Tag-Based Association Mining and Service Recommendation. ICSOC
2014: 419-428.
[27] J. Wu, L. Chen, Y. Feng, Z. Zheng, M. Zhou, and Z. Wu, “Predict-
ingQoS for Service Selection by Neighborhood-basedCollaborative Fil-
tering”, IEEE Trans. on System, Man, and Cybernetics, Part A, 2013, vol. 43,
no.2, pp.428-439.
[28] W. Qiu, Z. Zheng, X. Wang, X. Yang, and M. R. Lyu, “Reputation-
awareQoSValue Prediction of Web Services”,in Proc. 10th IEEE Inter-
national Conference on Services Computing , Santa Clara Marriott, CA,
USA, June27-July2,2013, pp.41-48.
[29] X.Chen, X.Liu, Z. Huang, andH. Sun, “RegionKNN: AScalableHybrid
Collaborative Filtering Algorithm for Personalized Web Service Rec-
ommendation”, in Proceedings of International Conference on Web Services,
Miami, FL,USA, pp.9-16, 2010.
[30] W. Lo, J. Yin, S. Deng,Y. Li, Z. Wu, “An Extended Matrix Factorization
Approach for QoS Prediction in Service Selection”, in Proceedings of In-
ternationalConferenceonServices Computing, Hawaii, USA, June 2012, pp.
162-169.
[31] Z. Zheng, H. Ma, M. R. Lyu, I. King, “Collaborative Web Service QoS
Prediction via Neighborhood Integrated Matrix Factorization”, IEEE T.
ServicesComputing,6(3), 2013, pp.289-299.
[32] Q. Yu,Z. Zheng, H. Wang, “Trace Norm Regularized Matrix Factoriza-
tion for Service Recommendation”, in Proceedings of International
ConferenceonWebServices,2013, pp.34-41.
[33] S. Ratnasamy, M. Handley, R. Karp, and S. Shenker, “Topologically-
aware overlay construction and server selection,” in Proc. 21st IEEE
INFOCOM, NewYork, NY, June2002.
[34] G. Zhang, M. Tang, S. Cheng, G. Zhang, H. Song, and J. Cao, “ P2P
Traffic Optimization, ” Science China Information Science, 2012, 55:1475-
1492.
[35] D. Meyer, L. Zhang, and K. Fall , “Report from the IAB workshop on
routingandaddressing,” RFC4984, 2007.
[36] Z. Zheng, Y. Zhang, and M. R. Lyu, “Distributed QoS Evaluation for
Real-World Web Services,” In Proc. of the 8th International Conference on
WebServices, Miami, Florida, USA, July5-10, 2010, pp.83-90.
[37] K. Elgazzar, R. Bell, and C. Volinsky, “Matrix factorization techniques
for recommender systems,” IEEE Computer, vol. 42, no. 8, pp. 30-37,
2009.
Jianxun Liu received PhD degree in comput-
er science from Shanghai Jiao Tong Universi-
ty in 2003. He is now a professor of Depart-
ment of Computer Science and Engineering,
Hunan University of Science and Technology.
His current research interests include work-
flow management systems, services compu-
ting, and cloud computing. He has published
about 80 academic papers in international
journals or conference proceedings.
Mingdong Tang is an associate professor in
the School of Computer Science and Engi-
neering at Hunan University of Science and
Technology, Xiangtan, China. He received his
Ph.D. degree in Computer Science from the
Institute of Computing Technology, Chinese
Academy of Sciences, Beijing, China, in 2010.
His current research interests include services
computing, cloud computing, and social net-
works. He is a member of IEEE and ACM.
Zibin Zheng is an associate research fellow
at Shenzhen Research Institute, The Chinese
University of Hong Kong. He received Out-
standing Ph.D. Thesis Award of The Chinese
University of Hong Kong at 2012, ACM
SIGSOFT Distinguished Paper Award at
ICSE2010, Best Student Paper Award at
ICWS2010, and IBM Ph.D. Fellowship Award
at 2010. His research interests include ser-
vice computing and cloud computing.
Xiaoqing (Frank) Liu is currently a profes-
sor and a director of the McDonnell
Douglass Foundation software engineering
laboratory at the Missouri University of Sci-
ence and Technology. He received the PhD
degree in computer science from Texas A&M
University, College Station, in 1995. His
research interests include software engi-
neering, service computing, requirements
engineering, collaborative systems, and
software engineering applications in many domains.
Saixia Lyu is a master student in the School
of Computer Science and Engineering, Hu-
nan University of Science and Technology,
Xiangtan, China. He received his B.S. de-
gree in Information and Computing Sciences
from Hunan University of Science and Tech-
nology, Xiangtan, China, in 2013. His re-
search interests include service recommen-
dation and selection.