Contemporary Business requires the ability to seamlessly exchange information between internal
business units, customers, and partner, is vital for success. Most organizations employ a variety of
different applications to store and exchange data in dissimilar way and therefore cannot “communicate” to
one another productively [1]. Service Oriented Architecture (SOA) components provide services to other
components via communication protocols typically over a network [2].The technologies like DCOM, RMI,
COBRA, Web Services etc. are developed using SOA, which contributed best to fulfill requirements to
some extent, but components result from these technologies are mostly either language specific or
platform specific,[3]. The services or components developed for one platform may not be able to
communicate and reusable in other platform, as they are mostly language specific or platform specific.
“World Wide Web Consortium (W3C) International community to develop web standards” issued WS-*
specifications for programming language vendors for Web services, which confirms a standard means of
interoperating between different software applications running on a variety of platforms or frameworks
[4][5]. This paper tests web services performance gain along with interoperability, reusability by using
“NAS Parallel Benchmarks (NPB)” set of program [6] developed by NASA Advanced Supercomputing
Division to evaluate the performance of supercomputers.
A Web service (WS*-) is a software system designed to support interoperable machine-to-machine
interaction over a network (WSDL) i.e between a client and a service. It has an interface described in a
machine-processable format . Other systems interact with the Web service in a manner prescribed by its
description using SOAP messages which is a protocol define by world wide web consortium, typically
conveyed using HTTP with an XML serialization in conjunction with other Web-related standards. Windows
Communication Foundation (WCF) is a framework for building service-oriented applications. Using WCF,
you can send data as asynchronous messages from one service endpoint to another. A service endpoint can
be part of a continuously available service hosted by IIS, or it can be a service hosted in an application like
an .exe file. An endpoint can be a client of a service that requests data from a service endpoint. The messages
can be as simple as a single character or word sent as XML document, or as complex as a stream of binary
data. In this paper ,We gave the Adavantages that are Available by using wcf ,instead of webservices and
other.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
SOME INTEROPERABILITY ISSUES IN THE DESIGNING OF WEB SERVICES : CASE STUDY ON...ijwscjournal
In today’s environment most of the commercial web based project developed in the industry as well
enumerous number of funded project/and studies taken as part of research oriented initiatives in the
academia suffer from major technical issues as to how design, develop and deploy the Web Services that
can run in variety of heterogeneous environments. In this paper we address the issues of
interoperability between Web Services, the metrics which can be used to measure the interoperability
and simulate the Online shopping application by developing the Credit Card Verification Software
using Luhn’s Mod 10 algorithm having Java Client written in NetBeans and the BankWebService in
C# .NET.
A Web service (WS*-) is a software system designed to support interoperable machine-to-machine
interaction over a network (WSDL) i.e between a client and a service. It has an interface described in a
machine-processable format . Other systems interact with the Web service in a manner prescribed by its
description using SOAP messages which is a protocol define by world wide web consortium, typically
conveyed using HTTP with an XML serialization in conjunction with other Web-related standards. Windows
Communication Foundation (WCF) is a framework for building service-oriented applications. Using WCF,
you can send data as asynchronous messages from one service endpoint to another. A service endpoint can
be part of a continuously available service hosted by IIS, or it can be a service hosted in an application like
an .exe file. An endpoint can be a client of a service that requests data from a service endpoint. The messages
can be as simple as a single character or word sent as XML document, or as complex as a stream of binary
data. In this paper ,We gave the Adavantages that are Available by using wcf ,instead of webservices and
other.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
SOME INTEROPERABILITY ISSUES IN THE DESIGNING OF WEB SERVICES : CASE STUDY ON...ijwscjournal
In today’s environment most of the commercial web based project developed in the industry as well
enumerous number of funded project/and studies taken as part of research oriented initiatives in the
academia suffer from major technical issues as to how design, develop and deploy the Web Services that
can run in variety of heterogeneous environments. In this paper we address the issues of
interoperability between Web Services, the metrics which can be used to measure the interoperability
and simulate the Online shopping application by developing the Credit Card Verification Software
using Luhn’s Mod 10 algorithm having Java Client written in NetBeans and the BankWebService in
C# .NET.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
A Web service typically carries comprehensive business logic, can be searched through the Web, and has to be accessed through the Internet or Intranet environment. Above all, a Web service is published in a standard language and accessed through a standard protocol.
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
In service oriented computing, services are the basic construct that aims to facilitate building of business application in a more flexible and interoperable manner for enterprise collaboration. To satisfy the needs of clients and to adapt to changing needs, service composition is performed in order to compose the various capabilities of available services. With the proliferation of services offering similar functionalities around the web, the task of service selection for service composition is complicated. It is vital to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or quality of service (QoS). Therefore, the process of service selection is complicated due to divergent view of service consumers and service providers on the quality of services. The objective of this paper presents the exploration of various techniques of Quality of Service based Service Selection (QSS) approach in the literature. To evaluate the service selection process, a number of criteria for QSS approach have been identified and presented in this paper.
EARLY PERFORMANCE PREDICTION OF WEB SERVICESijwscjournal
Web Service is an interface which implements business logic. Performance is an important quality aspect of Web services because of their distributed nature. Predicting the performance of web services during early stages of software development is significant. In this paper we model web service using Unified
Modeling Language, Use Case Diagram, Sequence Diagram, Deployment Diagram. We obtain the Performance metrics by simulating the web services model using a simulation tool Simulation of Multi-Tier Queuing Architecture. We have identified the bottle neck resources.
Complete Architecture and Development Guide To Windows Communication Foundati...Abdul Khan
This is Complete Architecture and Development Guide To Windows Communication Foundation (WCF) for building service-oriented applications. It enables architect to quickly in understand WCF and developers to build secure, reliable, transacted solutions that integrate across platforms and interoperate with existing investments.
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...CSCJournals
With data encryption, access control, and monitoring technology, high profile data breaches still
occur. To address this issue, this work focused on securing data at rest and data in motion by
utilizing current distributed network technology in conjunction with a data fragmenting and
defragmenting algorithm. Software prototyping was used to exhaustively test this new paradigm
within the confines of the Defense Technology Experimental Research (DETER) virtual testbed.
The virtual testbed was used to control all aspects within the testing network including: node
population, topology, file size, and number of fragments. In each topology, and for each
population size, different sized files were fragmented, distributed to nodes on the network,
recovered, and defragmented. All of these tests were recorded and documented. The results
produced by this prototype showed, with the max wait time removed, an average wait time of
.0287 s/fragment and by increasing the number of fragments, N, the complexity, X, would
increase as demonstrated in the formula: X = (.00287N!).
Automated Diagnosis of Malaria in Tropical Areas Using 40X Microscopic Images...CSCJournals
This paper proposes a new algorithm to measure parasitemia stemming from Plasmodium
falciparum by using optical images of capillary blood smears from Sub-Saharan Africa. The
approach is an improvement of the previous noteworthy method by developing a two-tone
adaptive median filter and Sauvola segmentation. The analysis was performed on the database
of 100X and 40X microscopic images originating from real time collection of patients’ blood of
some Cameroon’s laboratories. The obtained results were very satisfactory with a detection of
infected cells on 40X images of a sensitivity at 81.58%, a specificity at 97.11% and an accuracy
at 96.71%. Compared to the previous works, the values portray a real improvement in most
performance’s criteria for 100X images and 40X images as well. There is a significant step of
automated Malaria diagnosis in tropical areas and in the performance assessed. The results of
the method gave more strength for the two magnification ranges. The time spent in analysis is
obviously reduced with 40X magnification and the inaccessibility of the information by the visual
laboratory measurement is henceforth genuinely assaulted. The low cost of the system opens
therefore the possibility of a cost effective method of diagnosing malaria in low and middleincome
countries
Gene Selection for Patient Clustering by Gaussian Mixture ModelCSCJournals
Clustering is the basic composition of data analysis, which also plays a significant role in
microarray analysis. Gaussian mixture model (GMM) based clustering is very popular approach
for clustering. However, GMM approach is not so popular for patients/samples clustering based
on gene expression data, because gene expression datasets usually contains the large number
(m) of genes (variables) in presence of a few (n) samples observations, and consequently the
estimates of GMM parameters are not possible for patient clustering, because there does not
exists the inverse of its covariance matrix due to m>n. To conquer these problems, we propose to
apply a few ‘q’ top DE (differentially expressed) genes (i.e., q<n /><m) between two or more
patient classes, which are selected proportionally from all DE gene’s groups. Here, the fact
behind our proposal that the EE (equally expressed) genes between two or more classes have no
significant contribution to the minimization of misclassification error rate (MER). For selecting few
top DE genes, at first, we clustering genes (instead of patients/samples) by GMM approach. Then
we detect DE and EE gene clusters (groups) by our proposed rule. Then we select q (few) top DE
genes from different DE gene clusters by the rule of proportional to cluster size. Application of
such a few ‘q’ number of top DE genes overcomes the inverse problem of covariance matrix in
the estimation process of GMM’s parameters, and ultimately for gene expression data
(patient/sample) clustering. The performance of the proposed method is investigated using both
simulated and real gene expression data analysis. It is observed that the proposed method
improves the performance over the traditional GMM approaches in both situations.
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
Enhancement in Web Service ArchitectureIJERA Editor
Web services provide a standard means of interoperating between different software applications, running on a
variety of platforms and/or frameworks. Web services are increasingly used to integrate and build business
application on the internet. Failure of web services is not acceptable in many situations such as online banking,
so fault tolerance is a key challenge of web services. This paper elaborates the concept of web service
architecture and its enhancement. Traditional web service architecture lacks facilities to support fault tolerance.
To better cope with the fundamental issues of the traditional client-server based web service architecture, peer to
peer web service architecture have been introduced. The purpose of this paper is to elaborate the architecture,
construction methods and steps of web services and possible weaknesses in scalability and fault tolerance in
traditional client server architecture and a solution for that, peer to peer web service technology has evolved.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
A Web service typically carries comprehensive business logic, can be searched through the Web, and has to be accessed through the Internet or Intranet environment. Above all, a Web service is published in a standard language and accessed through a standard protocol.
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
In service oriented computing, services are the basic construct that aims to facilitate building of business application in a more flexible and interoperable manner for enterprise collaboration. To satisfy the needs of clients and to adapt to changing needs, service composition is performed in order to compose the various capabilities of available services. With the proliferation of services offering similar functionalities around the web, the task of service selection for service composition is complicated. It is vital to provide service consumers with facilities for selecting required web services according to their non-functional characteristics or quality of service (QoS). Therefore, the process of service selection is complicated due to divergent view of service consumers and service providers on the quality of services. The objective of this paper presents the exploration of various techniques of Quality of Service based Service Selection (QSS) approach in the literature. To evaluate the service selection process, a number of criteria for QSS approach have been identified and presented in this paper.
EARLY PERFORMANCE PREDICTION OF WEB SERVICESijwscjournal
Web Service is an interface which implements business logic. Performance is an important quality aspect of Web services because of their distributed nature. Predicting the performance of web services during early stages of software development is significant. In this paper we model web service using Unified
Modeling Language, Use Case Diagram, Sequence Diagram, Deployment Diagram. We obtain the Performance metrics by simulating the web services model using a simulation tool Simulation of Multi-Tier Queuing Architecture. We have identified the bottle neck resources.
Complete Architecture and Development Guide To Windows Communication Foundati...Abdul Khan
This is Complete Architecture and Development Guide To Windows Communication Foundation (WCF) for building service-oriented applications. It enables architect to quickly in understand WCF and developers to build secure, reliable, transacted solutions that integrate across platforms and interoperate with existing investments.
The Royal Split Paradigm: Real-Time Data Fragmentation and Distributed Networ...CSCJournals
With data encryption, access control, and monitoring technology, high profile data breaches still
occur. To address this issue, this work focused on securing data at rest and data in motion by
utilizing current distributed network technology in conjunction with a data fragmenting and
defragmenting algorithm. Software prototyping was used to exhaustively test this new paradigm
within the confines of the Defense Technology Experimental Research (DETER) virtual testbed.
The virtual testbed was used to control all aspects within the testing network including: node
population, topology, file size, and number of fragments. In each topology, and for each
population size, different sized files were fragmented, distributed to nodes on the network,
recovered, and defragmented. All of these tests were recorded and documented. The results
produced by this prototype showed, with the max wait time removed, an average wait time of
.0287 s/fragment and by increasing the number of fragments, N, the complexity, X, would
increase as demonstrated in the formula: X = (.00287N!).
Automated Diagnosis of Malaria in Tropical Areas Using 40X Microscopic Images...CSCJournals
This paper proposes a new algorithm to measure parasitemia stemming from Plasmodium
falciparum by using optical images of capillary blood smears from Sub-Saharan Africa. The
approach is an improvement of the previous noteworthy method by developing a two-tone
adaptive median filter and Sauvola segmentation. The analysis was performed on the database
of 100X and 40X microscopic images originating from real time collection of patients’ blood of
some Cameroon’s laboratories. The obtained results were very satisfactory with a detection of
infected cells on 40X images of a sensitivity at 81.58%, a specificity at 97.11% and an accuracy
at 96.71%. Compared to the previous works, the values portray a real improvement in most
performance’s criteria for 100X images and 40X images as well. There is a significant step of
automated Malaria diagnosis in tropical areas and in the performance assessed. The results of
the method gave more strength for the two magnification ranges. The time spent in analysis is
obviously reduced with 40X magnification and the inaccessibility of the information by the visual
laboratory measurement is henceforth genuinely assaulted. The low cost of the system opens
therefore the possibility of a cost effective method of diagnosing malaria in low and middleincome
countries
Gene Selection for Patient Clustering by Gaussian Mixture ModelCSCJournals
Clustering is the basic composition of data analysis, which also plays a significant role in
microarray analysis. Gaussian mixture model (GMM) based clustering is very popular approach
for clustering. However, GMM approach is not so popular for patients/samples clustering based
on gene expression data, because gene expression datasets usually contains the large number
(m) of genes (variables) in presence of a few (n) samples observations, and consequently the
estimates of GMM parameters are not possible for patient clustering, because there does not
exists the inverse of its covariance matrix due to m>n. To conquer these problems, we propose to
apply a few ‘q’ top DE (differentially expressed) genes (i.e., q<n /><m) between two or more
patient classes, which are selected proportionally from all DE gene’s groups. Here, the fact
behind our proposal that the EE (equally expressed) genes between two or more classes have no
significant contribution to the minimization of misclassification error rate (MER). For selecting few
top DE genes, at first, we clustering genes (instead of patients/samples) by GMM approach. Then
we detect DE and EE gene clusters (groups) by our proposed rule. Then we select q (few) top DE
genes from different DE gene clusters by the rule of proportional to cluster size. Application of
such a few ‘q’ number of top DE genes overcomes the inverse problem of covariance matrix in
the estimation process of GMM’s parameters, and ultimately for gene expression data
(patient/sample) clustering. The performance of the proposed method is investigated using both
simulated and real gene expression data analysis. It is observed that the proposed method
improves the performance over the traditional GMM approaches in both situations.
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
Cryptography has several important aspects in supporting the security of the data, which
guarantees confidentiality, integrity and the guarantee of validity (authenticity) data. One of the
public-key cryptography is the RSA cryptography. The greater the size of the modulus n, it will be
increasingly difficult to factor the value of n. But the flaws in the RSA algorithm is the time
required in the decryption process is very long. Theorem used in this research is the Chinese
Remainder Theorem (CRT). The goal is to find out how much time it takes RSA-CRT on the size
of modulus n 1024 bits and 4096 bits to perform encryption and decryption process and its
implementation in Java programming. This implementation is intended as a means of proof of
tests performed and generate a cryptographic system with the name "RSA and RSA-CRT Text
Security". The results of the testing algorithm is RSA-CRT 1024 bits has a speed of
approximately 3 times faster in performing the decryption. In testing the algorithm RSA-CRT 4096
bits, the conclusion that the decryption process is also effective undertaken more rapidly.
However, the flaws in the key generation process and the RSA 4096 bits RSA-CRT is that the
time needed is longer to generate the keys.
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
Smart devices are equipped with multiple authentication techniques and still remain prone to
attacks since all of these techniques require explicit user intervention. The purpose of this paper
is to capture the user behavior in order to use it as an implicit authentication technique.
In this paper, we introduce a novel authentication model to be used complementary to the
existing models; Particularly, the context of the user, the duration of usage of each application
and the occurrence time were examined and modeled using the cubic spline function as an
authentication technique. A software system composed of two software components has been
implemented on Android platform. Preliminary results show a 76% accuracy rate in determining
the rightful owner of the device.
Performance Evaluation of Image Edge Detection Techniques CSCJournals
The success of an image recognition procedure is related to the quality of the edges marked. The
aim of this research is to investigate and evaluate edge detection techniques when applied to
noisy images at different scales. Sobel, Prewitt, and Canny edge detection algorithms are
evaluated using artificially generated images and comparison criteria: edge quality (EQ) and map
quality (MQ). The results demonstrated that the use of these criteria can be utilized as an aid for
further analysis and arbitration to find the best edge detector for a given image.
Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)CSCJournals
Several obfuscation tools and software are available for Java programs but larger part of these
software and tools just scramble the names of the classes or the identifiers that stored in a
bytecode by replacing the identifiers and classes names with meaningless names. Unfortunately,
these tools are week, since the java, compiler and java virtual machine (JVM) will never load and
execute scrambled classes. However, these classes must be decrypted in order to enable JVM
loaded them, which make it easy to intercept the original bytecode of programs at that point, as if
it is not been obfuscated. In this paper, we presented a dynamic obfuscation technique for java
programs. In order to deter reverse engineers from de-compilation of software, this technique
integrates three levels of obfuscation, source code, lexical transformation and the data
transformation level in which we obfuscate the data structures of the source code and byte-code
transformation level. By combining these levels, we achieved a high level of code confusion,
which makes the understanding or decompiling the java programs very complex or infeasible.
The proposed technique implemented and tested successfully by many Java de-compilers, like
JV, CAVJ, DJ, JBVD and AndroChef. The results show that all decompiles are deceived by the
proposed obfuscation technique
The availability of advanced capturing and computation techniques delivered the way to study on
trajectory data, which denote the mobility of a variety of moving objects, such as people, vehicles
and animals. Trajectory data mining is of the research trend in data mining research to cope with
the current demand of trajectory data analysis providing profit rich applications. Data clustering is
one of the best techniques to group the community data. In this paper efforts are made to review
the trendy research being done in trajectory data mining. The review is three fold, surveying the
literature on location and community based trajectory mining, trajectory data bases and trajectory
querying. The review explored the trajectory data mining framework. This review can help outline
the field of trajectory data mining, providing a quick outlook of this field to the community.
Trajectory clustering methods are discussed. The opportunities and applications of cluster based
trajectory data mining are presented. The method of similarity based community clustering is
adopted to go with the future work.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
Application of Fuzzy Logic in Load Balancing of Homogenous Distributed Systems1CSCJournals
Various studies have shown that distributing the work load evenly among processors of a
distributed system highly improves system performance and increases resource utilization. This
process is known as load balancing. Fuzzy logic has been applied in many fields of science and
industry to deal with uncertainties. Existing research in using fuzzy logic for the purpose of load
balancing has only concentrated in utilizing fuzzy logic concepts in describing processors load
and tasks execution length. The responsibility of the fuzzy-based load balancing process itself,
however, has not been discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a new fuzzy dynamic load
balancing algorithm for homogenous distributed systems. The proposed algorithm utilizes fuzzy
logic in dealing with inaccurate load information, making load distribution decisions, and
maintaining overall system stability. In terms of control, we propose a new approach that specifies
how, when, and by which node the load balancing is implemented. Our approach is called
Centralized-But-Distributed (CBD). An evaluation study of the proposed algorithm shows that our
algorithm is able to reduce the average response time and average queue length as compared to
known load balancing algorithms reported in the literature.
In recent years many advancement has been made in research and development of Oral Drug Delivery System. Concept of Novel Drug Delivery System arose to overcome the certain aspect related to physicochemical properties of drug molecule and the related formulations.
Purpose of this review is to compile the recent literature with special focus on Gastro Retentive Drug Delivery Systems to give an update
on pharmaceutical approaches used in enhancing the Gastric Residence Time (GRT). Various approaches are currently used including Gastro Retentive Floating Drug Delivery Systems(GRFDDS),swelling and expanding system, polymeric bioadhesive systems, modifiedshape
systems, high density system and other delayed gastric emptying devices. These systems are very helpful to different problem solve during the formulation of different dosage form. The present work also focuses on the polymers used in floating drug delivery systems
mostly from natural origin. Floating drug delivery systems are less dense than gastric fluids; hence remain buoyant in the upper GIT for a
prolonged period, releasing the drug at the desired/ predeterminedrate. This review article focuses on the recent technological development in floating drug delivery systems with special emphasis on the principal mechanism of floatation and advantages of achieving gastric
retention, brief collection on various polymers employed for floating drug delivery systems etc. In addition this review also summarizes the In –Vitro and In -Vivo studies to evaluate their performance and also their future potential.
Here are some Reasons why you can Choose Concierge Appconciergeapp
If you are looking for the mobile makeup artist in melbourne then Concierge is the best fit for you. This app is only made for your comfort and we always take care of our clients. Concierge provides best features like Group booking functionality, Convenience of mobile services that come to you etc. Even we can not charge any commission fee. For more information please visit this presentation.
A SECURITY FRAMEWORK FOR SOA APPLICATIONS IN MOBILE ENVIRONMENTIJNSA Journal
A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enable support to many types of application but also give rise to a necessity to find a model of service development. Actually, SOA (Service Oriented Architecture) is a good option to support application development. This paper presents a framework that allows the development of SOA based application in mobile environment. The objective of the framework is to give developers with tools for provision of services in this environment with the necessary security characteristics.
MULTIVIEW SOA : EXTENDING SOA USING A PRIVATE CLOUD COMPUTING AS SAAS AND DAASijseajournal
This work is based on two major areas, the Multiview Service Oriented Architecture and the combination between the computing cloud and MV-SOA. Thus, it is suggested to extend firstly the service oriented architecture (SOA) into an architecture called MV-SOA by adding two components, the Multiview service generator, whose role is to transform the classic service into Multiview service, and the data base, this component seeks to stock all of consumer service information. It is also suggested to combine the computing cloud and Multiview Service Oriented Architecture MVSOA. To reach such combination, the
MVSOA architecture was taken and we added to the client-side a private cloud in SaaS and DaaS.
ENHANCING AND MEASURING THE PERFORMANCE IN SOFTWARE DEFINED NETWORKINGIJCNCJournal
Software Defined Networking (SDN) is a challenging chapter in today’s networking era. It is a network design approach that engages the framework to be controlled or 'altered' adroitly and halfway using programming applications. SDN is a serious advancement that assures to provide a better strategy than displaying the Quality of Service (QoS) approach in the present correspondence frameworks. SDN etymologically changes the lead and convenience of system instruments using the single high state program. It separates the system control and sending functions, empowering the network control to end up specifically. It provides more functionality and more flexibility than the traditional networks. A network administrator can easily shape the traffic without touching any individual switches and services which are needed in a network. The main technology for implementing SDN is a separation of data plane and control plane, network virtualization through programmability. The total amount of time in which user can respond is called response time. Throughput is known as how fast a network can send data. In this paper, we have design a network through which we have measured the Response Time and Throughput comparing with the Real-time Online Interactive Applications (ROIA), Multiple Packet Scheduler, and NOX.
An Architectural Framework for Delivering Sip-As Multimedia Services Based on...josephjonse
This paper proposes a new scalable service-oriented architecture based on Open Service Gateway Initiative (OSGI) technology. A key part of this architecture is its SIP application as a service (SIP-AS). It relies on IMS core network supported by multi agents components implemented using Java Agent DEvelopment (JADE) platform. As a proof of concept, a real testbed/prototype has been developed to validate our approach. The validation process consisted of two phases: (i) configuration of the JADE/OSGi SIP-AS architecture to provide a televoting service and (ii) characterization and analysis of jitter, packet loss, load capacity and CPU utilization of the implemented architecture. Results demonstrate that this televoting service scales up and out enabling the elasticity of the architecture on the processing of
concurrent calls and dynamic load balancing.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
AN ARCHITECTURAL FRAMEWORK FOR DELIVERING SIP-AS MULTIMEDIA SERVICES BASED ON...ijngnjournal
This paper proposes a new scalable service-oriented architecture based on Open Service Gateway Initiative (OSGI) technology. A key part of this architecture is its SIP application as a service (SIP-AS). It relies on IMS core network supported by multi agents components implemented using Java Agent DEvelopment (JADE) platform. As a proof of concept, a real testbed/prototype has been developed to validate our approach. The validation process consisted of two phases: (i) configuration of the JADE/OSGi SIP-AS architecture to provide a televoting service and (ii) characterization and analysis of jitter, packet loss, load capacity and CPU utilization of the implemented architecture. Results demonstrate that this televoting service scales up and out enabling the elasticity of the architecture on the processing of concurrent calls and dynamic load balancing.
EARLY PERFORMANCE PREDICTION OF WEB SERVICESijwscjournal
Web Service is an interface which implements business logic. Performance is an important quality aspect
of Web services because of their distributed nature. Predicting the performance of web services during
early stages of software development is significant. In this paper we model web service using Unified
Modeling Language, Use Case Diagram, Sequence Diagram, Deployment Diagram. We obtain the
Performance metrics by simulating the web services model using a simulation tool Simulation of Multi-Tier
Queuing Architecture. We have identified the bottle neck resources.
Referring Expressions with Rational Speech Act Framework: A Probabilistic App...IJDKP
This paper focuses on a referring expression generation (REG) task in which the aim is to pick
out an object in a complex visual scene. One common theoretical approach to this problem is
to model the task as a two-agent cooperative scheme in which a ‘speaker’ agent would generate
the expression that best describes a targeted area and a ‘listener’ agent would identify the target.
Several recent REG systems have used deep learning approaches to represent the speaker/listener
agents. The Rational Speech Act framework (RSA), a Bayesian approach to pragmatics that can
predict human linguistic behavior quite accurately, has been shown to generate high quality and
explainable expressions on toy datasets involving simple visual scenes. Its application to large scale
problems, however, remains largely unexplored. This paper applies a combination of the probabilistic
RSA framework and deep learning approaches to larger datasets involving complex visual scenes
in a multi-step process with the aim of generating better-explained expressions. We carry out
experiments on the RefCOCO and RefCOCO+ datasets and compare our approach with other endto-end deep learning approaches as well as a variation of RSA to highlight our key contribution.
Experimental results show that while achieving lower accuracy than SOTA deep learning methods,
our approach outperforms similar RSA approach in human comprehension and has an advantage
over end-to-end deep learning under limited data scenario. Lastly, we provide a detailed analysis
on the expression generation process with concrete examples, thus providing a systematic view
on error types and deficiencies in the generation process and identifying possible areas for future
improvements.
Similar to Performance Evaluation of Web Services In Linux On Multicore (20)
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Performance Evaluation of Web Services In Linux On Multicore
1. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 161
Performance Evaluation of Web Services In Linux On Multicore
P. Bala Subramanyam Raju bsr3011@gmail.com
Research Scholar,
S.V University,
Tirupathi Chittoor (Dt) AP, India
P. Govindarajulu pgovindarajulu@yahoo.com
Professor, Dept. of Computer Science,
S.V University,
Tirupathi Chittoor (Dt) AP, India
Abstract
Contemporary Business requires the ability to seamlessly exchange information between internal
business units, customers, and partner, is vital for success. Most organizations employ a variety of
different applications to store and exchange data in dissimilar way and therefore cannot “communicate” to
one another productively [1]. Service Oriented Architecture (SOA) components provide services to other
components via communication protocols typically over a network [2].The technologies like DCOM, RMI,
COBRA, Web Services etc. are developed using SOA, which contributed best to fulfill requirements to
some extent, but components result from these technologies are mostly either language specific or
platform specific,[3]. The services or components developed for one platform may not be able to
communicate and reusable in other platform, as they are mostly language specific or platform specific.
“World Wide Web Consortium (W3C) International community to develop web standards” issued WS-*
specifications for programming language vendors for Web services, which confirms a standard means of
interoperating between different software applications running on a variety of platforms or frameworks
[4][5]. This paper tests web services performance gain along with interoperability, reusability by using
“NAS Parallel Benchmarks (NPB)” set of program [6] developed by NASA Advanced Supercomputing
Division to evaluate the performance of supercomputers.
Keywords: SOA, WSDL, COBRA, RMI, Stub, Skeleton, SOAP Protocol, HTTP Protocol.
1. INTRODUCTION
Service-Oriented Architecture (SOA) is an approach to create and expose the business functions to the
outer world via communication protocols [7]. One of the key aspects of SOA is that, interactions occur
with loosely coupled services that operate independently.SOA Architecture and its elements are shown in
figures1.1, figure 1.2. It provides service reuse and build applications so quickly, this benefits business to
reduce time to market (TTM) and save money [8].
The SOA [9] can operate independently of specific technologies and can be implemented using a wide
range of technologies including: RPC, REST, DCOM, CORBA OPC-UA, Java RMI, Web Services, and
WCF Services, JAX-WS 2.2[10]. WCF Services [11] [12] and JAX-WS2.2 are web services that confirms
to WS-*specifications.
2. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 162
FIGURE 1.1: Shows the Architecture of SOA. FIGURE 1.2: Shows the Elements of SOA.
The rest of the paper is organized as follows; Section 2 provides brief introduction about WCF Services
and JAX-WS2.2, related research work outlined in section 3. Proposed problem statement, Algorithm of
NPB application are discussed in section 4. Section 5 specifies hardware and software used.
Implementation details are discussed in section 6, Execution Results are shown in section 7. Conclusion
and future work is presented in section 8.
2. WCF and JAX-WS
Windows Communication Foundation (WCF) is a framework for building service oriented applications
[13], where we can send data asynchronously from one service endpoint to other. WCF Services exposes
business process as collection of endpoints. An endpoint consist of three properties [14]
1. Address- indicates where the service can be found
2. Binding -specifies how a client can communicate
3. Contracts- identify the operations available
A service endpoint can be part of continuously available service hosted by IIS or service hosted in an
application. An end point can be a client service requests data from a service endpoint [15]
.
WCF supports
Industry standard formats such as WSDL, XML Schema and WS-Policy Service Metadata used to
configure clients. Major Features of WCF are listed
1. Service orientation,
2. Interoperability,
3. Security,
4. Multiple Transports and Encodings,
5. AJAX and REST support,
6. Customization.
WCF Services can be run like normal executables, can be hosted by an external agent, such as IIS or
Windows Activation Service (WAS). WAS enables WCF applications to be activated automatically as Web
services or manually as executables. The Architecture of WCF Services and communication process is
shown in the below figures 2.1and 2.2
3. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 163
FIGURE 2.1: Shows the Architecture of WCF. FIGURE 2.2: Shows the Communication Process
between Service and Client Using Endpoint.
Java API for XML Web services (JAX-WS) is a technology for building web services and clients that
communicate using XML.JAX-WS allows developers to write message-oriented as well as Remote
Procedure Call9RPC) web services [16]. JAX-WS hides the complexity of SOAP messages structure,
encoding, conventions for representing service invocations and responses. On the server side, the
developer specifies the web service operations by defining methods in an interface written in the java
programming language [17] [18]. The developer codes one or more classes that implement those
methods. Client programs are also easy to code.
JAX-WS uses technologies defined by the W3C technologies HTTP, SOAP, WSDL which specifies an
XML format for describing a service as a set of endpoints operating on messages; this is a big advantage
of platform independence.
FIGURE 2.3: Shows the Types of Web Services FIGURE 2.4: Shows the Communication Pattern of JAX-WS.
Supported by java.service Architecture.
4. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 164
3. RELATED WORK
The Authors Markus Stopper and Bernd Gastermann have introduced the WCF’s various Message
exchange patterns, and hosting process. They have implemented WCF services for industrial application
in production environment with a central manufacturing information system (MIS).This application steadily
delivers important information about the current manufacturing process in real-time. They have designed
the software to give indication of whether the production order’s deadline can be reached or not [19].
Wei.Zhang and Jing.Li tested the extensibility of WCF i.e. the ability to change the product more easily
over time and flexibility to customize for specific requirements of applications. In this research they used
web-MIS application. Web-MIS applicaton takes advantage of the extensibility to integrate DI
(Dependency Injection) and AOP (Aspect-Oriented Programming). Using WCF we can achieve higher
softwarequality [20].
The Authors Tu Nguyen Thi Thanh, Thang Huynh Quyetresearch attempts to introduce the development
of OPC UA SDK based WCF Technology, which is used for monitoring and controlling systems. They
have successfully developed OPC UA SDK for an environmental monitoring application (EMA).This SDK
in turn makes system architects and developers easy to design and implement applications in terms of
environmental monitoring. In addition, this also reduces the development time and cost for such
applications [21].
MdTanvir Ahmad, Prof. M. AfsarAlam, Shah Imran Alamhave introduced various SOA implementations
like contract First WCF with XML serialization, Data Contract serialization and restful service. It has been
witnessed from performance analysis that, by designing/implementing SOA using Contract-First
Approach, with Data Contract Sterilization saves time and money. With this approach WS* security can
be achieved properly.
It has also been observed that SOA designing/implementation with WCF RESTful Service is good in
integration with latest GUI and concludes that, SOA capability can be extended to large scale by making it
accessible to an individual and organization level. Significance performance gain with WCF RESTful
Service. The analysis of SOAP WCF Service and WCF RESTful Service clearly shown that the RESTful
WCF returns the response much faster than the WCF WSDL Service, almost 10 times faster. Also the
response object size for RESTful WCF Service is smaller than WCF WSDL Service [22].
4. PROBLEM STATEMENT AND ALGORITHM OF NPB APPLICATION
Most of research work on SOA is concentrated on extensibility and performance gain. Less motivation
towards interoperability. The management of resources to increase capacity (serving number of clients)
and performance is a major constraint because the service demands might vary in peak timings.
Therefore more efficient and cost-effective solution is needed in implementing SOA services.
The goal of this work is to provide the more performance with the same resources (hardware) along with
testing Cross platform interoperability, language interoperability, and reusability. We have used Nasa
Parallel Benchmark (NPB) application for this purpose. Below is the abstract and untouched algorithm of
NPB application.
Algorithm for Main method
Step: 1 Start
Step: 2 Read the operation, class from arguments
Step: 3 if operation equal to IS
Call method ProcessIS with class argument
Step: 4 Else if operation equal to CG
Call method ProcessCG with class argument
Step: 5 Else if operation equal to MG
Call method ProcessMG with class argument
5. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 165
Step: 6 Else if operation equal to FT
Call method ProcessFT with class argument
Step: 7 Stop
Algorithm for ProcessIS
Step: 1 Start
Step: 2 Read the class parameter
Step: 3 perform Integer Sort operation based on the class argument
Step: 4 output the result
Step: 5 Stop
Algorithm for ProcessCG
Step: 1 Start
Step: 2 Read the class parameter
Step: 3 perform Conjugate Gradient operation based on the class argument
Step: 4 output the result
Step: 5 Stop
Algorithm for ProcessMG
Step: 1 Start
Step: 2 Read the class parameter
Step: 3 perform Multi-Grid operation based on the class argument
Step: 4 output the result
Step: 5 Stop
Algorithm for ProcessFT
Step: 1 Start
Step: 2 Read the class parameter
Step: 3 perform discrete 3D fast Fourier Transform operation based on the class argument
Step: 4 output the result
Step: 5 Stop
5. EXPERIMENTAL TESTBED
Server Configuration Client Configuration
Processor : Intel® Core™ i7-4770k
[23]
Processor : Intel® Core™ i3-
3110Mk
[24]
No of Cores : 4 No of Cores : 2
No of Threads : 8 No of Threads : 4
Base Frequency : 3.5Ghz Base Frequency : 2.4Ghz
Turbo Frequency : 3.9Ghz Turbo Frequency : No
Intel® Smart Cache : 8MB Intel® Smart Cache : 3 MB
RAM : 8GB/1600MHz RAM : 4GB/1333MHz
LINUX KERNEL: 4.5
[25]
Operating System: Linux Mint 17.3-Mate 64 Bit
[26]
Operating System: Windows 10 64 bit
6. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 166
6. IMPLEMENTATION DETAILS
In order to prove advanced web services provides not only programming language interoperability but
also platform, we created server service which executes the NPB operations in Linux OS using Java JAX-
WS. Client services are created in Linux Java JAX-WS as desktop application, another client service in
windows system using .NET WCF Services as web application. Both the clients are created to call Server
service by passing operation, class as arguments. The clients, server are hosted in the LAN network to
have communication between them.
Initially executed NPB standalone application using NetBeans IDE and results have been tabulated in
table 6.The Linux hosted JAX-WS as server service which in turn executes the NPB when called by client
service. We have made few modifications to NPB source so that it will be suitable in the JAX-WS Service.
The client services .NET WCF Service, and Java service requested the server service. The execution
results are sent as response from server and the results are tabulated in table 6. Figure 6 showing the
experiment architecture. And figures 6.1, 6.2, 6.3, 6.4 shows the few execution screens.
FIGURE 6: Shows the Experimental Architecture .
Improved Abstract algorithm of NPB application to fit in client server environment.
Algorithm Web Server Service Class
Step: 1 Start
Step: 2 wait for client request
Step: 3 if request is received
Call processrequest method with
operation, class values
Step: 4 receive the result from process
request method
Step: 5 return the result to the client as
response
Step: 6 return to step 2
Step: 7 stop
Algorithm Web Client Service Class
Step: 1 Start
Step: 2 Read the operation and class values
Step: 3 call Web server service in the network
Along with operation, class values
Step: 4 receive the result as response
Step: 5 output the result
Step: 6 stop
Web Server : Glass Fish Server 4.1.1 Web Server : IIS
Java JDK: 1.7 C#.NET : 6.0
Java EE : 7.0 ASP.NET : 4.6
Net beans IDE: 8.0.2 Visual Studio IDE: 2015
7. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 167
FIGURE 6.1: Shows Exec of IS Operation with Class B. FIGURE 6.2: Shows Execof MG Operation with Class W.
FIGURE 6.3: Shows ExecofFT Operation with Class A. FIGURE 6.4: Shows Execof CG Operation with Class.
8. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 168
7. NORMAL EXECUTION AND WEB SERVICE EXECUTION
8. CONCLUSION AND FUTURE WORK
The above results shows that Web services provides better performance for legacy source code, which
can be easily embedded with few modifications. This integration of legacy source code saves lot of
development effort, time and cost for the organization by reusing the existing development effort. It is also
proved that Web services provides not only language interoperability, but also platform interoperability by
utilizing the JAX-WS service hosted in Linux in .NET WCF service.
We have conducted this experiment NPB application for only S, W, A, B Classes due to lack of server
hardware. It can be further extended to the classes C, D, E, and F which requires huge hardware
resources.
9. REFERENCES
[1] Internet: http://www.altova.com/whitepapers/webservices.pdf [Jul, 24, 2016].
[2] Internet: https://en.wikipedia.org/wiki/Service-oriented_architecture[Jul, 24, 2016].
[3] Internet: http://www.careerride.com/Net-Web-Service-Need.aspx[Jul, 24, 2016].
[4] Internet: http://www.dotnet-tricks.com/Tutorial/webservice/ccHW280913-Understanding-WS-star-
standards-and-specifications.html [Jul,9,2016].
[5] Internet: https://www.w3.org/2002/ws/Activity [Jul, 24, 2016].
[6] Internet: http://www.nas.nasa.gov/publications/npb.html[Jul, 24, 2016].
Normal Execution Web Services Execution
IS Class S Class W Class A Class B Class S Class W Class A Class B
Size 65536 1048576 8388608 3355443
2
65536 1048576 8388608 33554432
Time in Sec 0.007 0.022 0.260 1.109 0.006 0.016 0.254 1.089
MOPS total 93.637 476.630 322.639 306.433 109.243 655.366 330.261 308.122
Iterations 10 10 10 10 10 10 10 10
CG Class S Class W Class A Class B Class S Class W Class A Class B
Size 1400 7000 14000 75000 1400 7000 14000 75000
Time in Sec 0.042 0.295 1.071 85.502 0.042 0.277 1.034 84.209
MOPS total 1587.0 1430.714 1397.255 639.853 1627.0 1518.520 1447.253 650.853
Iterations 15 15 15 75 15 15 15 75
MG Class S Class W Class A Class B Class S Class W Class A Class B
Size 32*32*32 64*64*64 256*256*2
56
256*256*
256
32*32*32 64*64*64 256*256*2
56
256*256*2
56
Time in Sec 0.027 0.272 1.595 7.603 0.027 0.232 1.432 6.903
MOPS total 337.723 2452.172 2493.276 2620.186 350.723 2874.960 2546.673 2685.190
Iterations 4 40 4 20 4 40 4 20
FT Class S Class W Class A Class B Class S Class W Class A Class B
Size 64*64*64 128*128*
128
256*256*1
28
512*256*
256
64*64*64 128*128*1
28
256*256*1
28
512*256*2
56
Time in Sec 0.166 0.452 6.004 84.988 0.160 0.315 5.791 83.988
MOPS total 1067.271 824.497 1188.615 1083.136 1107.293 1183 1232.334 1153.136
Iterations 4 6 6 20 4 6 6 20
9. P. Bala Subramanyam Raju & P. Govindarajulu
International Journal of Computer Science & Security (IJCSS), Volume (10) : Issue (4) : 2016 169
[7] Internet: https://msdn.microsoft.com/en-in/library/bb833022.aspx[Jul, 24, 2016].
[8] Internet: http://searchsoa.techtarget.com/definition/service-oriented-architecture[Jul, 24, 2016].
[9] Internet: https://en.wikipedia.org/wiki/Service-oriented_architecture[Jul, 24, 2016].
[10]Internet: http://download.oracle.com/otn-pub/jcp/jaxws-2.2-mrel3-evalu-oth-JSpec/jaxws-2_2-mrel3-
spec.pdf?AuthParam=1459229313_10c3b5dc52161b9d6472646637abce2b [Jul, 24, 2016].
[11]Internet: https://msdn.microsoft.com/en-us/library/ms733128 (v=vs.110).aspx [Jul, 24, 2016].
[12]Internet: https://msdn.microsoft.com/en-us/library/aa480210.aspx[Jul, 24, 2016].
[13]Internet: https://msdn.microsoft.com/en-us/library/ms731082(v=vs.110).aspx [Jul, 24, 2016].
[14]Internet: https://msdn.microsoft.com/en-us/library/ms733107(v=vs.110).aspx [Jul, 24, 2016].
[15]Internet: https://msdn.microsoft.com/en-us/library/ms731079(v=vs.110).aspx [Jul, 24, 2016].
[16]Internet: http://docs.oracle.com/javaee/6/tutorial/doc/bnayl.html [Jul, 24, 2016].
[17]Internet: http://www.mkyong.com/tutorials/jax-ws-tutorials/ [Jul, 24, 2016].
[18]Internet: http://www.ibm.com/developerworks/webservices/tutorials/ws-jax/ws-jax.html [Jul, 24, 2016].
[19]Markus Stopper and Bernd Gastermann “Service-oriented Communication Concept based on
WCF.NET for Industrial Applications” International Multiconference of Engineers and computer
Scientists 2010 Vol III IMECS 2010, March 17-19, 2010 Hong Kong.
[20]W. Zhang and J. Li, "Research and Application of WCF Extensibility", Web Information Systems and
Mining (WISM), 2010 International Conference on, Sanya, 2010, pp. 363-367.doi:
10.1109/WISM.2010.112
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5662927&isnumber=5662251.
[21]Tu Nguyen Thi Thanh, Thang Huynh Quyet,” Development of an OPC UA SDK Based WCF
Technology and Its Deployment for Environmental Monitoring Applications”, ICCASA 2012, Ho Chi
Minh City, Vietnam, November 26-27, 2012, pp 347-356
http://link.springer.com/chapter/10.1007%2F978-3-642-36642-0_34.
[22]Kola Siva Tharun, MuppallaPrudhvi, Satti Swami Reddy “ADVANTAGES OF WCF OVER WEB
SERVICES” International Journal of Computer Science and Mobile Computing, IJCSMC, Vol. 2,
Issue. 4, April 2013, pg.340 – 345 ISSN 2320–088X.
[23]http://ark.intel.com/products/75123/Intel-Core-i7-4770K-Processor-8M-Cache-up-to-3_90-GHz
[Jul, 24, 2016].
[24]http://ark.intel.com/products/84699/Intel-Core-i3-5020U-Processor-3M-Cache-2_20-GHz
[Jul, 24, 2016].
[25]https://www.kernel.org/ [Jul, 24, 2016].
[26]https://www.linuxmint.com/edition.php?id=206 [Jul, 24, 2016].