The document discusses semantic web services and their challenges. It provides an overview of semantic web technologies like WSDL, SOAP, UDDI, and OIL which are used to build semantic web services. The semantic web architecture adds semantics to web services through ontologies written in OWL and DAML+OIL. Key approaches to semantic web services include annotation, composition, and addressing privacy and security. However, semantic web services still face challenges in achieving their full potential due to issues in representation, reasoning, and a lack of real-world applications and data.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
Wireless network is ready for hundreds or thousands of nodes, where each node is connected to one or sometimes more sensors. WSN sensor integrated circuits, embedded systems, networks, modems, wireless communication and dissemination of information. The sensor may be an obligation to technology and science. Recent developments underway to miniaturization and low power consumption. They act as a gateway, and prospective clients, I usually have the data on the server WSN. Other components separate routing network routers, called calculating and distributing routing tables. Discussed the routing of wireless energy balance. Optimization solutions, we have created a genetic algorithm. Before selecting an algorithm proposed for the construction of the center console. In this study, the algorithms proposed model simulated results based on "parameters depending dead nodes, the number of bits transmitted to a base station, where the number of units sent to the heads of fuel consumption compared to replay and show that the proposed algorithm has a network of a relative.
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
Abstract: In WSN, sensor nodes have limited energy budget therefore this paper mainly focus on power saving by using the docition paradigm. Docition is a new teacher-student paradigm proposed to improve cognitive radio. Although it improves the infrastruc¬ture based networks it has a weakness in case of ad-hoc mobile net¬works. The energy constraints and the total mobility of the net¬work complicate the selection of the appropriate teacher for a student. By selecting the wrong teacher, there is a high probabil¬ity that the taught information may be faulty, and thus the student radio diverges from the best state. This causes a high amount of energy loss, though the most important concern in ad-hoc networks is energy limitation. In this paper, we propose a dynamic docition for teacher selection based on the auto-correla¬tion degree of the teacher’s candidate environment and the cross-correlation degree between the teacher candidate and the student environments. We validate our approach in the context of coexist¬ence between WSN and WiFi. The WSN detects, models and exploits the unused time slots in the electromagnetic spectrum, left by WiFi, using dynamic docition. The simulation results show that the use of dynamic docition outperforms the existing docition in mobile networks. The improvements are shown through the low link overhead percentage (20% less overhead) and the low packet loss ratio (30% improvement).
Keywords: Docitive; Online Prediction Problem; WSN; pareto model; IEEE802.11 b/g;cognitive radio.
Title: Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitive WSN
Author: Dr. Charbel Nicolas
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
Abstract: Data gathering in wireless sensor network (WSN) is a crucial field of study and it can be optimized various algorithms like clustering, aggregation, and cryptographic technique in order to reliably transfer data between sensor and sink. But these techniques do not provide an optimized data gathering wireless sensor network because of the fact that they do not leverage the advantages of various techniques. Our problem definition is to create a reliable data gathering wireless sensor network which ensures good energy efficiency and lower delay as compared to existing techniques.
Keywords: Aggregation, Clustering, Data Gathering, Cryptography, Data Compression, Run Length Encoding.
Title: Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency and Delay
Author: Neelam Ashok Meshram
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
Multidimensional scaling algorithm and its current applications in wireless l...IDES Editor
The paper gives an overview of multidimensional
scaling (MDS) algorithm. Aside from brief introduction to
MDS, its characteristics, its various types and its current
applications has been discussed in wireless systems i.e.
localization of wireless sensors in a network and determining
the position of a mobile station without GPS. MDS is an
algorithm by means of which information contained in a set of
data is represented by a set of points in a low dimensional space.
These points are arranged in such a way that distances between
the points represents the relation between the data elements
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
This slides covers all aspects
of current Web services and discusses the future direction of Web services.
It explains how to discover, describe, and access Web services and the technologies
behind those functions. It also provides concrete use cases for
deploying Web services and answers the question “Why use Web services?”
Lastly, it provides detailed description of advanced Web service applications
to include orchestration and security. The chapter closes with a discussion
of grid-enabled Web services and semantic-enabled Web services.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
Abstract Now a day’s wireless sensor network has become an interesting research field. Network life time and energy efficiency are one of the main concerns for wireless sensor networks. Sensors are constrained in terms of battery power, storage, limited processing capacity etc. Because of these reasons new protocols are proposed for wireless sensor network. This paper only deals with cluster based hierarchical protocol TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol). The sensor network architecture in TEEN is based on a hierarchical clustering. TEEN is data-centric, reactive, event-driven protocol which is best suited for time critical application. It transmits data based on hard threshold and soft threshold values. If the thresholds are not reached, then nodes will never communicate. The user will not get any data from network and will not come to know if all the nodes die. So, user will not be able to distinguish between how many nodes are alive or dead in network and will not be able to know about network lifetime. This paper deals with that node will be able to tell base station or sink before leaving network and base station will be aware of alive and dead nodes in the network. Keywords: WSN; TEEN (Threshold Sensitive Energy Efficient Clustering); Hard Threshold; Soft Threshold;
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analysis of Genetic Algorithm for Effective power Delivery and with Best Upsurgeijeei-iaes
Wireless network is ready for hundreds or thousands of nodes, where each node is connected to one or sometimes more sensors. WSN sensor integrated circuits, embedded systems, networks, modems, wireless communication and dissemination of information. The sensor may be an obligation to technology and science. Recent developments underway to miniaturization and low power consumption. They act as a gateway, and prospective clients, I usually have the data on the server WSN. Other components separate routing network routers, called calculating and distributing routing tables. Discussed the routing of wireless energy balance. Optimization solutions, we have created a genetic algorithm. Before selecting an algorithm proposed for the construction of the center console. In this study, the algorithms proposed model simulated results based on "parameters depending dead nodes, the number of bits transmitted to a base station, where the number of units sent to the heads of fuel consumption compared to replay and show that the proposed algorithm has a network of a relative.
Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitiv...paperpublications3
Abstract: In WSN, sensor nodes have limited energy budget therefore this paper mainly focus on power saving by using the docition paradigm. Docition is a new teacher-student paradigm proposed to improve cognitive radio. Although it improves the infrastruc¬ture based networks it has a weakness in case of ad-hoc mobile net¬works. The energy constraints and the total mobility of the net¬work complicate the selection of the appropriate teacher for a student. By selecting the wrong teacher, there is a high probabil¬ity that the taught information may be faulty, and thus the student radio diverges from the best state. This causes a high amount of energy loss, though the most important concern in ad-hoc networks is energy limitation. In this paper, we propose a dynamic docition for teacher selection based on the auto-correla¬tion degree of the teacher’s candidate environment and the cross-correlation degree between the teacher candidate and the student environments. We validate our approach in the context of coexist¬ence between WSN and WiFi. The WSN detects, models and exploits the unused time slots in the electromagnetic spectrum, left by WiFi, using dynamic docition. The simulation results show that the use of dynamic docition outperforms the existing docition in mobile networks. The improvements are shown through the low link overhead percentage (20% less overhead) and the low packet loss ratio (30% improvement).
Keywords: Docitive; Online Prediction Problem; WSN; pareto model; IEEE802.11 b/g;cognitive radio.
Title: Using Neighbor’s State Cross-correlation to Accelerate Adaptation in Docitive WSN
Author: Dr. Charbel Nicolas
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
Characterization of directed diffusion protocol in wireless sensor networkijwmn
Wireless sensor network (WSN) has enormous applications in many places for monitoring the environments
of importance. Sensor nodes are capable of sensing, computing, and communicating. These sensor nodes
are energy constraint and operated by batteries. Since energy consumption is an important issue of WSN,
there have been many energy-efficient protocols proposed for the WSN. Directed diffusion (DD) is a datacentric
protocol that focuses on the energy efficiency of the networks. Since the first proposal of DD
protocol by Deborah, there have been various versions of DD protocols proposed by many scientists across
the globe. These upgraded versions of DD protocols add on various features to the original DD protocol
such as energy, scalability, network lifetime, security, reliability, and mobility. In this paper, we discuss
and classify various characteristics of themost populardirected diffusion protocols that have been proposed
over couple of years.
Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency...paperpublications3
Abstract: Data gathering in wireless sensor network (WSN) is a crucial field of study and it can be optimized various algorithms like clustering, aggregation, and cryptographic technique in order to reliably transfer data between sensor and sink. But these techniques do not provide an optimized data gathering wireless sensor network because of the fact that they do not leverage the advantages of various techniques. Our problem definition is to create a reliable data gathering wireless sensor network which ensures good energy efficiency and lower delay as compared to existing techniques.
Keywords: Aggregation, Clustering, Data Gathering, Cryptography, Data Compression, Run Length Encoding.
Title: Design of a Reliable Wireless Sensor Network with Optimized Energy Efficiency and Delay
Author: Neelam Ashok Meshram
ISSN 2349-7815
International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE)
Paper Publications
Multidimensional scaling algorithm and its current applications in wireless l...IDES Editor
The paper gives an overview of multidimensional
scaling (MDS) algorithm. Aside from brief introduction to
MDS, its characteristics, its various types and its current
applications has been discussed in wireless systems i.e.
localization of wireless sensors in a network and determining
the position of a mobile station without GPS. MDS is an
algorithm by means of which information contained in a set of
data is represented by a set of points in a low dimensional space.
These points are arranged in such a way that distances between
the points represents the relation between the data elements
LOAD BALANCING AND ENERGY EFFICIENCY IN WSN BY CLUSTER JOINING METHODIAEME Publication
In any WSN life of network is depending on life of sensor node. Thus, proper load balancing is very useful for improving life of network. The tree-based routing protocols like GSTEB used dynamic tree structures for routing without any formation of collections. In cases of larger networks, the scheme is not always feasible. In this proposed work cluster-based routing method is used. Cluster head is selected such that it should be close to the base station and should have maximum residential energy than other nodes selected for cluster formation. Size of cluster is controlled by using location-based cluster joining method such that nodes selects their nearest collection head based on the signal strength from cluster head and distance between node and cluster head. Nodes connect to head having the highest signal strength and closest to the base station, this minimizes size of cluster and reduces extra energy consumption. In addition to this cluster formation process starts only after availability of data due to an event. So proposed protocol performs better than existing tree based protocols like GSTEB in terms of energy efficiency
This slides covers all aspects
of current Web services and discusses the future direction of Web services.
It explains how to discover, describe, and access Web services and the technologies
behind those functions. It also provides concrete use cases for
deploying Web services and answers the question “Why use Web services?”
Lastly, it provides detailed description of advanced Web service applications
to include orchestration and security. The chapter closes with a discussion
of grid-enabled Web services and semantic-enabled Web services.
XenServer in der Cloud
Der beste Hypervisor für Desktop Virtualisierung
Web-basierter Zugriff auf VMs in der Cloud
Plattform für virtuelle Networking Appliances (VPX)
Live Demo I
Desktop-Optimierungen in Citrix XenServer
Zugriff über Web Self-Service
Powering VPX
Networking für die Cloud
Einbindung von SaaS Anwendungen in bestehende Umgebungen und Auslagern von Diensten mittels OpenCloudAccess / OpenCloudBridge
Sicherheit und Hochverfügbarkeit mit Citrix NetScaler
Sicherer Zugriff, Hochverfügbarkeit aller Komponenten und Bereitstellung von Web Anwendungen
Citrix Receiver für jedes Endgerät - Zugriff auf virtuelle Desktops & Apps mit iPad, Blackberry, Android & Co.
HDX Technologien: WAN-Optimierung mit Branch Repeater - Integration in bestehende Citrix Umgebungen
Live Demo II
WAN-Optimierung
Zugriff mit Citrix Receiver
Produktvorstellung: OpenCloud Access / OpenCloud Bridge
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...CSCJournals
A main objective of this paper is using artificial intelligence technique to web service agents and increase the efficiency of the agent communications. In recent years, web services have played a major role in computer applications. Web services are essential, as the design model of applications are dedicated to electronic businesses. This model aims to become one of the major formalisms for the design of distributed and cooperative applications in an open environment (the Internet). Current commercial and research-based efforts are reviewed and positioned within these two fields. A web service as a software system designed to support interoperable machine-to-machine interaction over a network. It has an interface described in a machine-process able format (specifically Web Services Description Language WSDL). Other systems interact with the web service in a manner prescribed by its description using SOAP messages, typically conveyed using HTTP with an XML serialization in conjunction with other Web-related standards. Particular attention is given to the application of AI techniques to the important issue of WS composition. Within the range of AI technologies considered, we focus on the work of the Semantic Web and Agent-based communities to provide web services with semantic descriptions and intelligent behavior and reasoning capabilities. Re-composition of web services is also considered and a number of adaptive agent approaches are introduced and implemented in publication domain with three dimensional databases and one of the areas of work is eCommerce.
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWijcseit
Web Services are modular, self-describing, self-contained and loosely coupled applications that can be
published, located, and invoked across the web. With the increasing number of web services available on
the web, the need for web services composition is becoming more and more important. Nowadays, for
answering complex needs of users, the construction of new web services based on existing ones is required.
This problem is known as web services composition. However, it is one of big challenge problems of recent
years in a distributed and dynamic environment. The various approaches in field of web service
compositions proposed by the researchers. In this paper we present a review of existing approaches for
web service composition and compare them among each other with respect to some key requirements. We
hope this paper helps researchers to focus on their efforts and to deliver lasting solutions in this field.
International Journal of Computer Science, Engineering and Information Techno...ijcseit
Web Services are modular, self-describing, self-contained and loosely coupled applications that can be
published, located, and invoked across the web. With the increasing number of web services available on
the web, the need for web services composition is becoming more and more important. Nowadays, for
answering complex needs of users, the construction of new web services based on existing ones is required.
This problem is known as web services composition. However, it is one of big challenge problems of recent
years in a distributed and dynamic environment. The various approaches in field of web service
compositions proposed by the researchers. In this paper we present a review of existing approaches for
web service composition and compare them among each other with respect to some key requirements. We
hope this paper helps researchers to focus on their efforts and to deliver lasting solutions in this field.
Survey on Semantic Web Services and its Composition AlgorithmEditor IJMTER
Service Oriented Architecture (SOA) is a collection of services. The
correspondence of these services takes place with one another. In SOA, Web Services are the
most important & promising part. Web services, adopted by Service Oriented Architecture
(SOA), are loosely coupled reusable software components that semantically encapsulate
discrete functionality and are distributed and programmatically accessible over the internet.
Web Service Composition plays an important role in SOA. Web Service Composition may be
dynamic or static. A composition process requires an algorithm to perform composition task.
Now-a-days various approaches for composition algorithm are used as required by research
task. In this study, we have done a survey on various web service composition algorithms.
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWijcseit
Web Services are modular, self-describing, self-contained and loosely coupled applications that can be
published, located, and invoked across the web. With the increasing number of web services available on
the web, the need for web services composition is becoming more and more important. Nowadays, for
answering complex needs of users, the construction of new web services based on existing ones is required.
This problem is known as web services composition. However, it is one of big challenge problems of recent
years in a distributed and dynamic environment. The various approaches in field of web service
compositions proposed by the researchers. In this paper we present a review of existing approaches for
web service composition and compare them among each other with respect to some key requirements. We
hope this paper helps researchers to focus on their efforts and to deliver lasting solutions in this field.
In recent years, the number of end users connected to the internet of things (IoT) has increased, and we have witnessed the emergence of the cloud computing paradigm. These users utilize network resources to meet their quality of service (QoS) requirements, but traditional networks are not configured to backing maximum of scalability, real-time data transfer, and dynamism, resulting in numerous challenges. This research presents a new platform of IoT architecture that adds the benefits of two new technologies: software-defined networking and fog paradigm. Software-defined networking (SDN) refers to a centralized control layer of the network that enables sophisticated methods for traffic control and resource allocation. So, fog paradigm allows for data to be analyzed and managed at the edge of the network, making it suitable for tasks that require low and predictable delay. Thus, this research provides an in-depth view of the platform organize and performance of its base ingredients, as well as the potential uses of the suggested platform in various applications.
May 2022: Most Download Articles in Web & Semantic Technologydannyijwest
International journal of Web & Semantic Technology (IJWesT) is a quarterly open access peer- reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of web & semantic technology. The growth of the World- Wide Web today is simply phenomenal. It continues to grow rapidly and new technologies, applications are being developed to support end users modern life. Semantic Technologies are designed to extend the capabilities of information on the Web and enterprise databases to be networked in meaningful ways. Semantic web is emerging as a core discipline in the field of Computer Science & Engineering from distributed computing, web engineering, databases, social networks, Multimedia, information systems, artificial intelligence, natural language processing, soft computing, and human-computer interaction. The adoption of standards like XML, Resource Description Framework and Web Ontology Language serve as foundation technologies to advancing the adoption of semantic technologies.
Lightweight IoT middleware for rapid application developmentTELKOMNIKA JOURNAL
Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
International Journal of Web & Semantic Technology (IJWesT)dannyijwest
International journal of Web & Semantic Technology (IJWesT) is a quarterly open access peer- reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of web & semantic technology. The growth of the World- Wide Web today is simply phenomenal
International Conference on NLP & Big Data (NLPD 2020)pijans
International Conference on NLP & Big Data (NLPD 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Big data. Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to these topics only.
International Journal of Web & Semantic Technology (IJWesT)dannyijwest
International journal of Web & Semantic Technology (IJWesT) is a quarterly open access peer- reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of web & semantic technology. The growth of the World- Wide Web today is simply phenomenal.
International Journal on AdHoc Networking Systems (IJANS)dannyijwest
In recent years, AdHoc networks have been attracting much interest in both academic and industrial communities. International Journal on AdHoc Networking Systems is an open access peer-reviewed journal that serves as a forum to discuss on ongoing research and new contributions. The journal addresses both practical and theoretical research in the areas of ad hoc networks, sensor networks, mesh networks and vehicular networks. Its main focus is on all issues from link layer up to the application layer. The journal solicits original technical papers that were not previously published and are not currently under review for publication elsewhere.
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
Tech transfer is a common methodology for transferring new products or an existing
commercial product to R&D or to another manufacturing site. Transferring product knowledge to the
manufacturing floor is crucial and it is an ongoing approach in the pharmaceutical and biotech
industry. Without adopting this process, no company can manufacture its niche products, let alone
market them. Technology transfer is a complicated, process because it is highly cross functional. Due
to its cross functional dependence, these projects face numerous risks and failure. If anidea cannot be
successfully brought out in the form of a product, there is no customer benefit, or satisfaction.
Moreover, high emphasis is in sustaining manufacturing with highest quality each and every time. It
is vital that tech transfer projects need to be executed flawlessly. To accomplish this goal, risk
management is crucial and project team needs to use the risk management approach seamlessly.