In service Oriented Architecture, many services are offered with similar functionality but with different service quality parameters. Thus the service selection using a deterministic approach causes conflicts and inefficient results. We use asynchronous queue to model the service inventory architecture avoiding unnecessary locking of resources and thus allowing a provision to consumers to get their required services without intervening and with temporally decoupled fashion. Actually this kind of service selection strategy is considered in regards with game theory to eliminate fluctuations of queue length. It offers a discrete random service which is equal to some request requested by consumers, it means service can be provided based on probability mass function as a substitute of deterministic decisions for selecting a proper service provider as of the consumers. Once the request is taken out from the queue, it is delivered to the interceptor that has validation and sanitization module. It thus reduces the peak queue length and reduces periodic fluctuations in the queue length.
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
This document proposes a preferences based customized trust model (PBCTM) for assessing trust in cloud services. PBCTM considers user preferences for quality of service attributes and evidence of a service's performance on those attributes to calculate a customized trust score. It allows for elastic trust computation that can respond dynamically to changing user preferences over time. The model facilitates periodic ranking and selection of cloud services according to a user's varying quality expectations. Experimental results show PBCTM provides more accurate trust assessments and higher user satisfaction compared to other models.
QOS Aware Formalized Model for Semantic Web Service SelectionIJwest
Selecting the most relevant Web Service according to a client requirement is an onerous task, as innumerous number of functionally same Web Services(WS) are listed in UDDI registry. WS are functionally same but their Quality and performance varies as per service providers. A web Service Selection Process involves two major points: Recommending the pertinent Web Service and avoiding unjustifiable web service. The deficiency in keyword based searching is that it doesn’t handle the client request accurately as keyword may have ambiguous meaning on different scenarios. UDDI and search engines all are based on keyword search, which are lagging behind on pertinent Web service selection. So the search mechanism must be incorporated with the Semantic behavior of Web Services. In order to strengthen this approach, the proposed model is incorporated with Quality of Services (QoS) based Ranking of semantic web services.
This paper focuses on various concepts of Quality of Service associated with web services. Various QoS parameters like performance, availability, reliability and stability etc. are formalized in order to enhance the pertinence of web service selection. A QoS mediator agent based Web Service Selection Model is proposed where QoS Consultant acts as a Mediator Agent between clients and service providers. Model suggests user’s preferences on QoS parameter selection. The proposed model helps to select pertinent Web Service as per user’s requirement and reduce the human effort.. Further process of adding ontology with semantic web services is also illustrated here.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SERVICE ORIENTED QUALITY REQUIREMENT FRAMEWORK FOR CLOUD COMPUTINGijcsit
This research paper introduces a framework to identify the quality requirements of cloud computing services. It considered two dominant sub-layers; functional layer and runtime layer against cloud characteristics. SERVQUAL model attributes and the opinions of the industry experts were used to derive the quality constructs in cloud computing environment. The framework gives proper identification of cloud computing service quality expectations of users. The validity of the framework was evaluated by using
questionnaire based survey. Partial least squares-structural equation modelling (PLS-SEM) technique was
used to evaluate the outcome. The research findings shows that the significance of functional layer is
higher than runtime layer and prioritized quality factors of two layers are Service time, Information and
data security, Recoverability, Service Transparency, and Accessibility.
A review on framework and quality of service based web services discoveryMustafa Algaet
In consequence these services are nowadays accessible to the final clients. In the last few years, more
and more Web Services providing the same functionalities are available in the environment. In order to
select the best service adapted to client’s requests, we need some method capable to evaluate and
compare different services providing the same functionalities. In this context, Quality of service can be defined as the capability to respond to the requirements (constraints) of a client and to fulfill these
needs with the best criteria (preferences) established by the client. It is calculated based on the non-
functional properties of the service. This paper provides an overview of a research progress in Quality
of Service Based Web Services Discovery; it also highlights the issues that need to be investigated in
Quality of Service Based Web Services
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationIRJET Journal
This document discusses a privacy-preserving QoS prediction framework for web service recommendation. It begins with an introduction to web services and the importance of quality of service (QoS) metrics in selecting web services. It then discusses existing recommender system techniques like collaborative filtering for web service recommendation. The document proposes a new technique for predicting QoS values based on known QoS data while preserving privacy. It reviews related work on QoS-aware and location-aware web service recommendation techniques. Finally, it outlines the framework of a proposed location-aware and privacy-preserving QoS prediction approach for web service recommendation.
- The document proposes a new approach to decrease the impact of SLA (service level agreement) violations on user satisfaction levels in cloud computing environments.
- It uses two hidden user characteristics - willingness to pay for service and willingness to pay for certainty - to inform a proactive resource allocation approach.
- The goal is to improve user satisfaction and profitability by considering these characteristics, rather than just SLA parameters, when deciding how to allocate resources during critical situations where some SLA violations are unavoidable.
Preferences Based Customized Trust Model for Assessment of Cloud ServicesIJECEIAES
This document proposes a preferences based customized trust model (PBCTM) for assessing trust in cloud services. PBCTM considers user preferences for quality of service attributes and evidence of a service's performance on those attributes to calculate a customized trust score. It allows for elastic trust computation that can respond dynamically to changing user preferences over time. The model facilitates periodic ranking and selection of cloud services according to a user's varying quality expectations. Experimental results show PBCTM provides more accurate trust assessments and higher user satisfaction compared to other models.
QOS Aware Formalized Model for Semantic Web Service SelectionIJwest
Selecting the most relevant Web Service according to a client requirement is an onerous task, as innumerous number of functionally same Web Services(WS) are listed in UDDI registry. WS are functionally same but their Quality and performance varies as per service providers. A web Service Selection Process involves two major points: Recommending the pertinent Web Service and avoiding unjustifiable web service. The deficiency in keyword based searching is that it doesn’t handle the client request accurately as keyword may have ambiguous meaning on different scenarios. UDDI and search engines all are based on keyword search, which are lagging behind on pertinent Web service selection. So the search mechanism must be incorporated with the Semantic behavior of Web Services. In order to strengthen this approach, the proposed model is incorporated with Quality of Services (QoS) based Ranking of semantic web services.
This paper focuses on various concepts of Quality of Service associated with web services. Various QoS parameters like performance, availability, reliability and stability etc. are formalized in order to enhance the pertinence of web service selection. A QoS mediator agent based Web Service Selection Model is proposed where QoS Consultant acts as a Mediator Agent between clients and service providers. Model suggests user’s preferences on QoS parameter selection. The proposed model helps to select pertinent Web Service as per user’s requirement and reduce the human effort.. Further process of adding ontology with semantic web services is also illustrated here.
Reliability evaluation model for composite web servicesdannyijwest
Web services are the new innovation in this era. Because of the cross-platform and language independent nature of the web
services, it is getting accepted by the various industries. Revolution in Service Oriented Architecture (SOA) has created
numerous web service users. Different choices of services are available to meet the specific requirement of customers. At the
same time, customer needs quality service. Selecting the web service which meets all the Quality of Service (QoS) requirement
specified by the consumer in the Service Level Agreement is a tedious task today. One of the predominant QoS factor is
reliability of the web service. Evaluation of reliability on web services and selecting the best one among the different choices are
needed now. This paper focuses on the design of reliability evaluation framework for the composite web services.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
SERVICE ORIENTED QUALITY REQUIREMENT FRAMEWORK FOR CLOUD COMPUTINGijcsit
This research paper introduces a framework to identify the quality requirements of cloud computing services. It considered two dominant sub-layers; functional layer and runtime layer against cloud characteristics. SERVQUAL model attributes and the opinions of the industry experts were used to derive the quality constructs in cloud computing environment. The framework gives proper identification of cloud computing service quality expectations of users. The validity of the framework was evaluated by using
questionnaire based survey. Partial least squares-structural equation modelling (PLS-SEM) technique was
used to evaluate the outcome. The research findings shows that the significance of functional layer is
higher than runtime layer and prioritized quality factors of two layers are Service time, Information and
data security, Recoverability, Service Transparency, and Accessibility.
A review on framework and quality of service based web services discoveryMustafa Algaet
In consequence these services are nowadays accessible to the final clients. In the last few years, more
and more Web Services providing the same functionalities are available in the environment. In order to
select the best service adapted to client’s requests, we need some method capable to evaluate and
compare different services providing the same functionalities. In this context, Quality of service can be defined as the capability to respond to the requirements (constraints) of a client and to fulfill these
needs with the best criteria (preferences) established by the client. It is calculated based on the non-
functional properties of the service. This paper provides an overview of a research progress in Quality
of Service Based Web Services Discovery; it also highlights the issues that need to be investigated in
Quality of Service Based Web Services
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationIRJET Journal
This document discusses a privacy-preserving QoS prediction framework for web service recommendation. It begins with an introduction to web services and the importance of quality of service (QoS) metrics in selecting web services. It then discusses existing recommender system techniques like collaborative filtering for web service recommendation. The document proposes a new technique for predicting QoS values based on known QoS data while preserving privacy. It reviews related work on QoS-aware and location-aware web service recommendation techniques. Finally, it outlines the framework of a proposed location-aware and privacy-preserving QoS prediction approach for web service recommendation.
- The document proposes a new approach to decrease the impact of SLA (service level agreement) violations on user satisfaction levels in cloud computing environments.
- It uses two hidden user characteristics - willingness to pay for service and willingness to pay for certainty - to inform a proactive resource allocation approach.
- The goal is to improve user satisfaction and profitability by considering these characteristics, rather than just SLA parameters, when deciding how to allocate resources during critical situations where some SLA violations are unavoidable.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
USER-CENTRIC OPTIMIZATION FOR CONSTRAINT WEB SERVICE COMPOSITION USING A FUZZ...ijwscjournal
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound value-added service. Since, there may be a number of compositions to create the requested service, it is important to find one which its properties are close to user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem. Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of web service composition easier and more efficient.
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
Dynamic Interface Adaptability in Service Oriented Software
M. Ketfi and N. Belkhatir
8th International Workshop on Component-Oriented Programming (WCOP'03),
Darmstadt, Germany, July 2003.
Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Maintaining Consistent Customer Experience in Service System NetworksStephen Kwan
This document discusses maintaining consistent customer experience in service system networks. It proposes a model to align value propositions between service providers and their partners to deliver the promised level and quality of service to customers. The success of service system networks depends on this alignment, otherwise customers may receive dissatisfying service. The document presents scenarios where value propositions can become misaligned, such as in outsourcing and when using channel partners. It proposes decomposing value propositions into components to better understand relationships between initiating and receiving stakeholders across different value dimensions. An outcome-based contracting model is also discussed as a way for service providers to combat commoditization.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES ijwscjournal
This document summarizes research on using mobile web services for supply chain management. It first defines mobile web services and discusses architectures and classifications. It then reviews literature on mobile web service technologies, focusing on proposed architectures, discovery approaches, and other areas. The document outlines supply chain management concepts and processes. It surveys literature applying mobile web services to supply chain management processes. Finally, it proposes an integrated model for a mobile web service-oriented supply chain and identifies relevant research areas.
Orchestration of web services based on t qo s using user and web services agenteSAT Publishing House
1. The document discusses orchestrating web services based on transactional and quality of service (TQoS) properties using user and web services agents.
2. It proposes selecting atomic web services that fulfill the user's requirements and TQoS characteristics, and composing them using agents to achieve the user's overall goal.
3. The composition approach involves three steps - specifying the workflow, selecting component services based on the workflow and TQoS properties using a user agent, and composing the services using web services agents.
The importance of Exchange 2013 CAS in Exchange 2013 coexistence | Part 2/2 |...Eyal Doron
The importance of Exchange 2013 CAS in Exchange 2013 coexistence | Part 2/2 | 3#23
http://o365info.com/the-importance-of-exchange-2013-cas-in-exchange-2013-coexistence-environment-part-22/
Reviewing the subject of - Exchange CAS 2013 role in an Exchange 2013 coexistence environment.
This is the second article, in a series of two articles.
Eyal Doron | o365info.com
Functionality Based Fixing of Weight for Non-functional parameters of a web s...Editor IJCATR
In recent years, web services open the way to global business development through B2B integration and they used with
different business applications to accommodate their services. So while selecting a service, the first preference is given to the
functional properties of the web service and then a best web service is selected from the list by considering the expected quality. The
QoS of a web service is also depends on the variant nonfunctional parameters of its service which may subject to changes because of
network and other related factors. While considering the performance of a service, the overall quality is always preferred but the actual
functionality of the service is based on the weight fixed for the non functional parameters like response time, throughput, etc... So
assigning functionality based weight for the non functional parameters are used to achieve the assured quality of the service. In this
paper we are proposing the system that gives importance for the non functional parameters such as response time, throughput,
availability, success ability, reliability for which the weight is set based on functionality and requirement of aparticular business
application.
This document summarizes a research study that examined the influence of Internet Banking Service Quality (IBSQ) dimensions on Customer Satisfaction (CS) in the Ghanaian banking industry. The study collected data through surveys from 200 bank customers. Using structural equation modeling, the findings showed that of the five IBSQ dimensions, web design had a significantly positive influence on CS, explaining about 79.6% of CS. The study contributes to the literature on e-service quality and customer satisfaction in electronic banking, and provides implications for theory and management.
The document discusses guidelines for versioning service contracts to enable reuse and compatibility between different versions of services and consumers. It argues that a versioning strategy is essential to achieve reuse and realize the business benefits of SOA. The key elements are:
1) Define machine-readable contract elements in WSDL that specify validation rules at runtime.
2) Establish compatibility rules between contract versions to determine if new versions are backwards/forwards compatible. Non-breaking changes result in minor versions while breaking changes require major versions.
3) Design message type schemas for extensibility using XML features like <xs:any> to enable forwards compatibility and allow unknown future extensions. Consumers must accept and ignore unknown elements.
This document presents an approach for composing semantic web services using agents in a mobile ad hoc network (MANET). It proposes an ontology-based framework where JADE agents can link web services and agents to enable semantic web applications. The approach involves three phases - service registration, construction of a service graph by matching input/output parameters, and service discovery and composition. It describes using three sample agents (TrainNameService, TrainNumberService, CompositeTrainService) to demonstrate how the composition works. The composed web services are then shown to work properly when accessed over the MANET architecture. The approach aims to automate web service composition by semantically matching parameters.
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers. For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
Semantic Web: A Study on Web Service Composition Approachesijtsrd
A Web service is a collection of open protocols and standards used for exchanging data between applications and systems. Web Service discovery, selection and composition are the important tasks of the any automated business processes. In a web service composition set of web services are collectively executed to achieve the objectives. This study reveals the existing approaches used for web service composition in both syntactic and semantic environments. We have reviewed more than 40 articles in this domain and concluded with merits and demerits of the methodologies applied for the implementation of the web service composition. Michael Raj TF, | Siva Prakasam. P"Semantic Web: A Study on Web Service Composition Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd115.pdf http://www.ijtsrd.com/computer-science/world-wide-web/115/semantic-web-a-study-on-web-service-composition-approaches/michael-raj-tf-
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
This document discusses quality of service (QoS) based techniques for selecting web services for service composition. It begins by providing background on service-oriented computing and defining service composition. The document then reviews three approaches to web service selection: functional, non-functional, and user-based. It focuses on non-functional (QoS-based) service selection, describing the specifications of QoS-based service selection techniques, including QoS modeling, categorization, user preferences, evaluation criteria, and aggregating evaluation results. The document aims to evaluate various QoS-based service selection techniques and identify criteria for comparing them.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their
functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcscpconf
In today’s scenario, most of the organizations provide the services through the web. This makes the web service an important research area. In addition, early design and building web services, it is necessary to concentrate on the quality of web services. Performance is an important quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system. Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services
Performance Prediction of Service-Oriented Architecture - A surveyEditor IJCATR
Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications
based on service specifications created by service developers. Incorporating traditional performance models such as Stochastic Petri
Nets, Queuing Networks, and Simulation present drawbacks of SOA based applications due to special characteristics of SOA such as
lose coupling, self-contained and interoperability. Although, researchers have suggested many methods in this area during last decade,
none of them has obtained popular industrial use. Based on this, we have conducted a comprehensive survey on these methods to
estimate their applicability. This survey classified these approaches according to their performance metrics analyzed, performance
models used, and applicable project stage. Our survey helps SOA architects to select the appropriate approach based on target
performance metric and researchers to identify the SOA state-of-art performance prediction
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcsandit
In today’s scenario, most of the organizations provide the services through the web. This makes
the web service an important research area. In addition, early design and building web services,
it is necessary to concentrate on the quality of web services. Performance is an important
quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system.
Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature
available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services.
USER-CENTRIC OPTIMIZATION FOR CONSTRAINT WEB SERVICE COMPOSITION USING A FUZZ...ijwscjournal
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed environments. In such systems, however each service responds the user request independently, it is essential to compose them for delivering a compound value-added service. Since, there may be a number of compositions to create the requested service, it is important to find one which its properties are close to user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem. Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of web service composition easier and more efficient.
Dynamic Interface Adaptability in Service Oriented SoftwareMadjid KETFI
Dynamic Interface Adaptability in Service Oriented Software
M. Ketfi and N. Belkhatir
8th International Workshop on Component-Oriented Programming (WCOP'03),
Darmstadt, Germany, July 2003.
Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Research Inventy : International Journal of Engineering and Scienceinventy
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
Maintaining Consistent Customer Experience in Service System NetworksStephen Kwan
This document discusses maintaining consistent customer experience in service system networks. It proposes a model to align value propositions between service providers and their partners to deliver the promised level and quality of service to customers. The success of service system networks depends on this alignment, otherwise customers may receive dissatisfying service. The document presents scenarios where value propositions can become misaligned, such as in outsourcing and when using channel partners. It proposes decomposing value propositions into components to better understand relationships between initiating and receiving stakeholders across different value dimensions. An outcome-based contracting model is also discussed as a way for service providers to combat commoditization.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES ijwscjournal
This document summarizes research on using mobile web services for supply chain management. It first defines mobile web services and discusses architectures and classifications. It then reviews literature on mobile web service technologies, focusing on proposed architectures, discovery approaches, and other areas. The document outlines supply chain management concepts and processes. It surveys literature applying mobile web services to supply chain management processes. Finally, it proposes an integrated model for a mobile web service-oriented supply chain and identifies relevant research areas.
Orchestration of web services based on t qo s using user and web services agenteSAT Publishing House
1. The document discusses orchestrating web services based on transactional and quality of service (TQoS) properties using user and web services agents.
2. It proposes selecting atomic web services that fulfill the user's requirements and TQoS characteristics, and composing them using agents to achieve the user's overall goal.
3. The composition approach involves three steps - specifying the workflow, selecting component services based on the workflow and TQoS properties using a user agent, and composing the services using web services agents.
The importance of Exchange 2013 CAS in Exchange 2013 coexistence | Part 2/2 |...Eyal Doron
The importance of Exchange 2013 CAS in Exchange 2013 coexistence | Part 2/2 | 3#23
http://o365info.com/the-importance-of-exchange-2013-cas-in-exchange-2013-coexistence-environment-part-22/
Reviewing the subject of - Exchange CAS 2013 role in an Exchange 2013 coexistence environment.
This is the second article, in a series of two articles.
Eyal Doron | o365info.com
Functionality Based Fixing of Weight for Non-functional parameters of a web s...Editor IJCATR
In recent years, web services open the way to global business development through B2B integration and they used with
different business applications to accommodate their services. So while selecting a service, the first preference is given to the
functional properties of the web service and then a best web service is selected from the list by considering the expected quality. The
QoS of a web service is also depends on the variant nonfunctional parameters of its service which may subject to changes because of
network and other related factors. While considering the performance of a service, the overall quality is always preferred but the actual
functionality of the service is based on the weight fixed for the non functional parameters like response time, throughput, etc... So
assigning functionality based weight for the non functional parameters are used to achieve the assured quality of the service. In this
paper we are proposing the system that gives importance for the non functional parameters such as response time, throughput,
availability, success ability, reliability for which the weight is set based on functionality and requirement of aparticular business
application.
This document summarizes a research study that examined the influence of Internet Banking Service Quality (IBSQ) dimensions on Customer Satisfaction (CS) in the Ghanaian banking industry. The study collected data through surveys from 200 bank customers. Using structural equation modeling, the findings showed that of the five IBSQ dimensions, web design had a significantly positive influence on CS, explaining about 79.6% of CS. The study contributes to the literature on e-service quality and customer satisfaction in electronic banking, and provides implications for theory and management.
The document discusses guidelines for versioning service contracts to enable reuse and compatibility between different versions of services and consumers. It argues that a versioning strategy is essential to achieve reuse and realize the business benefits of SOA. The key elements are:
1) Define machine-readable contract elements in WSDL that specify validation rules at runtime.
2) Establish compatibility rules between contract versions to determine if new versions are backwards/forwards compatible. Non-breaking changes result in minor versions while breaking changes require major versions.
3) Design message type schemas for extensibility using XML features like <xs:any> to enable forwards compatibility and allow unknown future extensions. Consumers must accept and ignore unknown elements.
This document presents an approach for composing semantic web services using agents in a mobile ad hoc network (MANET). It proposes an ontology-based framework where JADE agents can link web services and agents to enable semantic web applications. The approach involves three phases - service registration, construction of a service graph by matching input/output parameters, and service discovery and composition. It describes using three sample agents (TrainNameService, TrainNumberService, CompositeTrainService) to demonstrate how the composition works. The composed web services are then shown to work properly when accessed over the MANET architecture. The approach aims to automate web service composition by semantically matching parameters.
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers. For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
Semantic Web: A Study on Web Service Composition Approachesijtsrd
A Web service is a collection of open protocols and standards used for exchanging data between applications and systems. Web Service discovery, selection and composition are the important tasks of the any automated business processes. In a web service composition set of web services are collectively executed to achieve the objectives. This study reveals the existing approaches used for web service composition in both syntactic and semantic environments. We have reviewed more than 40 articles in this domain and concluded with merits and demerits of the methodologies applied for the implementation of the web service composition. Michael Raj TF, | Siva Prakasam. P"Semantic Web: A Study on Web Service Composition Approaches" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd115.pdf http://www.ijtsrd.com/computer-science/world-wide-web/115/semantic-web-a-study-on-web-service-composition-approaches/michael-raj-tf-
Evaluation of QoS based Web- Service Selection Techniques for Service Composi...Waqas Tariq
This document discusses quality of service (QoS) based techniques for selecting web services for service composition. It begins by providing background on service-oriented computing and defining service composition. The document then reviews three approaches to web service selection: functional, non-functional, and user-based. It focuses on non-functional (QoS-based) service selection, describing the specifications of QoS-based service selection techniques, including QoS modeling, categorization, user preferences, evaluation criteria, and aggregating evaluation results. The document aims to evaluate various QoS-based service selection techniques and identify criteria for comparing them.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their
functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services.
In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
WEB SERVICE SELECTION BASED ON RANKING OF QOS USING ASSOCIATIVE CLASSIFICATIONijwscjournal
With the explosive growth of the number of services published over the Internet, it is difficult to select satisfactory web services among the candidate web services which provide similar functionalities. Quality of Service (QoS) is considered as the most important non-functional criterion for service selection. But this criterion is no longer considered as the only criterion to rank web services, satisfying user’s preferences. The similarity measure (outputs–inputs similarity) between concepts based on ontology in an interconnected network of semantic Web services involved in a composition can be used as a distinguishing criterion to estimate the semantic quality of selected services for the composite service. Coupling the
semantic similarity as the functional aspect and quality of services allows us to further constrain and select services for the valid composite services. In this paper, we present an overall service selection and ranking framework which firstly classify candidate web services to different QoS levels respect to user’s QoS requirements and preferences with an Associative Classification algorithm and then rank the most qualified candidate services based on their functional quality through semantic matching. The experimental results show that proposed framework can satisfy service requesters’ non-functional requirements.
QOS OF WEB SERVICE: SURVEY ON PERFORMANCE AND SCALABILITYcscpconf
In today’s scenario, most of the organizations provide the services through the web. This makes the web service an important research area. In addition, early design and building web services, it is necessary to concentrate on the quality of web services. Performance is an important quality attributes that to be considered during the designing of web services. The expected
performance can be achieved by proper scheduling of resources and scalability of the system. Scalability is a desirable attribute of a process computer system or network. Poor scalability
can result in lacking system performance. Hence, in this paper, we have reviewed the literature available for the quality attributes of performance and scalability and identified the issues that
affect the quality attributes related to Web Services
Performance Prediction of Service-Oriented Architecture - A surveyEditor IJCATR
Performance prediction and evaluation for SOA based applications assist software consumers to estimate their applications
based on service specifications created by service developers. Incorporating traditional performance models such as Stochastic Petri
Nets, Queuing Networks, and Simulation present drawbacks of SOA based applications due to special characteristics of SOA such as
lose coupling, self-contained and interoperability. Although, researchers have suggested many methods in this area during last decade,
none of them has obtained popular industrial use. Based on this, we have conducted a comprehensive survey on these methods to
estimate their applicability. This survey classified these approaches according to their performance metrics analyzed, performance
models used, and applicable project stage. Our survey helps SOA architects to select the appropriate approach based on target
performance metric and researchers to identify the SOA state-of-art performance prediction
User-Centric Optimization for Constraint Web Service Composition using a Fuzz...ijwscjournal
ABSTRACT
Service-Oriented Applications (SOA) are being regarded as the main pragmatic solution for distributed
environments. In such systems, however each service responds the user request independently, it is
essential to compose them for delivering a compound value-added service. Since, there may be a number of
compositions to create the requested service, it is important to find one which its properties are close to
user’s desires and meet some non-functional constraints and optimize criteria such as overall cost or
response time. In this paper, a user-centric approach is presented for evaluating the service compositions
which attempts to obtain the user desires. This approach uses fuzzy logic in order to inference based on
quality criteria ranked by user and Genetic Algorithms to optimize the QoS-aware composition problem.
Results show that the Fuzzy-based Genetic algorithm system enables user to participate in the process of
web service composition easier and more efficient.
An effective method for clustering-based web service recommendationIJECEIAES
Normally web services are classified by the quality of services; however, the term quality is not absolute and defined relatively. The quality of web services is measured or derived using various parameters like reliability, scalability, flexibility, and availability. The limitation of the methods employing these parameters is that sometimes they are producing similar web services in recommendation lists. To address this research problem, the novel improved clustering-based web service recommendation method is proposed in this paper. This approach is mainly dealing with producing diversity in the results of web service recommendations. In this method, functional interest, quality of service (QoS) preference, and diversity features are combined to produce a unique recommendation list of web services to end-users. To produce the unique recommendation results, we propose a varied web service classification order that is clustering-based on web services’ functional relevance such as non-useful pertinence, recorded client intrigue importance, and potential client intrigue significance. Additionally, to further improve the performance of this approach, we designed web service graph construction, an algorithm of various widths clustering. This approach serves to enhance the exceptional quality, that is, the accuracy of web service recommendation outcomes. The performance of this method was implemented and evaluated against existing systems for precision, and f-score performance metrics, using the research datasets.
USER-CENTRIC OPTIMIZATION FOR CONSTRAINT WEB SERVICE COMPOSITION USING A FUZZ...ijwscjournal
This document summarizes a research paper that proposes a user-centric approach for evaluating and optimizing constraint-based web service compositions using fuzzy logic and genetic algorithms. The approach uses fuzzy logic to model user preferences through quality criteria rankings. It then uses a genetic algorithm to optimize the composition process to maximize user satisfaction based on those fuzzy preferences. The results showed that the fuzzy-genetic algorithm system enables users to more easily and efficiently participate in and guide the web service composition process according to their needs and preferences.
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...ijwscjournal
Service Oriented Architecture facilitates automatic execution and composition of web services in
distributed environment. This service composition in the heterogeneous environment may suffer from
various kinds of service failures. These failures interrupt the execution of composite web services and
lead towards complete system failure. The dynamic recovery decisions of the failed services are
dependent on non-functional attributes of the services. In the recent years, various methodologies
have been presented to provide recovery decisions based on time related QoS (Quality of Service)
factors. These QoS attributes can be categorized further. Our paper categorized these attributes as
space and time. In this paper, we have proposed an affinity model to quantify the location affinity for
composition of web services. Furthermore, we have also suggested a replication mechanism and
algorithm for taking recovery decisions based on time and space based QoS parameters and usage
pattern of the services by the user.
AN ADAPTIVE APPROACH FOR DYNAMIC RECOVERY DECISIONS IN WEB SERVICE COMPOSITIO...ijwscjournal
Service Oriented Architecture facilitates automatic execution and composition of web services in distributed environment. This service composition in the heterogeneous environment may suffer from various kinds of service failures. These failures interrupt the execution of composite web services and lead towards complete system failure. The dynamic recovery decisions of the failed services are dependent on non-functional attributes of the services. In the recent years, various methodologies have been presented to provide recovery decisions based on time related QoS (Quality of Service) factors. These QoS attributes can be categorized further. Our paper categorized these attributes as space and time. In this paper, we have proposed an affinity model to quantify the location affinity for composition of web services. Furthermore, we have also suggested a replication mechanism and algorithm for taking recovery decisions based on time and space based QoS parameters and usage pattern of the services by the user.
Continuous Testing of Service-Oriented Applications Using Service Virtualizationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document discusses continuous testing of service-oriented applications using service virtualization. It begins with an introduction to service-oriented architecture and discusses how service virtualization can address challenges in testing SOA applications by virtualizing dependencies and unavailable components. The document then discusses how service virtualization enables simultaneous development and testing, handles out-of-scope data dependencies, and supports heterogeneous technologies and platforms. It also provides an overview of the service virtualization lifecycle and some popular service virtualization tools.
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in
business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade.
Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in
safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It
checks user requirements change continuously and dynamically adopts architecture model. Also it checks
providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection
adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit.
Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result
an optimised decision. Finally we illustrated that using of it has a good performance for web service based
applications.
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
This document proposes and evaluates a framework for integrating web services. It begins by discussing how users appreciate simple, on-demand access to affordable software services without needing to install or update applications themselves. The document then presents an argument for a web-based architecture that allows users to access and purchase a wide range of software applications as needed. It evaluates this framework through user surveys and examples of simulation software services to demonstrate how the integrated framework can be implemented. The surveys found that the framework reduced costs, simplified processes, and improved the user experience by combining various online components and software services.
RECOMMENDATION FOR WEB SERVICE COMPOSITION BY MINING USAGE LOGSIJDKP
Web service composition has been one of the most researched topics of the past decade. Novel methods of
web service composition are being proposed in the literature include Semantics-based composition, WSDLbased
composition. Although these methods provide promising results for composition, search and
discovery of web service based on QoS parameter of network and semantics or ontology associated with
WSDL, they do not address composition based on usage of web service. Web Service usage logs capture
time series data of web service invocation by business objects, which innately captures patterns or
workflows associated with business operations. Web service composition based on such patterns and
workflows can greatly streamline the business operations. In this research work, we try to explore and
implement methods of mining web service usage logs. Main objectives include Identifying usage
association of services. Linking one service invocation with other, Evaluation of the causal relationship
between associations of services.
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYijwscjournal
One of the main requirements in service based applications is runtime adaptation to changes that occur in business, user, environment, and computational contexts. Changes in contexts lead to QOS degrade. Continues adaptation mechanism and strategies are required to stay service based applications(SBA) in safe state. In this paper a framework for runtime adaptation in service based application isintroduced. It checks user requirements change continuously and dynamically adopts architecture model. Also it checks providers QOS attributes continuously and if adaptation requirement is triggered, runs service selection adaptation strategy to satisfy user preferences. Thusit is a context aware and automatically adaptable
framework for SBA applications. Wehave implemented a fuzzy based system for web service selection unit. Due to ambiguity of context’s data and cross-cutting effects of quality of services, using fuzzy would result an optimised decision. Finally we illustrated that using of it has a good performance for web service based applications.
A FRAMEWORK FOR SOFTWARE-AS-A-SERVICE SELECTION AND PROVISIONINGIJCNCJournal
As cloud computing is increasingly transforming the information technology landscape, organizations and
businesses are exhibiting strong interest in Software-as-a-Service (SaaS) offerings that can help them
increase business agility and reduce their operational costs. They increasingly demand services that can
meet their functional and non-functional requirements. Given the plethora and the variety of SaaS
offerings, we propose, in this paper, a framework for SaaS provisioning, which relies on brokered Service
Level agreements (SLAs), between service consumers and SaaS providers. The Cloud Service Broker (CSB)
helps service consumers find the right SaaS providers that can fulfil their functional and non-functional
requirements. The proposed selection algorithm ranks potential SaaS providers by matching their offerings
against the requirements of the service consumer using an aggregate utility function. Furthermore, the CSB
is in charge of conducting SLA negotiation with selected SaaS providers, on behalf of service consumers,
and performing SLA compliance monitoring
Semantic web services discovery selection and composition techniquescsandit
Web services are already one of the most important resources on the Internet. As an integrated
solution for realizing the vision of the Next Generation Web, semantic web services combine
semantic web technology with web service technology, envisioning automated life cycle
management of web services. This paper discusses the significance and importance of service
discovery & selection to business logic, and the requisite current research in the various phases
of the semantic web service lifecycle like discovery and selection. We also present several
different composition strategies, based on current research, and provide an outlook towards
critical future work.
Similar to Service selection in service oriented architecture using probabilistic approach and asynchronous queues with interceptor validation (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
UNLOCKING HEALTHCARE 4.0: NAVIGATING CRITICAL SUCCESS FACTORS FOR EFFECTIVE I...amsjournal
The Fourth Industrial Revolution is transforming industries, including healthcare, by integrating digital,
physical, and biological technologies. This study examines the integration of 4.0 technologies into
healthcare, identifying success factors and challenges through interviews with 70 stakeholders from 33
countries. Healthcare is evolving significantly, with varied objectives across nations aiming to improve
population health. The study explores stakeholders' perceptions on critical success factors, identifying
challenges such as insufficiently trained personnel, organizational silos, and structural barriers to data
exchange. Facilitators for integration include cost reduction initiatives and interoperability policies.
Technologies like IoT, Big Data, AI, Machine Learning, and robotics enhance diagnostics, treatment
precision, and real-time monitoring, reducing errors and optimizing resource utilization. Automation
improves employee satisfaction and patient care, while Blockchain and telemedicine drive cost reductions.
Successful integration requires skilled professionals and supportive policies, promising efficient resource
use, lower error rates, and accelerated processes, leading to optimized global healthcare outcomes.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
2. Int J Elec & Comp Eng ISSN: 2088-8708
Service selection in service oriented architecture using probabilistic approach and ... (Balika J. Chelliah)
397
By making service calls asynchronous, it permits providers to use number of process to switch
various consumer requirements instantaneously. Asynchronous modes of operating require much more support
functions for maintenance and flexibility, other than just responding quickly to the client. Provision selection
in on demand environment is the practice of methods in choosing and rendering quality of services (QoS) to
consumers. First, dual interfaces are specified; the requestor will request the on demand service by the way of
passing request message. Interface between client and service provider enabled to accept the request and same
thing is to be monitored effectively by that interface.
This paper is organized in such a way that Section 2 contains related work, Section 3 states
the proposed system and its architecture, techniques and algorithm Section 4 demonstrates services
selection strategy, Section 5 shows experimental analysis and in Section 6 conclusion and future work has
been stated.
2. RELATED WORK
In service oriented architecture (SOA), service agents could discover numerous service providers
which gives similar function with dissimilar quality of service (QoS). Cooperative mixed strategy (CMS) [1]
is used to tackle the service selection problem (SSP) of time-sensitive services exhausting the theory of
games that solves inconstant-sum non-cooperative n-person dynamic game. MS deals users an optimized
probability mass function in its place of a deterministic choice to choose an appropriate provider from
the candidates and removes the variation of queue length, and increase the whole performance of SOA
significantly. A SOA modeling and design grounded on the notion of service component and standard UML
modeling constructs [2] that provide the interface of a service component works better than the list of
operation signatures to stipulate the complete contract between the service provider and consumer. The Web
services outsourcing manager framework for dynamic business processes uses an XML-based annotation
document is suggested to seize the business requirements and used to dynamically produce quest scripts for a
progressive Web services discovery engine to catch Web services from UDDI registries and Web service
inspection language documents [3, 4]. Service selection in dynamic environment is the treatment of
techniques in choosing and offering Quality of Services (QoS) to consumers. The dynamic nature of web
services is captured by an environment collecting runtime information of web services. Utilizing the statuses,
availability estimation on dynamic scale [5] is proposed along with multiple QoS criteria's such as cost and
performance implies Status Identification based service selection. The key requirements for commercial
service oriented architectures [6] with strict latency requirements are detailed. Based on this, recognizing
the capabilities of the hosting environment and effectively matching those for the wanted service
configuration are required to enable hosting services with strict QoS requirements. A method [7, 8] to gather
context based data of service providers is given as input to the rule based system and appropriateness of
every SP is obtained as output including recommended stipulations regarding their usage. Service Oriented
Architecture (SOA) which comprises of many consumers meets with reliability and availability problem.
A service selection and replication based on Quality of Service (QoS) mechanism [9] is able to control
service replica properly in order to, increase service instance, service replication is adopted. To control
the selection and replication of service, this paper proposes. Thus the system is able to control service replica
properly and force service distribution for effecting regular consumer as few as possible.
A state of art interceptor module and highly probabilistic queue management technique are
introduced in this chapter. The lack of existing validation system that isolates the request validation from
service rendering forces the queue to be overcrowded with invalidated requests and insecure hits [10-15].
The least effort to the validation of the existing system leaves the service provider insecure and busyrowding
a highly rated service providers' queue will deprecate the quality of service provider which is meant to
provide and vice versa. The survey shows that there is a need for such a model that deals the queue length as
a random variable that most likely chooses a queue with lower length and with best effort service.
The interceptor is introduced to have an efficient flow of service without any web security threat
such as passing requests from clients without proper validation. This approach further integrates a sanitizer
module which discards the invalid requests sent by any client and promotes efficiency [16-20]. Further it
establishes a time-sensitive service with minimum waiting time and consistent performance in quality.
The interceptor allows a valid request to hit the service and the response will be given accordingly. In case of
any delay the interceptor duly intimates the client and the client will be kept posted in time.
3. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 396 - 406
398
3. ARCHITECTURE OF QoS IMPROVISATION AT QUEUE LEVEL
Interceptor and probabilistic approach attempts to design an efficient flow of service without any
web security threats. As it decouples the sanitizer module from the service provider, the overall burden in
web service provider is reduced considerably [21-25]. This approach establishes a time sensitive service with
minimum waiting time and consistent performance. In the architecture depicted in Figure 1, there is
the probabilistic model which distributes the request randomly and asynchronously but always tries to insert
the request into the queue which has minimal waiting time. Thus it produces normalized probabilistic model.
Once the request is taken out from the queue, it is delivered to the interceptor that has validation and
sanitization module.
Figure 1. Architecture of service delivery with interceptor and probabilistic approach
Registration of service requestor, Signature &IP Verification, Attempts Check and Sanitizer are
the processes in interceptor module. The motivation behind the interceptor module is to isolate the request
validation from the service provider. This architecture shown in Figure 2 will completely allow
the interceptor to be functioning independently and coherently with the service provider. Thus it reduces
the burden of the service provider to a greater extent. The service provider never keeps any chores except
the core business in hand. The round trip time will be stamped along with the service reply.
Figure 2. Interceptor module process valid requests in web service
4. Int J Elec & Comp Eng ISSN: 2088-8708
Service selection in service oriented architecture using probabilistic approach and ... (Balika J. Chelliah)
399
3.1. IP registration
The request Time (login time of the req) is a new tag which is enclosed for this and includes Token
that takes values from 0 to 1, SignatureTokenSTclient. It performs the registration of the user with credentials
and consequent signature validation.
If contains_Token == 0 Then
DoRegistration(user_name,pwd);
Else if contains_Token == 1
DoSignature_Validation(user_name, pwd,STclient)
Do Registration(user_name,pwd)
While (Login_IP:LIP,Login_Time:LT,Token/seed,)
{
Generate Token
Appends LT, LIP and Token / seed in
whitelist
}
The cryptographically protected pseudo random number producer generates the token and the
whitelist is populated with either the token or seed. The token is obtained by the client which calculates the
Signature_Token as follows:
Signature_Token is computed by the MD5 algorithm with Token and pwd as parameters.
Whitelist may further comprises additional attributes like username, password, Timestamp skew –
TSS, No of Attempts – NoA, Threshold limit –TL, Interval – IT, Last Request Time – LRT. The default
token validity is 12 hours and it will expire in case of NoA exceeding the threshold. Using a signature Token
is better than the conventional authentication schemes, which aids in dealing of DOS. Although, occurrences
of the demands are augmented by the invader, it is constrained that the mark/kernel would stand usable
simply for the specified amount of period or until it’s alive.
3.2. Interceptor module algorithm
The invalid request and corresponding error message are sent back to the client. Here for
the signature verification module MD5 algorithm is used that takes token and password as parameters to
generate the signature token as signature validation, which takes user name and password and gives yes to
client considered as a token from the white list. White list gives the permitted tokens and black list lists non
permitted tokens. If the token is not in the white list the request will be denied with the error message
otherwise sent to IP verification module.
3.3. Signature verification
It validates the authenticity of the client by verifying the value in the Signature_Token tag obtained
through the client request.
Signature_Validation(user_name,password, STclient)
{
1. Consumea kernel from the Whitelist
2. If kernel
spawn the tokens
5. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 396 - 406
400
Else if Token
Do stagenumber 3
3. STINT = MD5 (pwd+Token )
4. If STclient = ST_INT {
Print success to client
Do IP_verfication(IPclient)
}
Else {
Print the Unacceptable Desires of fault dispatch
}
}
The choice of choosing a hash algorithm like MD5 is transforming the calculation simpler than retaining
a pair of private and public keys that are encrypted by a further cryptographic algorithm.
3.4. IP verification
It checks whether the IP address of client is valid by using either whitelist or blacklist. The blacklist
holds a set of client’s IP address that made threat to the service provider. In IP verification, first step is
signature validation which is followed by IP verification module. Considering IP white list and black List,
any IP which is in the white list will be allowed otherwise it will be declined. If IP address is in IP white list
and not in the IP black list then it is a success, it is an otherwise invalid request. Attempt check module finds
the running time of any attempt and if the running time is greater than the constant time (allowed time) then
the request will be invalid.
IP_Verfication(IPclient){
1. AssumeIpwhitelist and IPblacklist.
2. IfIPclient = =IpwhitelistorIPclient != IPblacklist {
Print Success
Do Attempts_Check()
}
Else {
Print Invalid Requests of Error message
}
}
3.5. Efforts plaid
Accessing demands on the specific period of value associated with the information depends
proceeding with following limitations.
a. References of times must be represented in standard time format (UTC).
b. The recommended time refrences should be in Xml Schema Defnition:date Time format. ValueType must
be used for other attribute.
c. The limit of threshold TL is defined as
n -number of requested URI in t1 time period
k - Specific k URI from similar IP.
TSS - maximum tolerance limit for the clock skewed between the sender and the recipient.
IT - permitted time gap from LT to LRT.
6. Int J Elec & Comp Eng ISSN: 2088-8708
Service selection in service oriented architecture using probabilistic approach and ... (Balika J. Chelliah)
401
AttemptsCheck(){
INT - CT
If [CT < (LT – TSS * constant value)] {
Print Error message to client as invalid request
}
Else{
If (LT - LRT) > IT {
If(NoA< TL)
Call Sanitizer()
Else{
Print Error message to client as invalid request
} } } }
3.6. Sanitizer
The schema caching process is maintained by the sanitizer which is the process of maintaining
indigenous replicas of the representation. System can be supposed to be updated regularly when there is any
change. This sanitizer can be easily manipulated with the help of name space particularly naming the folders.
On considering the schema, the unrestrained incidence must be limited till further end, since that is the main
reason for coercive parsing attack. Thus, these incidents would likely be detained with respect to the kind of
application in use. As namespace injection attacks are likely to occur an each namespaces and related tags are
monitored and these details are enlisted inside the whitelist in order to provide authentication. The predefined
input policies of the ports and services should be enforced so that improved security will be enforced.
The XSD Path is extracted from XML form of service request and checked up if empty, in case the value is
null, the request will be forbidden and the error message will be conveyed to the client to avoid the parameter
tampering attack. Further the threshold of the magnitude of the service request message is enforced and any
message that exceeds the stipulated size would be rejected. Thus the coercive parsing attack is handled.
Therefore the sanitizer module authenticates the data in contradiction of the XML stipulations and upholds
the data correctness, completeness and structure.
3.7. Algorithm for probabilistic queue selection
The probabilistic approach tends to provide the probability distribution for service selection.
It is useful in time-sensitive services. Probabilistic approach ensures best management of queues. Providing
balance among providers helps retain quality parameter for further segments. Users send the requests which
will be distributed through probabilistic model with optimal queue length and it helps you to choose the less
crowded queue and that is given to the interceptors which checks the registration and verifies IP for
sanitization. Crowding a highly rated service providers' queue will deprecate the quality that the service
provider promises to provide and vice versa.
A synchronous queuing provides a synchronous service illusion that hides the validation logic for
the service call into a shared call and then phases the inbound request on a service message queue for
processing at a later period. If the service request validates then it can be placed on the queue for processing
and a 'success' response issued to the requester immediately. A failure will cause an error response to
the service consumer. The message is then abandoned and not placed in the queue. Both the request and
response operations occur independently and thus provide both the server to return to their core processing
after sending a request/response message. They can interact using messages in the form of non-blocking
interrupts, thus providing much user experience.
4. SERVICES SELECTION STRATEGY
In service oriented architecture, service providers offer different quality of service (QoS), thus they
encounter decision conflicts in selection to obtain an optimal service quality that result in poor performance.
4.1. Problem with pure strategy
The arrival of the series of service requests that come to web service environment follows
the distribution of Poisson with as mean arrival rate. Every request of user is meant to select one service
provider among the m parallel items [Mi ]i
m
=1for finishing the demands. The user spares Tp time to finish
planning routines such as binding provider and transmitting data. The parameters Tp, l, and μ which are
presumed to be not a variable during the queuing duration of the service requests differ based on these requests
and responses. Any request j needs the necessary details at time t of service level parameter and queue length
from the broker before the selection of service provider.
7. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 396 - 406
402
The non-probabilistic strategy J is to select the service provider by which the request might anticipate
to be completed in the minimum duration:In order to anticipate the request to be completed within
the minimum duration, any pure strategy is selected as following:
min Ti = (Li + 1) / μi
By assuming that the J chooses the service provider M1 and the ratio Li/μi where, L1/μ1, i=2,3,...,m at t.
During evaluation of expected time, every request will choose the one with the lowest expected time.
Considering the time period when M1 acquires the position of the best provider, say Dt just before the interval
t, the requestors of the service are incoming while this recess must have completed the similar opportunity to
tie M1. Similar quality of service is not delivered when the queue length is lengthier than the queue at the time
J arrives to queue on time t+Tp, It discovers the finding of queue is lengthier than its anticipation and it may
not deliver the similar quality of service. Thus it causes periodic fluctuation in the queue length and causes
a drastic increase in the peak queue length.
4.2. Optimizing quality parameter
Our top priority is to optimize the QOS parameter of service queues so as to provide a retain of
quality of the service providers. A more balanced distribution using probabilistic approach can drastically
utilize the remaining service providers of mediocre quality parameter as well as improve the efficiency of
best by reducing its queue peak length.
5. EXPERIMENTAL RESULTS
We are considering three service providers which provide different quality parameter with the top
one providing the best quality parameter and the bottom one providing least. We provide a distribution of
service requests using probabilistic approach to each of the service provider. It is well noted that any number
of request may arrive at a particular interval of time. The utility of asynchronous queues can further provide
improve the user response operation.
5.1. Simulation setup
For our ease of evaluation we have chosen 3 service providers each with their dedicated
asynchronous processing with the first one providing the highest service quality and the last providing with
least service quality. Thus to asses them we generate a rational number of requests at every interval and
record the requests distribution as well as the queue length of the providers. Figure 3 show therequests
distribution based on QOS parameter.
To further illustrate we provide a queue length distribution line of service providers. The simulation
is extended with the further setup that the 1000 queues are set up with its initial random queue length of mean
10 and SD3 is chosen from normal distribution. The web service request arrival follows the exponential
distribution.
Figure 3. Requests distribution based on QOS parameter
8. Int J Elec & Comp Eng ISSN: 2088-8708
Service selection in service oriented architecture using probabilistic approach and ... (Balika J. Chelliah)
403
At any moment to enque a service request, a random queue length is chosen from exponential
distribution in which lambda value is the inverse of mean queue lengths. The simulation scenario is set to be
Monte- Carlo simulation where the random sampling from probabilistic distribution is presumed to have
a replica of real world. A million service requests were generated and the growths of the queues are recorded
after every 1000 requests.
5.2. Results and discussion
Providing a balance of distribution of requests among the providers helps them to retain their quality
parameter for further segments. Moreover it also makes use of quality of other queues than simply targeting
the best provider. A probabilistic approach can ensure the best management of queues and eventually reduces
peak queue length and unnecessary congestion.
5.2.1. Service system rendering performance
As in Figure 4 the performance sustains throughout the number of requests to the service provider
increases. With the interceptor module, as the overcrowding requests will be validated before the service
provider, the performance endures.
Figure 4. Performance comparison of interceptor system
As depicted in Figure 5 CPU usage is very low compared to the existing system and maintained
below 25%. It is inevitable for the time sensitive service. It helps to manage the best possibility and provide
the balance and helps to retain the quality parameters for the segments.
Figure 5. CPU usage comparison of interceptor system
9. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 396 - 406
404
Depending on the quality of parameter we can calculate our sample Pi. For our experiment we chose
to provide the top provider with 0.58, second with 0.3, and the last one with 0.16 so as to prevent excessive
fluctuation in the queue length. The difference between the maximum queue length and minimum queue
length never had shown considerable deviation from the normal course. It means the requests are evenly
queued as shown in the following figure and the sample of recorded requests. The length difference has
the distribution from 2 to 10 that is really 0.025% of error in queuing. Thus the plot Figure6 shows our state
of art probabilistic approach outperforms the pure strategy and consequently improves the quality of service.
Figure 6. Queue difference distribution for 1 million request in probabilistic approach
5.3. QoS analysis-availability comparison
As depicted in Figure 7 using the Queue Optimization (QO) approaches improves the availability
ratio in the range of 67% to 91%. The reliability is improved to the extent by the introduction of sanitizer and
probabilistic approach. Since the interceptor keeps most of the invalid service requests away, the availability
is drastically increased by 24% to 91%. The access count matches to the new high because of
the probabilistic approach. The introduction of interceptor module and a stochastic model promise improvement
in QoS parameters. The consistency in rendering SOAP services is maintained during scale up. The stochastic
model assures better queue with minimal queue length. The Measured QoS Availability is increased up to 90% as
in Figure 8.
Figure 7. Availability comparison of web service in optimization
5.4. QoS analysis-reliability comparison
The reliability is Figure 8 increased from the average of 55% to the average 86% by the introduction
of interceptor module and probabilistic queue mechanism. This integrated approach ensures the consistent
reliability and provides the assurance in the quality standpoint. Avoiding unusual requests and placing them
in the queue is likely to have minimal waiting time. This improves the stewardess into the greater level so
10. Int J Elec & Comp Eng ISSN: 2088-8708
Service selection in service oriented architecture using probabilistic approach and ... (Balika J. Chelliah)
405
that the bench marks of service level agreement would be maintained at par. The probabilistic approach does
its part well and altogether it produces 31% increase in the reliability.
Figure 8. Reliability comparison of web service in optimization
6. CONCLUSION AND FUTURE WORK
Every user wishes to have their request processed faster and have the best response. Pure strategy
using deterministic approach may cause poor performance. The interceptor module approach and
probabilistic queue approach altogether improve the web service system performance at greater level.
The separation of service request validation from the business entity ameliorates the performance of
the system directly. The likelihood approach places the request into better queues that helps the request likely
to not wait in a longer queue. Overall, the reliability and availability benchmarks are improved by
the probabilistic approach and interceptor module.
Deterministic approach in service selection causes to choose the best service provider and may not
result in its specified quality when there occurs numerous simultaneous requests because of the queue
fluctuation. Probabilistic approach provides a probability for service selection and thus reduces queue
fluctuation to prevent and loss of quality. This is very useful in time-sensitive services which require
minimum waiting time and consistent performance in quality.
REFERENCES
[1] Temglit, N., Chibani, A., Djouani, K., & Nacer, M. A. “A Distributed Agent-Based Approach for Optimal QoS
Selection in Web of Object Choreography,” IEEE Systems Journal, 12(2), 1655–1666.
doi:10.1109/jsyst.2016.2647281,2018
[2] Zhu, W., Yin, B., Gong, S., & Cai, K.-Y., “An Approach to Web Services Selection for Multiple Users,” IEEE
Access, 5, 15093–15104. doi:10.1109/access.2017.2722228 ,2017
[3] Tang, M., Zheng, Z., Kang, G., Liu, J., Yang, Y., & Zhang, T. “Collaborative Web Service Quality Prediction via
Exploiting Matrix Factorization and Network Map,” IEEE Transactions on Network and Service Management,
13(1), 126–137. doi:10.1109/tnsm.2016.2517097, 2016.
[4] Hashmi, K., Malik, Z., Erradi, A., & Rezgui, A. “QoS Dependency Modeling for Composite Systems,” IEEE
Transactions on Services Computing, 1–1. doi:10.1109/tsc.2016.2589244, 2016.
[5] Saleem, M. S., Ding, C., Liu, X., & Chi, C.-H. “Personalized Decision-Strategy based Web Service Selection using a
Learning-to-Rank Algorithm,” IEEE Transactions on Services Computing, 8(5), 727–
739. doi:10.1109/tsc.2014.2377724,2015.
[6] Hu, Y., Peng, Q., Hu, X., & Yang, R. “Time Aware and Data Sparsity Tolerant Web Service Recommendation
Based on Improved Collaborative Filtering,” IEEE Transactions on Services Computing, 8(5), 782–
794. doi:10.1109/tsc.2014.2381611, 2015.
[7] Ricardo J. Rabelo, OvidiuNoran and Peter Bernus, “Towards the Next Generation Service Oriented Enterprise
Architecture,” IEEE 19th International Enterprise Distributed Object Computing Workshop, 2015
[8] SutheeraPuntheeranurak,"SOA selection and replication based on QoS," TENCON 2014 - 2014 IEEE Region 10
Conference, 2014.
[9] SaurabhShrivastava and Ashish Sharma, “An approach for QoS Based Fault Reconfiguration in Service Oriented
Architecture”, IEEE International Conference on Information Systems and Computer Networks, 2013
[10] MadihaWaris , Dr. Shoab Ahmad Khan and Muhammad ZamanFakhar, “Factors Effecting Service Oriented
Architecture Implementation”, IEEE Science and Information Conference ,2013
11. ISSN:2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 396 - 406
406
[11] Haiqing Bu, “Metrics for Service Granularity in Service Oriented Architecture”, IEEE International Conference on
Computer Science and Network Technology, 2011
[12] Neelavathi, Dadapeer and K. Vivekanandan, “Service selection based on status identification in SOA”, IEEE
Electronic Computer Technology (ICECT), 3rd
International Conference on (Volume: 6), 2011.
[13] AryaAmini, Soheila Sadjedy. “SOMGIS- A Service Oriented Model for GIS Software Architecture,” International
Conference on Computer Engineering and Technology, 2010.
[14] Mohammad Kazem HAKI, Maia Wentland Forte, “Service Oriented Enterprise Architecture Framework,” IEEE 6th
World Congress on Services, 2010.
[15] Siani Pearson and Tomas sander, “A mechanism for policy-driven selection of service providers in SOA and cloud
environments,” IEEE 10th
Annual International Conference on New Technologies of Information Systems
(NOTERE), 2010
[16] Jan Christian Lang, Thomas Widjaja, Peter Buxmann, Wolfgang Domsche and Thomas Hess, “Optimizing the
Supplier Selection and Service Portfolio of a SOA Service Integrator,” IEEE Hawaii International Conference on
System Sciences, 2008
[17] JuhaSavolainen and Anssi Karhinen, “Matching Service Requirements to Empirical Capability Models in Service-
Oriented Architectures,” Annual IEEE International Computer Software and Applications Conference, 2008.
[18] M. Rosen, Service-Oriented Architecture and Design Strategies, Jun Wiley 2008.
[19] YiminShen, Yushun Fan. "Cooperative Mixed Strategy for Service Selection in Service Oriented Architecture" IEEE
International Conference on Systems, Man and Cybernetics, 2007.
[20] Z. Stojanovic, A. Dahanayake, H. Sol. “Modeling and design of service-oriented architecture,” IEEE International
Conference on Systems, Man and Cybernetics, Oct. 2004.
[21] L.-J. Zhang, B. Li, C. Tian, H. Chang, “On demand web services-based business process,” IEEE International
Conference on Systems, Man and Cybernetics, Oct. 2003.
[22] P. Bernus, L. Nemes, and G. Schmidt, “Handbook on Enterprise Architecture,” Berlin: Springer, 2003
[23] D. Gross, C. M. Harris, Fundamentals of Queuing Theory. New York: John Wiley & Sons, 1985, pp. 79.
[24] Web Service Level Agreement language, (WSLA language), http://www.research.ibm.com/wsla
[25] Service-Oriented Architecture, http://en.wikipedia.o- rg/wiki/Service-oriented_architecture