Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00035
Feng-Jian Wang, F. Fahmi
The microservice architecture is a variation of a Service-Oriented Architecture (SOA) that allows a service to be broken down into a number of smaller but independently concurrent running units so that both performance and maintainability of the application can get a big improvement. In this paper, we introduce an approach to constructing a software with layered and distributed microservices using object-oriented specifications. The proposed approach could increase the concurrency of the application system and thus improve the performance and could increase the reusability of microservices.
{"title":"Constructing a Service Software with Microservices","authors":"Feng-Jian Wang, F. Fahmi","doi":"10.1109/SERVICES.2018.00035","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00035","url":null,"abstract":"The microservice architecture is a variation of a Service-Oriented Architecture (SOA) that allows a service to be broken down into a number of smaller but independently concurrent running units so that both performance and maintainability of the application can get a big improvement. In this paper, we introduce an approach to constructing a software with layered and distributed microservices using object-oriented specifications. The proposed approach could increase the concurrency of the application system and thus improve the performance and could increase the reusability of microservices.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114475394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/services.2018.00010
{"title":"IEEE Services 2018 Plenary Panels [3 abstracts]","authors":"","doi":"10.1109/services.2018.00010","DOIUrl":"https://doi.org/10.1109/services.2018.00010","url":null,"abstract":"","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122190333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00018
M. Batran, H. Kanasugi, Takehiro Kashiyama, Y. Sekimoto, R. Shibasaki
Mobile Phones are near ubiquitous. We introduce a sensing technique to count how many people flow into and out of an urban area in an average weekday and weekend by combining subscribers billing records, road infrastructure network, and population data. Furthermore, trips are disaggregated by entry region and validated to the most recent available traffic survey. We found that 69,439 trip, 69,164 trip flow into and out of Greater Maputo in Mozambique, our study area, respectively in an average weekday, while those numbers are 46,976 trip, 45,237 trip on an average weekend.
{"title":"Sensing Population Mobility through City Boundary in Greater Maputo via Mobile Phone Big Data Mining","authors":"M. Batran, H. Kanasugi, Takehiro Kashiyama, Y. Sekimoto, R. Shibasaki","doi":"10.1109/SERVICES.2018.00018","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00018","url":null,"abstract":"Mobile Phones are near ubiquitous. We introduce a sensing technique to count how many people flow into and out of an urban area in an average weekday and weekend by combining subscribers billing records, road infrastructure network, and population data. Furthermore, trips are disaggregated by entry region and validated to the most recent available traffic survey. We found that 69,439 trip, 69,164 trip flow into and out of Greater Maputo in Mozambique, our study area, respectively in an average weekday, while those numbers are 46,976 trip, 45,237 trip on an average weekend.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121662533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00040
Sakshi Agarwal, K. Narayanan, Manjira Sinha, Rohit Gupta, S. Eswaran, Tridib Mukherjee
Making design choices for big data systems is not trivial. If not planned out efficiently, keeping in mind the practical requirements, there's a possibility that the deployed system can lack important features to match up the application or it may contain over-sophisticated methods that incurs a large cost, but little increase in the efficiency, output. To equip the end user towards wise design choices, we have proposed a decision support framework for big data systems that can evaluate the suitability over numerous design combinations and outputs the one most efficient for the end-user requirement.
{"title":"Decision Support Framework for Big Data Analytics","authors":"Sakshi Agarwal, K. Narayanan, Manjira Sinha, Rohit Gupta, S. Eswaran, Tridib Mukherjee","doi":"10.1109/SERVICES.2018.00040","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00040","url":null,"abstract":"Making design choices for big data systems is not trivial. If not planned out efficiently, keeping in mind the practical requirements, there's a possibility that the deployed system can lack important features to match up the application or it may contain over-sophisticated methods that incurs a large cost, but little increase in the efficiency, output. To equip the end user towards wise design choices, we have proposed a decision support framework for big data systems that can evaluate the suitability over numerous design combinations and outputs the one most efficient for the end-user requirement.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124556833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00044
Cheng-Kai Chou, Chun-Chih Lo, Shih-Hao Huang, M. Horng, Y. Kuo
Climate control is vitally important to the operation of greenhouses. However, many conventional methods for controlling greenhouse climate are not efficient enough since they are either based on an on-off control method or a proportional control method. To maintain a steady climate, an intelligent switching control strategy for greenhouse climate control system was designed using time series to analyze historical data from greenhouse climate control system and predict target attribute's value to regulate climatic conditions such as suppress or raise the environmental factor based on prediction results. The simulated results showed that the greenhouse climate can be stabilized and maintained within the ideal range by the proposed control strategy.
{"title":"Greenhouse Climate Control Based on Time Series Analysis","authors":"Cheng-Kai Chou, Chun-Chih Lo, Shih-Hao Huang, M. Horng, Y. Kuo","doi":"10.1109/SERVICES.2018.00044","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00044","url":null,"abstract":"Climate control is vitally important to the operation of greenhouses. However, many conventional methods for controlling greenhouse climate are not efficient enough since they are either based on an on-off control method or a proportional control method. To maintain a steady climate, an intelligent switching control strategy for greenhouse climate control system was designed using time series to analyze historical data from greenhouse climate control system and predict target attribute's value to regulate climatic conditions such as suppress or raise the environmental factor based on prediction results. The simulated results showed that the greenhouse climate can be stabilized and maintained within the ideal range by the proposed control strategy.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00021
Zhang Tao, Shuai Zhao, Junliang Chen
In order to ensure the safety of ships during the voyage, we need to use the AIS data to find outlying ship trajectories and remind other ships to take the necessary avoidance actions. In the process of ship trajectory outlier detection, on the one hand, the ship trajectory outlier detection model trained on historical data is needed, on the other hand, the requirement for real-time detection should be met. Therefore, this paper designs ship trajectory outlier detection service system based on collaborative computing. The service system can combine the advantages of batch computing framework and stream computing framework. Trajectory data services, real-time annotation service are implemented in stream computing framework, F-DBSCAN outlier detection service, model training service, and model-based outlier detection service are implemented in batch computing framework. Memory database is used to complete data interaction between the two frameworks. The experiment shows that the service system can detect the outlying ship trajectories according to the real-time AIS data while using the outlier detection model.
{"title":"Ship Trajectory Outlier Detection Service System Based on Collaborative Computing","authors":"Zhang Tao, Shuai Zhao, Junliang Chen","doi":"10.1109/SERVICES.2018.00021","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00021","url":null,"abstract":"In order to ensure the safety of ships during the voyage, we need to use the AIS data to find outlying ship trajectories and remind other ships to take the necessary avoidance actions. In the process of ship trajectory outlier detection, on the one hand, the ship trajectory outlier detection model trained on historical data is needed, on the other hand, the requirement for real-time detection should be met. Therefore, this paper designs ship trajectory outlier detection service system based on collaborative computing. The service system can combine the advantages of batch computing framework and stream computing framework. Trajectory data services, real-time annotation service are implemented in stream computing framework, F-DBSCAN outlier detection service, model training service, and model-based outlier detection service are implemented in batch computing framework. Memory database is used to complete data interaction between the two frameworks. The experiment shows that the service system can detect the outlying ship trajectories according to the real-time AIS data while using the outlier detection model.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127140915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00045
Emmanuel A. Oyekanlu, K. Scoles
Low-cost, real-time digital signal processors (DSPs) embedded in generic Internet of Things (IoT) edge devices can make significant contributions to distributed edge computing for industrial IoT (IIoT) networks. The DSP considered in this paper is the Texas Instruments (TI) TMS320C28x DSP (C28x). At the edge of the network, the C28x is programmed using low-level Embedded C programming language to construct the Morlet wavelet. Our implementation at this layer is the first known construction of the Morlet wavelet for C28x DSP using Embedded C. At the fog layer, near the edge of the IoT network, where more computing resources exist, the wavelet is then convolved with healthcare (electrocardiogram) and electrical network signals, using Matlab to reduce signal noise, and to identify important parts of examined signals. Convolution results indicates that the distributed computing approach for low-cost generic devices considered in this paper is suitable for use in large IIoT networks
{"title":"Real-Time Distributed Computing at Network Edges for Large Scale Industrial IoT Networks","authors":"Emmanuel A. Oyekanlu, K. Scoles","doi":"10.1109/SERVICES.2018.00045","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00045","url":null,"abstract":"Low-cost, real-time digital signal processors (DSPs) embedded in generic Internet of Things (IoT) edge devices can make significant contributions to distributed edge computing for industrial IoT (IIoT) networks. The DSP considered in this paper is the Texas Instruments (TI) TMS320C28x DSP (C28x). At the edge of the network, the C28x is programmed using low-level Embedded C programming language to construct the Morlet wavelet. Our implementation at this layer is the first known construction of the Morlet wavelet for C28x DSP using Embedded C. At the fog layer, near the edge of the IoT network, where more computing resources exist, the wavelet is then convolved with healthcare (electrocardiogram) and electrical network signals, using Matlab to reduce signal noise, and to identify important parts of examined signals. Convolution results indicates that the distributed computing approach for low-cost generic devices considered in this paper is suitable for use in large IIoT networks","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125463667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00017
Rami Sellami, S. Mouton
Cloud computing has recently attracted full attention of many organizations due to its economic, business and technical benefits. Indeed, we observe that the proliferation of offers by cloud providers raises several challenges. One of these innovative challenges is discovering and selecting services in order to deploy applications in multi-PaaS environments. To tackle this challenge, we propose an automatic and declarative approach to discover and select services offered by multi-PaaS providers. It enables developers to express their requirements and PaaS providers to expose their offers in manifests.
{"title":"Toward an Automatic Approach for Multi-PaaS Environments Selection","authors":"Rami Sellami, S. Mouton","doi":"10.1109/SERVICES.2018.00017","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00017","url":null,"abstract":"Cloud computing has recently attracted full attention of many organizations due to its economic, business and technical benefits. Indeed, we observe that the proliferation of offers by cloud providers raises several challenges. One of these innovative challenges is discovering and selecting services in order to deploy applications in multi-PaaS environments. To tackle this challenge, we propose an automatic and declarative approach to discover and select services offered by multi-PaaS providers. It enables developers to express their requirements and PaaS providers to expose their offers in manifests.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121561916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00022
A. Shahid, N. Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, Teresita Lemus
In Location-Based Services (LBS), users are required to disclose their precise location information to query a service provider. An untrusted service provider can abuse those queries to infer sensitive information on a user through spatio-temporal and historical data analyses. Depicting the drawbacks of existing privacy-preserving approaches in LBS, we propose a user-centric obfuscation approach, called KLAP, based on the three fundamental obfuscation requirements: k number of locations, l-diversity, and privacy area preservation. Considering user's sensitivity to different locations and utilizing Real-Time Traffic Information (RTTI), KLAP generates a convex Concealing Region (CR) to hide user's location such that the locations, forming the CR, resemble similar sensitivity and are resilient against a wide range of inferences in spatio-temporal domain. For the first time, a novel CR pruning technique is proposed to significantly improve the delay between successive CR submissions. We carry out an experiment with a real dataset to show its effectiveness for sporadic, frequent, and continuous service use cases.
{"title":"KLAP for Real-World Protection of Location Privacy","authors":"A. Shahid, N. Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, Teresita Lemus","doi":"10.1109/SERVICES.2018.00022","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00022","url":null,"abstract":"In Location-Based Services (LBS), users are required to disclose their precise location information to query a service provider. An untrusted service provider can abuse those queries to infer sensitive information on a user through spatio-temporal and historical data analyses. Depicting the drawbacks of existing privacy-preserving approaches in LBS, we propose a user-centric obfuscation approach, called KLAP, based on the three fundamental obfuscation requirements: k number of locations, l-diversity, and privacy area preservation. Considering user's sensitivity to different locations and utilizing Real-Time Traffic Information (RTTI), KLAP generates a convex Concealing Region (CR) to hide user's location such that the locations, forming the CR, resemble similar sensitivity and are resilient against a wide range of inferences in spatio-temporal domain. For the first time, a novel CR pruning technique is proposed to significantly improve the delay between successive CR submissions. We carry out an experiment with a real dataset to show its effectiveness for sporadic, frequent, and continuous service use cases.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122713137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/SERVICES.2018.00041
Tridib Mukherjee, S. Eswaran
Mining and profiling intent of players is an important facet in today's online games for the gaming companies to take targeted actions and provide personalized services. While analyzing and predicting player behavior have been studied in the online gaming domain, investigating intent behind those behaviors from the data has not been studied. We introduce the problem of player intent mining. With the example of online Rummy, a popular card game in India, we show how specific behavior aspects of player over time plays a key role in identifying their intent. Through both supervised and unsupervised techniques we achieve reasonable accuracy in identifying the intent.
{"title":"Towards Mining of Player Intent for Targeted Gaming Services","authors":"Tridib Mukherjee, S. Eswaran","doi":"10.1109/SERVICES.2018.00041","DOIUrl":"https://doi.org/10.1109/SERVICES.2018.00041","url":null,"abstract":"Mining and profiling intent of players is an important facet in today's online games for the gaming companies to take targeted actions and provide personalized services. While analyzing and predicting player behavior have been studied in the online gaming domain, investigating intent behind those behaviors from the data has not been studied. We introduce the problem of player intent mining. With the example of online Rummy, a popular card game in India, we show how specific behavior aspects of player over time plays a key role in identifying their intent. Through both supervised and unsupervised techniques we achieve reasonable accuracy in identifying the intent.","PeriodicalId":130225,"journal":{"name":"2018 IEEE World Congress on Services (SERVICES)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}