首页 > 最新文献

International Journal of Web Services Research最新文献

英文 中文
A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation 混合双置换下的可塑优化密钥传播的良好组织安全访问
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/ijwsr.2020010103
A. Sathish, S. Ravimaran, S. J. N. Kumar
With the rapid developments occurring in cloud computing and services, there has been a growing trend of using the cloud for large-scale data storage. This has led to a major security dispute on data handling. Thus, the process can be overcome by utilizing an efficient shielded access on a key propagation (ESAKP) technique along with an adaptive optimization algorithm for password generation and performing double permutation. The password generation is done by adaptive ant lion optimization (AALO) which tackles the problem of ineffiency. This build has stronger security which needs an efficient selection property by eliminating the worst fit in each iteration. The optimized password is utilized by an adaptive vignere cipher for efficient key generation in which adaptiveness is employed to prevent the dilemma of choosing the first letter of alphabet which in turn reduces the computation time and improves the security. Additionally, there is a need to encrypte the symmetric key asymmetrically with a Elliptic Curve-Diffie Hellman algorithm (EC-DH) with a double stage permutation which produces a scrambling form of data adding security to the data.
随着云计算和服务的快速发展,使用云进行大规模数据存储的趋势日益增长。这导致了数据处理方面的重大安全争议。因此,可以通过利用密钥传播(ESAKP)技术上的有效屏蔽访问以及用于密码生成和执行双重排列的自适应优化算法来克服该过程。密码生成采用自适应蚁群优化(AALO)算法,解决了算法效率低下的问题。这种构建具有更强的安全性,它需要通过消除每次迭代中的最差匹配来有效地选择属性。利用优化后的密码进行自适应维涅尔密码,有效地生成密钥,并利用自适应性避免了选择字母表首字母的困境,从而减少了计算时间,提高了安全性。此外,还需要使用椭圆曲线- diffie Hellman算法(EC-DH)对对称密钥进行非对称加密,该算法具有双阶段排列,这会产生置乱形式的数据,从而增加数据的安全性。
{"title":"A Well-Organized Safeguarded Access on Key Propagation by Malleable Optimization in Blend With Double Permutation","authors":"A. Sathish, S. Ravimaran, S. J. N. Kumar","doi":"10.4018/ijwsr.2020010103","DOIUrl":"https://doi.org/10.4018/ijwsr.2020010103","url":null,"abstract":"With the rapid developments occurring in cloud computing and services, there has been a growing trend of using the cloud for large-scale data storage. This has led to a major security dispute on data handling. Thus, the process can be overcome by utilizing an efficient shielded access on a key propagation (ESAKP) technique along with an adaptive optimization algorithm for password generation and performing double permutation. The password generation is done by adaptive ant lion optimization (AALO) which tackles the problem of ineffiency. This build has stronger security which needs an efficient selection property by eliminating the worst fit in each iteration. The optimized password is utilized by an adaptive vignere cipher for efficient key generation in which adaptiveness is employed to prevent the dilemma of choosing the first letter of alphabet which in turn reduces the computation time and improves the security. Additionally, there is a need to encrypte the symmetric key asymmetrically with a Elliptic Curve-Diffie Hellman algorithm (EC-DH) with a double stage permutation which produces a scrambling form of data adding security to the data.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"26 1","pages":"43-63"},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73222580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Decentralized PageRank Based Content Dissemination Model at the Edge of Network 基于分散PageRank的网络边缘内容传播模型
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/ijwsr.2020010101
Xin Zhang, Jiali You, Hanxing Xue, Jinlin Wang
In the era of Internet of Things, cloud services are difficult to meet the real-time transmission requirements of users for the data generated in the edge of network especially for the Internet video services. Utilizing the devices at the edge of network, such as an intelligent router, to achieve nearby content services for users can effectively reduce backbone traffic and enhance service performance. This article proposes a decentralized PageRank-based content dissemination model at the edge of network, in which a suitable node selection algorithm is designed to distribute the content evenly in the network. Each node can quickly obtain data from neighbor nodes, thereby reducing the cloud load as well as the network bandwidth and improving the service response performance. The simulation shows that, compared with the other two dissemination algorithms, the content is distributed more even, which means every node has more opportunity to obtain the data from neighbors; and the service rejection rate can be decreased by an average of 5.2% in the case of high concurrent requests.
在物联网时代,云服务难以满足用户对网络边缘产生的数据的实时传输需求,尤其是互联网视频业务。利用网络边缘设备(如智能路由器)为用户提供就近的内容服务,可以有效减少骨干流量,提高业务性能。本文提出了一种基于分散pagerank的网络边缘内容传播模型,该模型设计了合适的节点选择算法,使内容在网络中均匀分布。每个节点可以快速获取相邻节点的数据,从而减少云负载和网络带宽,提高业务响应性能。仿真结果表明,与其他两种传播算法相比,该算法的内容分布更加均匀,这意味着每个节点有更多的机会从相邻节点获取数据;在高并发请求的情况下,服务拒绝率可以平均降低5.2%。
{"title":"A Decentralized PageRank Based Content Dissemination Model at the Edge of Network","authors":"Xin Zhang, Jiali You, Hanxing Xue, Jinlin Wang","doi":"10.4018/ijwsr.2020010101","DOIUrl":"https://doi.org/10.4018/ijwsr.2020010101","url":null,"abstract":"In the era of Internet of Things, cloud services are difficult to meet the real-time transmission requirements of users for the data generated in the edge of network especially for the Internet video services. Utilizing the devices at the edge of network, such as an intelligent router, to achieve nearby content services for users can effectively reduce backbone traffic and enhance service performance. This article proposes a decentralized PageRank-based content dissemination model at the edge of network, in which a suitable node selection algorithm is designed to distribute the content evenly in the network. Each node can quickly obtain data from neighbor nodes, thereby reducing the cloud load as well as the network bandwidth and improving the service response performance. The simulation shows that, compared with the other two dissemination algorithms, the content is distributed more even, which means every node has more opportunity to obtain the data from neighbors; and the service rejection rate can be decreased by an average of 5.2% in the case of high concurrent requests.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"54 39 1","pages":"1-16"},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80584887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Neuro-Fuzzy Approach to Detect Rumors in Online Social Networks 基于神经模糊的在线社交网络谣言检测方法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2020-01-01 DOI: 10.4018/ijwsr.2020010104
Santhoshkumar Srinivasan, Yuhong Yan, Yong-bo Liang, Abhijeet Roy, B. Kumara, Incheon Paik, Wuhui Chen, Frederic Montagut, R. Molva, S. Golega, Shuai Zhao, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang
Along with true information, rumors spread in online social networks (OSN) on an unprecedented scale. In recent days, rumor identification gains more interest among the researchers. Finding rumors also poses other critical challenges like noisy and imprecise input data, data sparsity, and unclear interpretations of the output. To address these issues, we propose a neuro-fuzzy classification approach called the neuro-fuzzy rumor detector (NFRD) to automatically identify the rumors in OSNs. NFRD quickly transforms the input to fuzzy rules which classify the rumor. Neural networks handle larger input data. Fuzzy systems are better in handling uncertainty and imprecision in input data by producing fuzzy rules that effectively eliminate the unclear inputs. NFRD also considers the semantic aspects of information to ensure better classification. The neuro-fuzzy approach addresses the most common problems such as uncertainty elimination, noise reduction, and quicker generalization. Experimental results show the proposed approach performs well against state-of-the-art rumor detecting techniques.
伴随着真实的信息,谣言在网络社交网络(OSN)中以前所未有的规模传播。近年来,谣言识别在研究者中引起了更大的兴趣。寻找谣言还带来了其他关键挑战,如嘈杂和不精确的输入数据、数据稀疏性以及对输出的不明确解释。为了解决这些问题,我们提出了一种神经模糊分类方法,称为神经模糊谣言检测器(NFRD)来自动识别asn中的谣言。NFRD快速将输入转换为模糊规则,对谣言进行分类。神经网络处理更大的输入数据。模糊系统通过产生模糊规则来有效地消除不明确的输入,从而更好地处理输入数据的不确定性和不精确性。NFRD还考虑信息的语义方面,以确保更好的分类。神经模糊方法解决了最常见的问题,如不确定性消除、噪声降低和更快的泛化。实验结果表明,该方法能够很好地对抗当前最先进的谣言检测技术。
{"title":"A Neuro-Fuzzy Approach to Detect Rumors in Online Social Networks","authors":"Santhoshkumar Srinivasan, Yuhong Yan, Yong-bo Liang, Abhijeet Roy, B. Kumara, Incheon Paik, Wuhui Chen, Frederic Montagut, R. Molva, S. Golega, Shuai Zhao, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang","doi":"10.4018/ijwsr.2020010104","DOIUrl":"https://doi.org/10.4018/ijwsr.2020010104","url":null,"abstract":"Along with true information, rumors spread in online social networks (OSN) on an unprecedented scale. In recent days, rumor identification gains more interest among the researchers. Finding rumors also poses other critical challenges like noisy and imprecise input data, data sparsity, and unclear interpretations of the output. To address these issues, we propose a neuro-fuzzy classification approach called the neuro-fuzzy rumor detector (NFRD) to automatically identify the rumors in OSNs. NFRD quickly transforms the input to fuzzy rules which classify the rumor. Neural networks handle larger input data. Fuzzy systems are better in handling uncertainty and imprecision in input data by producing fuzzy rules that effectively eliminate the unclear inputs. NFRD also considers the semantic aspects of information to ensure better classification. The neuro-fuzzy approach addresses the most common problems such as uncertainty elimination, noise reduction, and quicker generalization. Experimental results show the proposed approach performs well against state-of-the-art rumor detecting techniques.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"54 1","pages":"64-82"},"PeriodicalIF":1.1,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86733679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Big Data Security 大数据安全
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-04 DOI: 10.4018/978-1-5225-7501-6.ch003
Prerna Mahajan, Geetika Gaba, N. Chauhan
The value of Big Data is now being recognized by many industries and governments. The efficient mining of Big Data enables to improve the competitive advantage of companies and to add value for many social and economic sectors. In fact, important projects with huge investments were launched by several governments to extract the maximum benefit from Big Data. The private sector has also deployed important efforts to maximize profits and optimize resources. However, Big Data sharing brings new information security and privacy issues. Traditional technologies and methods are no longer appropriate and lack of performance when applied in Big Data context. This chapter presents Big Data security challenges and a state of the art in methods, mechanisms and solutions used to protect data-intensive information systems.
大数据的价值正在被许多行业和政府所认识。大数据的有效挖掘能够提高企业的竞争优势,并为许多社会和经济部门增加价值。事实上,为了从大数据中获得最大的收益,一些政府已经启动了大量投资的重要项目。私营部门也作出了重大努力,实现利润最大化和资源优化。然而,大数据共享带来了新的信息安全和隐私问题。传统的技术和方法在大数据环境下已经不再适用,缺乏性能。本章介绍了大数据安全面临的挑战,以及用于保护数据密集型信息系统的方法、机制和解决方案的最新进展。
{"title":"Big Data Security","authors":"Prerna Mahajan, Geetika Gaba, N. Chauhan","doi":"10.4018/978-1-5225-7501-6.ch003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7501-6.ch003","url":null,"abstract":"The value of Big Data is now being recognized by many industries and governments. The efficient mining of Big Data enables to improve the competitive advantage of companies and to add value for many social and economic sectors. In fact, important projects with huge investments were launched by several governments to extract the maximum benefit from Big Data. The private sector has also deployed important efforts to maximize profits and optimize resources. However, Big Data sharing brings new information security and privacy issues. Traditional technologies and methods are no longer appropriate and lack of performance when applied in Big Data context. This chapter presents Big Data security challenges and a state of the art in methods, mechanisms and solutions used to protect data-intensive information systems.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"86 1","pages":""},"PeriodicalIF":1.1,"publicationDate":"2019-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83262701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Understanding the Determinants of Consumer Satisfaction With B&B Hotels: An Interpretive Structural Modeling Approach 了解消费者对民宿酒店满意度的决定因素:一种解释结构模型方法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-01 DOI: 10.4018/ijwsr.2019100102
Lin Xiao, Chuanmin Mi, Yetian Chen, Lihua Huang
This study aims to understand the determinants of consumer satisfaction with bed-and-breakfast establishments (B&Bs) and build a hierarchical structure of these determinants. Content analysis was conducted based on the consumer online review data. Ten determinants of customer satisfaction were identified. The interpretive structural modeling (ISM) technique was then used to develop a five-level hierarchical structural model based on these determinants. Finally, the cross-impact matrix multiplication applied to the classification (MICMAC) technique was used to analyze the driver and dependence power for each determinant. This study has the potential to make significant contributions from both the theoretical and practical perspectives.
本研究旨在了解消费者对住宿加早餐机构(b&b)满意度的决定因素,并建立这些决定因素的层次结构。根据消费者在线评论数据进行内容分析。确定了客户满意度的十个决定因素。然后使用解释结构建模(ISM)技术来开发基于这些决定因素的五层分层结构模型。最后,采用交叉影响矩阵乘法分类技术(MICMAC)分析各行列式的驱动因素和依赖程度。本研究有可能在理论和实践上做出重大贡献。
{"title":"Understanding the Determinants of Consumer Satisfaction With B&B Hotels: An Interpretive Structural Modeling Approach","authors":"Lin Xiao, Chuanmin Mi, Yetian Chen, Lihua Huang","doi":"10.4018/ijwsr.2019100102","DOIUrl":"https://doi.org/10.4018/ijwsr.2019100102","url":null,"abstract":"This study aims to understand the determinants of consumer satisfaction with bed-and-breakfast establishments (B&Bs) and build a hierarchical structure of these determinants. Content analysis was conducted based on the consumer online review data. Ten determinants of customer satisfaction were identified. The interpretive structural modeling (ISM) technique was then used to develop a five-level hierarchical structural model based on these determinants. Finally, the cross-impact matrix multiplication applied to the classification (MICMAC) technique was used to analyze the driver and dependence power for each determinant. This study has the potential to make significant contributions from both the theoretical and practical perspectives.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"28 1","pages":"21-39"},"PeriodicalIF":1.1,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76135966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fused Collaborative Filtering With User Preference, Geographical and Social Influence for Point of Interest Recommendation 基于用户偏好、地理和社会影响的兴趣点推荐融合协同过滤
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-01 DOI: 10.4018/ijwsr.2019100103
Jun Zeng, Feng Li, Xin He, Junhao Wen
Point of interest (POI) recommendation is a significant task in location-based social networks (LBSNs), e.g., Foursquare, Brightkite. It helps users explore the surroundings and help POI owners increase income. While several researches have been proposed for the recommendation services, it lacks integrated analysis on POI recommendation. In this article, the authors propose a unified recommendation framework, which fuses personalized user preference, geographical influence, and social reputation. The TF-IDF method is adopted to measure the interest level and contribution of locations when calculating the similarity between users. Geographical influence includes geographical distance and location popularity. The authors find friends in Brightkite share low common visited POIs. It means friends' interests may vary greatly. Instead of directly getting recommendations from so-called friends in LBSN, the users attain recommendation from others according to their reputation. Finally, experimental results on real-world dataset demonstrate that the proposed method performs much better than other recommendation methods.
兴趣点(POI)推荐是基于位置的社交网络(LBSNs)的一项重要任务,例如Foursquare, Brightkite。它可以帮助用户探索周围环境,并帮助POI所有者增加收入。虽然已有一些针对推荐服务的研究,但缺乏对POI推荐的综合分析。在本文中,作者提出了一个统一的推荐框架,它融合了个性化的用户偏好、地理影响和社会声誉。在计算用户之间的相似度时,采用TF-IDF方法来衡量地点的兴趣程度和贡献。地理影响包括地理距离和地理位置知名度。作者发现,在Brightkite的朋友们都有很低的常见访问点。这意味着朋友们的兴趣可能会有很大的不同。在LBSN中,用户不是直接从所谓的朋友那里获得推荐,而是根据自己的口碑获得他人的推荐。最后,在真实数据集上的实验结果表明,该方法的推荐效果明显优于其他推荐方法。
{"title":"Fused Collaborative Filtering With User Preference, Geographical and Social Influence for Point of Interest Recommendation","authors":"Jun Zeng, Feng Li, Xin He, Junhao Wen","doi":"10.4018/ijwsr.2019100103","DOIUrl":"https://doi.org/10.4018/ijwsr.2019100103","url":null,"abstract":"Point of interest (POI) recommendation is a significant task in location-based social networks (LBSNs), e.g., Foursquare, Brightkite. It helps users explore the surroundings and help POI owners increase income. While several researches have been proposed for the recommendation services, it lacks integrated analysis on POI recommendation. In this article, the authors propose a unified recommendation framework, which fuses personalized user preference, geographical influence, and social reputation. The TF-IDF method is adopted to measure the interest level and contribution of locations when calculating the similarity between users. Geographical influence includes geographical distance and location popularity. The authors find friends in Brightkite share low common visited POIs. It means friends' interests may vary greatly. Instead of directly getting recommendations from so-called friends in LBSN, the users attain recommendation from others according to their reputation. Finally, experimental results on real-world dataset demonstrate that the proposed method performs much better than other recommendation methods.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"98 1","pages":"40-52"},"PeriodicalIF":1.1,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81004431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Novel Completion-Time-Minimization Scheduling Approach of Scientific Workflows Over Heterogeneous Cloud Computing Systems 异构云计算系统上科学工作流完成时间最小化调度新方法
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-01 DOI: 10.4018/ijwsr.2019100101
S. Bukhari, Yunni Xia
The cloud computing paradigm provides an ideal platform for supporting large-scale scientific-workflow-based applications over the internet. However, the scheduling and execution of scientific workflows still face various challenges such as cost and response time management, which aim at handling acquisition delays of physical servers and minimizing the overall completion time of workflows. A careful investigation into existing methods shows that most existing approaches consider static performance of physical machines (PMs) and ignore the impact of resource acquisition delays in their scheduling models. In this article, the authors present a meta-heuristic-based method to scheduling scientific workflows aiming at reducing workflow completion time through appropriately managing acquisition and transmission delays required for inter-PM communications. The authors carry out extensive case studies as well based on real-world commercial cloud sand multiple workflow templates. Experimental results clearly show that the proposed method outperforms the state-of-art ones such as ICPCP, CEGA, and JIT-C in terms of workflow completion time.
云计算范例提供了一个理想的平台,用于支持互联网上基于大规模科学工作流的应用程序。然而,科学工作流的调度和执行仍然面临各种挑战,如成本和响应时间管理,其目的是处理物理服务器的获取延迟和最小化工作流的总体完成时间。对现有方法的仔细调查表明,大多数现有方法都考虑物理机的静态性能,而忽略了其调度模型中资源获取延迟的影响。在这篇文章中,作者提出了一种基于元启发式的方法来调度科学工作流,旨在通过适当地管理内部pm通信所需的获取和传输延迟来减少工作流完成时间。作者还基于现实世界的商业云和多个工作流模板进行了广泛的案例研究。实验结果清楚地表明,该方法在工作流完成时间方面优于ICPCP、CEGA和JIT-C等先进方法。
{"title":"A Novel Completion-Time-Minimization Scheduling Approach of Scientific Workflows Over Heterogeneous Cloud Computing Systems","authors":"S. Bukhari, Yunni Xia","doi":"10.4018/ijwsr.2019100101","DOIUrl":"https://doi.org/10.4018/ijwsr.2019100101","url":null,"abstract":"The cloud computing paradigm provides an ideal platform for supporting large-scale scientific-workflow-based applications over the internet. However, the scheduling and execution of scientific workflows still face various challenges such as cost and response time management, which aim at handling acquisition delays of physical servers and minimizing the overall completion time of workflows. A careful investigation into existing methods shows that most existing approaches consider static performance of physical machines (PMs) and ignore the impact of resource acquisition delays in their scheduling models. In this article, the authors present a meta-heuristic-based method to scheduling scientific workflows aiming at reducing workflow completion time through appropriately managing acquisition and transmission delays required for inter-PM communications. The authors carry out extensive case studies as well based on real-world commercial cloud sand multiple workflow templates. Experimental results clearly show that the proposed method outperforms the state-of-art ones such as ICPCP, CEGA, and JIT-C in terms of workflow completion time.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"1 1","pages":"1-20"},"PeriodicalIF":1.1,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83002508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ADOMC-NPR Automatic Decision-Making Offloading Framework for Mobile Computation Using Nonlinear Polynomial Regression Model 基于非线性多项式回归模型的ADOMC-NPR移动计算自动决策卸载框架
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-10-01 DOI: 10.4018/ijwsr.2019100104
Abdulrahman Elhosuieny, Mofreh Salem, Amr Thabet, Abdelhameed Ibrahim
Nowadays, mobile computation applications attract major interest of researchers. Limited processing power and short battery lifetime is an obstacle in executing computationally-intensive applications. This article presents a mobile computation automatic decision-making offloading framework. The proposed framework consists of two phases: adaptive learning, and modeling and runtime computation offloading. In the adaptive phase, curve-fitting (CF) technique based on non-linear polynomial regression (NPR) methodology is used to build an approximate time-predicting model that can estimate the execution time for spending the processing of the detected-intensive applications. The runtime computation phase uses the time predicting model for computing the predicted execution time to decide whether to run the application remotely and perform the offloading process or to run the application locally. Eventually, the RESTful web service is applied to carry out the offloading task in the case of a positive offloading decision. The proposed framework experimentally outperforms a competitive state-of-the-art technique by 73% concerning the time factor. The proposed time-predicting model records minimal deviation of the originally obtained values as it is applied 0.4997, 8.9636, 0.0020, and 0.6797 on the mean squared error metric for matrix-determinant, image-sharpening, matrix-multiplication, and n-queens problems, respectively.
目前,移动计算应用引起了研究人员的极大兴趣。有限的处理能力和较短的电池寿命是执行计算密集型应用的障碍。提出了一种移动计算自动决策卸载框架。该框架包括自适应学习、建模和运行时计算卸载两个阶段。在自适应阶段,采用基于非线性多项式回归(NPR)方法的曲线拟合(CF)技术建立了近似的时间预测模型,该模型可以估计检测密集型应用程序的执行时间。运行时计算阶段使用时间预测模型来计算预测的执行时间,以决定是远程运行应用程序并执行卸载过程,还是在本地运行应用程序。最后,在确定卸载决策的情况下,应用RESTful web服务来执行卸载任务。在实验上,所提出的框架在时间因素方面优于具有竞争力的最先进技术73%。所提出的时间预测模型分别对矩阵行列式、图像锐化、矩阵乘法和n-queens问题的均方误差度量应用0.4997、8.9636、0.0020和0.6797,记录了原始获得值的最小偏差。
{"title":"ADOMC-NPR Automatic Decision-Making Offloading Framework for Mobile Computation Using Nonlinear Polynomial Regression Model","authors":"Abdulrahman Elhosuieny, Mofreh Salem, Amr Thabet, Abdelhameed Ibrahim","doi":"10.4018/ijwsr.2019100104","DOIUrl":"https://doi.org/10.4018/ijwsr.2019100104","url":null,"abstract":"Nowadays, mobile computation applications attract major interest of researchers. Limited processing power and short battery lifetime is an obstacle in executing computationally-intensive applications. This article presents a mobile computation automatic decision-making offloading framework. The proposed framework consists of two phases: adaptive learning, and modeling and runtime computation offloading. In the adaptive phase, curve-fitting (CF) technique based on non-linear polynomial regression (NPR) methodology is used to build an approximate time-predicting model that can estimate the execution time for spending the processing of the detected-intensive applications. The runtime computation phase uses the time predicting model for computing the predicted execution time to decide whether to run the application remotely and perform the offloading process or to run the application locally. Eventually, the RESTful web service is applied to carry out the offloading task in the case of a positive offloading decision. The proposed framework experimentally outperforms a competitive state-of-the-art technique by 73% concerning the time factor. The proposed time-predicting model records minimal deviation of the originally obtained values as it is applied 0.4997, 8.9636, 0.0020, and 0.6797 on the mean squared error metric for matrix-determinant, image-sharpening, matrix-multiplication, and n-queens problems, respectively.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"6 1","pages":"53-73"},"PeriodicalIF":1.1,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75404944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Dynamic Web Service Composition Using AND/OR Directed Graphs 使用和/或有向图的自动动态Web服务组合
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-01 DOI: 10.4018/IJWSR.2019070102
Hajar Elmaghraoui, Laila Benhlima, D. Chiadmi
In this article, the authors propose a dynamic web service composition approach based on representing the semantic relationship between web services using a weighted directed AND/OR graph. The nodes in this graph represent available services while the arcs represent the semantic input/output dependencies among them. The novelty of this work consists of constructing the graph and computing offline the shortest paths between each pair of its nodes to disconnect this tedious task from the composition query process. A set of dynamic optimization techniques has been included to reduce the size of the graph and thus improve the scalability and performance of this approach. In addition to the sequence and fork relations between services, this solution also supports the parallel relation. Furthermore, a recovery mechanism is integrated to ensure the continuity of the execution of the composition.
在本文中,作者提出了一种动态web服务组合方法,该方法基于使用加权有向AND/OR图来表示web服务之间的语义关系。此图中的节点表示可用的服务,而弧表示它们之间的语义输入/输出依赖关系。这项工作的新颖之处在于构建图并离线计算每对节点之间的最短路径,从而将这项繁琐的任务从组合查询过程中分离出来。包含了一组动态优化技术来减少图的大小,从而提高该方法的可伸缩性和性能。除了服务之间的序列和分支关系外,该解决方案还支持并行关系。此外,还集成了恢复机制,以确保组合物执行的连续性。
{"title":"Automatic Dynamic Web Service Composition Using AND/OR Directed Graphs","authors":"Hajar Elmaghraoui, Laila Benhlima, D. Chiadmi","doi":"10.4018/IJWSR.2019070102","DOIUrl":"https://doi.org/10.4018/IJWSR.2019070102","url":null,"abstract":"In this article, the authors propose a dynamic web service composition approach based on representing the semantic relationship between web services using a weighted directed AND/OR graph. The nodes in this graph represent available services while the arcs represent the semantic input/output dependencies among them. The novelty of this work consists of constructing the graph and computing offline the shortest paths between each pair of its nodes to disconnect this tedious task from the composition query process. A set of dynamic optimization techniques has been included to reduce the size of the graph and thus improve the scalability and performance of this approach. In addition to the sequence and fork relations between services, this solution also supports the parallel relation. Furthermore, a recovery mechanism is integrated to ensure the continuity of the execution of the composition.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"25 1","pages":"29-43"},"PeriodicalIF":1.1,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75533906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Tagging Augmented LDA Model for Clustering 一种新的标记增强LDA聚类模型
IF 1.1 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2019-07-01 DOI: 10.4018/IJWSR.2019070104
Yi Zhao, Yu Qiao, K. He
Clustering has become an increasingly important task in the analysis of large documents. Clustering aims to organize these documents, and facilitate better search and knowledge extraction. Most existing clustering methods that use user-generated tags only consider their positive influence for improving automatic clustering performance. The authors argue that not all user-generated tags can provide useful information for clustering. In this article, the authors propose a new solution for clustering, named HRT-LDA (High Representation Tags Latent Dirichlet Allocation), which considers the effects of different tags on clustering performance. For this, the authors perform a tag filtering strategy and a tag appending strategy based on transfer learning, Word2vec, TF-IDF and semantic computing. Extensive experiments on real-world datasets demonstrate that HRT-LDA outperforms the state-of-the-art tagging augmented LDA methods for clustering.
聚类已成为大型文档分析中越来越重要的任务。聚类的目的是组织这些文档,促进更好的搜索和知识提取。大多数现有的使用用户生成标签的聚类方法只考虑它们对提高自动聚类性能的积极影响。作者认为,并非所有用户生成的标签都能为聚类提供有用的信息。在本文中,作者提出了一种新的聚类解决方案,称为HRT-LDA (High Representation Tags Latent Dirichlet Allocation),它考虑了不同标签对聚类性能的影响。为此,作者执行了一种基于迁移学习、Word2vec、TF-IDF和语义计算的标签过滤策略和标签追加策略。在真实数据集上的大量实验表明,HRT-LDA在聚类方面优于最先进的标记增强LDA方法。
{"title":"A Novel Tagging Augmented LDA Model for Clustering","authors":"Yi Zhao, Yu Qiao, K. He","doi":"10.4018/IJWSR.2019070104","DOIUrl":"https://doi.org/10.4018/IJWSR.2019070104","url":null,"abstract":"Clustering has become an increasingly important task in the analysis of large documents. Clustering aims to organize these documents, and facilitate better search and knowledge extraction. Most existing clustering methods that use user-generated tags only consider their positive influence for improving automatic clustering performance. The authors argue that not all user-generated tags can provide useful information for clustering. In this article, the authors propose a new solution for clustering, named HRT-LDA (High Representation Tags Latent Dirichlet Allocation), which considers the effects of different tags on clustering performance. For this, the authors perform a tag filtering strategy and a tag appending strategy based on transfer learning, Word2vec, TF-IDF and semantic computing. Extensive experiments on real-world datasets demonstrate that HRT-LDA outperforms the state-of-the-art tagging augmented LDA methods for clustering.","PeriodicalId":54936,"journal":{"name":"International Journal of Web Services Research","volume":"35 1","pages":"59-77"},"PeriodicalIF":1.1,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90449632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
International Journal of Web Services Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1