SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
Control Theory and Informatics                                                                     www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011


              On Demand Web Services with Quality of Service
                                                BRAJESH KOKKONDA
      Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                             Tel: +91-7416322567 E-mail: brajesh.email@gmail.com


                                                  P.PRADEEP KUMAR
      Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                               Tel: +91-9885364555 E-mail: pkpuram@gmail.com


                                                        G.RAJESH
         Department of Information & Technology, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                            Tel: +91-9848540851 E-mail: gunupudirajesh@gmail.com
Abstract
The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds.
This creates new opportunities to build applications that better integrate real-time state of the physical world,
and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented
Architecture (SOA) approaches traditionally used to couple functionality of heavyweight corporate IT systems,
are becoming applicable to embedded real-world devices, i.e., objects of the physical world that feature
embedded processing and communication.

Keywords: - Time synchronization, sensor networks

1. Introduction
The process described in this project has been developed and implemented as part of the Integrated Architecture
(SIA). The role of IA is to enable the ubiquitous integration of real world services running on embedded devices
with enterprise services. WS web service standards constitute the de facto communication method used by the
components of enterprise-level applications, and for this reason IA is fully based on them. In this manner,
business applications can access near real-time data from a wide range of networked devices through a high-
level, abstract interface based on web services. Furthermore, the IA also supports RESTful services in order to
be able to communicate with many emerging Web 2.0 services. This enables any networked device that is
connected to the SIA to directly participate in business processes while neither requiring the process modeler,
nor the process execution engine to know about the exact details of the underlying hardware.

1.1 Previous Work
In recent years, the use of services to compose new applications from existing modules has gained momentum.
Web services are autonomous units of code, independently developed and evolved. The Web Service
Description Language (WSDL) is used as the defacto standard for service providers to describe the interface of
the Web services, i.e., their operations and input and output parameters. Therefore, Web services lack
homogeneous structure beyond that of their interface. Heterogeneity stems from different ways to name
parameters, define parameters, and describe internal processing. This heterogeneity encumbers straightforward
integration between Web services. Web service registries such as Universal Description, Discovery, and
Integration (UDDI) were created to encourage interoperability and adoption of Web services. However, UDDI
registries have some major flaws. UDDI registries either are made publicly available and contain many obsolete
entries or require registration. In either case, a registry stores only a limited description of the available services.
Semantic Web services were proposed to overcome interface heterogeneity. Using languages such as Ontology
Web Language for Services (OWL-S) and WSDL Semantics (WSDL-S), Web services are extended with an
unambiguous description by relating properties such as input and output parameters to common concepts and by


6|Page
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

defining the execution characteristics of the service.

The concepts are defined in Web ontologies, which serve as the key mechanism to globally define and reference
concepts. Formal languages enable service composition, in which a developer uses automatic or semiautomatic
tools to create a integrated business process from a set of independent Web services. Service composition in a
heterogeneous environment immediately raises issues of evaluating the accuracy of the mapping. As an
example, consider three real-world Web services, as illustrated in Fig. 1. The three services distance between zip
codes (A), store IT contracts (B), and translation into any language (C) share some common concepts, such as
the code concept. However, these three services originate from very different domains. Service A is concerned
with distance calculation and uses the zip codes as input, service B defines CurrencyCode as part of the IT
contract information to be stored, and service C uses a Client Code as an access key for users. It is unlikely that
any of the services will be combined into a meaningful composition. This example illustrates that methods based
solely on the concepts mapped to the service’s parameters may yield inaccurate results. We aim at analyzing
different methods for automatically identifying possible semantic composition. We explore two sources for
service analysis: WSDL description files and free textual descriptors, which are commonly used in service
repositories. We investigate two methods for Web service classification for each type of descriptor: Term
Frequency/ Inverse Document Frequency (TF/IDF) and context based analysis, and a baseline method. We
define contexts as a model of a domain for a given term, which is automatically extracted from a fragment of
text. In this work, contexts are created by finding-related terms from the Web. Unlike ontologies, which are
considered shared models of a domain, we define contexts as local views of [1]

2. System Architecture




3. Results
The concept of this paper is implemented and different results are shown below




7|Page
www.iiste.org
Control Theory and Informatics                                                      www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011




3.1 Graphs



                                              Web Services Data Retrieved at
                                               Different Instances of Time
                             Data Retrieved
                                (Bytes)




                                                                               t1
                                                                               t2


                                                   Web Services Index




8|Page
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011


                                                       Web Services Response time at
                                                            Different Instances




                                 Retrieval Time (ms)
                                                                                       t1
                                                                                       t2
                                                                                       t3

                                                            Web Services Index



3.2 Performance Analysis
The proposed paper is implemented in Java technology on a Pentium-IV PC with 20 GB hard-disk and 256 MB
RAM. The propose paper’s concepts shows efficient results of retrieving data from web services and has been
efficiently tested on different systems.

4. Conclusion
The future Internet will be highly populated by heterogeneous networked embedded devices that will further
blur the borders of real and virtual world, empowering us with new capabilities in creating real-world aware
business applications. For this to happen, it is of high importance to be able to find real-world services that can
be dynamically included in enterprise applications a quite challenging task considering the application
requirements, technologies, and heterogeneity of devices. In that line of thought, we have presented here an
approach that would facilitate this task for developers, allowing them not only to search efficiently for services
running on embedded devices, but also to deploy missing functionalities on-demand.

References
A. Segev and E. Toch, “Context-Based Matching and Ranking of Web Services for Composition,” IEEE Trans.
    Services Computing, vol. 99, no. 1, pp. 210-222, Jun. 2009.

M. Hepp, K. Siorpaes, and D. Bachlechner, “Harvesting Wiki Consensus: Using Wikipedia Entries as
    Vocabulary for Knowledge Management,” IEEE Internet Computing, vol. 11, no. 5, pp. 54- 65, Sept./Oct.
    2007.

N.B. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, “Tiny Web Services: Design and Implementation of
    Interoperable and Evolvable Sensor Networks,” Proc. Sixth ACM Conf. Embedded Network Sensor
    Systems, pp. 253-266, 2008.

S. Karnouskos, O. Baecker, L.M.S. de Souza, and P. Spiess, “Integration of SOA-Ready Networked Embedded
    Devices in Enterprise Systems via a Cross-Layered Web Service Infrastructure,” Proc. IEEE Conf.
    Emerging Technologies & Factory Automation (ETFA), pp. 293-300, Sept. 2007.

D. Guinard and V. Trifa, “Towards the Web of Things: Web Mashups for Embedded Devices,” Proc. Workshop
    Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM ’09), Apr. 2009.

D. Guinard, V. Trifa, P. Spiess, B. Dober, and S. Karnouskos, “Discovery and On-Demand Provisioning of Real-
World Web Services,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), pp. 583- 590, 2009.




9|Page
www.iiste.org

Weitere ähnliche Inhalte

Was ist angesagt?

Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...
Conference Papers
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
Conference Papers
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
Vinoth Kanna
 

Was ist angesagt? (18)

The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...
 
I42024349
I42024349I42024349
I42024349
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
 
A New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewA New Approach for CBIR – A Review
A New Approach for CBIR – A Review
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 

Andere mochten auch

Final Questionnaire
Final QuestionnaireFinal Questionnaire
Final Questionnaire
beckyt95
 
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
guest3f9c6b
 
Proteccion del medio ambiente tochi
Proteccion del medio ambiente tochiProteccion del medio ambiente tochi
Proteccion del medio ambiente tochi
tochieshermosa
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Stenio Fernandes
 
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnnBaru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
Sadrina Ina
 
Decalogo del investigador ovni
Decalogo del investigador ovniDecalogo del investigador ovni
Decalogo del investigador ovni
john xlarge
 
Visita papa noel 2012
Visita papa noel 2012Visita papa noel 2012
Visita papa noel 2012
begotor
 
Elementary education quality improvement programme
Elementary education quality improvement programmeElementary education quality improvement programme
Elementary education quality improvement programme
punarnav bharat
 

Andere mochten auch (10)

Final Questionnaire
Final QuestionnaireFinal Questionnaire
Final Questionnaire
 
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
 
Proteccion del medio ambiente tochi
Proteccion del medio ambiente tochiProteccion del medio ambiente tochi
Proteccion del medio ambiente tochi
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnnBaru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
 
Decalogo del investigador ovni
Decalogo del investigador ovniDecalogo del investigador ovni
Decalogo del investigador ovni
 
Visita papa noel 2012
Visita papa noel 2012Visita papa noel 2012
Visita papa noel 2012
 
Elementary education quality improvement programme
Elementary education quality improvement programmeElementary education quality improvement programme
Elementary education quality improvement programme
 
Final ppt
Final pptFinal ppt
Final ppt
 
Library Presentation
Library PresentationLibrary Presentation
Library Presentation
 

Ähnlich wie 2.[6 9]on demand web services with quality of service

Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
iaemedu
 
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
CSCJournals
 
Cloud computing
Cloud computingCloud computing
Cloud computing
shethzaid
 

Ähnlich wie 2.[6 9]on demand web services with quality of service (20)

Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
 
As044285288
As044285288As044285288
As044285288
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Survey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition AlgorithmSurvey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition Algorithm
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvvIJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
IJRAR1BHP007bbhjkmmgcxxfhnjkjkmmgfgvhjjjvv
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
 
Web Services Foundation Technologies
Web Services Foundation TechnologiesWeb Services Foundation Technologies
Web Services Foundation Technologies
 
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWWEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Shceduling iot application on cloud computing
Shceduling iot application on cloud computingShceduling iot application on cloud computing
Shceduling iot application on cloud computing
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service Architecture
 

Mehr von Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
Alexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
Alexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
Alexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
Alexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
Alexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
Alexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
Alexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
Alexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
Alexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
Alexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
Alexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
Alexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
Alexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
Alexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
Alexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
Alexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
Alexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
Alexander Decker
 

Mehr von Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

2.[6 9]on demand web services with quality of service

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 On Demand Web Services with Quality of Service BRAJESH KOKKONDA Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-7416322567 E-mail: brajesh.email@gmail.com P.PRADEEP KUMAR Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-9885364555 E-mail: pkpuram@gmail.com G.RAJESH Department of Information & Technology, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-9848540851 E-mail: gunupudirajesh@gmail.com Abstract The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA) approaches traditionally used to couple functionality of heavyweight corporate IT systems, are becoming applicable to embedded real-world devices, i.e., objects of the physical world that feature embedded processing and communication. Keywords: - Time synchronization, sensor networks 1. Introduction The process described in this project has been developed and implemented as part of the Integrated Architecture (SIA). The role of IA is to enable the ubiquitous integration of real world services running on embedded devices with enterprise services. WS web service standards constitute the de facto communication method used by the components of enterprise-level applications, and for this reason IA is fully based on them. In this manner, business applications can access near real-time data from a wide range of networked devices through a high- level, abstract interface based on web services. Furthermore, the IA also supports RESTful services in order to be able to communicate with many emerging Web 2.0 services. This enables any networked device that is connected to the SIA to directly participate in business processes while neither requiring the process modeler, nor the process execution engine to know about the exact details of the underlying hardware. 1.1 Previous Work In recent years, the use of services to compose new applications from existing modules has gained momentum. Web services are autonomous units of code, independently developed and evolved. The Web Service Description Language (WSDL) is used as the defacto standard for service providers to describe the interface of the Web services, i.e., their operations and input and output parameters. Therefore, Web services lack homogeneous structure beyond that of their interface. Heterogeneity stems from different ways to name parameters, define parameters, and describe internal processing. This heterogeneity encumbers straightforward integration between Web services. Web service registries such as Universal Description, Discovery, and Integration (UDDI) were created to encourage interoperability and adoption of Web services. However, UDDI registries have some major flaws. UDDI registries either are made publicly available and contain many obsolete entries or require registration. In either case, a registry stores only a limited description of the available services. Semantic Web services were proposed to overcome interface heterogeneity. Using languages such as Ontology Web Language for Services (OWL-S) and WSDL Semantics (WSDL-S), Web services are extended with an unambiguous description by relating properties such as input and output parameters to common concepts and by 6|Page www.iiste.org
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 defining the execution characteristics of the service. The concepts are defined in Web ontologies, which serve as the key mechanism to globally define and reference concepts. Formal languages enable service composition, in which a developer uses automatic or semiautomatic tools to create a integrated business process from a set of independent Web services. Service composition in a heterogeneous environment immediately raises issues of evaluating the accuracy of the mapping. As an example, consider three real-world Web services, as illustrated in Fig. 1. The three services distance between zip codes (A), store IT contracts (B), and translation into any language (C) share some common concepts, such as the code concept. However, these three services originate from very different domains. Service A is concerned with distance calculation and uses the zip codes as input, service B defines CurrencyCode as part of the IT contract information to be stored, and service C uses a Client Code as an access key for users. It is unlikely that any of the services will be combined into a meaningful composition. This example illustrates that methods based solely on the concepts mapped to the service’s parameters may yield inaccurate results. We aim at analyzing different methods for automatically identifying possible semantic composition. We explore two sources for service analysis: WSDL description files and free textual descriptors, which are commonly used in service repositories. We investigate two methods for Web service classification for each type of descriptor: Term Frequency/ Inverse Document Frequency (TF/IDF) and context based analysis, and a baseline method. We define contexts as a model of a domain for a given term, which is automatically extracted from a fragment of text. In this work, contexts are created by finding-related terms from the Web. Unlike ontologies, which are considered shared models of a domain, we define contexts as local views of [1] 2. System Architecture 3. Results The concept of this paper is implemented and different results are shown below 7|Page www.iiste.org
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 3.1 Graphs Web Services Data Retrieved at Different Instances of Time Data Retrieved (Bytes) t1 t2 Web Services Index 8|Page www.iiste.org
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Web Services Response time at Different Instances Retrieval Time (ms) t1 t2 t3 Web Services Index 3.2 Performance Analysis The proposed paper is implemented in Java technology on a Pentium-IV PC with 20 GB hard-disk and 256 MB RAM. The propose paper’s concepts shows efficient results of retrieving data from web services and has been efficiently tested on different systems. 4. Conclusion The future Internet will be highly populated by heterogeneous networked embedded devices that will further blur the borders of real and virtual world, empowering us with new capabilities in creating real-world aware business applications. For this to happen, it is of high importance to be able to find real-world services that can be dynamically included in enterprise applications a quite challenging task considering the application requirements, technologies, and heterogeneity of devices. In that line of thought, we have presented here an approach that would facilitate this task for developers, allowing them not only to search efficiently for services running on embedded devices, but also to deploy missing functionalities on-demand. References A. Segev and E. Toch, “Context-Based Matching and Ranking of Web Services for Composition,” IEEE Trans. Services Computing, vol. 99, no. 1, pp. 210-222, Jun. 2009. M. Hepp, K. Siorpaes, and D. Bachlechner, “Harvesting Wiki Consensus: Using Wikipedia Entries as Vocabulary for Knowledge Management,” IEEE Internet Computing, vol. 11, no. 5, pp. 54- 65, Sept./Oct. 2007. N.B. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, “Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks,” Proc. Sixth ACM Conf. Embedded Network Sensor Systems, pp. 253-266, 2008. S. Karnouskos, O. Baecker, L.M.S. de Souza, and P. Spiess, “Integration of SOA-Ready Networked Embedded Devices in Enterprise Systems via a Cross-Layered Web Service Infrastructure,” Proc. IEEE Conf. Emerging Technologies & Factory Automation (ETFA), pp. 293-300, Sept. 2007. D. Guinard and V. Trifa, “Towards the Web of Things: Web Mashups for Embedded Devices,” Proc. Workshop Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM ’09), Apr. 2009. D. Guinard, V. Trifa, P. Spiess, B. Dober, and S. Karnouskos, “Discovery and On-Demand Provisioning of Real- World Web Services,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), pp. 583- 590, 2009. 9|Page www.iiste.org