Since many organizations recently decide to implement and publish their applications over Internet, the number of Web services has dramatically increased. In many cases, a single service is not sufficient to respond t...
详细信息
Since many organizations recently decide to implement and publish their applications over Internet, the number of Web services has dramatically increased. In many cases, a single service is not sufficient to respond to the user’s request. In order to tackle this problem, services have to be combined together. Therefore, composition of Web services is one of the recent critical issues. Several approaches have been presented, to tackle this problem. In this paper, we classify these approaches into four categories namely Workflow-based, AI-planning based, Syntactic-based, and Ontology-based. Then, we describe and compare these approaches using some criteria (like QoS, scalability, and correctness). The overall results indicate that some AI-planning and Ontology based approaches like HTN-DL and WSMO satisfy most of the criteria.
Certain requirements in requirements document are scattered and tangled. Often software developers neglect these requirements during implementation or repeat the same functionality throughout the codes. These requirem...
详细信息
Certain requirements in requirements document are scattered and tangled. Often software developers neglect these requirements during implementation or repeat the same functionality throughout the codes. These requirements are called crosscutting concerns. Identifying and analyzing these concerns manually is a hassle due to its ambiguous characteristics and massive volume of requirement sources. Aspect-oriented requirements engineering (AORE) supports crosscutting concern identification at various software development phases. However it is crucial at the requirements level; to avoid coupling between requirements, improve traceability among requirements, eases function modularization, reduce software complexity, enhance correctness of the software design, and most importantly it saves the cost. Many techniques have been developed for crosscutting concern identification at the requirements level such as Theme/Doc and Early Aspects. However all of these techniques in the existing studies are only supported by semi-automated tool whereby human intervention is required to achieve the desired results. In this paper, we describe a tool, 3CI that automatically identifies crosscutting concern as well as their crosscutting relationships at the requirement level. The tool utilizes NLP techniques to extract linguistic properties in each unique requirement and exploits these properties to identify crosscutting concerns and its influences in a requirements document. NLP techniques such as part-of-speech analysis, word frequency analysis and dominant verb analysis contribute in the processing of requirements phrases to assist aspects mining.
Nowadays, credit card is a famous trend used by millions of people around the world as a form of payment. This paper presented an architectural framework and prototype of credit card authorization system using thread-...
详细信息
Nowadays, credit card is a famous trend used by millions of people around the world as a form of payment. This paper presented an architectural framework and prototype of credit card authorization system using thread-level parallelism and shared memory pool techniques in order to support dynamic tuning of the size of the thread pool at runtime. Normally, single threaded were chosen by software developer in current credit card authorization whereby authentication process takes longer time to respond and its limitation of handling huge number of simultaneous transactions at the same time. As a result, the performance of the authorization system was affected during peak hours. Through thread-level parallelism technique or usually known as multi-threading, each worker thread will be assigned with several child threads to perform online fraud validation concurrently, depending on numbers of cryptographic elements presented in transaction message while the work thread itself performed card restriction validation based on the card information stored in card's shared memory pool.
Aspect-oriented requirements engineering shows encouraging results in improving, identification, modularization and composition of crosscutting concerns. For instance, many techniques have been developed for crosscutt...
详细信息
Aspect-oriented requirements engineering shows encouraging results in improving, identification, modularization and composition of crosscutting concerns. For instance, many techniques have been developed for crosscutting concern identification activity. This crucial activity is useful at the requirements level; it avoids coupling between requirements, improves traceability among requirements, eases function modularization, reduces software complexity, enhances the correctness of the software design, and most importantly it saves the cost. However, existing studies do not provide us with a clear definition of the term crosscutting concern and aspect. In terms of tools, most of these techniques in the existing studies are only supported by semi-automated tool. It means human intervention is required to achieve the desired results. In this paper, we describe a tool that provides automated support for identifying crosscutting concern at the requirements level. The tool utilises natural language processing technique to reason about properties of the concerns and model their structure and relationship.
This paper introduces a novel particle swarm optimization algorithm based on the concept of black holes in physics, called random black hole particle swarm optimization (RBH-PSO) for the first time. In each dimension ...
详细信息
ISBN:
(纸本)9781424423101
This paper introduces a novel particle swarm optimization algorithm based on the concept of black holes in physics, called random black hole particle swarm optimization (RBH-PSO) for the first time. In each dimension of a particle, we randomly generate a black hole located nearest to the best particle of the swarm in current generation and then randomly pull particles of the swarm into the black hole with a probability p. By this mechanism of random black hole, we can give all the particles another interesting direction to converge as well as another chance to fly out of local minima when a premature convergence happens. Several experiments on fifteen benchmark test functions are conducted to demonstrate that the proposed RBH-PSO algorithm is able to speedup the evolution process distinctly and improve the performance of global optimizer greatly. Finally, an actual application of the proposed algorithm to spam detection is conducted then compared to other three current methods.
Modern project management is a well-understood discipline that can produce predictable, repeatable results. The methodologies of modern project management are highly analytic, usually requiring automated tools to supp...
详细信息
Modern project management is a well-understood discipline that can produce predictable, repeatable results. The methodologies of modern project management are highly analytic, usually requiring automated tools to support them on large projects. Like most other disciplines, it is learned through both practice and study. Project management encompasses many different skills, such as understanding the interdependencies among people, technologies, budgets, and expectations; planning the project to maximize productivity; motivating others to execute the plan; analyzing the actual results; and reworking and tuning the plan to deal with the realities of what really happens as the project is executed. In order to manage a project and bring it to a successful completion, its project manager must have a complete understanding of the methodologies being used for the management of different parts of the project. Managers prefer specific project methodology, while resist and face difficulties for an opportunity to manage another project with different methodology as they don’t know how much commonality exists between the preferred and the new required methodology.
In this paper, we have studied a common Web service composition problem, the syntactic matching problem, where the output parameters of a Web service can be used as the input parameters of another Web service. Many au...
详细信息
Super-peer P2P systems strike a balance between searching efficiency in centralized P2P systems and the autonomy, load balancing and robustness provided by pure P2P systems. A super-peer is a node in a super-peer P2P ...
详细信息
Super-peer P2P systems strike a balance between searching efficiency in centralized P2P systems and the autonomy, load balancing and robustness provided by pure P2P systems. A super-peer is a node in a super-peer P2P system that maintains the central index for the information shared by a set of peers within the same cluster. The central index handles the searching request on behalf of the connecting set of peers and also passes on the request to neighboring super-peers in order to access additional indices and peers. In this paper, we study the behavior of query answering in super-peer P2P systems with the aim of understanding the issues and tradeoffs in designing a scalable super-peer system. We focus on where to post queries in order to retrieve the result and investigate the implications for three different architectures: caching queries at the peer; caching only at the super-peer; and an ordinary P2P system without any caching facilities. We are adopting the existing equation on measuring the network cost for query answering in super-peer systems. In addition, we are adapting the same equation for super-peer system with caching facilities while answering their queries. Using these equations, the cost of query processing for these architectures is compared. The paper discusses the tradeoffs between architectures with respect to caching, highlights the effect of key parameter values on system performance, and ends by considering whether certain knowledge domains are more appropriate for particular architectures.
Our motivation for knowledge discovery in Chinese medicine is two folds: innovate and verify effective data mining technology in realistic applications;and update Chinese medical informatics. This paper focuses on the...
详细信息
We present a study of the Web based user navigation patterns mining and propose a novel approach for clustering of user navigation patterns. The approach is based on the graph partitioning for modeling user navigation...
详细信息
ISBN:
(纸本)9781424421749
We present a study of the Web based user navigation patterns mining and propose a novel approach for clustering of user navigation patterns. The approach is based on the graph partitioning for modeling user navigation patterns. For the clustering of user navigation patterns we create an undirected graph based on connectivity between each pair of Web pages and we propose novel formula for assigning weights to edges in such a graph. The experimental results represent that the approach can improve the quality of clustering for user navigation pattern in Web usage mining systems. These results can be use for predicting userpsilas next request in the huge Web sites.
暂无评论