Discovering Important Services Based on Weighted K-Core Decomposition

2019 ◽  
Vol 16 (1) ◽  
pp. 22-36
Author(s):  
Muchou Wang ◽  
Yiming Li ◽  
Sheng Luo ◽  
Zhuxin Hu

With the development of service-oriented architecture, the number of services is expanding rapidly. Important services usually have high quality, and they can be recommended to users if the users do not give any keyword. However, how to discover the important services is still a problem facing many people. In this article, the authors propose a novel approach to discover important services based on service networks. First, their approach uses service networks to abstract services and the relations between them. Second, the authors employ the weighted k-core decomposition approach in the field of complex networks to partition the service network into a layered structure and calculate the weighted coreness value of each service node. Finally, services will be ranked according to their weighted coreness values in a descending order. The top-ranked services are the important ones the authors' approach recommends. Experimental results on a real-world data set crawled from ProgrammableWeb validate the effectiveness of their approach.

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-17
Author(s):  
Ying Jin ◽  
Guangming Cui ◽  
Yiwen Zhang

Service-oriented architecture (SOA) is widely used, which has fueled the rapid growth of Web services and the deployment of tremendous Web services over the last decades. It becomes challenging but crucial to find the proper Web services because of the increasing amount of Web services. However, it proves unfeasible to inspect all the Web services to check their quality values since it will consume a lot of resources. Thus, developing effective and efficient approaches for predicting the quality values of Web services has become an important research issue. In this paper, we propose UIQPCA, a novel approach for hybrid User and Item-based Quality Prediction with Covering Algorithm. UIQPCA integrates information of both users and Web services on the basis of users’ ideas on the quality of coinvoked Web services. After the integration, users and Web services which are similar to the target user and the target Web service are selected. Then, considering the result of integration, UIQPCA makes predictions on how a target user will appraise a target Web service. Broad experiments on WS-Dream, a web service dataset which is widely used in real world, are conducted to evaluate the reliability of UIQPCA. According to the results of experiment, UIQPCA is far better than former approaches, including item-based, user-based, hybrid, and cluster-based approaches.


Electronics ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 1525
Author(s):  
Chathurangi Edussuriya ◽  
Kasun Vithanage ◽  
Namila Bandara ◽  
Janaka Alawatugoda ◽  
Manjula Sandirigama ◽  
...  

The Internet of Things (IoT) is the novel paradigm of connectivity and the driving force behind state-of-the-art applications and services. However, the exponential growth of the number of IoT devices and services, their distributed nature, and scarcity of resources has increased the number of security and privacy concerns ranging from the risks of unauthorized data alterations to the potential discrimination enabled by data analytics over sensitive information. Thus, a blockchain based IoT-platform is introduced to address these issues. Built upon the tamper-proof architecture, the proposed access management mechanisms ensure the authenticity and integrity of data. Moreover, a novel approach called Block Analytics Tool (BAT), integrated with the platform is proposed to analyze and make predictions on data stored on the blockchain. BAT enables the data-analysis applications to be developed using the data stored in the platform in an optimized manner acting as an interface to off-chain processing. A pharmaceutical supply chain is used as the use case scenario to show the functionality of the proposed platform. Furthermore, a model to forecast the demand of the pharmaceutical drugs is investigated using a real-world data set to demonstrate the functionality of BAT. Finally, the performance of BAT integrated with the platform is evaluated.


Author(s):  
Jinhui Yao ◽  
Shiping Chen ◽  
David Levy

In recent years, a range of innovations in the ‘service’ related technologies have been witnessed, namely SaaS, PaaS, and IaaS. Meanwhile, Service Oriented Architecture (SOA) enables composing different services seamlessly to form new service network. The combination of the two trends allow individual organizations to overcome their limitation of computing resources and obtain the maximum value of the functionality themselves can provide. One major issue with such massive composition is to verify the compliance of participating entities. Composed services usually span several administrative domains, where each has its own priorities. Given the fact that an admission to a violation may cause penalties, it is conceivable that an entity may intend to deceive. To tackle this issue, ‘accountability’ has emerged as a promising concept to achieve system trustworthiness. Recently, accountability has received considerable attention in research communities, and many approaches have been proposed. In this survey, the authors discuss the concept and desirable properties of accountability, clarify the requirements and differences that distinguish accountability to other related approaches, and systematically summarize and evaluate various approaches of accountability.


With the presence of computer and internet, a developing variety of hoodlums are utilizing the web to spread a wide extend of illicit materials and wrong information universally in mysterious manner, making criminal personality following troublesome in the cybercrime examination handle. The virtual world provides criminals with an anonymous environment to conduct malicious activities such as malware, sending random messages, spamming, stealing intellectual property and sending ransom e-mails. All of these activities are text in somehow. Therefore, there is a need for a tool in order to identify the author or creator of this criminality by analyzing the text. Text-based Authorship Attribution techniques are used to identify the most possible author from a bunch of potential suspects of text. In this paper, the novel approach is presented for authorship attribution in English text using ASCII based processing approach Using this ASCII based method for authorship attribution help us to obtain better result in terms of accuracy and computational efficiency. The result is based on the text which is posted on social media considering real world data set.


Author(s):  
Alistair Barros

In the commercial world, the value of ubiquitous computing applications is proportional to the range of business services that can be accessed in device-consumptive ways. Services originate in legacy applications of organizations, and are developed and operated typically in heterogeneous environments. Service-oriented architecture (SOA), supported by a complex stack of Web services standards, addresses ways in which software components of diverse applications can be homogeneously interacted with and composed. Thus, SOA provides a crucial mechanism for making services accessible to ubiquitous computing applications. In this chapter, we shed light on what SOA entails, based on Web services interfaces and messaging, and service composition through single-party process orchestration and multiparty choreography languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards. Ways in which SOA needs be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed. Such extensions, we argue, converge with directions in ubiquitous computing through so-called ubiquitous service networks and service ecosystems.


Author(s):  
Alistair Barros

In the commercial world, the value of ubiquitous computing applications is proportional to the range of business services that can be accessed in device-consumptive ways. Services originate in legacy applications of organizations, and are developed and operated typically in heterogeneous environments. Service-oriented architecture (SOA), supported by a complex stack of Web services standards, addresses ways in which software components of diverse applications can be homogeneously interacted with and composed. Thus, SOA provides a crucial mechanism for making services accessible to ubiquitous computing applications. In this chapter, we shed light on what SOA entails, based on Web services interfaces and messaging, and service composition through single-party process orchestration and multiparty choreography languages. For the latter, concrete patterns are used to describe the capabilities of prospective standards. Ways in which SOA needs be extended to allow wider and more flexible service trading, typified in current developments through service marketplaces, are then discussed. Such extensions, we argue, converge with directions in ubiquitous computing through so-called ubiquitous service networks and service ecosystems.


Sci ◽  
2020 ◽  
Vol 2 (2) ◽  
pp. 27
Author(s):  
Jessica Cooper ◽  
Ognjen Arandjelović

In recent years, a range of problems under the broad umbrella of computer vision based analysis of ancient coins have been attracting an increasing amount of attention. Notwithstanding this research effort, the results achieved by the state of the art in published literature remain poor and far from sufficiently well performing for any practical purpose. In the present paper we present a series of contributions which we believe will benefit the interested community. We explain that the approach of visual matching of coins, universally adopted in existing published papers on the topic, is not of practical interest because the number of ancient coin types exceeds by far the number of those types which have been imaged, be it in digital form (e.g., online) or otherwise (traditional film, in print, etc.). Rather, we argue that the focus should be on understanding the semantic content of coins. Hence, we describe a novel approach—to first extract semantic concepts from real-world multimodal input and associate them with their corresponding coin images, and then to train a convolutional neural network to learn the appearance of these concepts. On a real-world data set, we demonstrate highly promising results, correctly identifying a range of visual elements on unseen coins with up to 84% accuracy.


2021 ◽  
Vol 6 (1) ◽  
pp. e000903
Author(s):  
Mitchell Lawlor ◽  
Vuong Nguyen ◽  
Anne Brooks ◽  
Colin Clement ◽  
Jamie E Craig ◽  
...  

ObjectiveTo describe the development and implementation of a web-based high-quality data collection tool to track the outcomes of glaucoma treatments in routine practice.Methods and analysisThis is a prospective observational registry study. An international steering committee undertook an iterative structured process to define a minimum, patient-centred data set designed to track outcomes of glaucoma treatment. The outcomes were coded into a web-based programme allowing easy access for rapid data entry. Clinicians receive personal reports enabling instant audit of their outcomes. Analyses of aggregated anonymised data on real-world outcomes are analysed and periodically reported with the goal of improving patient care.ResultsThe minimum data set developed by the international steering committee includes the following: a baseline visit captures 13 mandatory fields in order to accurately phenotype each patient’s subtype of glaucoma and to allow comparison between services, and a follow-up visit includes only four mandatory fields to allow completion within 30 s.Currently, there are 157 surgeons in 158 ophthalmology practices across Australia and New Zealand who are registered. These surgeons are tracking 5570 eyes of 3001 patients and have recorded 67 074 visits. The median number of eyes per surgeon is 22 eyes with a range of 1–575. The most common glaucoma procedure, excluding cataract surgery, is iStent inject, with 2316 cases.ConclusionThis software tool effectively facilitates data collection on safety and efficacy outcomes of treatments for different subgroups of glaucoma within a real-world setting. It provides a template to evaluate new treatments as they are introduced into practice.


Author(s):  
Michael Adams ◽  
Arthur ter Hofstede ◽  
Nick Russell ◽  
Wil van der Aalst

This chapter re-examines the principles that underpin business process technologies to derive a novel approach that moves beyond the traditional assembly-line metaphor. Using a set of principles derived from activity theory, a system has been implemented, using a service oriented architecture, that provides support for dynamic and extensible flexibility, evolution and exception handling in business processes, based on accepted ideas of how people actually perform their work tasks. The resulting system, called the worklet service, makes available all of the benefits offered by process aware information systems to a wider range of organisational environments.


2015 ◽  
Vol 12 (2) ◽  
pp. 26-46 ◽  
Author(s):  
Zhitao Wan ◽  
Ping Wang ◽  
Lihua Duan ◽  
Fan Jing Meng ◽  
Jing Min Xu

The demands of migrating on-premises complex enterprise applications to cloud dramatically increase with the wide adoption of cloud computing. A recent research validates the possibility of combining multiple proprietary migration services offered by different vendors together to complete cloud migration. Pattern based service composition has been proven as an appealing approach to accelerate the service composition and ensure the qualities in the Service Oriented Architecture (SOA) domain and can be applied to the cloud migration service composition theoretically. However, current pattern discovery approaches are not applicable for the cloud migration due to lack of either existing cloud migration business process knowledge or execution logs. This paper proposes a novel approach to discover cloud migration patterns from a set of service composition solutions. The authors formalize the pattern discovery as a special graph similarity matching problem and present an algorithm to calculate the similarities of these service composition solutions. Patterns are chosen out of the solutions by similarity under designed criteria. The benchmark results and quantitative analysis show that our proposed approach is effective and efficient in pattern discovery for cloud migration service composition.


Sign in / Sign up

Export Citation Format

Share Document