SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Control Theory and Informatics                                                                     www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011


              On Demand Web Services with Quality of Service
                                                BRAJESH KOKKONDA
      Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                             Tel: +91-7416322567 E-mail: brajesh.email@gmail.com


                                                  P.PRADEEP KUMAR
      Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                               Tel: +91-9885364555 E-mail: pkpuram@gmail.com


                                                        G.RAJESH
         Department of Information & Technology, Vivekananda Institute of Technology and Sciences,
                                         Karimnagar, Andhra Pradesh, India
                            Tel: +91-9848540851 E-mail: gunupudirajesh@gmail.com
Abstract
The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds.
This creates new opportunities to build applications that better integrate real-time state of the physical world,
and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented
Architecture (SOA) approaches traditionally used to couple functionality of heavyweight corporate IT systems,
are becoming applicable to embedded real-world devices, i.e., objects of the physical world that feature
embedded processing and communication.

Keywords: - Time synchronization, sensor networks

1. Introduction
The process described in this project has been developed and implemented as part of the Integrated Architecture
(SIA). The role of IA is to enable the ubiquitous integration of real world services running on embedded devices
with enterprise services. WS web service standards constitute the de facto communication method used by the
components of enterprise-level applications, and for this reason IA is fully based on them. In this manner,
business applications can access near real-time data from a wide range of networked devices through a high-
level, abstract interface based on web services. Furthermore, the IA also supports RESTful services in order to
be able to communicate with many emerging Web 2.0 services. This enables any networked device that is
connected to the SIA to directly participate in business processes while neither requiring the process modeler,
nor the process execution engine to know about the exact details of the underlying hardware.

1.1 Previous Work
In recent years, the use of services to compose new applications from existing modules has gained momentum.
Web services are autonomous units of code, independently developed and evolved. The Web Service
Description Language (WSDL) is used as the defacto standard for service providers to describe the interface of
the Web services, i.e., their operations and input and output parameters. Therefore, Web services lack
homogeneous structure beyond that of their interface. Heterogeneity stems from different ways to name
parameters, define parameters, and describe internal processing. This heterogeneity encumbers straightforward
integration between Web services. Web service registries such as Universal Description, Discovery, and
Integration (UDDI) were created to encourage interoperability and adoption of Web services. However, UDDI
registries have some major flaws. UDDI registries either are made publicly available and contain many obsolete
entries or require registration. In either case, a registry stores only a limited description of the available services.
Semantic Web services were proposed to overcome interface heterogeneity. Using languages such as Ontology
Web Language for Services (OWL-S) and WSDL Semantics (WSDL-S), Web services are extended with an
unambiguous description by relating properties such as input and output parameters to common concepts and by


6|Page
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011

defining the execution characteristics of the service.

The concepts are defined in Web ontologies, which serve as the key mechanism to globally define and reference
concepts. Formal languages enable service composition, in which a developer uses automatic or semiautomatic
tools to create a integrated business process from a set of independent Web services. Service composition in a
heterogeneous environment immediately raises issues of evaluating the accuracy of the mapping. As an
example, consider three real-world Web services, as illustrated in Fig. 1. The three services distance between zip
codes (A), store IT contracts (B), and translation into any language (C) share some common concepts, such as
the code concept. However, these three services originate from very different domains. Service A is concerned
with distance calculation and uses the zip codes as input, service B defines CurrencyCode as part of the IT
contract information to be stored, and service C uses a Client Code as an access key for users. It is unlikely that
any of the services will be combined into a meaningful composition. This example illustrates that methods based
solely on the concepts mapped to the service’s parameters may yield inaccurate results. We aim at analyzing
different methods for automatically identifying possible semantic composition. We explore two sources for
service analysis: WSDL description files and free textual descriptors, which are commonly used in service
repositories. We investigate two methods for Web service classification for each type of descriptor: Term
Frequency/ Inverse Document Frequency (TF/IDF) and context based analysis, and a baseline method. We
define contexts as a model of a domain for a given term, which is automatically extracted from a fragment of
text. In this work, contexts are created by finding-related terms from the Web. Unlike ontologies, which are
considered shared models of a domain, we define contexts as local views of [1]

2. System Architecture




3. Results
The concept of this paper is implemented and different results are shown below




7|Page
www.iiste.org
Control Theory and Informatics                                                      www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011




3.1 Graphs



                                              Web Services Data Retrieved at
                                               Different Instances of Time
                             Data Retrieved
                                (Bytes)




                                                                               t1
                                                                               t2


                                                   Web Services Index




8|Page
www.iiste.org
Control Theory and Informatics                                                                 www.iiste.org
ISSN 2224-5774 (print) ISSN 2225-0492 (online)
Vol 1, No.1, 2011


                                                       Web Services Response time at
                                                            Different Instances




                                 Retrieval Time (ms)
                                                                                       t1
                                                                                       t2
                                                                                       t3

                                                            Web Services Index



3.2 Performance Analysis
The proposed paper is implemented in Java technology on a Pentium-IV PC with 20 GB hard-disk and 256 MB
RAM. The propose paper’s concepts shows efficient results of retrieving data from web services and has been
efficiently tested on different systems.

4. Conclusion
The future Internet will be highly populated by heterogeneous networked embedded devices that will further
blur the borders of real and virtual world, empowering us with new capabilities in creating real-world aware
business applications. For this to happen, it is of high importance to be able to find real-world services that can
be dynamically included in enterprise applications a quite challenging task considering the application
requirements, technologies, and heterogeneity of devices. In that line of thought, we have presented here an
approach that would facilitate this task for developers, allowing them not only to search efficiently for services
running on embedded devices, but also to deploy missing functionalities on-demand.

References
A. Segev and E. Toch, “Context-Based Matching and Ranking of Web Services for Composition,” IEEE Trans.
    Services Computing, vol. 99, no. 1, pp. 210-222, Jun. 2009.

M. Hepp, K. Siorpaes, and D. Bachlechner, “Harvesting Wiki Consensus: Using Wikipedia Entries as
    Vocabulary for Knowledge Management,” IEEE Internet Computing, vol. 11, no. 5, pp. 54- 65, Sept./Oct.
    2007.

N.B. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, “Tiny Web Services: Design and Implementation of
    Interoperable and Evolvable Sensor Networks,” Proc. Sixth ACM Conf. Embedded Network Sensor
    Systems, pp. 253-266, 2008.

S. Karnouskos, O. Baecker, L.M.S. de Souza, and P. Spiess, “Integration of SOA-Ready Networked Embedded
    Devices in Enterprise Systems via a Cross-Layered Web Service Infrastructure,” Proc. IEEE Conf.
    Emerging Technologies & Factory Automation (ETFA), pp. 293-300, Sept. 2007.

D. Guinard and V. Trifa, “Towards the Web of Things: Web Mashups for Embedded Devices,” Proc. Workshop
    Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM ’09), Apr. 2009.

D. Guinard, V. Trifa, P. Spiess, B. Dober, and S. Karnouskos, “Discovery and On-Demand Provisioning of Real-
World Web Services,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), pp. 583- 590, 2009.




9|Page
www.iiste.org

Mais conteúdo relacionado

Mais procurados

The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...Arab Federation for Digital Economy
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Conference Papers
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...hemanthbbc
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...IOSR Journals
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingIJMER
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computingINFOGAIN PUBLICATION
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDijsrd.com
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountabilityeSAT Publishing House
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report TagoreVinoth Kanna
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...IJCI JOURNAL
 
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...IJCSEA Journal
 
A New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewA New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewIRJET Journal
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET Journal
 

Mais procurados (18)

The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...The Role of Digital Certificates in Contemporary Government Systems: the Case...
The Role of Digital Certificates in Contemporary Government Systems: the Case...
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...Blockchain enabled task and time sheet management for accounting services pro...
Blockchain enabled task and time sheet management for accounting services pro...
 
I42024349
I42024349I42024349
I42024349
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
Ieeepro techno solutions   2014 ieee java project - query services in cost ef...Ieeepro techno solutions   2014 ieee java project - query services in cost ef...
Ieeepro techno solutions 2014 ieee java project - query services in cost ef...
 
Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...Improving security for data migration in cloud computing using randomized enc...
Improving security for data migration in cloud computing using randomized enc...
 
A Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud ComputingA Novel Information Accountability Framework for Cloud Computing
A Novel Information Accountability Framework for Cloud Computing
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
A framework assuring decentralized accountability
A framework assuring decentralized accountabilityA framework assuring decentralized accountability
A framework assuring decentralized accountability
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Research Design Report Tagore
Research Design Report TagoreResearch Design Report Tagore
Research Design Report Tagore
 
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...E FFICIENT  D ATA  R ETRIEVAL  F ROM  C LOUD  S TORAGE  U SING  D ATA  M ININ...
E FFICIENT D ATA R ETRIEVAL F ROM C LOUD S TORAGE U SING D ATA M ININ...
 
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
HIGH SPEED DATA RETRIEVAL FROM NATIONAL DATA CENTER (NDC) REDUCING TIME AND I...
 
A New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewA New Approach for CBIR – A Review
A New Approach for CBIR – A Review
 
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC AlgorithmIRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
IRJET- Secure Data Deduplication for Cloud Server using HMAC Algorithm
 

Destaque

Final Questionnaire
Final QuestionnaireFinal Questionnaire
Final Questionnairebeckyt95
 
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...guest3f9c6b
 
Proteccion del medio ambiente tochi
Proteccion del medio ambiente tochiProteccion del medio ambiente tochi
Proteccion del medio ambiente tochitochieshermosa
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsStenio Fernandes
 
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnnBaru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnnSadrina Ina
 
Decalogo del investigador ovni
Decalogo del investigador ovniDecalogo del investigador ovni
Decalogo del investigador ovnijohn xlarge
 
Visita papa noel 2012
Visita papa noel 2012Visita papa noel 2012
Visita papa noel 2012begotor
 
Elementary education quality improvement programme
Elementary education quality improvement programmeElementary education quality improvement programme
Elementary education quality improvement programmepunarnav bharat
 

Destaque (10)

Final Questionnaire
Final QuestionnaireFinal Questionnaire
Final Questionnaire
 
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...D A T A B A S E M A N A G E M E N T S Y S T E M S  J N T U  M O D E L  P A P ...
D A T A B A S E M A N A G E M E N T S Y S T E M S J N T U M O D E L P A P ...
 
Proteccion del medio ambiente tochi
Proteccion del medio ambiente tochiProteccion del medio ambiente tochi
Proteccion del medio ambiente tochi
 
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI SystemsGlobecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
Globecom - MENS 2011 - Characterizing Signature Sets for Testing DPI Systems
 
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnnBaru drs.ppt nnnnnnnnnnnnnnnnnnnn
Baru drs.ppt nnnnnnnnnnnnnnnnnnnn
 
Decalogo del investigador ovni
Decalogo del investigador ovniDecalogo del investigador ovni
Decalogo del investigador ovni
 
Visita papa noel 2012
Visita papa noel 2012Visita papa noel 2012
Visita papa noel 2012
 
Elementary education quality improvement programme
Elementary education quality improvement programmeElementary education quality improvement programme
Elementary education quality improvement programme
 
Final ppt
Final pptFinal ppt
Final ppt
 
Library Presentation
Library PresentationLibrary Presentation
Library Presentation
 

Semelhante a 2.[6 9]on demand web services with quality of service

Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challengesiaemedu
 
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...CSCJournals
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoTKiran Kumar Pattanaik
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
Survey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition AlgorithmSurvey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition AlgorithmEditor IJMTER
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...eSAT Journals
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improvedeSAT Publishing House
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...IRJET Journal
 
Web Services Foundation Technologies
Web Services Foundation TechnologiesWeb Services Foundation Technologies
Web Services Foundation TechnologiesPankaj Saharan
 
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWWEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWijcseit
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Shceduling iot application on cloud computing
Shceduling iot application on cloud computingShceduling iot application on cloud computing
Shceduling iot application on cloud computingEman Ahmed
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 
Cloud computing
Cloud computingCloud computing
Cloud computingshethzaid
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service ArchitectureIJERA Editor
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performancecsandit
 

Semelhante a 2.[6 9]on demand web services with quality of service (20)

Semantic web services and its challenges
Semantic web services and its challengesSemantic web services and its challenges
Semantic web services and its challenges
 
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
Three Dimensional Database: Artificial Intelligence to eCommerce Web service ...
 
As044285288
As044285288As044285288
As044285288
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Survey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition AlgorithmSurvey on Semantic Web Services and its Composition Algorithm
Survey on Semantic Web Services and its Composition Algorithm
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...Service oriented cloud architecture for improved performance of smart grid ap...
Service oriented cloud architecture for improved performance of smart grid ap...
 
Service oriented cloud architecture for improved
Service oriented cloud architecture for improvedService oriented cloud architecture for improved
Service oriented cloud architecture for improved
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
 
Web Services Foundation Technologies
Web Services Foundation TechnologiesWeb Services Foundation Technologies
Web Services Foundation Technologies
 
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEWWEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
WEB SERVICES COMPOSITION METHODS AND TECHNIQUES: A REVIEW
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Shceduling iot application on cloud computing
Shceduling iot application on cloud computingShceduling iot application on cloud computing
Shceduling iot application on cloud computing
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Enhancement in Web Service Architecture
Enhancement in Web Service ArchitectureEnhancement in Web Service Architecture
Enhancement in Web Service Architecture
 
The improvement and performance
The improvement and performanceThe improvement and performance
The improvement and performance
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

2.[6 9]on demand web services with quality of service

  • 1. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 On Demand Web Services with Quality of Service BRAJESH KOKKONDA Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-7416322567 E-mail: brajesh.email@gmail.com P.PRADEEP KUMAR Department of Computer Science & Engineering, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-9885364555 E-mail: pkpuram@gmail.com G.RAJESH Department of Information & Technology, Vivekananda Institute of Technology and Sciences, Karimnagar, Andhra Pradesh, India Tel: +91-9848540851 E-mail: gunupudirajesh@gmail.com Abstract The increasing usage of smart embedded devices in business blurs the line between the virtual and real worlds. This creates new opportunities to build applications that better integrate real-time state of the physical world, and hence, provides enterprise services that are highly dynamic, more diverse, and efficient. Service-Oriented Architecture (SOA) approaches traditionally used to couple functionality of heavyweight corporate IT systems, are becoming applicable to embedded real-world devices, i.e., objects of the physical world that feature embedded processing and communication. Keywords: - Time synchronization, sensor networks 1. Introduction The process described in this project has been developed and implemented as part of the Integrated Architecture (SIA). The role of IA is to enable the ubiquitous integration of real world services running on embedded devices with enterprise services. WS web service standards constitute the de facto communication method used by the components of enterprise-level applications, and for this reason IA is fully based on them. In this manner, business applications can access near real-time data from a wide range of networked devices through a high- level, abstract interface based on web services. Furthermore, the IA also supports RESTful services in order to be able to communicate with many emerging Web 2.0 services. This enables any networked device that is connected to the SIA to directly participate in business processes while neither requiring the process modeler, nor the process execution engine to know about the exact details of the underlying hardware. 1.1 Previous Work In recent years, the use of services to compose new applications from existing modules has gained momentum. Web services are autonomous units of code, independently developed and evolved. The Web Service Description Language (WSDL) is used as the defacto standard for service providers to describe the interface of the Web services, i.e., their operations and input and output parameters. Therefore, Web services lack homogeneous structure beyond that of their interface. Heterogeneity stems from different ways to name parameters, define parameters, and describe internal processing. This heterogeneity encumbers straightforward integration between Web services. Web service registries such as Universal Description, Discovery, and Integration (UDDI) were created to encourage interoperability and adoption of Web services. However, UDDI registries have some major flaws. UDDI registries either are made publicly available and contain many obsolete entries or require registration. In either case, a registry stores only a limited description of the available services. Semantic Web services were proposed to overcome interface heterogeneity. Using languages such as Ontology Web Language for Services (OWL-S) and WSDL Semantics (WSDL-S), Web services are extended with an unambiguous description by relating properties such as input and output parameters to common concepts and by 6|Page www.iiste.org
  • 2. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 defining the execution characteristics of the service. The concepts are defined in Web ontologies, which serve as the key mechanism to globally define and reference concepts. Formal languages enable service composition, in which a developer uses automatic or semiautomatic tools to create a integrated business process from a set of independent Web services. Service composition in a heterogeneous environment immediately raises issues of evaluating the accuracy of the mapping. As an example, consider three real-world Web services, as illustrated in Fig. 1. The three services distance between zip codes (A), store IT contracts (B), and translation into any language (C) share some common concepts, such as the code concept. However, these three services originate from very different domains. Service A is concerned with distance calculation and uses the zip codes as input, service B defines CurrencyCode as part of the IT contract information to be stored, and service C uses a Client Code as an access key for users. It is unlikely that any of the services will be combined into a meaningful composition. This example illustrates that methods based solely on the concepts mapped to the service’s parameters may yield inaccurate results. We aim at analyzing different methods for automatically identifying possible semantic composition. We explore two sources for service analysis: WSDL description files and free textual descriptors, which are commonly used in service repositories. We investigate two methods for Web service classification for each type of descriptor: Term Frequency/ Inverse Document Frequency (TF/IDF) and context based analysis, and a baseline method. We define contexts as a model of a domain for a given term, which is automatically extracted from a fragment of text. In this work, contexts are created by finding-related terms from the Web. Unlike ontologies, which are considered shared models of a domain, we define contexts as local views of [1] 2. System Architecture 3. Results The concept of this paper is implemented and different results are shown below 7|Page www.iiste.org
  • 3. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 3.1 Graphs Web Services Data Retrieved at Different Instances of Time Data Retrieved (Bytes) t1 t2 Web Services Index 8|Page www.iiste.org
  • 4. Control Theory and Informatics www.iiste.org ISSN 2224-5774 (print) ISSN 2225-0492 (online) Vol 1, No.1, 2011 Web Services Response time at Different Instances Retrieval Time (ms) t1 t2 t3 Web Services Index 3.2 Performance Analysis The proposed paper is implemented in Java technology on a Pentium-IV PC with 20 GB hard-disk and 256 MB RAM. The propose paper’s concepts shows efficient results of retrieving data from web services and has been efficiently tested on different systems. 4. Conclusion The future Internet will be highly populated by heterogeneous networked embedded devices that will further blur the borders of real and virtual world, empowering us with new capabilities in creating real-world aware business applications. For this to happen, it is of high importance to be able to find real-world services that can be dynamically included in enterprise applications a quite challenging task considering the application requirements, technologies, and heterogeneity of devices. In that line of thought, we have presented here an approach that would facilitate this task for developers, allowing them not only to search efficiently for services running on embedded devices, but also to deploy missing functionalities on-demand. References A. Segev and E. Toch, “Context-Based Matching and Ranking of Web Services for Composition,” IEEE Trans. Services Computing, vol. 99, no. 1, pp. 210-222, Jun. 2009. M. Hepp, K. Siorpaes, and D. Bachlechner, “Harvesting Wiki Consensus: Using Wikipedia Entries as Vocabulary for Knowledge Management,” IEEE Internet Computing, vol. 11, no. 5, pp. 54- 65, Sept./Oct. 2007. N.B. Priyantha, A. Kansal, M. Goraczko, and F. Zhao, “Tiny Web Services: Design and Implementation of Interoperable and Evolvable Sensor Networks,” Proc. Sixth ACM Conf. Embedded Network Sensor Systems, pp. 253-266, 2008. S. Karnouskos, O. Baecker, L.M.S. de Souza, and P. Spiess, “Integration of SOA-Ready Networked Embedded Devices in Enterprise Systems via a Cross-Layered Web Service Infrastructure,” Proc. IEEE Conf. Emerging Technologies & Factory Automation (ETFA), pp. 293-300, Sept. 2007. D. Guinard and V. Trifa, “Towards the Web of Things: Web Mashups for Embedded Devices,” Proc. Workshop Mashups, Enterprise Mashups and Lightweight Composition on the Web (MEM ’09), Apr. 2009. D. Guinard, V. Trifa, P. Spiess, B. Dober, and S. Karnouskos, “Discovery and On-Demand Provisioning of Real- World Web Services,” Proc. IEEE Int’l Conf. Web Services (ICWS ’09), pp. 583- 590, 2009. 9|Page www.iiste.org