The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The chemical and petroleum (oil and gas, C&P) is a fast growing and diversified industry. Various applications, from field technique equipment data exchange to business execution with Enterprise Resource Planning (ERP) system, have been deployed to manage and record operation performance. Various industry standards have been defined to create a commonly accepted nomenclature for representing structural...
Recently, the trend of Cloud Computing has become a significant impact for IT departments and forms many innovative services by virtualization. Virtual systems have been used and identified on services of different fields nowadays. IT hardware manufacturers such as HP, IBM, Dell, etc..., put a large amount of investments on enterprise server products to support the virtualization environment. Service...
Cloud computing often uses a multi-tenant architecture where tenants share application and system software. Request prioritization presents a challenge in this architecture. Tenant may have individual (local) prioritization requirements, and these requirements can be different for different tenants. The shared application must use a global priority scheme for requests from all the tenants. This paper...
Cloud Computing, with its on-demand provisioning capability on shared resources, has emerged as a new paradigm for reducing IT costs. In this paper, we present the architecture of a provisioning system that simplifies the deployment of complex application services on a Cloud infrastructure. We will introduce the concept of Composite Appliance and explain how it can be implemented and utilized to simplify...
Virtualization technology improves the resource utilization, but also raises the probability of resource contention. Thus, it arises one problem, namely how about performance isolation among VMs. To answer the question, benchmarks are highly required to evaluate performance isolation. However, few benchmarks to give solutions to the problem are available. Especially, there does not exist a micro-benchmark...
The continuous growth and development of ecommerce around the world is disproportionate to Asianconsumers' adoption of online shopping. The average adoption rate in Asian countries is low compared to that in western countries. The purpose of this paper is to provide an understanding of the current situation regarding online shopping behavior in Asian countries, especially Malaysia. The factors that...
Risk Management is an important process to be carried out for any form of interaction before decision-making. This process will help the concerned user to take steps and actions accordingly in order to address risks and achieve the activity's desired goals. Various techniques and approaches for risk management have been discussed in the literature. But the process of risk management is not generic...
For several years the mantra has been “closing the Business - IT gap”, enabling business people to focus on strategic direction, while not being unnecessarily burdened by the complexity of the underlying support systems. The discipline of Business Architecture continues to evolve, attempting to bring rigor to the task of matching imprecise strategic needs to rigid IT systems. Increasingly literature...
Random forest is an excellent ensemble learning method, which is composed of multiple decision trees grown on random input samples and splitting nodes on a random subset of features. Due to its good classification and generalization ability, random forest has achieved success in various domains. However, random forest will generate many noisy trees when it learns from the data set that has high dimension...
Open source software (OSS) has been widely accepted as one of reuse methods to develop software applications in industry. OSS is well known for free software which can be used with freedoms on costs and copyrights. Nonetheless, when it comes to compliances of OSS licenses, different licenses have different duties to which users should conform. Furthermore, if the software using OSS is commercial,...
Privacy preserving in location-based service (LBS) has been an important issue in Vehicular Ad hoc Network (VANET). Traditional k-anonymity algorithm dealing with location privacy protecting problem does not consider vehicle's mobility and inner collaborator. In this paper, we propose a new algorithm which uses dynamic and mobile aware anonymous peer selecting algorithm to improve the anonymity and...
Internet Data Centers (IDC) emerge as a major network service platform to converge Internet related services and applications to one location, managing servers, networks, together with valuable and sensitive data of many enterprises. Therefore, an appropriate security approach is essential. Intrusion Detection Systems (IDS) are often deployed in IDC as a security measure to detect real-time intrusions...
Starting from brief introduction to TOP API and eBay Developers Program, a deep comparison of TOP API and eBay API from some aspects including developer registration, application creation, API call limits, openness to transaction-related data and openness to social networking data is made. Using SNS API and transaction category of APIs on Taobao Open Platform, a new third party application for sellers...
This paper first presents a RFID-based mobile logistics monitoring system framework composed of mobile front-end application sub-system and back-end monitoring and service sub-system. The system architecture is designed, and the operating principle is described. The architectures and functions of the front-end application software and back-end monitoring software are discussed in detail. In practical...
Traditional Distributed Hash Tables (DHT) abstraction distributes data items among peer nodes on a structured overlay network in storage-intensive applications. The question is whether DHT-based systems can provide reliable and scalable storage services also in stock-oriented applications, where logistics, trace ability and fault-tolerance are the main requirements. In this paper a novel approach...
We present a service resource selection and scheduling approach capable of maximizing the resource utilization rate (RUT) and the requirement satisfaction degree (RSD) by bundling multiple customer requirements (CRs). In traditional approaches, each CR is optimally satisfied by independently selecting a set of candidate service resources. This possibly leads to a low RUT and low RSD. In our approach,...
The tremendous growth in the amount of available web services (WS) impulses many researchers on proposing recommender systems to help users discover services. Most of the proposed solutions analyzed query strings and web service descriptions to generate recommendations. However, text based recommendations approaches depend mainly on user's perspective, languages and notations which easily decrease...
Automatic service composition is an important problem in service computing. Existing works on service composition assume different representation models with various expressiveness for component services as well as for the composition logic. This has made understanding these composition approaches and their applications difficult. This paper presents a novel language-based formal framework that acts...
This article reports a successful experience of software product line development in the domain of e-commerce applications. Product lines are challenging for small organizations, so we propose to use conventional tools for most of development activities. Trace ability between the features and the UML architectural models is achieved by means of the package merge mechanism of the UML 2, as representation...
A cloud-based, highly consumable queuing service must provide extreme scalability, flexible models of consistency, and high availability in the presence of network partitions. CAP theorem states that at most two of the three properties - Consistency, Availability, and Partition Tolerance - can be achieved at the same time for any shared data system. This paper presents the design and implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.