The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The quality of service multicast routing problem (QoSMRP) is a very interesting research issue for transmission in communication networks. It is known to be an NP-hard problem, so many heuristic algorithms have been employed for solving this problem. This paper proposes two hybrid approaches based on the hybridization of Firefly algorithm (FA) with Quantum Evolutionary algorithm (QEA) to solve the...
This paper introduces a study of the fog computing suitability assessment as a solution for the increasing demand of the IoT devices. In particular, we focus on the energy consumption and the Quality of Service (QoS) as two important metrics of the performance of the fog. Therefore, we present a modeling of these two metrics in the fog. Then, we express the problem as constrained optimization and...
With liwwwmited network capacity and dense development of wireless networks, Heterogeneous Ultra-dense Networks (H-UDN) is introduced to satisfy the demand of mobile users. But the traffic will be heavily unbalanced in the H-UDN. Thus, load balancing technique becomes a crucial problem. However, how to prevent the system resource from inefficiently using is also an important problem that needs to...
As services for Big Data Analysis (BDA) become prevalent, analysis services with intelligence and autonomy using automatic service composition (ASC) show bright prospects in the BDA market. Selection is one of the most important phases of successful ASC process. Moreover, it became competitive with the rise of demand for the services and criticalness of the BDA process. It is a challenge to accomplish...
This paper studies heuristic search-based optimization of service compositions. We have investigated applying Genetic Algorithms (GA) to optimize service-oriented architectures (SOA) in terms of security goals and cost, we help software Engineers to map the optimized service composition to the business process model based on security and cost. Service composition security risk is measured by implementing...
Organizations are nowadays more and more adopting Cloud computing to execute their multi-tenant business processes in order to quickly adapt to changes of requirements at lower costs. In such environment, using configurable process models allows for various tenants to share a reference process which can be customized depending on their needs. However, there is a lack of support for cloud-specific...
With software defined networking rapidly becoming industry default, the cut-through mode of switching is becoming increasingly harder to achieve in practice. On the other hand, cut-through networking remains firmly in focus in several fields where top network performance is required, where supercomputing and datacenter interconnect are two popular examples. In earlier work, cut-through mode on end-to-end...
Rostering plays an important role in human resource distribution and production efficiency for many types of organizations. Rostering had always been developed to tackle human resources distribution problems. In health care sector, doctor rostering had always been challenging because there were many constraints that required an additional attention. Many rostering solutions are failed to solve the...
Route planning is an important service in the map navigation. However, most of commercial map applications provide an optimal path that only minimize a single metric such as distance, time or other costs, while ignoring a critical criterion: safety. When citizens or travellers walk in a city, they may prefer to find a safe walking route to avoid the potential crime risk and to have a short distance,...
In the era of Big data, cloud storage services have become the option of choice to store and share data thanks to their cost-effectiveness and seemingly limitless capacity. The increasing success of these services is driving cloud providers to further improve their storage management systems in order to offer more stringent guarantees on data availability and access time. However, despite recent efforts...
The exponential growth of cloud based applications and the increased number of cloud users have given rise to new challenges for cloud service providers, especially for Infrastructure as a Service (IaaS) providers. This exponential growth of datacenters increases the energy consumption, along with its carbon footprints. Hence, better energy aware techniques not only reduce energy costs, but they are...
Cognitive radio (CR) is the current growing technology in wireless communication field and has increase the ability to use the frequency spectrum more properly. The main objective of cognitive radios is to sense the surrounding and use primary user's vacant spaces and allot them to the secondary users without interference each other. This paper presents the optimal solution and optimizes the Quality...
The third party IT service providers with multi brand service abilities maintain the competitive advantage over single original equipment manufacturers. It's a professional and efficient way to select a suitable service from each type of services to form a unified system of “one-stop” service for the user. D-GSS method is presented to match services' QoS with users' QoS requirements. A key challenge...
Since the heterogeneous Internet Service Provider (ISP) router policies prevent the quality-of-service (QoS) multimedia applications which require IP layer multicasting from being widely deployed on the Internet, the mechanism of implementing such applications by application layer broadcasting through organizing the multicast group in a peer-to-peer overlay network is proposed. In this paper, we study...
Web API is the lightweight version to the SOAP (Simple Object Access Protocol) service and usually applies REST (Representational State Transfer) as the architectural style. Nowadays, the service-oriented computing paradigm is shifting from the SOAP services to the Web APIs, i.e., RESTful services. Rather than hard coding from scratch, the methodology of service-oriented computing emphasizes identifying...
RGSS-Negotiation is a Repaired Genetic Security Service Negotiation approach. Security as a non-functional requirement for web service is an important trend. This is due to the different levels of security the consumer and the provider demand or supply. In a web service negotiation, researchers negotiate QoS objects (attributes). Negotiating security levels is not addressed so far. In this paper,...
An appropriate selection is of great importance to Web service composition. Current approaches normally focus on the average performance of quality of service (QoS) of Web services while not paying more attention to the performance such as stability considering the changing environments. In addition, Web services are differentiated from others with same functions which are provided by various physical...
Web service composition is aimed to compose new web service form to respond the goal of business process. The web service selection brings to consider accurate and reliability composition. Mostly a web service is exist tested quality of service (QoS) that is called non-functional testing described time, availability and cost. However, the web services composition need to meet the business requirement...
Resource allocation in data centers is a significant research area in cloud computing. A high-efficiency resource allocation strategy can save the operating cost for cloud service providers, and less amount of carbon dioxide emissions to the atmosphere. While the Service Level Agreement(SLA) of customers can be guaranteed. So the cloud providers have to deal with the cost-performance trade-off: the...
With the evolution of web applications towards real time setups, like web sockets, the need for more efficient and setup-specific scheduling techniques escalates. Thus, an effective task scheduling mechanism becomes the prime necessity for any server handling large number of requests concurrently. The existing task scheduling algorithms do not suffice this purpose due to their focus on being generic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.