Advances in Web Technologies and Engineering最新文献

筛选
英文 中文
Multi-Level Web Service Clustering to Bootstrap the Web Service Discovery and Selection 多级Web服务集群引导Web服务发现和选择
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7268-8.CH003
B. Kumara, Incheon Paik, K. Koswatte
{"title":"Multi-Level Web Service Clustering to Bootstrap the Web Service Discovery and Selection","authors":"B. Kumara, Incheon Paik, K. Koswatte","doi":"10.4018/978-1-5225-7268-8.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH003","url":null,"abstract":"Existing technologies for web services have been extended to give the value-added customized services to users through the service composition. Service composition consists of four major stages: planning, discovery, selection, and execution. However, with the proliferation of web services, service discovery and selection are becoming challenging and time-consuming tasks. Organizing services into similar clusters is a very efficient approach. Existing clustering approaches have problems that include discovering semantic characteristics, loss of semantic information, and a shortage of high-quality ontologies. Thus, the authors proposed hybrid term similarity-based clustering approach in their previous work. Further, the current clustering approaches do not consider the sub-clusters within a cluster. In this chapter, the authors propose a multi-level clustering approach to prune the search space further in discovery process. Empirical study of the prototyping system has proved the effectiveness of the proposed multi-level clustering approach.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimum Database Determination and Preprocessing for Machine Learning 机器学习的最小数据库确定和预处理
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7268-8.CH005
Á. Kuri-Morales
{"title":"Minimum Database Determination and Preprocessing for Machine Learning","authors":"Á. Kuri-Morales","doi":"10.4018/978-1-5225-7268-8.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH005","url":null,"abstract":"The exploitation of large databases implies the investment of expensive resources both in terms of the storage and processing time. The correct assessment of the data implies that pre-processing steps be taken before its analysis. The transformation of categorical data by adequately encoding every instance of categorical variables is needed. Encoding must be implemented that preserves the actual patterns while avoiding the introduction of non-existing ones. The authors discuss CESAMO, an algorithm which allows us to statistically identify the pattern preserving codes. The resulting database is more economical and may encompass mixed databases. Thus, they obtain an optimal transformed representation that is considerably more compact without impairing its informational content. For the equivalence of the original (FD) and reduced data set (RD), they apply an algorithm that relies on a multivariate regression algorithm (AA). Through the combined application of CESAMO and AA, the equivalent behavior of both FD and RD may be guaranteed with a high degree of statistical certainty.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The IoT and the Next Revolutions Automating the World 物联网和下一次革命使世界自动化
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-9246-4
{"title":"The IoT and the Next Revolutions Automating the World","authors":"","doi":"10.4018/978-1-5225-9246-4","DOIUrl":"https://doi.org/10.4018/978-1-5225-9246-4","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Survelliance of Type I and II Diabetic Subjects on Physical Characteristics 1型和2型糖尿病受试者身体特征监测
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3111-2.ch017
Rohit Rastogi, D. Chaturvedi, P. Singhal
{"title":"Survelliance of Type I and II Diabetic Subjects on Physical Characteristics","authors":"Rohit Rastogi, D. Chaturvedi, P. Singhal","doi":"10.4018/978-1-7998-3111-2.ch017","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.ch017","url":null,"abstract":"With the advancement of computation power and internet revolution, IoT, big data, and cloud computing have become the most prevalent technologies in present time. Convergence of these three technologies has led to the development of new opportunities and applications which solve the real time problems in the most efficient way. Though cloud computing and big data have an inherent connection between them, IoT plays a major role of a data source unit. With the explosion of data, cloud computing is playing a significant role in the storage and management. However, the main concern that accompanies IoT are the issues related to privacy, security, power efficiency, computational complexities, etc. Misinterpretation of data and security limitations are the bottlenecks of big data whereas the limitations of cloud computing involve network connection dependency, limited features, technical issues, and security. The chapter considers use cases to address their real time problems and discusses about how to solve these issues by combining these technologies.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Innovation and Network Architecture for the Future Internet 面向未来互联网的设计创新与网络架构
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7646-5
{"title":"Design Innovation and Network Architecture for the Future Internet","authors":"","doi":"10.4018/978-1-7998-7646-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7646-5","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Big Data Issues 大数据问题
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3111-2.ch008
K. K., D. R., S. S.
{"title":"Big Data Issues","authors":"K. K., D. R., S. S.","doi":"10.4018/978-1-7998-3111-2.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.ch008","url":null,"abstract":"Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122863048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security, Data Analytics, and Energy-Aware Solutions in the IoT 物联网中的安全、数据分析和能源感知解决方案
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-7323-5
{"title":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","authors":"","doi":"10.4018/978-1-7998-7323-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Integrated Framework for Semantic Service Composition Using Answer Set Programming (SSC-ASP) 基于答案集编程(SSC-ASP)的语义服务组合集成框架
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7268-8.ch001
Yilong Yang
{"title":"An Integrated Framework for Semantic Service Composition Using Answer Set Programming (SSC-ASP)","authors":"Yilong Yang","doi":"10.4018/978-1-5225-7268-8.ch001","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.ch001","url":null,"abstract":"Notwithstanding the advancement of service computing in recent years, service composition is still a main issue in this field. In this chapter, the authors present an integrated framework for semantic service composition using answer set programming. Unlike the AI planning approaches of top-down workflow with nested composition and combining composition procedure into service discovery, the proposed framework integrates a designed service workflow with automatic nested composition. In addition, the planning is based on service signature while validating through service contract. Moreover, a unified implementation of service discovery, selection, composition, and validation is achieved by answer set programming. Finally, the performance of proposed framework is demonstrated by a travel booking example on QWSDataset.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overlapping Singer Identification in Music Recordings 音乐录音中的重叠歌手识别
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-5225-7268-8.CH002
Wei-Ho Tsai, Cin-Hao Ma
{"title":"Overlapping Singer Identification in Music Recordings","authors":"Wei-Ho Tsai, Cin-Hao Ma","doi":"10.4018/978-1-5225-7268-8.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH002","url":null,"abstract":"Singer identification (SID), which refers to the task of automatically identifying the singer(s) in a music recording, is of great help in handling the rapid proliferation of music data on the internet and digital media. Although a number of SID studies from acoustic features have been reported, most systems are designed to identify the singer in recordings of solo performances. Very little research has considered a more realistic case, which is to identify more than one singer in a music recording. The research presented in this chapter investigates the feasibility of identifying singers in music recordings that contain overlapping (simultaneous) singing voices (e.g., duet or trio singings). This problem is referred to as overlapping singer identification (OSID). Several approaches to OSID are discussed and evaluated in this chapter. In addition, a related issue on how to distinguish solo singings from overlapping singing recordings is also discussed.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine and Deep Learning Techniques in IoT and Cloud 物联网和云中的机器和深度学习技术
Advances in Web Technologies and Engineering Pub Date : 1900-01-01 DOI: 10.4018/978-1-7998-3111-2.CH013
J. Naomi, K. M., S. V.
{"title":"Machine and Deep Learning Techniques in IoT and Cloud","authors":"J. Naomi, K. M., S. V.","doi":"10.4018/978-1-7998-3111-2.CH013","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.CH013","url":null,"abstract":"In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信