{"title":"Multi-Level Web Service Clustering to Bootstrap the Web Service Discovery and Selection","authors":"B. Kumara, Incheon Paik, K. Koswatte","doi":"10.4018/978-1-5225-7268-8.CH003","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH003","url":null,"abstract":"Existing technologies for web services have been extended to give the value-added customized services to users through the service composition. Service composition consists of four major stages: planning, discovery, selection, and execution. However, with the proliferation of web services, service discovery and selection are becoming challenging and time-consuming tasks. Organizing services into similar clusters is a very efficient approach. Existing clustering approaches have problems that include discovering semantic characteristics, loss of semantic information, and a shortage of high-quality ontologies. Thus, the authors proposed hybrid term similarity-based clustering approach in their previous work. Further, the current clustering approaches do not consider the sub-clusters within a cluster. In this chapter, the authors propose a multi-level clustering approach to prune the search space further in discovery process. Empirical study of the prototyping system has proved the effectiveness of the proposed multi-level clustering approach.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126134847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum Database Determination and Preprocessing for Machine Learning","authors":"Á. Kuri-Morales","doi":"10.4018/978-1-5225-7268-8.CH005","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH005","url":null,"abstract":"The exploitation of large databases implies the investment of expensive resources both in terms of the storage and processing time. The correct assessment of the data implies that pre-processing steps be taken before its analysis. The transformation of categorical data by adequately encoding every instance of categorical variables is needed. Encoding must be implemented that preserves the actual patterns while avoiding the introduction of non-existing ones. The authors discuss CESAMO, an algorithm which allows us to statistically identify the pattern preserving codes. The resulting database is more economical and may encompass mixed databases. Thus, they obtain an optimal transformed representation that is considerably more compact without impairing its informational content. For the equivalence of the original (FD) and reduced data set (RD), they apply an algorithm that relies on a multivariate regression algorithm (AA). Through the combined application of CESAMO and AA, the equivalent behavior of both FD and RD may be guaranteed with a high degree of statistical certainty.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127572876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The IoT and the Next Revolutions Automating the World","authors":"","doi":"10.4018/978-1-5225-9246-4","DOIUrl":"https://doi.org/10.4018/978-1-5225-9246-4","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133597285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survelliance of Type I and II Diabetic Subjects on Physical Characteristics","authors":"Rohit Rastogi, D. Chaturvedi, P. Singhal","doi":"10.4018/978-1-7998-3111-2.ch017","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.ch017","url":null,"abstract":"With the advancement of computation power and internet revolution, IoT, big data, and cloud computing have become the most prevalent technologies in present time. Convergence of these three technologies has led to the development of new opportunities and applications which solve the real time problems in the most efficient way. Though cloud computing and big data have an inherent connection between them, IoT plays a major role of a data source unit. With the explosion of data, cloud computing is playing a significant role in the storage and management. However, the main concern that accompanies IoT are the issues related to privacy, security, power efficiency, computational complexities, etc. Misinterpretation of data and security limitations are the bottlenecks of big data whereas the limitations of cloud computing involve network connection dependency, limited features, technical issues, and security. The chapter considers use cases to address their real time problems and discusses about how to solve these issues by combining these technologies.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132706562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Innovation and Network Architecture for the Future Internet","authors":"","doi":"10.4018/978-1-7998-7646-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7646-5","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133434709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data Issues","authors":"K. K., D. R., S. S.","doi":"10.4018/978-1-7998-3111-2.ch008","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.ch008","url":null,"abstract":"Various unimaginable opportunities and applications can be attained by the development of internet-connected automation. The network system with numerous wired or wireless smart sensors is called as IoT. It is showing various enhancement for past few years. Without proper security protection, various attacks and threats like cyberattacks threat causes serious disaster to IoT from the day it was introduced. Hence, IoT security system is improvised by various security and the management techniques. There are six sections in security management of IoT works. IoT security requirement is described intensively. The proposed layered of security management architecture is being defined and explained. Thus, this proposed architecture shows the security management system for IoT network tight security management for a network of the IoT which is elaborately explained with examples and about GDPR. In information security, intrusion recognizable proof is the showing of placing exercises that attempt to deal the protection, respectability, or availability of a benefit.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122863048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security, Data Analytics, and Energy-Aware Solutions in the IoT","authors":"","doi":"10.4018/978-1-7998-7323-5","DOIUrl":"https://doi.org/10.4018/978-1-7998-7323-5","url":null,"abstract":"","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121929691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Integrated Framework for Semantic Service Composition Using Answer Set Programming (SSC-ASP)","authors":"Yilong Yang","doi":"10.4018/978-1-5225-7268-8.ch001","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.ch001","url":null,"abstract":"Notwithstanding the advancement of service computing in recent years, service composition is still a main issue in this field. In this chapter, the authors present an integrated framework for semantic service composition using answer set programming. Unlike the AI planning approaches of top-down workflow with nested composition and combining composition procedure into service discovery, the proposed framework integrates a designed service workflow with automatic nested composition. In addition, the planning is based on service signature while validating through service contract. Moreover, a unified implementation of service discovery, selection, composition, and validation is achieved by answer set programming. Finally, the performance of proposed framework is demonstrated by a travel booking example on QWSDataset.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129696008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlapping Singer Identification in Music Recordings","authors":"Wei-Ho Tsai, Cin-Hao Ma","doi":"10.4018/978-1-5225-7268-8.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-7268-8.CH002","url":null,"abstract":"Singer identification (SID), which refers to the task of automatically identifying the singer(s) in a music recording, is of great help in handling the rapid proliferation of music data on the internet and digital media. Although a number of SID studies from acoustic features have been reported, most systems are designed to identify the singer in recordings of solo performances. Very little research has considered a more realistic case, which is to identify more than one singer in a music recording. The research presented in this chapter investigates the feasibility of identifying singers in music recordings that contain overlapping (simultaneous) singing voices (e.g., duet or trio singings). This problem is referred to as overlapping singer identification (OSID). Several approaches to OSID are discussed and evaluated in this chapter. In addition, a related issue on how to distinguish solo singings from overlapping singing recordings is also discussed.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114176945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine and Deep Learning Techniques in IoT and Cloud","authors":"J. Naomi, K. M., S. V.","doi":"10.4018/978-1-7998-3111-2.CH013","DOIUrl":"https://doi.org/10.4018/978-1-7998-3111-2.CH013","url":null,"abstract":"In establishing a healthy environment for connectivity devices, it is essential to ensure that privacy and security of connectivity devices are well protected. The modern world lives on data, information, and connectivity. Various kinds of sensors and edge devices stream large volumes of data to the cloud platform for storing, processing, and deriving insights. An internet of things (IoT) system poses certain difficulties in discretely identifying, remotely configuring, and controlling the devices, and in the safe transmission of data. Mutual authentication of devices and networks is crucial to initiate secure communication. It is important to keep the data in a secure manner during transmission and in store. Remotely operated devices help to monitor, control, and manage the IoT system efficiently. This chapter presents a review of the approaches and methodologies employed for certificate provisioning, device onboarding, monitoring, managing, and configuring of IoT systems. It also examines the real time challenges and limitations in and future scope for IoT systems.","PeriodicalId":372297,"journal":{"name":"Advances in Web Technologies and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}