Fruit Fly Optimization Algorithm for Network-Aware Web Service Composition in the Cloud
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 2
Abstract
Service Oriented Computing (SOC) provides a framework for the realization of loosely coupled service oriented applications. Web services are central to the concept of SOC. Currently, research into how web services can be composed to yield QoS optimal composite service has gathered significant attention. However, the number and spread of web services across the cloud data centers has increased, thereby increasing the impact of the network on composite service performance experienced by the user. Recently, QoS-based web service composition techniques focus on optimizing web service QoS attributes such as cost, response time, execution time, etc. In doing so, existing approaches do not separate QoS of the network from web service QoS during service composition. In this paper, we propose a network-aware service composition approach which separates QoS of the network from QoS of web services in the Cloud. Consequently, our approach searches for composite services that are not only QoS-optimal but also have optimal QoS of the network. Our approach consists of a network model which estimates the QoS of the network in the form of network latency between services on the cloud. It also consists of a service composition technique based on fruit fly optimization algorithm which leverages the network model to search for low latency compositions without compromising service QoS levels. The approach is discussed and the results of evaluation are presented. The results indicate that the proposed approach is competitive in finding QoS optimal and low latency solutions when compared to recent techniques.
Authors and Affiliations
Umar SHEHU, Ghazanfar SAFDAR, Gregory EPIPHANIOU
ROUTE MAINTENANCE APPROACH FOR LINK BREAKAGE PREDICTION IN MOBILE AD HOC NETWORKS
Mobile Ad hoc Network (MANET) consists of a group of mobile nodes that can communicate with each other without the need of infrastructure. The movement of nodes in MANET is random; therefore MANETs have a dynamic topolog...
A Secure Electronic Transaction Payment Protocol Design and Implementation
Electronic payment is the very important step of the electronic business system, and its security must be ensured. SSL/TLS and SET are two widely discussed means of securing online credit card payments. Because of implem...
Weld Defect Categorization from Welding Current using Principle Component Analysis
Real time welding quality control still remains a challenging task due to the dynamic characteristic of welding. Welding current of gas metal arc welding possess valuable information that can be analyzed for weld quality...
Computer Science Approach to Philosophy: Schematizing Whitehead’s Processes
Diagrams are used in many areas of study to depict knowledge and to assist in understanding of problems. This paper aims to utilize schematic representation to facilitate understanding of certain philosophical works; spe...
Fine-Grained Quran Dataset
Extracting knowledge from text documents has become one of the main hot topics in the field of Natural Language Processing (NLP) in the era of information explosion. Arabic NLP is considered immature due to several reaso...