Survey and Analysis on Migration of Legacy System to Service Oriented Architecture
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 9, Issue 2
Abstract
A number of new generation languages have been evolved for the past few years and have been adapted by the industries. As a result of which the project done under 3GL are becoming Legacy and also the information that is to be stored is increasing the complexity of the Legacy systems. These are issues because of which companies are migrating their legacy systems to SOA which provides loosely coupled and interoperable services. There are many approaches to migrate a legacy system to SOA. This paper presents a survey to migrate legacy system to SOA. We also propose a roadmap to migrate a legacy system to service oriented architecture
Authors and Affiliations
Krupi Patel
Detection of Sub-Lines of Various Orientations Using Back Propagation Networks
Various approaches can be taken to achieve vision for robot navigation using back-propagation artificial neural networks. An approach is presented in this paper which attempts to detect straight sub-lines from 8x8...
Implementation of Hybrid Wavelet Transform for Adaptive Lossless Image Compression
Abstract: In digital image processing, Image compression is a type of data compression causing reduction in image size but maintain the image quality. It reduce cost and time in image storage and transmission and thuscan...
Evaluation on a Simulated Annealing based Model for Solving Job Shop Scheduling Problem
The stochastic optimization techniques were commonly used in solving several optimization problems. There are different types of these algorithms that were addressed in several previous works. In our previous w...
Implemenation of Enhancing Information Retrieval UsingIntegration of Invisible Web Data Source
Abstract: Current information retrieval process concentrate in downloading web content and analyzing andindexing from surface web, exist of interlinked HTML pages. Information retrieval has limitations if the data...
Detecting multiple Blackhole and Grayhole attacks in MANETS by modifying AODV
Abstract: Ad hoc networking refers to as network with no fixed Infrastructure. When the nodes are assumed to be capable of moving in the network, then networks are referred as MANETs (mobile ad hoc networks).Securi...