Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (126)
  • Open Access

    ARTICLE

    Dynamic Horizontal and Vertical Scaling for Multi-tier Web Applications

    Abid Nisar1, Waheed Iqbal1,*, Fawaz Bokhari1, Faisal Bukhari1, Khaled Almustafa2

    Intelligent Automation & Soft Computing, Vol.26, No.2, pp. 353-365, 2020, DOI:10.31209/2019.100000159

    Abstract The adaptive resource provisioning of cloud-hosted applications is enabled to provide a better quality of services to the users of applications. Most of the cloud-hosted applications follow the multi-tier architecture model. However, it is challenging to adaptively provision the resources of multi-tier applications. In this paper, we propose an auto-scaling method to dynamically scale resources for multi-tier web applications. The proposed method exploits the horizontal scaling at the web server tier and vertical scaling at the database tier dynamically to maintain response time guarantees. We evaluated our proposed method on Amazon Web Services using a real web application. The extensive… More >

  • Open Access

    ARTICLE

    Word Embedding Based Knowledge Representation with Extracting Relationship Between Scientific Terminologies

    Mucheol Kim*, Junho Kim, Mincheol Shin

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 141-147, 2020, DOI:10.31209/2019.100000135

    Abstract With the trends of big data era, many people want to acquire the reliable and refined information from web environments. However, it is difficult to find appropriate information because the volume and complexity of web information is increasing rapidly. So many researchers are focused on text mining and personalized recommendation for extracting users’ interests. The proposed approach extracted semantic relationship between scientific terminologies with word embedding approach. We aggregated science data in BT for supporting users’ wellness. In our experiments, query expansion is performed with relationship between scientific terminologies with user’s intention. More >

  • Open Access

    ARTICLE

    A Novel Knowledge-Based Battery Drain Reducer for Smart Meters

    Isma Farah Siddiqui1, Scott Uk-Jin Lee2,*, Asad Abbas3

    Intelligent Automation & Soft Computing, Vol.26, No.1, pp. 107-119, 2020, DOI:10.31209/2019.100000132

    Abstract The issue of battery drainage in the gigantic smart meters network such as semantic-aware IoT-enabled smart meter has become a serious concern in the smart grid framework. The grid core migrates existing tabular datasets i.e., Relational data to semantic-aware tuples in its Resource Description Framework (RDF) format, for effective integration among multiple components to work aligned with IoT. For this purpose, WWW Consortium (W3C) recommends two specifications as mapping languages. However, both specifications use entire RDB schema to generate data transformation mapping patterns and results large quantity of unnecessary transformation. As a result, smart meters use huge computing resources, maximum… More >

  • Open Access

    ARTICLE

    Numerical Optimization Algorithm for Unsteady Flows of Rotor Based on Web Service

    Jilin Zhang1,4,5, Xuechao Liu1,5, Jian Wan2,1,5, Yongjian Ren1,5, Binglin Xu1,5, Jianfan He1,5, Yuchen Fan1,5, Li Zhou1,5, Zhenguo Wei6, Juncong Zhang6, Jue Wang3

    Intelligent Automation & Soft Computing, Vol.25, No.3, pp. 527-546, 2019, DOI:10.31209/2019.100000109

    Abstract A numerical optimization algorithm for unsteady flows of rotor based on web service is proposed. Space discretization uses the finite volume method, time discretization uses the implicit dual-time steps method, and turbulence model uses the Spalart–Allmaras (S–A) model. In order to efficiently use the computing resources of the cluster, a service-oriented service computing architecture is used in a parallel computing service program. In order to realize the load balance of hybrid grid partition, the grid is partitioned by Metis Library. Meanwhile, data communication based on Message Passing Interface (MPI) technology guarantees the consistency of convergence between parallel algorithm and serial… More >

  • Open Access

    ARTICLE

    The Design and Implementation of a Multidimensional and Hierarchical Web Anomaly Detection System

    Jianfeng Guan*, Jiawei Li, Zhongbai Jiang

    Intelligent Automation & Soft Computing, Vol.25, No.1, pp. 131-141, 2019, DOI:10.31209/2018.100000050

    Abstract The traditional web anomaly detection systems face the challenges derived from the constantly evolving of the web malicious attacks, which therefore result in high false positive rate, poor adaptability, easy over-fitting, and high time complexity. Due to these limitations, we need a new anomaly detection system to satisfy the requirements of enterprise-level anomaly detection. There are lots of anomaly detection systems designed for different application domains. However, as for web anomaly detection, it has to describe the network accessing behaviours characters from as many dimensions as possible to improve the performance. In this paper we design and implement a Multidimensional… More >

  • Open Access

    ARTICLE

    Information Classification and Extraction on Official Web Pages of Organizations

    Jinlin Wang1, Xing Wang1, *, Hongli Zhang1, Binxing Fang1, Yuchen Yang1, Jianan Liu2

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 2057-2073, 2020, DOI:10.32604/cmc.2020.011158

    Abstract As a real-time and authoritative source, the official Web pages of organizations contain a large amount of information. The diversity of Web content and format makes it essential for pre-processing to get the unified attributed data, which has the value of organizational analysis and mining. The existing research on dealing with multiple Web scenarios and accuracy performance is insufficient. This paper aims to propose a method to transform organizational official Web pages into the data with attributes. After locating the active blocks in the Web pages, the structural and content features are proposed to classify information with the specific model.… More >

  • Open Access

    ARTICLE

    Benchmarking Approach to Compare Web Applications Static Analysis Tools Detecting OWASP Top Ten Security Vulnerabilities

    Juan R. Bermejo Higuera1, *, Javier Bermejo Higuera1, Juan A. Sicilia Montalvo1, Javier Cubo Villalba1, Juan José Nombela Pérez1

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1555-1577, 2020, DOI:10.32604/cmc.2020.010885

    Abstract To detect security vulnerabilities in a web application, the security analyst must choose the best performance Security Analysis Static Tool (SAST) in terms of discovering the greatest number of security vulnerabilities as possible. To compare static analysis tools for web applications, an adapted benchmark to the vulnerability categories included in the known standard Open Web Application Security Project (OWASP) Top Ten project is required. The information of the security effectiveness of a commercial static analysis tool is not usually a publicly accessible research and the state of the art on static security tool analyzers shows that the different design and… More >

  • Open Access

    ARTICLE

    Performance Anomaly Detection in Web Services: An RNN- Based Approach Using Dynamic Quality of Service Features

    Muhammad Hasnain1, Seung Ryul Jeong2, *, Muhammad Fermi Pasha3, Imran Ghani4

    CMC-Computers, Materials & Continua, Vol.64, No.2, pp. 729-752, 2020, DOI:10.32604/cmc.2020.010394

    Abstract Performance anomaly detection is the process of identifying occurrences that do not conform to expected behavior or correlate with other incidents or events in time series data. Anomaly detection has been applied to areas such as fraud detection, intrusion detection systems, and network systems. In this paper, we propose an anomaly detection framework that uses dynamic features of quality of service that are collected in a simulated setup. Three variants of recurrent neural networks-SimpleRNN, long short term memory, and gated recurrent unit are evaluated. The results reveal that the proposed method effectively detects anomalies in web services with high accuracy.… More >

  • Open Access

    ARTICLE

    Prediction of Web Services Reliability Based on Decision Tree Classification Method

    Zhichun Jia1, 2, Qiuyang Han1, Yanyan Li1, Yuqiang Yang1, Xing Xing1, 2, *

    CMC-Computers, Materials & Continua, Vol.63, No.3, pp. 1221-1235, 2020, DOI:10.32604/cmc.2020.09722

    Abstract With the development of the service-oriented computing (SOC), web service has an important and popular solution for the design of the application system to various enterprises. Nowadays, the numerous web services are provided by the service providers on the network, it becomes difficult for users to select the best reliable one from a large number of services with the same function. So it is necessary to design feasible selection strategies to provide users with the reliable services. Most existing methods attempt to select services according to accurate predictions for the quality of service (QoS) values. However, because the network and… More >

  • Open Access

    ARTICLE

    Toward a More Accurate Web Service Selection Using Modified Interval DEA Models with Undesirable Outputs

    Alireza Poordavoodi1, Mohammad Reza Moazami Goudarzi2,*, Hamid Haj Seyyed Javadi3, Amir Masoud Rahmani4, Mohammad Izadikhah5

    CMES-Computer Modeling in Engineering & Sciences, Vol.123, No.2, pp. 525-570, 2020, DOI:10.32604/cmes.2020.08854

    Abstract With the growing number of Web services on the internet, there is a challenge to select the best Web service which can offer more quality-of-service (QoS) values at the lowest price. Another challenge is the uncertainty of QoS values over time due to the unpredictable nature of the internet. In this paper, we modify the interval data envelopment analysis (DEA) models [Wang, Greatbanks and Yang (2005)] for QoS-aware Web service selection considering the uncertainty of QoS attributes in the presence of desirable and undesirable factors. We conduct a set of experiments using a synthesized dataset to show the capabilities of… More >

Displaying 101-110 on page 11 of 126. Per Page