Process Planner: An Approach to Conceptualize Business Practices in Private Cloud
|
|
- Tyrone Hodges
- 8 years ago
- Views:
Transcription
1 Smart Computing Review, vol. 5, no. 1, February Smart Computing Review Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Debajyoti Mukhopadhyay, Nagesh Jadhav, and Falguni Chathly Maharashtra Institute of Technology, Pune , India / {debajyoti.mukhopadhyay, nagesh10, chathly.falguni}@ gmail.com * Corresponding Author: Debajyoti Mukhopadhyay Received November 10, 2014; Revised December 23, 2015; Accepted January 15, 2015; Published February 28, 2015 Abstract: The expansion of business is majorly driven by client and quality oriented architecture. Every commercial setup has its own business pattern and process of implementation. Large numbers of alternatives are supporting trade in terms of business formation, business development, and business expansion also, sometimes in each of its incremental stage. For business development, flexible technology is required, that can be a part of an existing technology and that would help to model business based on business rules. Business concepts need to be well organized and predefined for collaboration to ensure complete client satisfaction. This paper proposes an architecture that is light weight in terms of resource requirements that is modeled on the conceptbuilding approach which can further embedded into private or public cloud to support service oriented architecture. Inputs related to application are taken from a collaborating client, which is then forwarded to the planner for matching. The discovered web services (belonging to other clients) are then chosen for further collaboration. The planner relies on a concept-based approach, rather than using complex database schema. Concept of Artificial Intelligence (AI), a Hierarchical Task Network (HTN) play an important role in forming and analyzing the concept built. Each of the tasks is decomposed till depth (primary node), on the base of filter parameters mentioned by client. Medi-Care scenario is considered to show applicability of the approach. Approach solves and formulates the problem while using client criteria of search to map required output. Keywords: Business Process Management (BPM), Discovery, Business to Business (B2B), Hierarchical Task Network (HTN), Electronic-Commerce (E-commerce), Ontology, Planning, Service Oriented Architecture (SOA), Web Computing, Web Services, Information Technology (IT), Cloud Computing DOI: /smartcr
2 52 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Introduction D elivering prompt and quality services to clients is of utmost importance to the well-being of any industry. The major challenge in the implementation of commercial business logic is coping with constantly-changing trends or processes. The solution to this issue lies in the development of an adaptable and extensible framework for the conceptualization of business practices. Inadequacies in the current business logic implementation system, resource limits (e.g. memory), and a susceptibility to security breaches are driving forces towards innovations in new combinations of front end, web, and back end varieties of technology. Supporting other business sectors is what information technology does, from a service perspective. The formation of businesses from scratch is difficult job for small scale developers; it is even more difficult if the developer is from another sector. Web services are integral part of IT infrastructure, which itself is an integral part of small scale business expansion. Web services are a structured implementation of Service Oriented Architecture (SOA) [1], which facilitates both organizations and developers to model, create, and publish their business applications on a Universal Description Discovery and Integration (UDDI) system. A web service is designed to support interoperable machine interactions over a network [2]. Web services provide a platform for deploying businesses on the web. Refer to Figure 1. Electronic commerce (E-commerce) is one such example where businesses expand in conjunction with worldwide requirements from different clients. This in turn leads to comparative losses in small scale businesses that make it difficult for them to survive. For the small businesses, technology that can manage all issues and potential risks in business development is not affordable, which may further lead to loss of control over business as well as risk of losing precious customers. This paper discusses an effective architecture that can be applied to both small and large organizations, using their private cloud implementation to generate profitable businesses and serve multiple customers. The proposed architecture would help in developing software systems by way of enabling stronger system formulation rules and, therefore, easier systems. This paper proposes an architecture that helps develop an organization-specific planner. The planner can provide the best business processes out of specific commerce inputs, imports, exports, and contacts. The planner incorporates the concept of artificial intelligence (AI) to serve multiple clients dynamically and with real-time data. The presented approach takes client requirements and binds them with a knowledge base using binding technology. The result is that the best parsed value of the depth is answered. A process planner knowledge base is maintained and tested. Further ontological reasoning would be used to derive expected outputs. Binding technology is which takes inputs in terms of values, internally passes it to code, and serves up that value as input to the knowledge base. Although a lot of methods to support technology exist, the actual issues related to today s market are: 1. Lack of dynamism in B2B collaborations (top level input binding to primary function). 2. Mapping search of what is asked for (modeling discovery). Figure 1. B2B collaboration
3 Smart Computing Review, vol. 5, no. 1, January Motivating Scenarios E-commerce and online businesses are obligatory in order to deal with limited resources. A serving budget offered by large-scale firms is inevitable for all types of users. Thus: 1. The delivered product should be able to be resized and should serve despite the scale of the firm. Business and IT problems come in all shapes and sizes, so it should not come as a surprise that processes and workflows also come in different shapes and sizes, as do the approaches for defining them. 2. Highly coated requirement-serving or client-oriented architecture is required, where firms can independently mention business rules, and entrust what is defined and offered. SOA World Magazine mentions that collaborative business process modeling is a must in a customer-oriented market. In the coming years, Collaborative Business Process Management (BPM) will be the key for knowledge management and sharing in industry process knowledge, where we will go through the best practice solutions for thousands of processes existing in each industry. Could anyone in the 90's have imagined creating the knowledge base that is currently available on Wikipedia? These processes in a similar fashion need to evolve and have multiple variances available for people to choose the best model practiced and plug it into any of BPM product. Also, a group named Association of Business Process Management Professionals (ABPMP) has been formed in Toronto to take BPM execution forward. They work with the mission to engage in activities that advance the practice of business process management, and to foster the development and advancement of the skills and competencies of the professionals that work in this discipline. This paper focus on the steps necessary to create a conceptual based Helper, Planner, or Organizer that operates on the business rules in the conceptual layer of business architecture and passes the flow of requirements along with appropriate clients available on the basis of a quality parameter mentioned by the client. The paper is organized as follows. Section 1 defines the problem statement. Section 2 presents the background of research. Section 3 discusses related work and the novelty of the approach. Section 4 presents the proposed work. Section 5 declares prerequisites for the approach. Section 6 presents an implementation. Section 7 presents the algorithm and results. Finally, Section 8 presents concluding remarks. Background of Domain and Need for Innovation Over the past few years, organizations have been very effective at defining and optimizing their business processes to take advantage of transactional IT methodologies. These processes and systems guide the user through a predefined set of steps or tasks (workflow) that are embedded in IT systems. Typically, these systems have been based on optimizing the flow of a business document through various process steps and then measuring and managing the overall process toward specific performance goals. The main points that have to be noted here are: 1. There are two main ways of defining business processes: orchestration and choreography. Orchestration is where a central or master element controls all aspects of the process. Choreography is where each element of the process is autonomous and controls its own agenda. Both types of processes exist in most organizations, but are not well-integrated. Collaboration plays a critical role in bringing these processes together. Collaboration comes as an idea widely used in information systems for higher business benefits and the fulfillment of customer needs. The grouping of important and ruling quality of several companies gives a benefit in expanding commerce. Business Integration is the relevant approach that concentrates on domain-specific problems of dynamically interacting organizations. 2. With the increasingly global distribution and mobile nature of business, together with incorporated value chains in which critical support functions are outsourced, a new and different type of business process needs to be supported in the enterprise - one that combines the management, security, measurability, and standardization benefits of traditional, transactional-based processes. In these processes, we need to move beyond the business document as the primary metaphor and incorporate the rich set of knowledge types readily available to system users in a trusted, secure, and reliable fashion. 3. Searching for best services based on quality of service requirements from the registry and using the search results for business collaborations should also be noted. (Editor s note: This section seems quite small compared to the other two. Could it be expanded further?)
4 54 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Related Work and Novelty of Approach Web service discovery and web service collaboration are crucial tasks. Different techniques for web service discovery and the collaboration of multiple web services have been presented. As in [3], two levels of semantic web discovery using WordNet are presented. The first level is about the calculation of similarity degrees, and the second talks about the calculation of service interface similarity degrees. The threshold value is used to eliminate the service in order to provide refined search. Similarly, a semantic matchmaker system is proposed in [4] to provide better web service discovery by overcoming the limitations of UDDI. In [5], many filters are defined for service retrieval: the name space, the domain of ontology that is used, types of inputs/outputs, and constraints. But these are limited in scope compared to the presented approach. In contrast to [6], broker-based semantic web service discovery is proposed for the selection and ranking of web services. Parameters like quality of service (QoS) is used for the discovery and ranking of web services. In [7], authors have proposed a web service discovery algorithm based on ontology. The proposed algorithm uses OWL-S language to describing web servers. They used an improved semantic matching algorithm based on map relation diagram and geometric distance. In [8], the author presents a range of structural matching for a Business Process Execution Language (BPEL) process and proposes heuristics in order to define an efficient algorithm. When comparing the set of structural relationships existing among activities, any two activities can have one of the following relationships: precedence, exclusive, or parallel. Therefore the matching criteria are reduced. In [9], to manage the constantly-changing approach of user requests, a context-based model for web service discovery is presented. The model discovers the services based on query semantics, which is comprised of preferences provided by the user and the context. Authors of [10] state a community mining-based technique for the discovery of composite web services. The proposed technique constructs a web service interactive network (WSIN) from the usage log and generates a community structure by spectrum clustering. In [11], the authors talked about the semantic web, which helps to share and reuse data across different application, enterprise, and community boundaries. The primary goal of the semantic web-based ontology is to integrate heterogeneous data and enable the interoperability. Even the authors of [12] have proposed three methods for service classification analysis, which includes TF/IDF, web context extraction, and a baseline for evaluation purposes. Ontology matching using a string matching algorithm and the analysis of possible service composition using a context overlap is shown. For the experiment, they used a set of 392 web services, originally divided into the 20 different topics like courier services, currency conversion, communication, and business. The Web Service Description Language (WSDL) description based on a free text description achieved higher precision. This result was much higher than those achieved by the TF/IDF method. In [13], the combination of ontology learning and semantic web is shown. The proposed ontology-learning framework enables ontology learning for comprehensive ontology using semiautomatic ontology-construction tools. The framework also enables ontology import, extraction, pruning, refinement, and evaluation. Also in [14], a framework for web service discovery based on behavior of the services is proposed. The framework uses Calculus of Communicating Systems (CCS) to specify web service behaviors. Then, behavior matching is combined with fuzzy similarity using ontology for discovering the web services. A new behavior model for web services is presented in [15], which shows messages exchanged between participants with activities performed within the service. A new query language is developed that expresses temporal and semantic properties on service behaviors. But the choice of finite-state automata as a modeling formalism limits the expressiveness of the models. In summary, many recent proposals are presented about the need for better web service discovery and e-commerce expansion. However, all approaches are found to be hypothetical or based on uneven data. Thus, user required data does not evaluate a registry for even the smallest match sent. To handle this, we proposed an approach binding with ontology. In this paper, we present all the required understanding for the approach and implementation of a Process Planner.
5 Smart Computing Review, vol. 5, no. 1, January Proposed Work The proposed approach is a combination of ontology and business stages, which is also suitable for private clouds. The concept is built using real-world business rules. Every business process has a sequence to follow. Thus, real world B2B stages are mentioned. Real World Business-to-business Stages 1. Discovery and Information Gathering Stage (DIG): This is the most common stage of any web service business as an initiative. The seller and buyer discovers for available buyers and sellers, respectively. They call catalogs and also for other relevant prerequisites from the collaborators available. 2. Establish Contact (EC): This stage is relevant to contacting the appropriate buyer or seller, and all the pre-business requirements are inquired and discussed. 3. Negotiation (N): Both interacting parties negotiate for accepted terms. It can be manual where they actually meet, understand each other s needs, and come to a conclusion to do business or to move on to other business opportunities. As in alternative, automatic negotiation can also be handled as e-negotiation, where parties rely on the service agreement terms generated [16]. 4. Service Agreement (SA): Exact negotiating terms are noted legally by two (or more) collaborators, and here they declare penalties for non-deliverance, and confirm the start of collaboration. It is also at this stage that a new supplier or buyer becomes an established partner to the enterprise. 5. Service Order Fulfillment (SOF): Two collaborating companies seek to fulfill the terms of the contract. The creation and deliverance of the service and payment usually take place at this stage. After-sales services such as reverse logistics also take place here. Eventually, the above five stages become a base to satisfy upper-level transactions. The above level selling requests lead to discovering buyers, contacting them, making an agreement, and fulfilling the request. Similarly, buying has different intermediate tasks. This also stands for any organizations that sell or buy products or services online to develop their business. Architecture The architecture for an approach is shown Figure 2. Business requirements are taken from the client in a definite way and passed on the web for processing. The combination of inputs is matched with tasks and methods present as the top-level tasks in the Process Planner. It has a concept built into it. The match all and match any functions match the entered values and present values as inputs in the registry. Figure 2. Working architecture
6 56 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud 1. Business Inputs: Every system has uniqueness in taking their required input. The client adds the inputs on the entry level as required services and other search-regulating parameters. 2. Business Input Processing: Client parameters are forwarded to the next block for processing. It sequentially passes through each of the build concepts, matching and fetching values from the registry in parallel. Each stage has its own substage included into it, and passes the parsed values of the graph to the proceeding stage. Each stage is handled with a set of unique classes, methods, and properties, which are the terms of the Web Ontology Language (OWL) or concept building [17]. Refer to Figure 2. Business Input Fetching This block of the architecture is proposed as an inner processing block. Services are fetched from the registry. The matched flow is noted and referred to the client. The client is further provided with an access key for the web service. Business Flow Model Registry: This holds all buyers and sellers who are doing business through our Process Planner. Both the seller and buyer need to register themselves with the business flow registry. Service Registry: UDDI is a platform-independent, extensible Markup Language (XML) based registry which allows service providers to publish services and enables discovery. It also defines how the services interact over the Internet. There exist many UDDI business registries that have the ability to discover and locate their services based on the input search query. Every part mentioned is essential to satisfy client goals. From the top level task of the client, it is recursively matched to the methods of tasks in the Planner. A correct flow of tasks is returned to the user, which is then provided with an access code of the web service or product. For each scenario, proper concepts are built and progressed to reply to the user with his requirement. Understanding pre-requisites Understanding Planning Criteria Creation of Knowledge Base and Process Planner Creation of every entity or node in the Planner is a part of a collected hierarchy. Each marked node, sub-node, and leaf is a combination of at least one solution. Here, a knowledge base is noted as a collection of meaningful nodes arranged to form a concept. Business relates to all the fields from raw material collection, marketing and fulfillment of the product. Thus, concepts generated are expandable. Protégé OWL is used here to develop concepts using OWL terms. Scenario at Medi-Care Industries Domain knowledge is acquired by the author and team by continuously interacting with Chartered Accountant and administrative employees in hospitals and Medi-Care business holders. Most of the store holders are found to order medicine and equipment only from well-known businesses. Even the hospitals are dealing with widely-known holders. The reason is that the clients are investing a lot amount of money, which is risky. So accepting online transactions for such services is a bigger risk to them. Well-defined Medi-Care industries do business with most renowned dealers. The reasons for the market reaction are: [1] Assurance of brand and zero chance of being indignant. [2] Market need and the need for customer choice. [3] Hospitals and industries rely on dealers who deal in bulk rather than approaching new clients. Ontologies There is a branch of AI to solve problems using self-defined methods. Ontology represents an idea of working in a domain in a well-defined, descriptive way. Also, it is to support truly intelligent systems and to match knowledge requirements of capturing, processing, and reusing available information. Ontology is the way of building what business rules have to present. Technically, concept building is creating ontology for managing knowledge. Better knowledge has proved more important for solving a task than better algorithms [18]. Building Blocks of Ontology
7 Smart Computing Review, vol. 5, no. 1, January Ontology is made using following defined parts [19]: 1. Classes (Concepts): These are domain of discourse or entities to be conceptualized. A description of concepts is done in a domain using classes. Further, if it is necessary, a class can have subclasses that can represent concepts that are more specific than the superclass. One example is milk powder as a class which has the subclasses of chocolate milk powder and vanilla milk powder. 2. Properties (Slots): Each class contains properties or attributes and features related to it, i.e. a food class containing proteins, carbohydrates, and fats as properties. 3. Facets (Role Restrictions): These are the boundaries that properties must follow. For instance, every 200 g of milk powder should have 32 g of protein, 10 g of carbohydrates, and 0.5 g of fats. 4. Instances (Data): These are members of a class that are separated using facets and follow defined slots. An example would be different brands of powdered milk, like Everyday or Nutrilite. 5. Knowledge Base: A set of each of instance of each class forms the knowledge base, such as which are the available milk powders, and which are the producers of milk powders. Ontologies have become key development support in an increasing range of applications, and basically have become the preferred modeling tool. Ontologies created for classifying and utilizing web services are widely used for business development [20]. Planning Planning is also a term from AI that builds an intelligent system that is capable to set and achieve goals. They are provided with a way to envision the output while having the initial position representation of the state of the world and the capability to predict [21]. Modularization is the base for any of the code to work. For application-based work, a theoretical explanation becomes hard. For such application-oriented needs, hierarchical planning is preferable. Figure 3. Concept building Introducing Planning For concept building of an application, we use a Hierarchical Task Network (HTN) as a planning paradigm. It works by decomposing non-primitive (compound) Tasks into smaller subtasks recursively, until primitive Tasks are reached that can be performed directly using the planning operators. Domain: An HTN planning domain is a pair D = (O, M) where, O: set of operators M: set of methods.
8 58 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Operator: It is a primitive action. An Operator a = (name (a), precond (a), effects (a)) accomplishes a ground primitive Task t in a state s if name (a) = t and a is applicable to s. Task: A Task is an expression of the form t (r1,..., rk ) Where, t: task symbol (primitive or non-primitive) r1,,rk: terms, objects manipulated by the task A task is ground or completed only when all of the terms are ground. Otherwise, it is unground. A Task is primitive if its task symbol is an operator name and its parameters match. Otherwise, it is non-primitive. Methods: Tasks can be decomposed using so-called methods. An HTN method is a 4-tuple m = (name (m), task (m), subtasks (m), constr(m)) where, Name (m): the name of the method, i.e.,, an expression if the form m (x1,..., x2): m is a unique method symbol and x1,..., x2 are all of the variable symbols that occur anywhere in m. task (m) is a non-primitive task, (subtasks (m), constr (m)) is a task network. Task Network: On decomposition of the task, the task is replaced by a fresh or more specific task network. Thus, a Task Network can be defined as a set of tasks plus a set of restrictions (or often ordering constraints) that its tasks should satisfy. A task network is a pair w = (U, C) Where, U: set of task nodes C: set of Constraints Each task node u is part of U, and contains a task tu. If all of the tasks are primitive, then w is called primitive. Otherwise, it is called non-primitive. The HTN planning problem consists of finding a primitive decomposition of a given (initial) task network [22]. Understanding Protégé OWL Concept Building Using Protégé-OWL Ontology is an art of concept developing, which is supported by a Protégé-OWL environment. There is no one correct way to model a domain there are always viable alternatives. Protégé OWL successfully supports all the relationships among tasks and operated methods and hierarchical format successfully. A lot of compatible versions of Protégé OWL are available. Protégé OWL is provided with the facility to plug-in different supportive software. It is fully featured and enriched to support databases, graphs, query making, and report generation. Steps of building ontologies can be explained as follows: 1. Download and install Protégé OWL s latest version (4 or above). 2. Download and install a reasoner for the Protégé OWL concept testing, and keep the jars in a plug-in directory of Protégé OWL. 3. Download and install graphviz software for Protégé OWL concept visualization. 4. Start Protégé OWL, it will show a dialogue box. Choose New Project. 5. Making new project will create an empty ontology along with some tabs. The Active Ontology or Meta Data Ontology tab shows the generated name for the ontology along with the Ontology Browser. 6. In the menu bar, click Protégé -> Configure. This will open a dialog box. In Tab Widgets, select the needed tabs. 7. For configuring an OwlViz tab, one needs to add the dot.exe path to Options, available in the OwlViz Tab. Dot.exe is available in the GraphViz installation directory. 8. In the Owl Classes tab, you will find a root node called owl:thing. Thus, each concept developed in Protégé OWL is by default a child of a parent thing.
9 Smart Computing Review, vol. 5, no. 1, January Understanding Registries Configuring Service Registry with Apache UDDI and Mysql 1. Install MySQL and create a database for juddi. See Table 1. i. Install MySQL community server ii. Create a user and a database for juddi by executing the following commands 1. CREATE USER IDENTIFIED BY juddi ; 2. CREATE DATABASE juddi; 3. GRANT ALL PRIVILEGES ON juddi.* TO ; iii. Deploy juddi i. Download juddi portal bundle or juddi portal bundle and unzip it to drive C ii. Copy the juddiv3, pluto and juddi-portlets folders to Tomcat s webapps folder. 2. Configure MySQL with juddi i. Install mysql connector ii. Open the file Tomcat\webapps\juddiv3\META-INF\context.xml and edit it iii. Copy the following files to tomcat\webapps\juddiv3\web-inf\ and edit some files as given below: o.\web.xml: Set the value of<res-ref-name>as jdbc/juddidb; o.\classes\juddiv3.properties: Set the propertyjuddi.persistenceunit.name with value juddidb; o.\classes\meta-inf\persistence.xml: Set the persistence-unit name to juddidb, set <non-jta-datasource> value to java:comp/env/jdbc/juddidb Table 1. Code shot <Context> <WatchedResource>WEB-INF/web.xml</WatchedResource> <Resource name= jdbc/juddidb auth= Container type= javax.sql.datasource username= juddi password= juddi driverclassname= com.mysql.jdbc.driver url= jdbc:mysql://localhost:3306/juddi /> </Context> Understanding the Client GUI Types of Business Inputs Planner accepts specific inputs for the system to work. All the way, Medi-Care field required inputs are noted and accepted by the designed Planner. HTN works in systematic way and works all the way to the ground Tasks. Inputs taken are explained below. Business Input: For each newly contacted client there are chiefly only two highest level business aims for each B2B collaboration: i.e. Buy and Sell. Business Constraints: For any of the business inputs, being seller or buyer, a client has to define the best quality parameters available in the service he desires or is selling. Here, the four defined quality parameters are price, response time, throughput, and availability. Business Parameters: These parameters are the widely important parameters that are used in internal ontology building and for filtration using Linking and returning required built methods. Refer to Table 2. Creating the planner is combination of both Tasks, which can be primitive or non-primitive, and methods for decomposable tasks. The process planner is nothing but the concept built for a business domain. The formation of the planner is deep as its understanding, and includes a proper parent-child relationship.
10 60 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Tasks There are primitive and non-primitive Tasks in BOWL. Non-primitive Tasks can be broken down into lower level tasks. The difference between both types of tasks are that non-primitive tasks contain Method as an attribute in the definition of Task, while primitive Tasks are the ground Tasks. Non-primitive tasks can consist of one or more methods as shown in Fig 4. Linking Task Ontology All the tasks are linked as if in the form of a hierarchy. This hierarchical form can also be called a parent child relationship. Multiple tasks, with multiple methods in them, reply on the basis of internal permutations on those methods, operated on the constraints mentioned by the client. Refer to Figure 5. Permutations work as defined in the algorithm defined below. Table 2. Client-specific inputs Sr. No. Business Parameters Values 1 Client Details Name, Business Contact Details. 2 Business Input Buyer or Seller 3 Business Constraints Price (P), Response Time (Rt), Throughput (Tr), Availability (Av). Business Aim Buy (b), Sell(s) Product Type Service (S) or Product (P) 4 Business Parameters Product Name As found in the Service stored list. Payment Mode Contract (C1), Cash (C2) Quantity As per Client Delivery Time Maximum and Minimum Time Method Handling Figure 4. Method snapshot in the OWL code The method operates when permutation calls the method to operate. These methods are dynamically operated on decomposition. HTN handles hierarchy (i.e. parent-child relationship). For handling permutated links, methods are made. The parent can operate on one or more methods, corresponding to the requirement input.
11 Smart Computing Review, vol. 5, no. 1, January Implementation Sim ulation Scenario For dealing with the reason mentioned in the above sections, here the implementation scenario contains a set of buyers and sellers of Medi-Care products and services. The client is asked to mention the business inputs and business constraints that he is looking for. For example, the client might be looking for good quality and reasonable Medi-Care products. Then, he would clarify his preferences though business constraints. Based on the business inputs and business constraints, a business model flow registry is searched to find potential buyers or sellers for business collaboration in the stage of discovery. This stage passes the found sellers or buyers to the stage of establishing contact, which stores all the contact details and market found values of the clients. The negotiation stage is activated when contact is made successfully. It can be automatic or manually. When it is automatic, the client is being shown the pre-noted conditions of the business and forwards the service holder a notification. With the notification of negotiation terms, the requester s service terms are also being forwarded to the client. Further using the process planner, more conversation between a client move and request is made to show a service agreement. In the case of manual negotiation, both participating parties meet to negotiate. On the basis of client requirements and business agreements, a service registry is searched for a web service description language file, so that a client can set up a service client and start exploring the service. Figure 5. Link ontology
12 62 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud Process Planner Algorithm Process Planner Algorithm An algorithm is presented to show the working of the approach. The combination to inputs and processing in the Process Planner as mentioned in Table 3. BI: Business Inputs BC (Pf1, Pf2): Business Constraints. Here, Pf1 and Pf2 defines preference 1 and preference 2, respectively For any of the business inputs, being seller or buyer, the client has to define the best quality parameters available in the service he desires or is selling. Here, the four defined quality parameters are Price (P), Response Time (Rt), Throughput (Tr), and Availability (Av). BP (Pt, Pn, Sm, Pm, Q, Dt): Business Parameters Pt: Product Type Pn: Product Name Sm: Sourcing Mode Pm: Payment Type Q: Quantity Dt: Delivery Type. Results The process planner is a firm plan to query and observe the web services available to the client. This is the best available option with concept building. The outcome for the built system is shown for bringing good B2B transactions and better for the organization for accepting it. Here the knowledge base and client interface are both independently checked and then put to further stages. Even the knowledge base is modulated and checked for error-free functioning. Reasoner results in a proper ontology being built. On querying, the client found results in terms of the following format: 1. Graphical Flow 2. Web Service for usage 3. Business Format. The below figures show how one can query in Planner and export the required query. For a large queried number of a complex set of classes, successful query export remains a main aim as shown in Figure 6. Graphical Flow: Protégé-OWL is the best way to represent the descriptive output for the running system. The evaluation of the system requirements can be effectively shown using the displayable outputs and ontologies. Figure 7 shows the ontological flow in a graph, which is successfully exported from the process planner. The graphical form of output is not only easy for a client to understand business flow, but also it is supportive in analyzing the errors of terms if they exist. Figure 6. Export query
13 Smart Computing Review, vol. 5, no. 1, January Table 3. Process planner algorithm Function Process Plan (BI, BC (Pf1, Pf2)) Note the BI, as topmost task allocate value to tt Create Ouput File O If BI is empty Return Existing Service Else Subtasking(tt, BI, F) Return O End If End Process Plan Function Subtasking (tt, BI, F) Match BP (Pt,Pn,Sm,Pm,Q,Dt) with the business flow registry values If value found Find the top most task ts in the Process Planner Match the value of Process Plan function with Process planner Count the number of methods available in the Task Recursively find the subtasks available in the method If Task is available in method available mark it as ungrond task and call subtasking with new parameters Else Mark it as ground process and return output to file O. End If Call Sequence (tt, subtask_ tt) Call split ( subtask_ tt) Call flow (ground task) Else If no method found return ts as the output Task in file O End If End Function Figure 7. Exporting output in XML format
14 64 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud There are more than 200 classes in the Medi-Care ontology. On querying, decomposable tasks find ground tasks and return what is required. Web Service for Usage: The negotiation client searches the required service from the service registry. The client gets the results shown in Figure 8, which contains the service key, its name, and the WSDL file location, which the client can use to set up and use the new service [23]. Business Format: Planner can even return the results in business required format. Figs. 6 and 9 show the desired format. Figure 6 is a snapshot of the result showing an export of the XML format of a queried web service, and Figure 8 shows the list of web services available for a particular client. From here, the client can easily maintain his logs of tracking, paying, or manipulating acquired web services. Figure 8. Service registry result. Figure 9. Business format. The results can also be shown in terms of exported code, MS office output, or in terms of a scripting language (Python, Perl, etc.) even on the basis of requirements. Eventually, the result found leads to the topmost aim of buying or selling the product or service to fulfill. The client is provided with the SOAP code of the web service published for access, and in case of products, the particular code of the product is presented to the relevant buyer or seller. On fulfillment of the service, all the possibilities in the concept built are checked and marked, and tasks or goals are said to be complete. XML as an output is an access key to make whole system work on the web, and provides flexible interaction. juddi is compatible enough to publish a web service and is configured to reply. The results found are presented in all required forms.
15 Smart Computing Review, vol. 5, no. 1, January Conclusion This paper presents an approach to discovering web services and products using ontology. A required literature review, along with the procedure adopted are presented. As a case study, a Medi-Care B2B scenario is simulated. As a market review, it is noted that medical and law enterprises are under constant pressure to expand business capabilities, improve real-time information access, and provide richer user interactions to serve clients. This work can be a solution to the spontaneity required in the e-commerce. The system proposed can even be integrated into existing applications. For future work, the dynamic formulation and decomposition of business processes based on high-level business requirements can be reported. The proposed method of conceptualization can be a base for businesses collaboration on a large level. The presented approach can be an area of research for new researchers in the field of web computing. It is a combination where concepts of AI and web computing work together for the benefit of expanding and developing organizations. References [1] Le D. Ngan, L. Y. Jie, Rajaraman K, paper Dynamic Discovery of Complex Constraint- based Semantic Web Services, at Fifth IEEE International Conference on Semantic Computing, [2] Steve, J, Toward an Acceptable Definition of Service, IEEE Software, vol. 22, no. 3, pp , [3] Yanbin Peng, Two levels semantic web service discovery, Fuzzy Systems and Knowledge Discovery (FSKD), 2010 Seventh International Conference on, vol. 6, pp , Aug Article (CrossRef Link) [4] Tian Qiu; Pengfei Li, Web Service Discovery Based on Semantic Matchmaking with UDDI, Young Computer Scientists, ICYCS The 9th International Conference for,pp , Nov [5] T. Kawamura, J. De Blasio, T. Hasegawa, M. Paolucci, K. Sycara (2003), A Preliminary Report of a Public Experiment of a Semantic Service Matchmaker Combined with a Uddi Business Registry, Proc. Int l Conf. Service Oriented Computing (ICSOC), [6] Yousefipour, A.; Neiat, A.G.; Mohsenzadeh, M.; Seyyedi, M.A., A new broker-based semantic Web service discovery framework for selecting and ranking suggested Web services, Intelligent Computer Communication and Processing (ICCP), 2010 IEEE International Conference on, pp , Aug [7] Taoshen Li; Xinghao Chen, An discovery algorithm of Web service based on ontology, Electrical and Control Engineering (ICECE), 2011 International Conference, pp , Sept [8] R. Eshuis, P.W.P.J. Grefen (2007), Structural Matching of BPEL Processes, Proc. European Conf. Web Services (ECOWS), [1] Hannech, A.; Mcheick, H.; Adda, M., Context-based web service discovery model, Information Technology and e-services (ICITeS), 2012 International Conference on, pp. 1-7, March Article (CrossRef Link) [9] Xizhe Zhang; Ying Yin; Mingwei Zhang; Bin Zhang, A composite web services discovery technique based on community mining, Services Computing Conference, APSCC IEEE Asia-Pacific, pp , 7-11 Dec [10] Yajing Zhao; Jing Dong; Tu Peng, Ontology Classification for Semantic-Web-Based Software Engineering, Services Computing, IEEE Transactions on, vol. 2, no. 4, pp , Oct.-Dec Article (CrossRef Link) [11] Segev, A.; Toch, E., Context-Based Matching and Ranking of Web Services for Composition, Services Computing, IEEE Transactions on, vol. 2, no. 3, pp , July.-Sept Article (CrossRef Link) [2] Kaijun Ren; Nong Xiao; Jinjun Chen, Building Quick Service Query List Using WordNet and Multiple Heterogeneous Ontologies toward More Realistic Service Composition, Services Computing, IEEE Transactions on, vol. 4, no. 3, pp , July.-Sept Article (CrossRef Link) [12] Bensheng Yun, A New Framework for Web Service Discovery Based on Behavior, Services Computing Conference (APSCC), 2010 IEEE Asia-Pacific, pp , 6-10 Dec [13] Z. Shen, J. Su, Web Services Discovery Based on Behavior Signatures, Proc. IEEE Int l Conf. Services Computing, [14] Mohammed Irfan Bala, Sheetal Vij, Debajyoti Mukhopadhyay, Negotiation Life Cycle: An Approach in E- negotiation with Prediction, at Third International Conference on Computer Science, Engineering & Applications, ICCSEA 2013 Proceedings. [15] Protégé OWL Tutorial, [16] Ontologies and Semantic Web, [17] Part VI Hierarchical Task Network, [18] Aviv Segav, Quan Z. Sheng, Bootstrapping Ontologies for Web Services, IEEE Transactions on Service Computing, vol. 5, pp , Article (CrossRef Link) [19] Wikipedia Artificial Intelligence, [20] Shirin Sohrabi Jorge A. Baier Sheila A. McIlraith, HTN Planning with Preferences, IJCAI pp , 2009.
16 66 Mukhopadhyay et al.: Process Planner: An Approach to Conceptualize Business Practices in Private Cloud [21] Debajyoti Mukhopadhyay, Falguni Chathly, Nagesh Jadhav, QoS Based Framework for Effective Web Services in Cloud Computing, Journal of Software Engineering and Applications, Scientific Research, USA; vol. 5, no. 11A, pp , November Prof. Debajyoti Mukhopadhyay is the Dean (R&D) of MIT Group of Institutions and Head of Information Technology at Maharashtra Institute of Technology in Pune, India. He is the Founder of the MIT Center of Excellence for Research & Innovation (MITCERI) to encourage and facilitate R&D activities within the MIT Group. He had earlier assumed the position of the Director of Balaji Institute of Telecom & Management in Pune. He is the Founding Director of the Web Intelligence & Distributed Computing Research Lab. During , for almost three years he was the founding Head and Professor of Information Technology & MIS at Calcutta Business School. He was a Visiting Scholar at George Mason University, Virginia, the US, during June-July Prof. Mukhopadhyay is a Distinguished Adjunct Professor at Curtin University, Perth, Australia. He holds Adjunct Professorship at Monarch Business School, Switzerland, the College of Engineering in Pune, India and Thapar University, Patiala, India. He has worked as a full Professor of Computer Science & Engineering at the West Bengal University of Technology affiliated Engineering Colleges during He was a Visiting Professor at Chonbuk National University in the Republic of Korea in 2006 and He also taught at Stevens Institute of Technology, New Jersey, US from 1982 to 1984 and at Bengal Engineering & Science University ( ). He worked as a Research Fellow at Indian Statistical Institute, Calcutta ( ). During and in 1999, he was in the USA. He had worked at Bell Communications Research, USA in its Computing Systems and Architecture Lab ( ). He has published nearly 150 research articles in international journals, conference proceedings and as research report. Prof. Mukhopadhyay holds a B.E. in Electronics from the University of Calcutta, a D.C.S. (Computer Science & Applications) from The Queen's University of Belfast, the UK, an M.S. in Computer Science from Stevens Institute of Technology in the US, and a Ph.D. in Engineering in Computer Science from Jadavpur University in India. Prof. Mukhopadhyay is a SMIEEE (USA), SMACM (USA), FIE (India), FIETE (India), C.Engg., SMCSI, MIMA, and Elected Member of Eta Kappa Nu. Nagesh Jadhav rceived a B.E. degree in Information Technology from the Bharati Vidyapeeth Deemed University in 2005, and completed his Master s Degree in IT from the University of Pune. He worked on his ME research project under the guidance of Prof. Debajyoti Mukhopadhyay at MITCERI. He has been an Assistant Professor at the MIT College of Engineering since His current research interests include web services, artificial intelligence, and network security. Falguni Chathly received a BE degree in Information Technology from Gujarat University in 2010, and received her Master s Degree in IT from the University of Pune. She worked on her ME research project under the guidance of Prof. Debajyoti Mukhopadhyay at MITCERI. Her current research interests include web computing and business process modeling. Copyrights 2015 KAIS
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
More informationIntroduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
More informationA Case Study of Question Answering in Automatic Tourism Service Packaging
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0045 A Case Study of Question
More informationService Oriented Architecture
Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline
More informationSecure Semantic Web Service Using SAML
Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA
More informationNS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE July, 2015 Version 4.0 TABLE OF CONTENTS 1 General Information... 4 1.1 Objective... 4 1.2 New 4.0 Features Improvements... 4 1.3 Migrating from 3.x to 4.x... 5 2
More informationCourse Syllabus For Operations Management. Management Information Systems
For Operations Management and Management Information Systems Department School Year First Year First Year First Year Second year Second year Second year Third year Third year Third year Third year Third
More informationCloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad
Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer
More informationOrchestrating Document and Media Management using CMIS
Orchestrating Document and Media Management using CMIS Technical Note - Integrating ActiveVOS with Alfresco CMIS Services AN ACTIVE ENDPOINTS TECHNICAL NOTE 2009 Active Endpoints Inc. ActiveVOS is a trademark
More informationA Business Process Driven Approach for Generating Software Modules
A Business Process Driven Approach for Generating Software Modules Xulin Zhao, Ying Zou Dept. of Electrical and Computer Engineering, Queen s University, Kingston, ON, Canada SUMMARY Business processes
More informationOracle Service Bus Examples and Tutorials
March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan
More informationWhite Paper. How Streaming Data Analytics Enables Real-Time Decisions
White Paper How Streaming Data Analytics Enables Real-Time Decisions Contents Introduction... 1 What Is Streaming Analytics?... 1 How Does SAS Event Stream Processing Work?... 2 Overview...2 Event Stream
More informationUnderstanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
More informationPortal Factory 1.0 - CMIS Connector Module documentation
DOCUMENTATION Portal Factory 1.0 - CMIS Connector Module documentation Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
More informationThe Service Revolution software engineering without programming languages
The Service Revolution software engineering without programming languages Gustavo Alonso Institute for Pervasive Computing Department of Computer Science Swiss Federal Institute of Technology (ETH Zurich)
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationTool-Assisted Knowledge to HL7 v3 Message Translation (TAMMP) Installation Guide December 23, 2009
Tool-Assisted Knowledge to HL7 v3 Message Translation (TAMMP) Installation Guide December 23, 2009 Richard Lyn lynrf@mcmaster.ca Jianwei Yang yangj29@mcmaster.ca Document Revision History Rev. Level Date
More informationAutomatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
More informationWHITEPAPER. Managing Design Changes in Enterprise SBM Installations
WHITEPAPER Managing Design Changes in Enterprise SBM Installations By Tom Clement Serena Software, Inc. October 2013 Summary This document explains how to organize your SBM maintenance and development
More informationLog Mining Based on Hadoop s Map and Reduce Technique
Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, anujapandit25@gmail.com Amruta Deshpande Department of Computer Science, amrutadeshpande1991@gmail.com
More informationMobile App Discovery through Conceptual Models
Mobile App Discovery through Conceptual Models Jasmin Brakmic, BSc Supervisor: Prof. Dr. Dimitris Karagiannis Research Group Knowledge Engineering University of Vienna, 24.01.2013 Agenda 1. Motivation
More informationGetting Started with Service- Oriented Architecture (SOA) Terminology
Getting Started with - Oriented Architecture (SOA) Terminology Grace Lewis September 2010 -Oriented Architecture (SOA) is a way of designing, developing, deploying, and managing systems it is neither a
More informationMULTI AGENT-BASED DISTRIBUTED DATA MINING
MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:
More informationSo today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we
More informationHow To Develop Software
Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which
More informationMobile Storage and Search Engine of Information Oriented to Food Cloud
Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:
More informationEnterprise Architecture Modeling PowerDesigner 16.1
Enterprise Architecture Modeling PowerDesigner 16.1 Windows DOCUMENT ID: DC00816-01-1610-01 LAST REVISED: November 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains to
More informationReusability of WSDL Services in Web Applications
599 Reusability of WSDL Services in Web Applications 1 Jaspreet Singh, 2 Sandeep Saini 1 Assistant Professor Department Of Computer Science & Engineering, Chandigarh University Gharuan, Punjab, India 2
More informationSustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,
More informationAssociate Professor, Department of CSE, Shri Vishnu Engineering College for Women, Andhra Pradesh, India 2
Volume 6, Issue 3, March 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue
More informationSecure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
More informationSAP Business Intelligence Suite Patch 10.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.0 Support Package 10-2014-07-25 SAP Business Intelligence Suite Patch 10.x Update Guide Table of Contents 1 Introduction.... 3 1.1 About
More informationCombining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery
Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University
More informationEMC Documentum Connector for Microsoft SharePoint
EMC Documentum Connector for Microsoft SharePoint Version 7.1 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2013-2014
More informationAutomating Rich Internet Application Development for Enterprise Web 2.0 and SOA
Automating Rich Internet Application Development for Enterprise Web 2.0 and SOA Enterprise Web 2.0 >>> FAST White Paper November 2006 Abstract Modern Rich Internet Applications for SOA have to cope with
More informationService-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
More informationIBM Operational Decision Manager Version 8 Release 5. Getting Started with Business Rules
IBM Operational Decision Manager Version 8 Release 5 Getting Started with Business Rules Note Before using this information and the product it supports, read the information in Notices on page 43. This
More informationWebSphere Business Modeler
Discovering the Value of SOA WebSphere Process Integration WebSphere Business Modeler Workshop SOA on your terms and our expertise Soudabeh Javadi Consulting Technical Sales Support WebSphere Process Integration
More informationDynamic Decision-Making Web Services Using SAS Stored Processes and SAS Business Rules Manager
Paper SAS1787-2015 Dynamic Decision-Making Web Services Using SAS Stored Processes and SAS Business Rules Manager Chris Upton and Lori Small, SAS Institute Inc. ABSTRACT With the latest release of SAS
More informationA Monitored Student Testing Application Using Cloud Computing
A Monitored Student Testing Application Using Cloud Computing R. Mullapudi and G. Hsieh Department of Computer Science, Norfolk State University, Norfolk, Virginia, USA r.mullapudi@spartans.nsu.edu, ghsieh@nsu.edu
More informationCoveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
More informationSAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07 Table of Contents 1 Document History....3 2 Introduction....4 2.1 About this Document....4 2.1.1 Constraints....4
More informationOntology and automatic code generation on modeling and simulation
Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria youcef.gheraibia@gmail.com Abdelhabib Bourouis
More informationSearch Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
More informationIntelligent Shopping Agent
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Intelligent Shopping Agent Sameer Shanbhag 1*, Sujith Nair 2 and Nikhil Nair3 1*,2,3
More informationNovell ZENworks Asset Management 7.5
Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...
More informationStatic Analysis and Validation of Composite Behaviors in Composable Behavior Technology
Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 jackie.z.zhang@saic.com,
More informationWebSphere Business Monitor
WebSphere Business Monitor Dashboards 2010 IBM Corporation This presentation should provide an overview of the dashboard widgets for use with WebSphere Business Monitor. WBPM_Monitor_Dashboards.ppt Page
More informationSemantic Transformation of Web Services
Semantic Transformation of Web Services David Bell, Sergio de Cesare, and Mark Lycett Brunel University, Uxbridge, Middlesex UB8 3PH, United Kingdom {david.bell, sergio.decesare, mark.lycett}@brunel.ac.uk
More informationAutomating Service Negotiation Process for Service Architecture on the cloud by using Semantic Methodology
Automating Process for Architecture on the cloud by using Semantic Methodology Bhavana Jayant.Adgaonkar Department of Information Technology Amarutvahini College of Engineering Sangamner, India adgaonkarbhavana@yahoo.in
More informationQuick start. A project with SpagoBI 3.x
Quick start. A project with SpagoBI 3.x Summary: 1 SPAGOBI...2 2 SOFTWARE DOWNLOAD...4 3 SOFTWARE INSTALLATION AND CONFIGURATION...5 3.1 Installing SpagoBI Server...5 3.2Installing SpagoBI Studio and Meta...6
More informationSharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
More informationProject management integrated into Outlook
Project management integrated into Outlook InLoox PM 7.x off-line operation An InLoox Whitepaper Published: October 2011 Copyright: 2011 InLoox GmbH. You can find up-to-date information at http://www.inloox.com
More informationUltimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com
More informationWHITE PAPER. iet ITSM Enables Enhanced Service Management
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
More informationBitrix Site Manager 4.1. User Guide
Bitrix Site Manager 4.1 User Guide 2 Contents REGISTRATION AND AUTHORISATION...3 SITE SECTIONS...5 Creating a section...6 Changing the section properties...8 SITE PAGES...9 Creating a page...10 Editing
More informationPersonalization of Web Search With Protected Privacy
Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information
More informationOracle Data Miner (Extension of SQL Developer 4.0)
An Oracle White Paper October 2013 Oracle Data Miner (Extension of SQL Developer 4.0) Generate a PL/SQL script for workflow deployment Denny Wong Oracle Data Mining Technologies 10 Van de Graff Drive Burlington,
More informationBig Data with Rough Set Using Map- Reduce
Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,
More informationRotorcraft Health Management System (RHMS)
AIAC-11 Eleventh Australian International Aerospace Congress Rotorcraft Health Management System (RHMS) Robab Safa-Bakhsh 1, Dmitry Cherkassky 2 1 The Boeing Company, Phantom Works Philadelphia Center
More informationA Quality of Service Broker Based Process Model for Dynamic Web Service Composition
Journal of Computer Science 7 (8): 1267-1274, 2011 ISSN 1549-3636 2011 Science Publications A Quality of Service Broker Based Process Model for Dynamic Web Service Composition 1 Maya Rathore and 2 Ugrasen
More informationEnterprise Service Bus
We tested: Talend ESB 5.2.1 Enterprise Service Bus Dr. Götz Güttich Talend Enterprise Service Bus 5.2.1 is an open source, modular solution that allows enterprises to integrate existing or new applications
More informationAuthoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
More informationE-mail Listeners. E-mail Formats. Free Form. Formatted
E-mail Listeners 6 E-mail Formats You use the E-mail Listeners application to receive and process Service Requests and other types of tickets through e-mail in the form of e-mail messages. Using E- mail
More informationInstallation Guidelines (MySQL database & Archivists Toolkit client)
Installation Guidelines (MySQL database & Archivists Toolkit client) Understanding the Toolkit Architecture The Archivists Toolkit requires both a client and database to function. The client is installed
More informationEnhancing A Software Testing Tool to Validate the Web Services
Enhancing A Software Testing Tool to Validate the Web Services Tanuj Wala 1, Aman Kumar Sharma 2 1 Research Scholar, Department of Computer Science, Himachal Pradesh University Shimla, India 2 Associate
More informationOntological Identification of Patterns for Choreographing Business Workflow
University of Aizu, Graduation Thesis. March, 2010 s1140042 1 Ontological Identification of Patterns for Choreographing Business Workflow Seiji Ota s1140042 Supervised by Incheon Paik Abstract Business
More informationWeb Services Software Architecture
Web Services Software Architecture Syahrul Fahmy School of Informatics, The University of Manchester, PO Box 88, Manchester M60 1QD, United Kingdom S.Abdul-wahab@postgrad.manchester.ac.uk Abstract. Web
More informationA Framework of Model-Driven Web Application Testing
A Framework of Model-Driven Web Application Testing Nuo Li, Qin-qin Ma, Ji Wu, Mao-zhong Jin, Chao Liu Software Engineering Institute, School of Computer Science and Engineering, Beihang University, China
More informationMonitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
More informationContent Management Implementation Guide 5.3 SP1
SDL Tridion R5 Content Management Implementation Guide 5.3 SP1 Read this document to implement and learn about the following Content Manager features: Publications Blueprint Publication structure Users
More informationEVALUATION. WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration COPY. Developer
WA1844 WebSphere Process Server 7.0 Programming Using WebSphere Integration Developer Web Age Solutions Inc. USA: 1-877-517-6540 Canada: 1-866-206-4644 Web: http://www.webagesolutions.com Chapter 6 - Introduction
More informationMODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS
MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson
More informationA Framework of User-Driven Data Analytics in the Cloud for Course Management
A Framework of User-Driven Data Analytics in the Cloud for Course Management Jie ZHANG 1, William Chandra TJHI 2, Bu Sung LEE 1, Kee Khoon LEE 2, Julita VASSILEVA 3 & Chee Kit LOOI 4 1 School of Computer
More informationVerifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis
Verifying Business Processes Extracted from E-Commerce Systems Using Dynamic Analysis Derek Foo 1, Jin Guo 2 and Ying Zou 1 Department of Electrical and Computer Engineering 1 School of Computing 2 Queen
More informationWEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation biswajit.biswal@oracle.com ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
More informationEMC Documentum Composer
EMC Documentum Composer Version 6.5 User Guide P/N 300 007 217 A02 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 2008 EMC Corporation. All rights
More informationWeb Advertising Personalization using Web Content Mining and Web Usage Mining Combination
8 Web Advertising Personalization using Web Content Mining and Web Usage Mining Combination Ketul B. Patel 1, Dr. A.R. Patel 2, Natvar S. Patel 3 1 Research Scholar, Hemchandracharya North Gujarat University,
More informationIMPLEMENTING PREDICTIVE ANALYTICS USING HADOOP FOR DOCUMENT CLASSIFICATION ON CRM SYSTEM
IMPLEMENTING PREDICTIVE ANALYTICS USING HADOOP FOR DOCUMENT CLASSIFICATION ON CRM SYSTEM Sugandha Agarwal 1, Pragya Jain 2 1,2 Department of Computer Science & Engineering ASET, Amity University, Noida,
More informationNNMi120 Network Node Manager i Software 9.x Essentials
NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,
More informationOracle BPA Suite: Model and Implement Business Processes Volume I Student Guide
Oracle BPA Suite: Model and Implement Business Processes Volume I Student Guide D70464GC10 Edition 1.0 September 2008 D56390 Author Viktor Tchemodanov Technical Contributors and Reviewers Madhavi Buchi
More informationScalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens
Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many
More informationSitecore InDesign Connector 1.1
Sitecore Adaptive Print Studio Sitecore InDesign Connector 1.1 - User Manual, October 2, 2012 Sitecore InDesign Connector 1.1 User Manual Creating InDesign Documents with Sitecore CMS User Manual Page
More informationModel Driven Interoperability through Semantic Annotations using SoaML and ODM
Model Driven Interoperability through Semantic Annotations using SoaML and ODM JiuCheng Xu*, ZhaoYang Bai*, Arne J.Berre*, Odd Christer Brovig** *SINTEF, Pb. 124 Blindern, NO-0314 Oslo, Norway (e-mail:
More informationGovernment's Adoption of SOA and SOA Examples
Government's Adoption of SOA and SOA Examples Presented by : Ajay Budhraja, Chief of Enterprise Services ME (Engg), MS (Management), PMP, CICM, CSM, ECM (Master) AIIM, ITIL-F Copyright 2008 Ajay Budhraja
More informationSAS Business Data Network 3.1
SAS Business Data Network 3.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Business Data Network 3.1: User's Guide. Cary,
More informationSmartLink: a Web-based editor and search environment for Linked Services
SmartLink: a Web-based editor and search environment for Linked Services Stefan Dietze, Hong Qing Yu, Carlos Pedrinaci, Dong Liu, John Domingue Knowledge Media Institute, The Open University, MK7 6AA,
More informationEmerging Technologies Shaping the Future of Data Warehouses & Business Intelligence
Emerging Technologies Shaping the Future of Data Warehouses & Business Intelligence Service Oriented Architecture SOA and Web Services John O Brien President and Executive Architect Zukeran Technologies
More informationMonitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
More informationSiebel Application Deployment Manager Guide. Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013
Siebel Application Deployment Manager Guide Siebel Innovation Pack 2013 Version 8.1/8.2 September 2013 Copyright 2005, 2013 Oracle and/or its affiliates. All rights reserved. This software and related
More informationI. INTRODUCTION NOESIS ONTOLOGIES SEMANTICS AND ANNOTATION
Noesis: A Semantic Search Engine and Resource Aggregator for Atmospheric Science Sunil Movva, Rahul Ramachandran, Xiang Li, Phani Cherukuri, Sara Graves Information Technology and Systems Center University
More informationA UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More informationService-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
More informationA Cloud Test Bed for China Railway Enterprise Data Center
A Cloud Test Bed for China Railway Enterprise Data Center BACKGROUND China Railway consists of eighteen regional bureaus, geographically distributed across China, with each regional bureau having their
More informationHP Systinet. Software Version: 10.01 Windows and Linux Operating Systems. Concepts Guide
HP Systinet Software Version: 10.01 Windows and Linux Operating Systems Concepts Guide Document Release Date: June 2015 Software Release Date: June 2015 Legal Notices Warranty The only warranties for HP
More informationIMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
More informationUSAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT
TOTAL LOGISTIC MANAGEMENT No. 2 2009 PP. 5 13 Bartłomiej GAWEŁ, Anna PILCH USAGE OF BUSINESS RULES IN SUPPLY CHAIN MANAGEMENT Abstract: The growth of efficiency in supply chain management depends on the
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationSecure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
More informationReverse Engineering in Data Integration Software
Database Systems Journal vol. IV, no. 1/2013 11 Reverse Engineering in Data Integration Software Vlad DIACONITA The Bucharest Academy of Economic Studies diaconita.vlad@ie.ase.ro Integrated applications
More information