Cloud computing enables the automated creation of business applications from independently develo... more Cloud computing enables the automated creation of business applications from independently developed and deployed services. Mechanisms are thus needed to select service components that meet or exceed the functional and non-functional requirements of such applications. The primary objective of service selection in the Cloud could be viewed as the maximization of an application-specific utility function that matches the constraints of the service requester against the capabilities and offerings of the service provider(s). In this paper, we propose such an approach that computes the match between service requests and offerings, based on their functional and non-functional properties in an efficient manner (in terms of space and time complexity). The proposed technique incorporates behavior monitoring of potential matches to ensure enhanced application-specific utility. We compare our approach with similar existing approaches to show its applicability and performance.
Abstract Automated negotiation among Web services not only provides an effective way for the serv... more Abstract Automated negotiation among Web services not only provides an effective way for the services to bargain for their optimal customizations, but also allows the discovery of overlooked potential solutions. A number of negotiation supporting techniques have been ...
International journal of next-generation computing, Jul 1, 2012
Service Oriented Architectures (SOAs) enable the automatic creation of business applications from... more Service Oriented Architectures (SOAs) enable the automatic creation of business applications from independently developed and deployed services. Mechanisms are thus needed to select these service components that meet or exceed the functional and non-functional requirements of SOAs. The primary objective of service selection in SOAs can be viewed as a maximization of an application-specic utility function that matches the constraints of the service requester against the capabilities and oerings of the service provider(s). In this paper, we propose such an approach that computes the match between service requests and oerings, based on their functional and non-functional properties in an ecient manner (in terms of space and time). The proposed technique incorporates behavior monitoring of potential matches to ensure enhanced application-specic utility. We compare our approach with similar existing approaches to its show applicability and performance.
Business process automation using software as a service is well accepted software deployment and ... more Business process automation using software as a service is well accepted software deployment and distribution model that is grown exponentially in the last few years. SaaS can provide solutions that are suitable for both one off as well as long running systems. Multiple component services are combined to formulate a composite solution. This modular nature of the systems allows the flexibility to replace faulty services or introduce better performing components into the initial solution. On the other hand it makes it easier to deal with situations where a long running system may need to deal with a service which is no longer available or has a competitor which offers similar to better service as a much more attractive package. To fully utilize this nature of the software we need to understand the structure of the system. In this paper we present a bat algorithm based solution for different Quality of Service parameters of a component service considering the different invocation patterns of these component services in the system for optimum values of the QoS parameters. We evaluate the efficiency of our proposed technique on WSDream-QoSDataset [20] and show its effectiveness.
Service-Oriented Architectures (SOA) enable the automatic creation of business applications from ... more Service-Oriented Architectures (SOA) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown, how to deliver reliable Web services compositions is a significant and challenging problem. Services involved in an SOA often do not operate under a single processing environment and need to communicate using different protocols over a network. Under such conditions, designing a fault management system that is both efficient and extensible is a challenging task. In this article, we propose SFSS, a self-healing framework for SOA fault management. SFSS is predicting, identifying, and solving faults in SOAs. In SFSS, we identified a set of high-level exception handling strategies based on the QoS performances of different component services and the preferences articled by the service consumers. Multiple recovery plans are generated and evaluated according to the performance of the selected component services, and then we execute the best recovery plan. We assess the overall user dependence (i.e., the service is independent of other services) using the generated plan and the available invocation information of the component services. Due to the experiment results, the given technique enhances the service selection quality by choosing the services that have the highest score and betters the overall system performance. The experiment results indicate the applicability of SFSS and show improved performance in comparison to similar approaches.
Data mining classification methods can be a powerful tool when it comes to learning card game rul... more Data mining classification methods can be a powerful tool when it comes to learning card game rules such as Poker. There are millions of possible combination in the game and making a decision tree to cover all the rules is not desirable. We used the J48 decision tree model of data mining software Weka and made parameter analysis. Then we show experimentally how the number of instances is affecting the correctness of the classification, and propose an equation to determine accuracy based on the number of instances in a data set. We examine several different attributes and the experiment shows high performance.
Service Oriented Architectures (SOAs) enable the automatic creation of business applications from... more Service Oriented Architectures (SOAs) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown (in terms of dependability), how to deliver reliable Web services compositions is a significant and challenging problem. In this paper, we propose a framework for infusing dependability in SOAs through self-healing. We identify a set of high-level exception handling strategies based on the composition components' QoS performances and consumer requirements. Multiple recovery plans are produced and evaluated according to the performance of the included services, to select and execute the best recovery plan. We assess the overall system dependability using the generated plan and the available invocation information of the included services. Experiment results indicate the applicability of our method, and show the improved performance in comparison with similar existing approaches.
The Dataset contains 150 Web services distributed in computer nodes located all over the world (i... more The Dataset contains 150 Web services distributed in computer nodes located all over the world (i.e., distributed in 22 different countries), where each Web service is invoked 100 times by a service user. Planet-Lab is employed for monitoring Web<br> services. The service users observe, collect, and contribute the failure data of the selected Web services to our server, which is implemented in C# using Asp.Net running on Microsoft.Net version 3.5 and SQL as the back-end database.
2018 8th International Conference on Computer Science and Information Technology (CSIT), 2018
Web design and development and Website management are two fields that are classified within compu... more Web design and development and Website management are two fields that are classified within computer science in the educational datasets. There are several datasets that provide aggregate data about higher education institutions. However, the IPEDS dataset provides data not only about the institution, but also the finance, programs, staffing, enrollment and graduates. The numbers of graduates have been growing from 2010 through 2014. This paper looks at institutional characteristics, which may impact institutions offering Web programs or having a larger program.
2017 8th International Conference on Information Technology (ICIT), 2017
The development of educational policies that improve educational systems needs intelligent automa... more The development of educational policies that improve educational systems needs intelligent automated tools for decision making. This need has motivated the development of a new system which can help teachers, schools, and decision makers in enhancing students' performance. The primary concern here is to monitor the students and help the teachers in building action plans that improve students' performance and solve their problems. In this paper, we propose a novel system using collaborative filtering based technology with students' medical history, economic situation, and the concept of ‘neighbors’ in order to solve the students' performance related problems. The system combines collaborative filtering with clustering techniques to predict students' root factors (or causes) that may affect their future performance. We present experimental results from a large dataset that includes more than 10,000 students from 250 different schools. We deployed the new system for a period of 6 months and compared the results with the traditional approach. The system showed improvements in teachers' performance which reflected positively on students' performance.
2020 International Conference on Computational Science and Computational Intelligence (CSCI), 2020
Data mining classification methods can be a powerful tool when it comes to learning card game rul... more Data mining classification methods can be a powerful tool when it comes to learning card game rules such as Poker. There are millions of possible combination in the game and making a decision tree to cover all the rules is not desirable. We used the J48 decision tree model of data mining software Weka and made parameter analysis. Then we show experimentally how the number of instances is affecting the correctness of the classification, and propose an equation to determine accuracy based on the number of instances in a data set. We examine several different attributes and the experiment shows high performance.
Cloud computing enables the automated creation of business applications from independently develo... more Cloud computing enables the automated creation of business applications from independently developed and deployed services. Mechanisms are thus needed to select service components that meet or exceed the functional and non-functional requirements of such applications. The primary objective of service selection in the Cloud could be viewed as the maximization of an application-specific utility function that matches the constraints of the service requester against the capabilities and offerings of the service provider(s). In this paper, we propose such an approach that computes the match between service requests and offerings, based on their functional and non-functional properties in an efficient manner (in terms of space and time complexity). The proposed technique incorporates behavior monitoring of potential matches to ensure enhanced application-specific utility. We compare our approach with similar existing approaches to show its applicability and performance.
Abstract Automated negotiation among Web services not only provides an effective way for the serv... more Abstract Automated negotiation among Web services not only provides an effective way for the services to bargain for their optimal customizations, but also allows the discovery of overlooked potential solutions. A number of negotiation supporting techniques have been ...
International journal of next-generation computing, Jul 1, 2012
Service Oriented Architectures (SOAs) enable the automatic creation of business applications from... more Service Oriented Architectures (SOAs) enable the automatic creation of business applications from independently developed and deployed services. Mechanisms are thus needed to select these service components that meet or exceed the functional and non-functional requirements of SOAs. The primary objective of service selection in SOAs can be viewed as a maximization of an application-specic utility function that matches the constraints of the service requester against the capabilities and oerings of the service provider(s). In this paper, we propose such an approach that computes the match between service requests and oerings, based on their functional and non-functional properties in an ecient manner (in terms of space and time). The proposed technique incorporates behavior monitoring of potential matches to ensure enhanced application-specic utility. We compare our approach with similar existing approaches to its show applicability and performance.
Business process automation using software as a service is well accepted software deployment and ... more Business process automation using software as a service is well accepted software deployment and distribution model that is grown exponentially in the last few years. SaaS can provide solutions that are suitable for both one off as well as long running systems. Multiple component services are combined to formulate a composite solution. This modular nature of the systems allows the flexibility to replace faulty services or introduce better performing components into the initial solution. On the other hand it makes it easier to deal with situations where a long running system may need to deal with a service which is no longer available or has a competitor which offers similar to better service as a much more attractive package. To fully utilize this nature of the software we need to understand the structure of the system. In this paper we present a bat algorithm based solution for different Quality of Service parameters of a component service considering the different invocation patterns of these component services in the system for optimum values of the QoS parameters. We evaluate the efficiency of our proposed technique on WSDream-QoSDataset [20] and show its effectiveness.
Service-Oriented Architectures (SOA) enable the automatic creation of business applications from ... more Service-Oriented Architectures (SOA) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown, how to deliver reliable Web services compositions is a significant and challenging problem. Services involved in an SOA often do not operate under a single processing environment and need to communicate using different protocols over a network. Under such conditions, designing a fault management system that is both efficient and extensible is a challenging task. In this article, we propose SFSS, a self-healing framework for SOA fault management. SFSS is predicting, identifying, and solving faults in SOAs. In SFSS, we identified a set of high-level exception handling strategies based on the QoS performances of different component services and the preferences articled by the service consumers. Multiple recovery plans are generated and evaluated according to the performance of the selected component services, and then we execute the best recovery plan. We assess the overall user dependence (i.e., the service is independent of other services) using the generated plan and the available invocation information of the component services. Due to the experiment results, the given technique enhances the service selection quality by choosing the services that have the highest score and betters the overall system performance. The experiment results indicate the applicability of SFSS and show improved performance in comparison to similar approaches.
Data mining classification methods can be a powerful tool when it comes to learning card game rul... more Data mining classification methods can be a powerful tool when it comes to learning card game rules such as Poker. There are millions of possible combination in the game and making a decision tree to cover all the rules is not desirable. We used the J48 decision tree model of data mining software Weka and made parameter analysis. Then we show experimentally how the number of instances is affecting the correctness of the classification, and propose an equation to determine accuracy based on the number of instances in a data set. We examine several different attributes and the experiment shows high performance.
Service Oriented Architectures (SOAs) enable the automatic creation of business applications from... more Service Oriented Architectures (SOAs) enable the automatic creation of business applications from independently developed and deployed Web services. As Web services are inherently a priori unknown (in terms of dependability), how to deliver reliable Web services compositions is a significant and challenging problem. In this paper, we propose a framework for infusing dependability in SOAs through self-healing. We identify a set of high-level exception handling strategies based on the composition components' QoS performances and consumer requirements. Multiple recovery plans are produced and evaluated according to the performance of the included services, to select and execute the best recovery plan. We assess the overall system dependability using the generated plan and the available invocation information of the included services. Experiment results indicate the applicability of our method, and show the improved performance in comparison with similar existing approaches.
The Dataset contains 150 Web services distributed in computer nodes located all over the world (i... more The Dataset contains 150 Web services distributed in computer nodes located all over the world (i.e., distributed in 22 different countries), where each Web service is invoked 100 times by a service user. Planet-Lab is employed for monitoring Web<br> services. The service users observe, collect, and contribute the failure data of the selected Web services to our server, which is implemented in C# using Asp.Net running on Microsoft.Net version 3.5 and SQL as the back-end database.
2018 8th International Conference on Computer Science and Information Technology (CSIT), 2018
Web design and development and Website management are two fields that are classified within compu... more Web design and development and Website management are two fields that are classified within computer science in the educational datasets. There are several datasets that provide aggregate data about higher education institutions. However, the IPEDS dataset provides data not only about the institution, but also the finance, programs, staffing, enrollment and graduates. The numbers of graduates have been growing from 2010 through 2014. This paper looks at institutional characteristics, which may impact institutions offering Web programs or having a larger program.
2017 8th International Conference on Information Technology (ICIT), 2017
The development of educational policies that improve educational systems needs intelligent automa... more The development of educational policies that improve educational systems needs intelligent automated tools for decision making. This need has motivated the development of a new system which can help teachers, schools, and decision makers in enhancing students' performance. The primary concern here is to monitor the students and help the teachers in building action plans that improve students' performance and solve their problems. In this paper, we propose a novel system using collaborative filtering based technology with students' medical history, economic situation, and the concept of ‘neighbors’ in order to solve the students' performance related problems. The system combines collaborative filtering with clustering techniques to predict students' root factors (or causes) that may affect their future performance. We present experimental results from a large dataset that includes more than 10,000 students from 250 different schools. We deployed the new system for a period of 6 months and compared the results with the traditional approach. The system showed improvements in teachers' performance which reflected positively on students' performance.
2020 International Conference on Computational Science and Computational Intelligence (CSCI), 2020
Data mining classification methods can be a powerful tool when it comes to learning card game rul... more Data mining classification methods can be a powerful tool when it comes to learning card game rules such as Poker. There are millions of possible combination in the game and making a decision tree to cover all the rules is not desirable. We used the J48 decision tree model of data mining software Weka and made parameter analysis. Then we show experimentally how the number of instances is affecting the correctness of the classification, and propose an equation to determine accuracy based on the number of instances in a data set. We examine several different attributes and the experiment shows high performance.
The subject of this presentation is the EU’s cyber security policy. Cyber security gets more impo... more The subject of this presentation is the EU’s cyber security policy. Cyber security gets more important with advancements in information and communications technology. The thesis starts with the traditional definition of security and gives a comprehensive explanation of cyber security. The conceptual framework of this thesis is securitization, a concept developed by the Copenhagen School, especially by Ole Wæver and Barry Buzan. In this study, phishing, malware, botnets, denial of service and social engineering attacks are discussed as cases of the types of cyber attacks. In addition, cyber attacks of APT (Advanced Persistent Threat) are examined. Cyber-attacks on the German parliament, Estonia and TV5 Monde are examined as examples of cyber attacks that affected the European Union. “Cybersecurity Strategy of the European Union” is the basis of the EU's cyber security policy. This thesis throughly examines the major goals and policies/actions that this strategy outlines. In this context, “cyber security objectives of the EU”, its “strategic priorities and actions”, and its “roles and responsibilities” are analyzed in detail. The major argument of this presentation that the EU can only have an effective cyber security policy through a comprehensive approach which involves cooperation with the academia, member states and the private sector (NGOs and multinational companies).
Uploads
Papers by Amal Alhosban