SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1663
www.ijarcet.org
Abstract—The Main area in Web service is the Web
service composition which detects the composition
before execution. Petri net or Place / Transition net is a
mathematical modeling language used to describe the
distributed systems. Deadlock can be detected through
transitive matrix of Petri nets .This paper proposes a
Web service model for students’ online registration and
detects the deadlocks for various applications using
Petri net transitive matrix. Simulation results indicate a
better identification of deadlock.
Keywords — Web Service, Petri Net, Transitive Matrix,
Deadlock Detection.
I. INTRODUCTION
The World Wide Web infrastructure is extended
using Web services which provide the means for
software to connect to other software applications.
Using ubiquitous Web protocols and data formats
such as HTTP,XML, SOAP every application is
allowed to access the Web services which bout the
knowledge about the Web service .Higher level
business processes are created using Web service
composition which provides an open standard based
approach. Complexity to compose Web service is
reduced to a greater level using open standards. This
reduces time and cost and increases overall efficiency
business models. Web service is a technology based
on SOAP (Simple Object Access Protocol), WSDL
(Web Service Description Language), UDDI
(Universal Description, Discovery and Integration)
and HTTP (Hyper Text Transfer Protocol). Web
service is an important part of the SOA architecture
where the applications can be executed for isomeric
environment. Limited functionalities are provided by
a single Web service. In order to provide a concrete
complex service request several Web service are
combined together. Web service composition is not
reliable because it comes from different companies
and from different platform .so the key verification
before any process is to verify the correctness of
service composition as specified in [1]–[3].
Service profile, service model and
service grounding are the three parts of OWL-S
representation. Web service composition based on
service model not only considers the input and
output, but also includes the execution sequence of
the behavior process. In [4] proposed a model which
detects the deadlock of Web service composition
based on behavior which deals with two functional
module, function analyzer and behavior analyzer.
Web service composition model based on the color
Petri net proposed by [5] describes the operation of
Web service which characterizes control flow and
data flow. Paper [6] uses transitive matrix of Petri
nets as a detection tool to identify deadlock. Various
direct composition methods have been proposed,
including planning based [7], logical inference driven
[8], Petri net based [9], [10], automata based [11],
quality-of-service (QoS) optimizing based [12], etc.
These methods [7]–[12] assume both data formats
and sequences of the messages are consistent. In
order to reduce space in matrix, compression
technique has also been used. Two important
A Verification Method Based On Petri Net for
Online Student Registration Web Service
Composition
A.Kumaravel, Professor and Dean, M.Merlin Mexa, PG Student, Department of Computer
Science and Engineering.
Bharath University, Selaiyur, Chennai-600073, India
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1664
www.ijarcet.org
compression concepts are lossy and lossless
compression:
 Lossy compression With lossy
compression, it is assumed that some loss of
information is acceptable. Loss is also
acceptable in voice and audio compression,
depending on the desired quality.
 Lossless compression With lossless
compression, data is compressed without
any loss of data. It assumes you want to get
everything back that you put in. Critical
financial data files are examples where
lossless compression is required.
This paper proposes an online student
registration of Web service composition and
verification method. This paper achieves detection of
deadlock using transitive matrix of petrinet.
Efficiency is achieved by compressing and
decompressing the transitive matrix. Finally
examples are shown how effectively the deadlock is
detected and solved for Web service composition. In
section 1 a brief introduction about Web service
composition is explained and in section 2 Definitions
of Petri net and the transitive matrix is explained
followed by the detailed explanation about the
proposed work and its experimental process is given
in section 3. In section 4 verification of Web service
composition is explained. Conclusion and the future
work is specified in section 5.
II. BACKROUND
Definition I: (Petri net) [13-15] A Petri net is a 5-
tuple PN =< P,T, A,W,M0 > where:
1) P= { p1,p2…. ,pm }is a finite set of places,
2) T= {t1,t2,…tn,}is a finite set of transitions,
3)A ⊆ (P×T)∪(T × P) is the set of arcs (flow
relation),
4 W : A→{1,2,3,…} is a weight function,
5) M : P→{0,1,2,3,…} is the initial marking, P∩T =
Ф and T ∩P = Ф.
Definition II: (transitive matrix) [14] Let B-
and B+
be an input function matrices and output function
matrix of m rows by n columns in Petri nets,
respectively. The place and transition transitive
matrix are as follows:
MPR = B-
(B+
)T
: place transitive matrix
MT = (B+
)T
B-
: transition transitive matrix
Table I: shows the transition of token between places
before and after firing.
Definition III: Let a reachable marking MR(K +1)
from M(K) be an m-vector of nonnegative integer.
The transformation defined by MR (K+1)T
= M(K)T
MPR
Its show a flow relation of M(K) to MR(K +1) based
on the token in) Pi (k). Also, we can find that if
is integer (or not), then let = 1(or
0). This means the token in Pi(K) can (or can’t)
be transferred from M(K) to MR(K +1) . Since
M R(K +1) only represents the flow relation of tokens,
M R(K +1) may not necessarily correspond to
M(K +1) . Henceforth, we consider a limit to the
number of tokens that │Pi(K)│is equal to 1 or 0.
Definition IV: Weighted Place Transitive Matrix
MPR. Let MPR be the m×m weighted place transitive
matrix. If a transition t
k appears s times in the same
column of MPR, then we will replace t
k by t
k/s in MPR.
Table II (Example): Consider a simple net as follows:
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1665
www.ijarcet.org
Table II gives a few marking place transitive
matrixes MPR corresponding to simple Petri nets. It is
proved that Petri nets and their corresponding
marking place in the transitive matrixes MPR are
semantic consistent
This example net explained like as
M(K)= [P1(k),P2(k),…,P3(k)]then we can obtain
MR = [0,0,t1 (P1(k))+t2(P2 (k))]T
.
In this example(c), next marking may have maximum
two tokens from transition t1 and t2: like as
MR = [0,0,2].
III. PETRI NET REPRESENTATION OF WEB SERVICE
Fig.1 shows a Petri net
representation of an atomic Web service process.
Circles represent the input and the output of service.
Diamond and the rectangle represent the control
place and transition respectively. A series of circles
above the transition is the input place and below the
transition is the output place. The default weight of
the arcs connecting places and the transition is 1.The
service can start to execute only if the input place and
the control place has tokens and also it should be
consistent.
Fig.1 Petri net representation of an atomic Web
service process
Fig.2 and Fig.3 shows the behavior description of
two Web service. Fig.2 is an online Registration
service for students. This allows the students to login
and register their information like list of courses and
payment facilities. Payment facilities provide users
with DD number.
Fig.3 shows the online Examination services where
the students have to log in using their username and
password. If the student is an authorized student he
can enter the register number and attend the
examination using the online question paper.
Fig.2 Online Registration Service
Fig.3 Online Examination Service
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1666
www.ijarcet.org
Fig.4 Petri net representation of online Registration
Fig.5 Petri net representation of Online Examination
Fig.4 and Fig.5 shows the Petri net representation of
two services in Fig.2 and Fig.3.The dark diamonds
are the start and end control places added for Petri
net. If duplicate I/O data is present in data stream of
two atomic processes are in selection structure then it
can be merged because it will not lead to a conflict or
collision in Petri nets.
IV. VERIFY WEB SERVICE COMPOSITION USING
PETRI NET
Fig.6 Composition of Petri net
description for Web service
After finishing the transform of Web service from
OWL-S description to Petri net representation, the
composition of Petri net representation of Web
service in parallel, and the method are explained in
[13]-[15] in detail. The two Petri net compositions of
Web services are shows in Figure 6, where the two
data places interacts between the two services. The
same data places are composited into one, such as
P13-P16 is the interaction data places between two
Web services.
From the start control place p1 of composition
petrinet represented in Fig.6, the input parameter
given by the user are username(p5,p26),
password(p6,p27), course(p12,p28), email(p3,p24),
account receipt(p4,p25).
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1667
www.ijarcet.org
Table III. Explains the transitive matrix MPR
The initial state is represented as M (0). The output
parameter examination is start exam (p30), final end
control place (p32). Calculate to find the existence of
deadlock in composition Petri net of two Web service
in Figure 6, and check whether it is reachable from
the place requested. Through calculations we can
verify whether deadlock exists in composition of
Petri net. Two states are compared whether it is
reachable from the place requested.
The matrix multiplication operation on the state of
Petri net M(k) and marking place transitive matrixes
MPR, which is equivalent to that Petri net fired a
transit in state M(k),and get the next state of Petri net
M(k+1). The transitive matrixes state deduction also
uses the semantic consistent of Petri nets and their
corresponding marking place transitive matrixes MPR,
and in the Petri net model of Web service
composition, M(0) is the initial state. Next we get the
state of M(1) after one transit, M(1)=M(0)*MPR and
so forth, M(2)=M(1)*MPR , … ,M(n+1)=M(n)×MPR.
If the resulting state is M(k)={0,0,…,0]all-zero and
the compared states are equal then deadlock exists in
composition of Petri net. If M(k+1)=[0,0,1],
representing p1 and p2 transit successfully.
The service verification algorithm based on
marking place transitive matrix is as follows:
1) Compute MPR=D-
•diag(t1,t2,...,tn)•(D+
)T
according
to the composition Petri net of Web service;
2) Replace tk with tk/d in MPR, where d is the number
of tk transition in each column, we get MPR after
replacement;
3) Let k=0, calculate M(0);
4) Compute MR(k+1)=M(k)*MPR;
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1668
www.ijarcet.org
5) In MR(k+1), if ∑ , |tk|=1,otherwise |tk|=0,
substituted into MR(k+1), get M(k+1);
6) If M(k+1)=M(k), go to (7); otherwise, let k=k+1,
go to(4);
7) If M(k+1)=[0,0,…,0], composition Petri net is at a
deadlock; if the token value of the output place that
the user need in M(k+1) is 1, then finish correctly;
otherwise, composition Petri net can’t get the output
that user need.
Table IV. Relationship between the Activities.
Based on this relationship, it can be said that the
column relation is a sum of the send tokens from the
Place p and the row relation is a sum of the received
token in place p. Therefore, if a sum of the row of
place p is great than that of the column of place p,
then this place will be not dead. In order to reduce
space in transitive matrix, compression technique has
also been used.
V. CONCLUSIONS
This paper detects the deadlock and ensures
normal working of Web service. The transitive
matrix explained all relationship between the places
and transitions in the net. The represented service
model not only considers input and output but also
the behavior process of Web service. This paper uses
the transfer matrix for analysis and detection tool to
verify and detect the existence of deadlock. Finally, it
can be said that this method is very easy to find the
deadlock status and modify the deadlock status in the
net.
ACKNOWLEDGEMENTS
This work was supported by the management of
Bharath University, I would like to thank for the
encouragement of this research work.
REFERENCES
[1] Lei Liu, Xiang Ji, Lei Zhang, Yanli Zhang,
Shuai Lu A Novel Web Service
Composition Verification Method based on
Petri Net, International Journal of Digital
Content Technology and its
Applications(JDCTA)
Volume6,Number11,June 2012
[2] Junyan Qian, Guowang Huang, Lingzhong
Zhao. Semantic Web service composition
using answer set planning. JACT:
International Journal of Advancements in
Computing Technology, 2011, 3(5): 20-31.
[3] Xiaolin Zheng, Zhen Lin, Yanbo Yang,
Deren Chen. Research on context-aware
Web service composition based on the fluent
calculus. AISS: Advances in Information
Sciences and Service Sciences, 2011, 3(7):
62-74
[4] Rachid Hamadi, Boualem Benatallah. A
Petri net-based model for Web service
composition. In:Proceedings of the 14th
Australasian Database Conference (ADC
2003), Adelaide, South Australia, 2003,
191-200.
[5] Jingxia Li. Application of Colored Petri Net
in Model for Web Service Composition (in
Chinese). Beijing: Institute of Computing
Technology, Chinese Academy of Sciences,
2006.
[6] M. Carman, L. Serafini, and P. Traverso,
―Web service composition asplanning,‖ in
Proc. Int. Conf. ICAPS, 2003, pp. 45–51.
[7] X. Tang, C. Jiang, and M. Z. Zhou,
―Automatic Web service compositionbased
on Horn clauses and Petri nets,‖ Expert
Systems with Applications, vol. 38, no. 10,
pp. 13024–13031, 2011.
[8] R. Hamadi and B. Benatallah, ―A Petri
net-based model for Web service
composition,‖ in Proc. Int. Conf. ADC,
2003, pp. 191–200.
[9] J. M. Mendes, P. Leitão, F. Restivo, and A.
W. Colombo, ―Compositionof Petri nets
models in service-oriented industrial
automation,‖ in Proc. 8th Int. Conf. INDIN,
2010, pp. 578–583.
ISSN: 2278 – 1323
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 2, No 5, May 2013
1669
www.ijarcet.org
[10] H. Foster, S. Uchitel, J. Magee, and J.
Kramer, ―Compatibility verification for web
service choreography,‖ in Proc. Int’l Conf.
ICWS, 2004, pp. 738–741.
[11] P. Xiong, Y. Fan, and M. Z. Zhou, ―Web
service configuration undermultiple quality-
of-service attribute,‖ IEEE Transactions on
AutomationScience and Engineering, vol. 6,
no. 2, pp. 311–321, 2009.
[12] Lefebvre D, Leclercq E. Stochastic Petri
Net identification for the fault detection and
isolation of discrete event systems. IEEE
Transactions on Systems, Man and
Cybernetics, Part A: Systems and Humans,
2011, 41(2): 213-225.
[13] Feng He. Research on Some Key
Technologies of Web Services Composition
(in Chinese).
Shanghai: Donghua University, 2008.
[14] Zhehui Wu. Introduction to Petri Nets.
Beijing: China Machine Press, 2006.
[15] Karakoc E, Senkul P. Composing semantic
Web services under constraints. Expert
Systems with Applications, 2009, 36(8):
11021-11029.

Contenu connexe

Tendances

Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Areej Qasrawi
 
Compressed fuzzy logic based multi-criteria AODV routing in VANET environment
Compressed fuzzy logic based multi-criteria AODV routing in VANET environmentCompressed fuzzy logic based multi-criteria AODV routing in VANET environment
Compressed fuzzy logic based multi-criteria AODV routing in VANET environmentIJECEIAES
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksUniversity of Piraeus
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkIJAAS Team
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVTELKOMNIKA JOURNAL
 
Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Akhmad Zaimi
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...IRJET Journal
 
GA Based Optimization in LTE for Different Data with Different Loads
GA Based Optimization in LTE for Different Data with Different LoadsGA Based Optimization in LTE for Different Data with Different Loads
GA Based Optimization in LTE for Different Data with Different LoadsIRJET Journal
 
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM Rules
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM RulesImplementing CIDOC CRM Search Based on Fundamental Relations and OWLIM Rules
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM RulesVladimir Alexiev, PhD, PMP
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...researchinventy
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSVLSICS Design
 
E04124030034
E04124030034E04124030034
E04124030034IOSR-JEN
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andeSAT Publishing House
 
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...eSAT Journals
 
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...CSCJournals
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONijwmn
 
Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaeSAT Publishing House
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...ijwmn
 

Tendances (19)

Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
Traffic Features Extraction and Clustering Analysis for Abnormal Behavior Det...
 
Compressed fuzzy logic based multi-criteria AODV routing in VANET environment
Compressed fuzzy logic based multi-criteria AODV routing in VANET environmentCompressed fuzzy logic based multi-criteria AODV routing in VANET environment
Compressed fuzzy logic based multi-criteria AODV routing in VANET environment
 
A downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networksA downlink scheduler supporting real time services in LTE cellular networks
A downlink scheduler supporting real time services in LTE cellular networks
 
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc NetworkAn Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
An Improved Greedy Parameter Stateless Routing in Vehicular Ad Hoc Network
 
Optimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADVOptimization a Scheduling Algorithm of CA in LTE ADV
Optimization a Scheduling Algorithm of CA in LTE ADV
 
Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)Routing Management with MIRA and enhancement (IMECS2010)
Routing Management with MIRA and enhancement (IMECS2010)
 
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
Flexible and Scalable Routing Approach for Mobile Ad Hoc Networks Based on Re...
 
GA Based Optimization in LTE for Different Data with Different Loads
GA Based Optimization in LTE for Different Data with Different LoadsGA Based Optimization in LTE for Different Data with Different Loads
GA Based Optimization in LTE for Different Data with Different Loads
 
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM Rules
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM RulesImplementing CIDOC CRM Search Based on Fundamental Relations and OWLIM Rules
Implementing CIDOC CRM Search Based on Fundamental Relations and OWLIM Rules
 
Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...Research Inventy : International Journal of Engineering and Science is publis...
Research Inventy : International Journal of Engineering and Science is publis...
 
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMSREDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
REDUCTION OF BUS TRANSITION FOR COMPRESSED CODE SYSTEMS
 
E04124030034
E04124030034E04124030034
E04124030034
 
Performance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive andPerformance evaluation of proactive, reactive and
Performance evaluation of proactive, reactive and
 
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...Performance evaluation of proactive, reactive and hybrid routing protocols wi...
Performance evaluation of proactive, reactive and hybrid routing protocols wi...
 
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
Performance Evaluation of GPSR Routing Protocol for VANETs using Bi-direction...
 
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTIONMODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
MODIFIED LLL ALGORITHM WITH SHIFTED START COLUMN FOR COMPLEXITY REDUCTION
 
E010422834
E010422834E010422834
E010422834
 
Design and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpgaDesign and implementation of address generator for wi max deinterleaver on fpga
Design and implementation of address generator for wi max deinterleaver on fpga
 
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
A SEMI BLIND CHANNEL ESTIMATION METHOD BASED ON HYBRID NEURAL NETWORKS FOR UP...
 

En vedette

Ijarcet vol-2-issue-7-2292-2296
Ijarcet vol-2-issue-7-2292-2296Ijarcet vol-2-issue-7-2292-2296
Ijarcet vol-2-issue-7-2292-2296Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-1945-1949
Volume 2-issue-6-1945-1949Volume 2-issue-6-1945-1949
Volume 2-issue-6-1945-1949Editor IJARCET
 
Lkp securities derivativies daily report
Lkp securities derivativies daily reportLkp securities derivativies daily report
Lkp securities derivativies daily reportLKP Securities Ltd.
 
Executive dinner 2013 slideshow
Executive dinner 2013   slideshowExecutive dinner 2013   slideshow
Executive dinner 2013 slideshowronjary
 
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .Bank Suttiwat
 
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...МЕТТЭМ-СТРОИТЕЛЬНЫЕ ТЕХНОЛОГИИ
 
The Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceThe Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceTolip khan
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 

En vedette (17)

Corazón
CorazónCorazón
Corazón
 
Ijarcet vol-2-issue-7-2292-2296
Ijarcet vol-2-issue-7-2292-2296Ijarcet vol-2-issue-7-2292-2296
Ijarcet vol-2-issue-7-2292-2296
 
1914 1917
1914 19171914 1917
1914 1917
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
A0
A0A0
A0
 
1705 1708
1705 17081705 1708
1705 1708
 
1834 1840
1834 18401834 1840
1834 1840
 
Volume 2-issue-6-1945-1949
Volume 2-issue-6-1945-1949Volume 2-issue-6-1945-1949
Volume 2-issue-6-1945-1949
 
Afrodyta ola
Afrodyta olaAfrodyta ola
Afrodyta ola
 
Lkp securities derivativies daily report
Lkp securities derivativies daily reportLkp securities derivativies daily report
Lkp securities derivativies daily report
 
Executive dinner 2013 slideshow
Executive dinner 2013   slideshowExecutive dinner 2013   slideshow
Executive dinner 2013 slideshow
 
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .
บทที่ 2 ระบบคอมพิวเตอร์กับการออกแบบ .
 
1820 1824
1820 18241820 1824
1820 1824
 
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...
МЕТТЭМ-Строительные технологии: Создание социальных объектов на базе концесси...
 
品管工程師
品管工程師 品管工程師
品管工程師
 
The Impact of Supervision on Bank Performance
The Impact of Supervision on Bank PerformanceThe Impact of Supervision on Bank Performance
The Impact of Supervision on Bank Performance
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 

Similaire à 1663 1669

Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...ijcsit
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015TTA_TNagar
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015TTA_TNagar
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over SatelliteReza Gh
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layeradil raja
 
Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...EditorIJAERD
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Research on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesResearch on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesNooria Sukmaningtyas
 
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsOptimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsEM Legacy
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsCSCJournals
 
CN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdfCN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdfJoshuaeeda1
 
Extended distributed uml based protocol
Extended distributed uml based protocolExtended distributed uml based protocol
Extended distributed uml based protocolijcseit
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPIJMREMJournal
 
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...TELKOMNIKA JOURNAL
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...ijceronline
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ipAlvianus Dengen
 

Similaire à 1663 1669 (20)

Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...Labeled generalized stochastic petri net Based approach for web services Comp...
Labeled generalized stochastic petri net Based approach for web services Comp...
 
1720 1724
1720 17241720 1724
1720 1724
 
1720 1724
1720 17241720 1724
1720 1724
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015Final Year IEEE Project Titles 2015
Final Year IEEE Project Titles 2015
 
Next Generation Internet Over Satellite
Next Generation Internet Over SatelliteNext Generation Internet Over Satellite
Next Generation Internet Over Satellite
 
The Transport Layer
The Transport LayerThe Transport Layer
The Transport Layer
 
C0423014021
C0423014021C0423014021
C0423014021
 
Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...Improved data efficiency of programmable arbiter based on chip permutation ne...
Improved data efficiency of programmable arbiter based on chip permutation ne...
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Research on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business ProcessesResearch on Adaptation of Service-based Business Processes
Research on Adaptation of Service-based Business Processes
 
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic ConstraintsOptimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
Optimizing IP Networks for Uncertain Demands Using Outbound Traffic Constraints
 
A Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources ModelsA Survey on the Common Network Traffic Sources Models
A Survey on the Common Network Traffic Sources Models
 
CN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdfCN R16 -UNIT-5.pdf
CN R16 -UNIT-5.pdf
 
Extended distributed uml based protocol
Extended distributed uml based protocolExtended distributed uml based protocol
Extended distributed uml based protocol
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
A Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCPA Machine Learning based Network Sharing System Design with MPTCP
A Machine Learning based Network Sharing System Design with MPTCP
 
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...
Weighted Round Robin Load Balancer to Enhance Web Server Cluster in OpenFlow ...
 
Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...Method of controlling access to intellectual switching nodes of telecommunica...
Method of controlling access to intellectual switching nodes of telecommunica...
 
A multi path routing algorithm for ip
A multi path routing algorithm for ipA multi path routing algorithm for ip
A multi path routing algorithm for ip
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

1663 1669

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1663 www.ijarcet.org Abstract—The Main area in Web service is the Web service composition which detects the composition before execution. Petri net or Place / Transition net is a mathematical modeling language used to describe the distributed systems. Deadlock can be detected through transitive matrix of Petri nets .This paper proposes a Web service model for students’ online registration and detects the deadlocks for various applications using Petri net transitive matrix. Simulation results indicate a better identification of deadlock. Keywords — Web Service, Petri Net, Transitive Matrix, Deadlock Detection. I. INTRODUCTION The World Wide Web infrastructure is extended using Web services which provide the means for software to connect to other software applications. Using ubiquitous Web protocols and data formats such as HTTP,XML, SOAP every application is allowed to access the Web services which bout the knowledge about the Web service .Higher level business processes are created using Web service composition which provides an open standard based approach. Complexity to compose Web service is reduced to a greater level using open standards. This reduces time and cost and increases overall efficiency business models. Web service is a technology based on SOAP (Simple Object Access Protocol), WSDL (Web Service Description Language), UDDI (Universal Description, Discovery and Integration) and HTTP (Hyper Text Transfer Protocol). Web service is an important part of the SOA architecture where the applications can be executed for isomeric environment. Limited functionalities are provided by a single Web service. In order to provide a concrete complex service request several Web service are combined together. Web service composition is not reliable because it comes from different companies and from different platform .so the key verification before any process is to verify the correctness of service composition as specified in [1]–[3]. Service profile, service model and service grounding are the three parts of OWL-S representation. Web service composition based on service model not only considers the input and output, but also includes the execution sequence of the behavior process. In [4] proposed a model which detects the deadlock of Web service composition based on behavior which deals with two functional module, function analyzer and behavior analyzer. Web service composition model based on the color Petri net proposed by [5] describes the operation of Web service which characterizes control flow and data flow. Paper [6] uses transitive matrix of Petri nets as a detection tool to identify deadlock. Various direct composition methods have been proposed, including planning based [7], logical inference driven [8], Petri net based [9], [10], automata based [11], quality-of-service (QoS) optimizing based [12], etc. These methods [7]–[12] assume both data formats and sequences of the messages are consistent. In order to reduce space in matrix, compression technique has also been used. Two important A Verification Method Based On Petri Net for Online Student Registration Web Service Composition A.Kumaravel, Professor and Dean, M.Merlin Mexa, PG Student, Department of Computer Science and Engineering. Bharath University, Selaiyur, Chennai-600073, India
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1664 www.ijarcet.org compression concepts are lossy and lossless compression:  Lossy compression With lossy compression, it is assumed that some loss of information is acceptable. Loss is also acceptable in voice and audio compression, depending on the desired quality.  Lossless compression With lossless compression, data is compressed without any loss of data. It assumes you want to get everything back that you put in. Critical financial data files are examples where lossless compression is required. This paper proposes an online student registration of Web service composition and verification method. This paper achieves detection of deadlock using transitive matrix of petrinet. Efficiency is achieved by compressing and decompressing the transitive matrix. Finally examples are shown how effectively the deadlock is detected and solved for Web service composition. In section 1 a brief introduction about Web service composition is explained and in section 2 Definitions of Petri net and the transitive matrix is explained followed by the detailed explanation about the proposed work and its experimental process is given in section 3. In section 4 verification of Web service composition is explained. Conclusion and the future work is specified in section 5. II. BACKROUND Definition I: (Petri net) [13-15] A Petri net is a 5- tuple PN =< P,T, A,W,M0 > where: 1) P= { p1,p2…. ,pm }is a finite set of places, 2) T= {t1,t2,…tn,}is a finite set of transitions, 3)A ⊆ (P×T)∪(T × P) is the set of arcs (flow relation), 4 W : A→{1,2,3,…} is a weight function, 5) M : P→{0,1,2,3,…} is the initial marking, P∩T = Ф and T ∩P = Ф. Definition II: (transitive matrix) [14] Let B- and B+ be an input function matrices and output function matrix of m rows by n columns in Petri nets, respectively. The place and transition transitive matrix are as follows: MPR = B- (B+ )T : place transitive matrix MT = (B+ )T B- : transition transitive matrix Table I: shows the transition of token between places before and after firing. Definition III: Let a reachable marking MR(K +1) from M(K) be an m-vector of nonnegative integer. The transformation defined by MR (K+1)T = M(K)T MPR Its show a flow relation of M(K) to MR(K +1) based on the token in) Pi (k). Also, we can find that if is integer (or not), then let = 1(or 0). This means the token in Pi(K) can (or can’t) be transferred from M(K) to MR(K +1) . Since M R(K +1) only represents the flow relation of tokens, M R(K +1) may not necessarily correspond to M(K +1) . Henceforth, we consider a limit to the number of tokens that │Pi(K)│is equal to 1 or 0. Definition IV: Weighted Place Transitive Matrix MPR. Let MPR be the m×m weighted place transitive matrix. If a transition t k appears s times in the same column of MPR, then we will replace t k by t k/s in MPR. Table II (Example): Consider a simple net as follows:
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1665 www.ijarcet.org Table II gives a few marking place transitive matrixes MPR corresponding to simple Petri nets. It is proved that Petri nets and their corresponding marking place in the transitive matrixes MPR are semantic consistent This example net explained like as M(K)= [P1(k),P2(k),…,P3(k)]then we can obtain MR = [0,0,t1 (P1(k))+t2(P2 (k))]T . In this example(c), next marking may have maximum two tokens from transition t1 and t2: like as MR = [0,0,2]. III. PETRI NET REPRESENTATION OF WEB SERVICE Fig.1 shows a Petri net representation of an atomic Web service process. Circles represent the input and the output of service. Diamond and the rectangle represent the control place and transition respectively. A series of circles above the transition is the input place and below the transition is the output place. The default weight of the arcs connecting places and the transition is 1.The service can start to execute only if the input place and the control place has tokens and also it should be consistent. Fig.1 Petri net representation of an atomic Web service process Fig.2 and Fig.3 shows the behavior description of two Web service. Fig.2 is an online Registration service for students. This allows the students to login and register their information like list of courses and payment facilities. Payment facilities provide users with DD number. Fig.3 shows the online Examination services where the students have to log in using their username and password. If the student is an authorized student he can enter the register number and attend the examination using the online question paper. Fig.2 Online Registration Service Fig.3 Online Examination Service
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1666 www.ijarcet.org Fig.4 Petri net representation of online Registration Fig.5 Petri net representation of Online Examination Fig.4 and Fig.5 shows the Petri net representation of two services in Fig.2 and Fig.3.The dark diamonds are the start and end control places added for Petri net. If duplicate I/O data is present in data stream of two atomic processes are in selection structure then it can be merged because it will not lead to a conflict or collision in Petri nets. IV. VERIFY WEB SERVICE COMPOSITION USING PETRI NET Fig.6 Composition of Petri net description for Web service After finishing the transform of Web service from OWL-S description to Petri net representation, the composition of Petri net representation of Web service in parallel, and the method are explained in [13]-[15] in detail. The two Petri net compositions of Web services are shows in Figure 6, where the two data places interacts between the two services. The same data places are composited into one, such as P13-P16 is the interaction data places between two Web services. From the start control place p1 of composition petrinet represented in Fig.6, the input parameter given by the user are username(p5,p26), password(p6,p27), course(p12,p28), email(p3,p24), account receipt(p4,p25).
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1667 www.ijarcet.org Table III. Explains the transitive matrix MPR The initial state is represented as M (0). The output parameter examination is start exam (p30), final end control place (p32). Calculate to find the existence of deadlock in composition Petri net of two Web service in Figure 6, and check whether it is reachable from the place requested. Through calculations we can verify whether deadlock exists in composition of Petri net. Two states are compared whether it is reachable from the place requested. The matrix multiplication operation on the state of Petri net M(k) and marking place transitive matrixes MPR, which is equivalent to that Petri net fired a transit in state M(k),and get the next state of Petri net M(k+1). The transitive matrixes state deduction also uses the semantic consistent of Petri nets and their corresponding marking place transitive matrixes MPR, and in the Petri net model of Web service composition, M(0) is the initial state. Next we get the state of M(1) after one transit, M(1)=M(0)*MPR and so forth, M(2)=M(1)*MPR , … ,M(n+1)=M(n)×MPR. If the resulting state is M(k)={0,0,…,0]all-zero and the compared states are equal then deadlock exists in composition of Petri net. If M(k+1)=[0,0,1], representing p1 and p2 transit successfully. The service verification algorithm based on marking place transitive matrix is as follows: 1) Compute MPR=D- •diag(t1,t2,...,tn)•(D+ )T according to the composition Petri net of Web service; 2) Replace tk with tk/d in MPR, where d is the number of tk transition in each column, we get MPR after replacement; 3) Let k=0, calculate M(0); 4) Compute MR(k+1)=M(k)*MPR;
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1668 www.ijarcet.org 5) In MR(k+1), if ∑ , |tk|=1,otherwise |tk|=0, substituted into MR(k+1), get M(k+1); 6) If M(k+1)=M(k), go to (7); otherwise, let k=k+1, go to(4); 7) If M(k+1)=[0,0,…,0], composition Petri net is at a deadlock; if the token value of the output place that the user need in M(k+1) is 1, then finish correctly; otherwise, composition Petri net can’t get the output that user need. Table IV. Relationship between the Activities. Based on this relationship, it can be said that the column relation is a sum of the send tokens from the Place p and the row relation is a sum of the received token in place p. Therefore, if a sum of the row of place p is great than that of the column of place p, then this place will be not dead. In order to reduce space in transitive matrix, compression technique has also been used. V. CONCLUSIONS This paper detects the deadlock and ensures normal working of Web service. The transitive matrix explained all relationship between the places and transitions in the net. The represented service model not only considers input and output but also the behavior process of Web service. This paper uses the transfer matrix for analysis and detection tool to verify and detect the existence of deadlock. Finally, it can be said that this method is very easy to find the deadlock status and modify the deadlock status in the net. ACKNOWLEDGEMENTS This work was supported by the management of Bharath University, I would like to thank for the encouragement of this research work. REFERENCES [1] Lei Liu, Xiang Ji, Lei Zhang, Yanli Zhang, Shuai Lu A Novel Web Service Composition Verification Method based on Petri Net, International Journal of Digital Content Technology and its Applications(JDCTA) Volume6,Number11,June 2012 [2] Junyan Qian, Guowang Huang, Lingzhong Zhao. Semantic Web service composition using answer set planning. JACT: International Journal of Advancements in Computing Technology, 2011, 3(5): 20-31. [3] Xiaolin Zheng, Zhen Lin, Yanbo Yang, Deren Chen. Research on context-aware Web service composition based on the fluent calculus. AISS: Advances in Information Sciences and Service Sciences, 2011, 3(7): 62-74 [4] Rachid Hamadi, Boualem Benatallah. A Petri net-based model for Web service composition. In:Proceedings of the 14th Australasian Database Conference (ADC 2003), Adelaide, South Australia, 2003, 191-200. [5] Jingxia Li. Application of Colored Petri Net in Model for Web Service Composition (in Chinese). Beijing: Institute of Computing Technology, Chinese Academy of Sciences, 2006. [6] M. Carman, L. Serafini, and P. Traverso, ―Web service composition asplanning,‖ in Proc. Int. Conf. ICAPS, 2003, pp. 45–51. [7] X. Tang, C. Jiang, and M. Z. Zhou, ―Automatic Web service compositionbased on Horn clauses and Petri nets,‖ Expert Systems with Applications, vol. 38, no. 10, pp. 13024–13031, 2011. [8] R. Hamadi and B. Benatallah, ―A Petri net-based model for Web service composition,‖ in Proc. Int. Conf. ADC, 2003, pp. 191–200. [9] J. M. Mendes, P. Leitão, F. Restivo, and A. W. Colombo, ―Compositionof Petri nets models in service-oriented industrial automation,‖ in Proc. 8th Int. Conf. INDIN, 2010, pp. 578–583.
  • 7. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 2, No 5, May 2013 1669 www.ijarcet.org [10] H. Foster, S. Uchitel, J. Magee, and J. Kramer, ―Compatibility verification for web service choreography,‖ in Proc. Int’l Conf. ICWS, 2004, pp. 738–741. [11] P. Xiong, Y. Fan, and M. Z. Zhou, ―Web service configuration undermultiple quality- of-service attribute,‖ IEEE Transactions on AutomationScience and Engineering, vol. 6, no. 2, pp. 311–321, 2009. [12] Lefebvre D, Leclercq E. Stochastic Petri Net identification for the fault detection and isolation of discrete event systems. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 2011, 41(2): 213-225. [13] Feng He. Research on Some Key Technologies of Web Services Composition (in Chinese). Shanghai: Donghua University, 2008. [14] Zhehui Wu. Introduction to Petri Nets. Beijing: China Machine Press, 2006. [15] Karakoc E, Senkul P. Composing semantic Web services under constraints. Expert Systems with Applications, 2009, 36(8): 11021-11029.