International Journal of Web Engineering and Technology
Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.
Articles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.
International Journal of Web Engineering and Technology (5 papers in press)
Tooled Approach to Interoperability Monitoring with Traceability for Message-Driven Systems
by Kindson Munonye Abstract: Message-driven information systems allow for asynchronous data exchange of messages via a publish/subscribe mechanism. This is achieved by setting up data exchanges in form of a message-oriented-middleware (MOM) between the collaborating systems. Traceability provides a method for the persistence of the message intermediate states across the message lifecycle allowing for retransmission. This research proposes a model for traceability and metrics generation, not only from the message broker but from the producer and consumer clients interacting via HTTP. A Messaging Metamodel is proposed for aggregating interaction metadata. We develop this model using RabbitMQ an open-source message broker and Spring Framework enhanced to include traceability interfaces. A web application-compatible tool was designed, prototyped, and implemented based on this metamodel. This approach helps not only for monitoring interactions but for the detection of potential interoperability-related issues and improving overall message throughput. A case study was used to demonstrate the feasibility of this approach. Keywords: Messaging; Interoperability; RabbitMQ; Message Broker; Monitoring; Message-driven systems.
Uncertain Service Selection Using Hesitant Fuzzy Sets and Grey Wolf Optimization by Zeyneb Yasmina REMACI, Fethallah Hadjila Abstract: Dealing with complex user requirements and the exponential growth of Cloud service providers in a dynamic environment is a challenging task. In practice, the quality of service (QoS) constitutes a crucial feature in Cloud service selection (CSS). We generally assume that the QoS of Cloud services is inherently dynamic, and
consequently, CSS can be viewed as a complex Multi-Criteria Decision-Making (MCDM) issue. In this paper, we propose a Grey Wolf-based approach (GW) that uses Entropy, Cross-Entropy and hesitant fuzzy sets to select the near-optimal Cloud service compositions that best meet the user's need. According to the experiments, the proposed approach is very promising in terms of the computation time and the degree of satisfaction of global constraints. Keywords: Cloud Service; Cloud Service Selection; Uncertain Quality of Service; Cross-Entropy; Hesitant fuzzy set; Gery Wolf Optimiser.
Application of automatic fingerprint identification algorithm in criminal investigation by Xiangyang Wang Abstract: In the practical application of traditional fingerprint identification algorithm, the error of fingerprint detail feature extraction is high and the effect of edge recognition is poor. Therefore, the application research of fingerprint automatic identification algorithm in criminal investigation is proposed. Firstly, the collected fingerprint image is preprocessed to obtain the size of fingerprint effective area and fingerprint image gray level. Based on Gabor filter, the balanced and normalized fingerprint image is segmented and enhanced by filtering. Finally, feature extraction, classification and detail matching are carried out for the enhanced fingerprint. The experimental results show that the error value of the algorithm is relatively stable, the edge recognition effect is good, and the effective information loss rate is low; It has a good effect in the practical application of criminal investigation. Keywords: Automatic fingerprint identification algorithm; Criminal investigation; Fingerprint image gray; Gabor filter; Criminal activity information.
The Additional Testsuite Framework: Facilitating Software Testing and Test Management by Panagiotis Sotiropoulos, Costas Vassilakis Abstract: In this paper, we present the Additional Testsuite Framework, a novel test suite management approach, which provides structures and instrumentation for the creation, maintenance, evolution and use of test suites for software programs. In particular, the tests can be maintained in a centralized repository, and are developed and maintained independently of specific versions of the associated software. Through the use of annotations, tests are categorized and distributed to the desired versions of the software. The presented framework also supports test-based development, dynamic/selective program builds, feature-based builds, testing in different environments and source code analysis. The Additional Testsuite Framework concept has been implemented and extensively evaluated, with the test cases notably including the JBoss EAP CE and OpenLiberty servers. Keywords: Additional Testsuite Framework; Testsuite Management; Dynamic Testing; Test-Driven Development; Multiversion Testing; Multiple Environment Testing.
A Comprehensive Review and Open Issues on Energy Aware Resource Allocation in Cloud by Shubhuam Singh, Pawan Singh, Sudeep Tanwar Abstract: Cloud computing is an on-demand service resource that includes applications to data centers on a pay-per-use basis. While allocating resources, the node failure causes the cloud service failures. This reduces the quality of service along with 'extra' energy consumption. This survey makes a evaluation on 65 papers regarding energy aware resource allocation techniques in cloud. The performances and associated highest attainments of each contribution are described in this review. In addition, the tools used for implementing the resource allocation techniques in each paper along with type of workloads were considered. We examine a number of current or developed energy-aware resource allocation approaches for cloud settings in this study. We also provide a thorough analysis of the various energy-conscious resource allocation and selection strategies for cloud-based virtual machines. Lastly, the clear sketch of issues and weakness are determined that may be supportive to resolve the existing problems in this aspect. Keywords: Cloud computing; Resource allocation; Energy utilization; Quality of Service; Workloads.