Computer Science ›› 2020, Vol. 47 ›› Issue (1): 270-275.doi: 10.11896/jsjkx.181102228

• Computer Network • Previous Articles     Next Articles

Web Service Composition by Combining FAHP and Graphplan

FAN Guo-dong,ZHU Ming,LI Jing,CUI Xiao-liu   

  1. (College of Computer Science and Technology,Shandong University of Technology,Zibo,Shandong 255000,China)
  • Received:2018-11-30 Published:2020-01-19
  • About author:FAN Guo-dong,born in 1990,master student.He is currently working on automated Web service composition.His main research interests are Web service composition,micro-service architecture and machine learning;ZHU Ming,born in 1983,Ph.D,is member of China Computer Federation (CCF).His main interests are related to process-oriented programming,Web service composition,event modeling,and concurrent systems.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (61473179),Zibo City and University Integration Development Projects (2018ZBXC295),Science and Technology Projects of Shandong University of Technology (4041-417010).

Abstract: In recent years,with the advance of cloud computing,more and more services have been published online.How to search an optimal composition with both functional and non-functional requirements has become a challenging problem.QoS-aware web service composition is an NP-hard problem.To solve this problem,a system combining FAHP with improved Graphplan algorithm was proposed.Firstly,the overall QoS of service is generated by using FAHP according to user preferences.Se-condly,in the forward expand stage of Graphplan,dynamic threshold is used to prune less competitive services,which reduces time complexity while ensuring that critical services are retained.Finally,in the backward searching stage of Graphplan,service with best overall QoS is selected into the composition,under the premise of meeting the functional requirements.Experimental results show that the proposed algorithm not only improves the quality of service composition,but also reduces the program running time significantly compared with the ordinary Graphplan,Skyline and other methods.

Key words: Web service composition,Quality of service,Fuzzy analytical hierarchy process,Graphplan,Automatic composition

CLC Number: 

  • TP393
[1]LI J,YAN Y H,LEMIRE D.Scaling up web service composition with the skyline operator[C]∥IEEE International Conference on Web Services.USA:ICWS,2016:147-154.
[2]YAN Y H,CHEN M.Anytime QoS-aware service composition over the graphplan[J].Service Oriented Computing and Applications,2015,9(1):1-19.
[3]ZHU M,FAN G D,LI J,et al.An Approach for QoS-aware Service Composition with GraphPlan and Fuzzy Logic[C]∥ International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Procedia Computer Science,2018:56-63.
[4]LI J,YAN Y H,LEMIRE D.Full Solution Indexing for top-K Web Service Composition[J].IEEE Transactions on Services Computing,2016,11(3):521-533.
[5]LI J,YAN Y H,LEMIRE D.A Web Service Composition Method Based on Compact K2-Trees[C]∥ IEEE International Conference on Services Computing.IEEE Computer Society,2015.
[6]HUANG L T,DENG S G,DAI K,et al.Automatic Service Composition in Parallel with MapReduce[J].Chinese Journal of Electronics,2012,40(7):1397-1403.
[7]ZHU M,LI J,FAN G D,et al.Modeling and Verification of Response Time of QoS-aware Web Service Composition by Timed CSP[C]∥ International Conference on Emerging Ubiquitous Systems and Pervasive Networks.Procedia Computer Science,2018:48-55.
[8]CUI Y,WU J P,XU K,et al.A Survey of Research on Internet Service Quality Routing Algorithms[J].Journal of Software,2002(11):2065-2075.
[9]ZADEH L A .The Concept of a Linguistic Variable and Its Application to Approximate Reasoning—III[J].Information Scien-ces,1975,9(1):43-80.
[10]DARKO B,DRAGAN P,BOBAN D.Modification of analytic hierarchy process (AHP) method and its application in the defense decision-making[J].Scientific Research and Essays,2012,7(1):24-37.
[11]BOZANIC D,DRAGAN P,DRAGAN B.Modification of the analytic hierarchy process (AHP) method using fuzzy logic:Fuzzy AHP approach as a support to the decision making process concerning engagement of the group for additional hindering[J].Serbian Journal of Management,2015,10(2):151-171.
[12]CHARILAS D,MARKAKI O,PSARRAS J,et al.Application of Fuzzy AHP and ELECTRE to Network Selection[M]// Mobile Lightweight Wireless Systems.Springer Berlin Heidelberg,2009:63-73.
[13]WS-Challenge.Testsetgenerator2009[OL].https://code.google.com/p/wsc-pku-tcs/downloads/list.
[14]MANOLA F,MILLER E.Rdf primer [OL].http://www.w3.org/tr/rdfschema/.
[15]BECHHOFER S,HARMELEN F,HENDLER J,et al.OWL Web Ontology Language Reference[OL].https://www.w3.org/TR/owl-ref/.
[16]DOU D,MCDERMOTT D,QI P .Ontology Translation on the Semantic Web[M]∥Journal on Data Semantics II.Springer-Verlag,2004:35-57.
[17]LEE J K,SOHN M .eXtensible Rule Markup Language[J].Communications of the Acm,2003,46(5):59-64.
[18]ZHANG Y F,WANG J N,YAN Y H.Context-Aware Generic Service Discovery and Service Composition[C]∥ IEEE International Conference on Mobile Services.IEEE Computer Society,2014.
[19]SORA I,TODINCA D .Dealing with fuzzy QoS properties in service composition[C]∥ IEEE Jubilee International Sympo-sium on Applied Computational Intelligence & Informatics.Institute of Electrical and Electronics Engineers (IEEE).2015:197-202.
[20]AVILA S D,DJEMAME K.Fuzzy Logic Based QoS Optimization Mechanism for Service Composition[C]∥ IEEE International Symposium on Service Oriented System Engineering.Ins-titute of Electrical and Electronics Engineers ( IEEE),2013:182-191.
[21]ZHAO X,SHEN L,PENG X,et al.Toward SLA-constrained service composition:An approach based on a fuzzy linguistic preference model and an evolutionary algorithm[J].Information Sciences,2015,316:370-396.
[22]MA Y,WANG S G,SUN Q B,et al.Web Service Quality Metric Algorithm Employing Objective and Subjective Weight[J].Journal of Software,2014(11):2473-2485.
[23]ALMULLA M,ALMATORI K,YAHYAOUI H .A QoS-Based Fuzzy Model for Ranking Real World Web Services[C]∥ IEEE International Conference on Web Services.IEEE Computer So-ciety,2011:203-210.
[24]SUN X T,NIU J,GONG Q B,et al.services selection strategy based on combination weighting approach[J].Application Research of Computer,2017,34(8):2408-2411.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian. Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment [J]. Computer Science, 2022, 49(6A): 480-484.
[14] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[15] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!