You are on page 1of 3

A Dynamic QoS-Aware Logistics Service

Composition Algorithm Based on Social


Network
Abstract:
We detect the traffic anomalies by monitoring the header data. Some
attacks like denial of service led to develop the techniques for identifying the
network traffic. If we have the efficient analysis tool we could prevent the
network from the traffic before it could get attacked. We can analyze the
network traffic with the help of, correlation of the destination IP address in
the egress router. he address correlations are data transformed using the
discrete wavelet transform for detecting the traffic anomalies. !esults from
trace"driven evaluation suggest that proposed approach could provide an
effective means of detecting anomalies close to the source. We also present a
multidimensional indicator using the correlation of port numbers and the
number of flows as a means of detecting anomalies. Path Planning can be a
solution of finding a suitable business path during service composition but
the search space will increase dramatically with the growth of service
quantity and is hard to get a result within a tolerable interaction time. In the
conte#t of big data, to quickly build a service path with the optimal global
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1
V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86:
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 9!9" #9$"% +91 99&&' #"(% +91 9!9" "(9$% +91 9($1! !$!$1
V)*)+: ,,,-.)/012304546738+*-649 M0)1 +6:)333.)/01*3:546738+*;9:0)1-86:
$oS has become a problem demanding prompt solution.Sociologists point
out that companies prefer familiar partners in the commercial environment.
%y using this principle, a concept of partner circle is defined which can
significantly reduce the search space in path planning. here might be more
than one edge between two verte#es, for there might be multiple services
with different $oS between two cities
!isting system:
here is no established e#isting system to prevent the network traffic. &nd
so we are developing the statically analysis for detecting the traffic
anomalies.
he local optimization method is to choose services for every task then
use the evaluation function to sort the composite service by their $oS.
& simple problem with 'ust sequential structure and a complicate problem
with comple# structure. hen the problem becomes a (ultiple )hoice
*napsack Problem +()*P, with single constraint.
& -ogistics Service $oS .valuation (odel that evaluates the $oS of the
logistics service. he other is & -ogistics Service Provider )ooperation
/etwork that enables the creation of the Partner )ircle.
"roposed system:
In this pro'ect we are going to detect the anomalies using the following
three techniques.
raffic &nalysis at the Source
0eneral mechanism of detector.
race.
&n energy"efficient coordinated scheduling mechanism is proposed to
reduce the energy consumption it switch between two scheduling schemes
according to load variations.
hrough introducing the ergodic capacity of the cluster as the spectral
efficiency metric, both energy and spectral efficiency.
he proposed scheduling schemes are analyzed theoretically and their
relations are e#ploited through numerical computation and simulations.
#ardware $e%&irements:-
S1S.( 2 Pentium I3 4.5 06z
6&!7 7IS* 2 58 0%
!&( 2 49: (%
So'tware $e%&irements:-
;perating system 2 Windows <P Professional
=ront .nd 2 (icrosoft 3isual Studio ./et 488>
)oding -anguage 2 )? Sharp
7atabase 2 S$- S.!3.! 4888

You might also like