International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 110

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013


Optimal Approach of Hybrid Genetic Algorithm for Web Service Selection Problem

Kalpesh Lad, Trupti Manik


Abstract: Web Service composition is an important problem to formulate any business process. Its all about creating an web service using some existing web service. A web service may have many implementation having same functionality but with different Quality of Service (QoS) parameters. So, researchers are making effort to select the web service implementation as a part of web service composition so that composite web service gives best overall QoS values or optimal than any other possible composition. Some approaches have come up to address the same problem. The genetic algorithm, which we have considered, addresses the same problem. The genetic algorithm gives constrained driven approach to select the web service for composition. This approach gives much better result than its predecessor. But, it takes longer to execute. If the algorithm takes much time then the system will take much time to respond. This paper introduces an approach to converge the genetic algorithm in a lesser time


Keywords: Web Service, Constrained, Web Service Composition, Quality of Service


Edition: Volume 2 Issue 5, May 2013,


Pages: 350 - 354


How to Cite this Article?

Kalpesh Lad, Trupti Manik, "Optimal Approach of Hybrid Genetic Algorithm for Web Service Selection Problem", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=IJSRON20131019, Volume 2 Issue 5, May 2013, 350 - 354

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Web Service'

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1628 - 1631

A Survey On XML-Injection Attack Detection Systems

Swati Ramesh Kesharwani, Aarti Deshpande

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1886 - 1890

A Flexible and Dynamic Failure Recovery Mechanism for Composite Web Services Using Subset Replacement

Shuchi Gupta, Prof. Praveen Bhanodia

Share this Article

Similar Articles with Keyword 'Constrained'

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Downloads: 105

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2294 - 2297

Disease Inference and Community-based Health Services

Asif Akram, Rekha Jadhav

Share this Article

Similar Articles with Keyword 'Quality Service'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 959 - 963

An Analysis of Business Framework in identifying Customer Driven Demand Discovery

Are Karunakar Reddy, Gunna Kishore

Share this Article

Downloads: 155

Case Studies, Computer Science & Engineering, Indonesia, Volume 7 Issue 10, October 2018

Pages: 1666 - 1672

Analysis of Service Quality on Academic Information System toward User Satisfaction Using Kano Method Base on SERVQUAL Dimensions (Case Study: Academic Information System on STT Wastukancana Purwakarta)

Dayan Singasatia, Irsan Jaelani

Share this Article

Similar Articles with Keyword 'Web'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'Service'

Downloads: 1

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 705 - 706

An Analysis on Voice Assistant

Shravankumar Jha

Share this Article

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article
Top