A Search Engine for Semantic Web Documents

The main target of Swoogle is to create a system to collect and retrieve Semantic Web documents. This is alos known as Semantic Web search engine. Swoogle sees the Semantic Web as a web of documents which are called as SWDs (Semantic Web documents). SWD is an online document written in RDF or OWL with a respective extension (.rdf, .owl etc.). There are other acceptable extensions as rss, n3 or daml. Semantic Web is a distributed online repository of SWDs. By using Swoogle, we conduct crawler-based searches and queries against this repository. As…


API stands for Application Programming Interface. So, a web API as the name suggests is an API that can be accessed over the web using the HTTP protocol. Technologies like Java, ASP.NET can be used to develop web APIs. Using web APIs, you can develop HTTP based restful services.

https://tutorialshelper.com/how-to-authentication-in-web-api-example/

There are two types of web APIs, client-side web APIs, and server-side web APIs. Client-side and server-side APIs are similar to interfaces that are used to exchange data between end-users and web services. To improve data accessibility and operation support, every browser has a set of inbuilt web APIs.

Actually, web…


SE/2015/010 — P.H.D Diyasena

The article is as a requirement of the course SENG 41283: Distributed and Cloud Computing. https://science.kln.ac.lk/tunits/setu/index.php/component/sppagebuilder/90-seng-41283

All the resources that I have created and also mentioned in this article can be referred by https://github.com/deshanjali/ARM-Templates-se010

The assignment was about setting up a sample environment using Microsoft Azure cloud platform based on shared architecture concepts. At first, I did some hands-on to get familiar with the azure student portal given to us. Then went through open-source code samples and identified what would be perfect for use in this assignment as it should be not that complex. I came…


In the cryptography world, digest functions are also known as hashing algorithms. Hashing is a method that encrypts data into a unique string but not reversible. Hashing is done as a one-way function so cannot decipher. Regardless of the size, length of data it gives out the same length hash (fixed length) as the outcome by a particular algorithm. Hash values can also be known as a message digest. We commonly use hashing in password storing when we login those hashes are compared and grant permission. We can see hashing in blockchain-based cryptocurrencies also. MD5, SHA-1, SHA-256 are the mostly…


Public key algorithms are also known as asymmetric key algorithms which typically uses a key length of 512 to 4096 bits key size. This type of algorithms is comparingly slow than symmetric because these contain complex operations inside. RSA, DSS, ElGamal, elliptic and DH are the most popular asymmetric algorithms where sender and receiver do not share a secret key. Key is used to encrypt and decrypt data. These algorithms are functioning based on two different keys, those are the private key which is only known by the owner and a public key which is known by everyone. One is…


Secret key algorithms are also known as symmetric key as well as shared-key algorithms. A secret key is shared between sender and receiver and the usual key size is 80–256 bits. DES, 3DES, AES, IDEA, RC2/4/5/6, and Blowfish are some of the symmetric key algorithms. These types of algorithms are much faster because it contains simple mathematical operations. Key is used to encrypt and decrypt data. This pre-shared key is known prior to the data transfers between sender and receiver when the key is shorter it executes faster. Symmetric ciphers can be divided as block and stream ciphers where block…


Work Queue

RabbitMQ is a message broker application which is available free to use as open-source software. It is implemented based on the advanced message queue protocol (AMQP). The most common example that is used to explain RabbitMQ is the post office. Like in the post office this has the ability to take messages and put them in a queue and distribute them among receivers accordingly. In this RabbitMQ senders are known as producers and receivers are called consumers. You can see the basic architecture diagram of the RabbitMQ below:

https://www.rabbitmq.com/tutorials/tutorial-two-java.html

In RabbitMQ it always manages messages as binary blobs of…


Remote Method Invocation (RMI) is a technology that enables to communicate between java virtual machines and invoke methods among them using remote calling of objects and sharing services and resources. This communication is done using protocols and it allows to load various object types dynamically as required and it has the ability to transmit one or more objects along with the request which can lead to impact the services on the server-side functionality. When we considering the architecture of RMI we can identify a few layers in it. Those are application layer, stub and skeleton layer, remote reference layer, and…


RPC (remote procedure calls) comes under as a method to develop JAX-WS which stands for Java API for XML web services. It is a standard API for building web services by using remote procedure calls and XML. This method is capable of giving the ability to clients to execute procedures on external systems. Like SOAP protocol which is based on XML is used for the representation. Its specification defines all the necessities like structures and rules. RPC requests and responses are transmitted through the HTTP protocol.

https://www.researchgate.net/figure/1-JAX-RPC-architecture_fig1_44234871

When we considering the perspective of developers, they have to define interfaces on the…


Data at language level are stored in data structures. As well as at TCP/UDP level, data are communicated as ‘messages’ or streams of bytes. On that account conversion or flattening of data is needed. As a method, mostly data is converted to a sequence of bytes. But there is a problem that we can identify regarding to that which is there are various types of machines that consist of different primitive data representations. Following are some examples of different kind of primitive data types,

Integers — big-endian and little-endian are the variants for the ordering for integers

Floating points —…

deshanjali diyasena

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store