Swoogle is a Semantic Web Search and Metadata Engine and a crawler-based indexing and retrieval system for the Semantic Web. It extracts metadata for each discovered document, and computes relations between documents. Discovered documents are also indexed by an information retrieval system which can use either character N-Gram or URIrefs…


Application Programming Interfaces (APIs) are constructs made available in programming languages to allow developers to create complex functionality more easily. They abstract more complex code away from you, providing some easier syntax to use in its place.

Web API is the enhanced form of the web application to provide services…


The article is as an requirement of course SENG 41283 : Distributed and Cloud Computing and link https://science.kln.ac.lk/tunits/setu/index.php/component/sppagebuilder/90-seng-41283

I am using following architecture diagram to set up the sample environment in Azure Cloud Platform.

I have briefly explained the stuff that I used to deploy application in azure below.

How to create a Resource Group…

Resources…


People know that digital signatures are very important in information security. The security of digital signatures depends on the cryptographic strength of the underlying hash functions. Hash functions also have many other applications in cryptography such as data integrity, group signature, e-cash and many other cryptographic protocols. The use of…


In present world, numerous algorithms are designed and developed to provide security to the information that is spread across globally through network. These algorithms can be mainly classified as Symmetric and Asymmetric algorithms. The important issue that differentiates them is usage of keys. In symmetric algorithms, only one key is…


Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. Cryptography is not the only means of providing information security but rather one set of techniques. A crypto system is a general term referring to a…


RabbitMQ is an open source multi-protocol messaging broker. Running rabbitmq-server starts a RabbitMQ node in the foreground. The node will display a startup banner and report when startup is complete. To shut down the server, use service management tools or rabbitmqctl.

Think of RabbitMQ as the back-end AJAX.

If an…


Remote Method Invocation

RMI (Remote Method Invocation) is a way that a programmer, using the Java programming language and development environment, can write object-oriented programming in which objects on different computers can interact in a distributed network. RMI is the Java version of what is generally known as a remote…


Remote Procedure Calls

A remote procedure call is an inter-process communication technique that is used for client-server based applications. It is also known as a subroutine call or a function call.

A client has a request message that the RPC translates and sends to the server. This request may be…


External Data Representation

External Data Representation is a standard data serialization format, for uses such as computer network protocols. It allows data to be transferred between different kinds of computer systems. Converting from the local representation to XDR is called encoding. Converting from XDR to the local representation is called…

Rajitha Sandaruwan

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store