SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING &
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

TECHNOLOGY (IJCET)

ISSN 0976 – 6367(Print)
ISSN 0976 – 6375(Online)
Volume 5, Issue 2, February (2014), pp. 30-39
© IAEME: www.iaeme.com/ijcet.asp
Journal Impact Factor (2014): 4.4012 (Calculated by GISI)
www.jifactor.com

IJCET
©IAEME

DYNAMIC COMPUTATION OF THE APPLICATION BETWEEN SMART
MOBILE DEVICE AND CLOUD COMPUTING
R. Lakshman Naika,

Dr. B. Manjulaa,

M. Rajendra Prasadb

a

b

Department of Computer Science, Kakatiya University,Warangal, A.P., India
Department of Computer Science, Alluri Institute of Management Sciences, Warangal, A.P., India

ABSTRACT
The hardware-software partitioning problem is a key aspect of co-design of digital electronic
systems; extensive research has been performed with diverse definitions of partitioning problems.
However, existent partitioning solutions are not applicable to many real-time applications partly
because of restricted input specification or insufficient constraints. By using the off-loading
technique, a fundamental problem is to partition the dynamic computation of application involved in
between the mobile device and cloud.
In this paper, we proposed three approaches for mobile cloud applications: Extending the
access to cloud services to mobile devices, to enabling mobile devices to work collaboratively as
cloud resource providers, to enhance the execution of mobile applications on portable devices using
available cloud resources. Suitable framework is providing for runtime support with dynamic
computation of the application was proposed. This is different from existing mechanism, the
framework is not only allows the dynamic partitioning for a single user but also supports sharing
and computation instances among multiple users in the cloud to achieve efficient utilization of the
underlying cloud resources.
Keywords: Mobile Cloud Computing, Application Processing and Offloading, FIFO, CaaS.
I.

INTRODUCTION

Over the past few years, advances in the field of network based computing and applications
on demand have led to an explosive growth of application models such as cloud computing, software
as a service, community network, web store, and so on. As a major application model in the era of
the Internet,
30
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

On the other hand, with the advances in technologies of wireless communications and
portable devices, mobile computing has become integrated into the fabric of our every day life. With
increased mobility, users need to run stand-alone and/or to access remote mobile applications on
mobile devices. The application of cloud services in the mobile ecosystem enables a newly emerging
mobile computing paradigm, namely Mobile Cloud Computing (MCC). MCC offers great
opportunities for mobile service industry, allowing mobile devices to utilize the elastic resources
offered by the cloud. There are three MCC approaches: a) extending the access to cloud services to
mobile devices; b) enabling mobile devices to work collaboratively as cloud resource providers [1],
[2]; c) augmenting the execution of mobile applications using cloud resources, e.g. by offloading
selected computing tasks required by applications on mobile devices to the cloud. This will allow us
to create applications that far exceed traditional mobile device’s processing capabilities.
•

•

•

In the first approach, users use mobile devices, often through web browsers, to access software /
applications as services offered by cloud. The mobile cloud is most often viewed as a Softwareas-a-Service (SaaS) cloud. All the computation and data handling are usually performed in the
cloud.
The second MCC approach makes use of the resource at individual mobile devices to provide a
virtual mobile cloud, which is useful in an ad hoc networking environment without the access to
the Internet cloud.
The third MCC approach uses the cloud storage and processing for applications running on
mobile devices. The mobile cloud is considered as an Infrastructure-as-a-Service (IaaS) or
Platform-as-a-Service (PaaS) cloud, which is leveraged to augment the capability of mobile
devices through partial or full offloading of the computation and data storage from the mobile
devices.

So far, there is no comprehensive treatment of the fore-mentioned problems. Existing
computation partitioning mechanisms enable an adaptive execution of mobile application between
mobile devices and the server [3], [4], [5], [6]. However, these efforts are only suitable in traditional
mobile Internet computing and do not give any solution on how to use the elastic resources in clouds
to make the applications scalable in cases of serving a large number of mobile users. Other efforts [7]
[8] [9] [10] in facilitating large scale cloud applications do not fit well in the MCC applications
because they do not provide a flexible and adaptive mechanism to schedule the computation across
the client and clouds.
In this paper, we make use of the third MCC approach to design an execution framework for
mobile data stream applications. The framework consists of runtime systems to support the adaptive
partitioning and distributed execution of the applications. In order to achieve an efficient way to
serve a large number of users, the framework adopts a multi-tendency policy such that the
computation instances on the cloud are able to be shared by multiple applications/tenants.
II.

FRAMEWORK OF DYNAMIC COMPUTATION

A. Framework of Application
The data flow application, presented as a directed acyclic dataflow graph Dg = (Cn , C ) , is
composed of a set of n components Cn = i ; i=1,2,……n and a set of channels C = (i, j ) ; i, jεCn
(Component and node terms are interchangeably used.) The components run concurrently with each
one performing its own functional operations onto the data. The component has input ports and
output ports. Each port is associated with a specific data type. The channel’s capacity is defined as
31
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

the maximum number of units of data the channel is able to hold. The channel also indicates the
precedence constraint between the operations/components for processing one unit of data, which
means the component, can not process the data until all of its precedent components complete the
operation on that data. The component processing the input data of the application is called the entry
node. The component generating the output data is called the exit node. In real implementations, the
components are mapped into threads or processes. The channels are usually implemented by means
of TCP sockets, or shared memory or persistent storage.
The dataflow model is based on a data centric approach and usually takes advantage of
pipeline to accelerate data processing. Given a specific dataflow application, S i is the average number
of CPU instructions required by component i to process one unit of data.

d i,j

presents the amount

of data required to be transmitted on the channel (i , j ) for one unit of data. The weight on a node i
denoted as

wi

presents the computational cost (time). The weight on an edge denoted as

communication cost (time). Both
•
•

wi

and

wei, j are

wei, j

is the

measured by one unit of data.

Critical path is defined as the longest path from the entry node to the exit node, where the weight
of a path is defined as the summation of the weight of all the nodes and edges on the path.
Critical component/channel in a dataflow graph is defined as the one which has the greatest
weight among all the components/channels.

There are two metrics to evaluate the performance of the dataflow applications, makespan
and throughput. Makespan presents the total time to process one unit of input data. It is equal to the
weight of the critical path in the dataflow graph. Throughput presents the number of units of input
data the dataflow is able to process per second. Assuming that all the channels’ capacity is unlimited
and whatever level of pipeline parallelism is allowed, the throughput of the dataflow application is
determined by the critical component/channel, which has the slowest speed to compute/transfer the
data. So we have the formula for throughput
Tp =

1 where
tp

tp

= max{

max (w i ), max
iε c n
i, jε c

Fig.1: framework of application

(we i, j )}

………

(1)

Fig. 2: framework of Mobile Cloud System

B. Framework of System
The mobile cloud system shown in Fig. 2 consists of three parts, mobile clients (devices),
wireless networks and the cloud (data centers). The mobile client accesses to the Internet cloud
services through wireless networks with limited bandwidth. In the cloud are clusters of commodity
32
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

servers which are interconnected to each other through high speed switches. Possibly the mobile
client can accelerate the execution of the mobile applications by offloading computing tasks onto the
cloud. The benefit of offloading is the computational time saved due to the faster execution on much
more powerful CPUs in the cloud. The cost comes from data transmissions over wireless networks
between the client and cloud. The question here is which components in the dataflow graph should
be offloaded onto cloud such that the throughput of the application is maximized. The reason why
we take the throughput as the objective is that the accuracy of many mobile data stream applications
such as face/gesture recognition is determined by its throughput.
The offloading decision mainly depends on the local computing resources and the wireless
networking quality. A few parameters are introduced to model these properties. p is the CPU’s
capability of the mobile device, measured by the number of instructions per second. δ is the
percentage of the ideal CPU resource. It also indicates the current working load on the mobile
device. So the available CPU resource on the mobile device is δ p . B is the bandwidth of the
wireless network for the mobile device to access the Internet cloud. We have the following
assumptions in our system model.
1) The components running concurrently on the mobile devices are allocated equal CPU resources.
2) If a component is offloaded onto cloud, other components running on the mobile client will speed
N

up because of the acquisition of the released CPU resources. The speedup factor is N − 1 , where N
is the number of components on the mobile device before the offloading event.
3) The cloud always has abundant resources to accommodate the offloaded components such that
they will not become the critical component in the dataflow graph.
4) The total wireless bandwidth B are shared by all the crossing channels, where crossing channel in
the dataflow graph is defined as the one which connects two components residing two sides of
different resources. It is possible allowed for the mobile device to allocate disparate bandwidth to
different crossing channels. We do not distinguish between the uplink and downlink bandwidth in
our model.
5) If interdependent components are offloaded onto cloud, the channels connecting between them in
the cloud will not become the critical channel.
6) The input data of the application is acquired from the sensors on the mobile device, and output
data should also be delivered to the mobile device.

C. Problem Formulation of Partitioning
We define an application as a collection of processing modules interacting with each other.
For example, modules are functions, and when a function calls another function, the two functions
interact. For a typical client-server application, both the client and server modules belong to the
application. The client runs at the weak device, and the server runs in machines in the cloud. We
define a partition between client and server as the two sets of modules that cover all modules of the
application. Formally, we define D as the entire set of modules, define d as the partition for mobile
device, and define s as the partition for the server running in the cloud; d ∪ s = D Fig. 3
shows partitioning examples. D circle represents a module, and an edge represents that two modules
connected by the edge interact. In our discussion we focus on the basic partitioning case where two
} . Note that
non-overlapping sets cover the entire application: d ∪ s = D and d ∩ s = {
there are more complex cases like partitioning between a client and multiple servers and partitioning
with overlap sets of modules (e.g., the same module executes at the client and the server).

33
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

Fig. 3: Examples of partitioning of an application composed of four modules when module 1 is
pinned to the client and module 4 is pinned to the server. Note that even with this simple application
there are four possible partitioning examples. Dynamic partitioning chooses what partitioning to use
at run time among the set of available partitioning configurations.
Given the dataflow application { D g (C n , C ), s i , d i , j } the mobile device properties { p , δ } , and the
wireless network bandwidth B, the partitioning problem in this study is the problem of allocating a
set of n components of the dataflow graph to the resources (the mobile client and the cloud) and
allocating the limited wireless bandwidth B to the potential crossing channels such that the
throughput of the data stream application is maximized. The optimization problem is formulated in
Equation (2).
1

max T p =
tp
a i , bi , j

∑b
ε

i, j

, i , j ε {0 ,1,..... n +1} Where

di , j (a i −a j )
Si
∑ a ), max (
t p = max{ max (a i .
)}
i i , jε c
δP iε c
bi , j
iε c n
n

( ai − a j ) 2 = B ,

i, j c

bi , j > o,
ao = 1,
an+1 = 1,

ai = 0 or 1,

iε{ ,2,.... }
1 n

The core variables are
decision for component i. If
otherwise

ai = 0

a
a

…………..

and b

i

i

i , j

.

a

(2)

is either 0 or 1 integer, indicating the offloading

i

equals to 1, component i is executed on the mobile device;

means running on the cloud.

b

i , j

is the wireless bandwidth allocated to the

channel (i , j ) . Note that two virtual nodes, 0 and n + 1 , are created to satisfy the constraint that the
input/output data of the application should be from/delivered to the mobile device. Two edges (0, 1)
and (n , n + 1) are added into the set of edges C of the dataflow graph, where node 1 is the entry node
and node n is the exit node. Accordingly, d 0,1 is the size of a unit of input data. d n ,n +1 is the size of a
unit of output data.

34
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

III.

FRAMEWORK OF EXECUTION

A. Overview
Fig. 4 shows the overview of a dataflow execution framework in mobile cloud computing.
The runtime framework consists of software modules on both the mobile side and the cloud side. The
client side monitors the CPU workload and networking bandwidth. When the application is launched
on the mobile client, a request is sent to the Resource Manager in cloud for augmented execution.
The resource manager then assigns an Application Master to handle the request. The application
master first asks the mobile client for its device characteristics such as CPU capability p, its
workload δ , and the current network bandwidth B. Using this dynamic information from mobile
device as well as the static application properties stored in cloud, the application master then
generates an optimal partitioning result, which is presented in next Section. The components
assigned to the client are initiated as threads on the mobile device. Other components assigned to the
cloud are invoked as services, namely Component-as-a-Service (CaaS). The application master is
also in charge of the data transmission between the mobile client and cloud.
In the framework, every mobile application has an Application Master in cloud to augment its
execution. The components are shared and invoked by applications as a service in cloud. Resource
Manager and the per-machine Node Manager, which monitors the processes on that machine,
constitute the computation fabric in the cloud. Resource Manager manages the global assignment of
computing resources to Application Masters and CaaSs through cooperation with Node Managers. In
our design, we realize multi-tenancy feature for the CaaSs, which allows multiple
tenants/applications to share the CaaS instance. The instance is able to be replicated to handle the
scaling-up load from tenants. A master and slave architecture is used to implement the multi-tenancy
CaaSs, in which Component Master is responsible for scheduling and replicating the component
instances (also referred to Component Slaves). Specifically, Component Master negotiates resources
from Resource Manager and work with Node Managers to launch/terminate slaves according to the
current request load. The purpose of the multi-tenancy CaaS is to guarantee an elastic utilization of
underlying resources to accommodate the scalable CaaS requests.

Fig. 4: Framework of the application
35
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

B. Adaptive Partitioning
The application master, in the middle of the mobile clients and the cloud CaaSs, has two
distinct functionalities: (a) to determine an optimal partition results and make the partitioning
adaptive to the mobile client’s varying environment (local CPU load and wireless networking
bandwidth); (b) to coordinate the distributed execution of the dataflow application.

Fig. 5: Relationship between the mobile client and the application master
Fig. 5 shows the software modules on both the mobile client and application master, which
provides support for the adaptive partitioning. It is assumed that two logical communication
connections exist between both sides: an ”always-on” connection but low data rate wireless
connection which is for transmitting the control message; another wireless connection with
bandwidth B, which is to pipeline the data streams between the mobile client and cloud.
The profiler on the mobile client measures the device’s characteristics at startup and
continuously monitors its CPU workload and wireless network bandwidth. The controller on mobile
client side maintains some thresholds on the variance of the profiling parameters. If any of the
parameters increases/decreases by a value exceeding the threshold, a request for updating the
partitioning result will be sent to the controller on the application master. The controller of
application master calls optimization solver to generate a new partitioning result. Taking the result as
the input, the underlying module DF Execution provides runtime support for the distributed
execution of the dataflow application.
In the design of our framework, we make sure that the runtime software will not bring much
burden onto the mobile device and should be as lightweight as possible. So we put the optimization
solver on the cloud rather than the mobile device to reduce the local resource utilization. Although
the design feature requires an always-on connectivity, it is reasonable because unless there is
wireless connectivity, all the components of the dataflow application is executed locally by default
without the need to call the optimization solver.

C. Distributed Execution
Fig. 6 shows the distributed execution of dataflow example with two partitioning cases. In the
framework, the local components run as threads on mobile device while the remote components are
36
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

executed through the invocation of CaaSs. In a partitioned dataflow application, we name the
component allocated onto mobile device as local component, and the one offloaded onto cloud as
remote component. The application master has one thread for every remote component. These
threads are responsible for data transmission as well as CaaS invocation. Since the threads serve as
the images of the remote components, we call them as image components.
In a partitioned dataflow graph, the shaded node represents the remote component; the blank
one is the local component. The channels are classified into two categories, crossing channel and
internal channel. The crossing channel, e.g. (2; 3), (2; 4), (7; 8) in graph, refers to the edge in the
graph which connects a local component and remote component while the internal channel connects
two local components, e.g., (1; 2) in graph, or two remote components, e.g., (3; 6) in graph. The
crossing channels are implemented by TCP pipes. Through the TCP pipe, the data is pushed from
one component to its successor. Each TCP pipe has one in-memory FIFO at the receiver side to
buffer the data that may not be processed. The internal channels are implemented by shared memory
FIFOs. As a result of the FIFOs on all the channels, our framework enables an asynchronous and
loosely decoupled way to execute the concurrent components.
The objective function shown in Equation (2) depends on two variables, a i and b i , j . We
first study the problem of allocating the wireless bandwidth B to the crossing edges given a specific
partition. It is not difficult to prove theorem 1.
Theorem 1: Given a partition X = { a i | i = 1 , 2 ,.... n } , the throughput is maximized when
b

i , j

satisfies the condition that

Fig. 6: Dataflow Execution of Distributed system
37
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME
bi,j =

di,j
tcomm X)
(

bi, j = 0,

∀(i, j )εC

,

∀(i, j)εC

b 0 ,1 = (1 − a i )

and

d 0 ,1
t comm ( X )

b n ,n +1 = (1 − a n )

and

ai ≠ aj

ai = aj

,

d n ,n +1
t comm ( X )

…………

,

(3)

Where t comm (X ) is the communication cost/time that each crossing channel needs to transfer a unit
of data.
1
tcommX) = [( − ai )d0,1 + (1− an )dn,n+1 + ∑di,j (ai −aj )2],
(
1
B
i , jε c

..………

(4)

………...

(5)

So, the original problem can be reduced into
1
max T p =
max{ t comp ( X ), t comm ( X )}
X

Where

t

comp

(X ) =

Si n
∑ a }
max { a i .
δ P i =1 i
aiε x

and X is a v-dimension vector of 0 and 1. The

application throughput is constrained either by the speed that the local components process the data
or by the speed the crossing channels transfer data.

IV.

EVALUATION

The performance metric we consider in the evaluation is the throughput of the data stream
application. First, we evaluate how the controlling parameters affect the performance. Second, we
study the effect of the input parameters including application graphs, the wireless networking
bandwidth B and the available computing resource at mobile device δ p . At last, we demonstrate the
factor that can affect the computational cost. The input application graph we consider is the
randomly generated application graphs. We have implemented a graph generator to generate the
weighted streaming application graphs. We use the level-by-level method to create the graph which
was proposed by Tobita and Kasahara [11]. We could control the graph that we want to generate
through the following parameters: 1) number of nodes; 2) average out degree and 3) communicationto-computation ratio (CCR), where CCR is defined as the ratio of the average communication time to
the average computation time as shown in equation (6). If an application graph’s CCR is high, it can
be considered as a communication-intensive application. Otherwise, it is a computation-intensive
application.
CCR =

[d 0,1 + dn ,n +1 + ∑i , jεC d i , j ] /[(e + 2) × B ]

………..

n

(∑iεC S i )/(n × δp )

(6)

We have done a group of experiments to evaluate the effect of both controlling parameters
and input parameters to the performance.
38
International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print),
ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME

V.

CONCLUSIONS

In this paper, we argue for dynamic partitioning of applications between weak device and
cloud to better support applications running in diverse devices in different environments. We
formalize the dynamic partitioning problem and sketch how to construct a system that supports
dynamic partitioning. We then designed an application framework to provide runtime support for the
adaptive partitioning and distributed execution of such advanced mobile cloud applications. The
framework is able to serve large number of mobile users by leveraging the elastic resources in
existing cloud infrastructures. We believe that dynamic partitioning is an important part of future
mobile cloud computing.
In future, we are going to conduct a series of experimental tests on real-world applications
such as hand gesture recognition and mobile augmented reality based on our proposed framework.
We are testing the performance of the applications in case of various environment parameters such as
mobile devices’ CPU resource and networking bandwidth, and compare the performance of the
partitioned application with two strategies like with/without partitioning.

REFERENCES
[1]
[2]
[3]
[4]
[5]

[6]

[7]

[8]

[9]
[10]
[11]
[12]

[13]

E. E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices using MapReduce”, in Master
Thesis, Carnegie Mellon University, 2009.
Gonzalo Huerta-Canepa, Dongman Lee, “A Virtual Cloud Computing Provider for Mobile
Devices”, in proceedings of ACM MCS’10, pages 3756–3761. ACM Press, 2010.
Eduardo Cuervoy, Aruna Balasubramanianz, Dae-ki Cho, “MAUI: Making Smartphones Last
Longer with Code Offload”, in proceedings of MobiSys’10, ACM press, 2010.
Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti, “CloneCloud:
Elastic Execution between Mobile Device and Cloud”, in proceedings of EuroSys’10.
I. Giurgiu, O. Riva, D. Juric, I. Krivulev, and G. Alonso, “Calling the Cloud: Enabling Mobile
Phones as Interfaces to Cloud Applications”, in proceedings of Middleware’09, pages 1–20.
Springer, 2009.
Moo-Ryong Ra, Anmol Sheth, Lily Mummert, Padmanabhan Pillai, David Wetherall, Ramesh
Govindan, “Odessa: enabling interactive perception applications on mobile devices”, in
proceedings of ACM MobiSys’11, 2011.
M. Cherniack, H. Balakrishnan, M. Balazinska, “Scalable Distributed Stream processing”, in
proceedings of the Conference on Innovative Data Systems Research, pages 422–440. ACM
Press, 2003.
S. Chandrasekaran, O. Cooper, A. Deshpande, “TelegraphCQ: Continuous Dataflow Processing
for an Uncertain World”, in proceedings of the Conference on Innovative Data Systems
Research, 2003.
J. Dean, S. Ghemawat, “MapReduce: simplified data processing on large clusters”, in
proceedings of ACM OSDI’04.
M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, “Dryad: distributed data-parallel
programs from sequential building blocks”, in proceeding of EuroSys’07.
T. Tobita, H. Kasahara, “A standard task graph set for fair evaluation of multiprocessor
scheduling algorithms”, Journal of Scheduling, 5(5):379–394, 2002.
Monal Mehta, Ishitva Ajmera, Rakesh Jondhale, “Mobile Cloud Computing”, International
Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN Print:
0976- 6464, ISSN Online: 0976 –6472, Volume 4, Issue 5, pp. 152 - 160, 2013.
R. Lakshman Naik, D. Ramesh, B. Manjula, “Instances Selection using Advance Data Mining
Techniques”, International Journal of Computer Engineering & Technology (IJCET), ISSN Print:
0976 – 6367, ISSN Online: 0976 – 6375, Volume 3, Issue 2, pp. 47 - 53, 2012.
39

Mais conteúdo relacionado

Mais procurados

Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementZac Darcy
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
 
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...IJECEIAES
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grideSAT Journals
 
A practical architecture for mobile edge computing
A practical architecture for mobile edge computingA practical architecture for mobile edge computing
A practical architecture for mobile edge computingTejas subramanya
 
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IJCNCJournal
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsijdms
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARISivaSankari36
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsredpel dot com
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
 

Mais procurados (20)

Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurementOptimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart gridAn optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
A practical architecture for mobile edge computing
A practical architecture for mobile edge computingA practical architecture for mobile edge computing
A practical architecture for mobile edge computing
 
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
 
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
 
C0848062312
C0848062312C0848062312
C0848062312
 
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARIMOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
 
Proposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud ComputingProposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud Computing
 
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud EnvironmentContemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
 

Destaque (10)

10220140501001 (1)
10220140501001 (1)10220140501001 (1)
10220140501001 (1)
 
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement ofFeature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
 
50120140501014
5012014050101450120140501014
50120140501014
 
50120140501016
5012014050101650120140501016
50120140501016
 
50120130406017
5012013040601750120130406017
50120130406017
 
20320130405009
2032013040500920320130405009
20320130405009
 
40220140501008 2
40220140501008 240220140501008 2
40220140501008 2
 
10120140504014 2
10120140504014 210120140504014 2
10120140504014 2
 
El razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicialEl razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicial
 
10120130406014 2-3
10120130406014 2-310120130406014 2-3
10120130406014 2-3
 

Semelhante a IJCET Dynamic Computation Mobile Cloud Applications

A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saasIAEME Publication
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingSuzanne Simmons
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...IJECEIAES
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...IJCSIS Research Publications
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdffermanrw
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachIRJET Journal
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Souvik Pal
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...ijccsa
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationseSAT Publishing House
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart cityIJCNCJournal
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksiaemedu
 
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureCloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureIRJET Journal
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY IJCNCJournal
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismIRJET Journal
 

Semelhante a IJCET Dynamic Computation Mobile Cloud Applications (20)

A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
40120130405016
4012013040501640120130405016
40120130405016
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saasResource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
 
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud ComputingA Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
 
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
9-2020.pdf
9-2020.pdf9-2020.pdf
9-2020.pdf
 
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing ApproachImproving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
 
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
 
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
 
50120140502008
5012014050200850120140502008
50120140502008
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
 
Infrastructure of services for a smart city
Infrastructure of services for a smart cityInfrastructure of services for a smart city
Infrastructure of services for a smart city
 
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networksAnalysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
 
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport StructureCloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport Structure
 
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
 
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable MechanismSurvey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
 

Mais de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mais de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

IJCET Dynamic Computation Mobile Cloud Applications

  • 1. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com IJCET ©IAEME DYNAMIC COMPUTATION OF THE APPLICATION BETWEEN SMART MOBILE DEVICE AND CLOUD COMPUTING R. Lakshman Naika, Dr. B. Manjulaa, M. Rajendra Prasadb a b Department of Computer Science, Kakatiya University,Warangal, A.P., India Department of Computer Science, Alluri Institute of Management Sciences, Warangal, A.P., India ABSTRACT The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique, a fundamental problem is to partition the dynamic computation of application involved in between the mobile device and cloud. In this paper, we proposed three approaches for mobile cloud applications: Extending the access to cloud services to mobile devices, to enabling mobile devices to work collaboratively as cloud resource providers, to enhance the execution of mobile applications on portable devices using available cloud resources. Suitable framework is providing for runtime support with dynamic computation of the application was proposed. This is different from existing mechanism, the framework is not only allows the dynamic partitioning for a single user but also supports sharing and computation instances among multiple users in the cloud to achieve efficient utilization of the underlying cloud resources. Keywords: Mobile Cloud Computing, Application Processing and Offloading, FIFO, CaaS. I. INTRODUCTION Over the past few years, advances in the field of network based computing and applications on demand have led to an explosive growth of application models such as cloud computing, software as a service, community network, web store, and so on. As a major application model in the era of the Internet, 30
  • 2. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME On the other hand, with the advances in technologies of wireless communications and portable devices, mobile computing has become integrated into the fabric of our every day life. With increased mobility, users need to run stand-alone and/or to access remote mobile applications on mobile devices. The application of cloud services in the mobile ecosystem enables a newly emerging mobile computing paradigm, namely Mobile Cloud Computing (MCC). MCC offers great opportunities for mobile service industry, allowing mobile devices to utilize the elastic resources offered by the cloud. There are three MCC approaches: a) extending the access to cloud services to mobile devices; b) enabling mobile devices to work collaboratively as cloud resource providers [1], [2]; c) augmenting the execution of mobile applications using cloud resources, e.g. by offloading selected computing tasks required by applications on mobile devices to the cloud. This will allow us to create applications that far exceed traditional mobile device’s processing capabilities. • • • In the first approach, users use mobile devices, often through web browsers, to access software / applications as services offered by cloud. The mobile cloud is most often viewed as a Softwareas-a-Service (SaaS) cloud. All the computation and data handling are usually performed in the cloud. The second MCC approach makes use of the resource at individual mobile devices to provide a virtual mobile cloud, which is useful in an ad hoc networking environment without the access to the Internet cloud. The third MCC approach uses the cloud storage and processing for applications running on mobile devices. The mobile cloud is considered as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud, which is leveraged to augment the capability of mobile devices through partial or full offloading of the computation and data storage from the mobile devices. So far, there is no comprehensive treatment of the fore-mentioned problems. Existing computation partitioning mechanisms enable an adaptive execution of mobile application between mobile devices and the server [3], [4], [5], [6]. However, these efforts are only suitable in traditional mobile Internet computing and do not give any solution on how to use the elastic resources in clouds to make the applications scalable in cases of serving a large number of mobile users. Other efforts [7] [8] [9] [10] in facilitating large scale cloud applications do not fit well in the MCC applications because they do not provide a flexible and adaptive mechanism to schedule the computation across the client and clouds. In this paper, we make use of the third MCC approach to design an execution framework for mobile data stream applications. The framework consists of runtime systems to support the adaptive partitioning and distributed execution of the applications. In order to achieve an efficient way to serve a large number of users, the framework adopts a multi-tendency policy such that the computation instances on the cloud are able to be shared by multiple applications/tenants. II. FRAMEWORK OF DYNAMIC COMPUTATION A. Framework of Application The data flow application, presented as a directed acyclic dataflow graph Dg = (Cn , C ) , is composed of a set of n components Cn = i ; i=1,2,……n and a set of channels C = (i, j ) ; i, jεCn (Component and node terms are interchangeably used.) The components run concurrently with each one performing its own functional operations onto the data. The component has input ports and output ports. Each port is associated with a specific data type. The channel’s capacity is defined as 31
  • 3. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME the maximum number of units of data the channel is able to hold. The channel also indicates the precedence constraint between the operations/components for processing one unit of data, which means the component, can not process the data until all of its precedent components complete the operation on that data. The component processing the input data of the application is called the entry node. The component generating the output data is called the exit node. In real implementations, the components are mapped into threads or processes. The channels are usually implemented by means of TCP sockets, or shared memory or persistent storage. The dataflow model is based on a data centric approach and usually takes advantage of pipeline to accelerate data processing. Given a specific dataflow application, S i is the average number of CPU instructions required by component i to process one unit of data. d i,j presents the amount of data required to be transmitted on the channel (i , j ) for one unit of data. The weight on a node i denoted as wi presents the computational cost (time). The weight on an edge denoted as communication cost (time). Both • • wi and wei, j are wei, j is the measured by one unit of data. Critical path is defined as the longest path from the entry node to the exit node, where the weight of a path is defined as the summation of the weight of all the nodes and edges on the path. Critical component/channel in a dataflow graph is defined as the one which has the greatest weight among all the components/channels. There are two metrics to evaluate the performance of the dataflow applications, makespan and throughput. Makespan presents the total time to process one unit of input data. It is equal to the weight of the critical path in the dataflow graph. Throughput presents the number of units of input data the dataflow is able to process per second. Assuming that all the channels’ capacity is unlimited and whatever level of pipeline parallelism is allowed, the throughput of the dataflow application is determined by the critical component/channel, which has the slowest speed to compute/transfer the data. So we have the formula for throughput Tp = 1 where tp tp = max{ max (w i ), max iε c n i, jε c Fig.1: framework of application (we i, j )} ……… (1) Fig. 2: framework of Mobile Cloud System B. Framework of System The mobile cloud system shown in Fig. 2 consists of three parts, mobile clients (devices), wireless networks and the cloud (data centers). The mobile client accesses to the Internet cloud services through wireless networks with limited bandwidth. In the cloud are clusters of commodity 32
  • 4. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME servers which are interconnected to each other through high speed switches. Possibly the mobile client can accelerate the execution of the mobile applications by offloading computing tasks onto the cloud. The benefit of offloading is the computational time saved due to the faster execution on much more powerful CPUs in the cloud. The cost comes from data transmissions over wireless networks between the client and cloud. The question here is which components in the dataflow graph should be offloaded onto cloud such that the throughput of the application is maximized. The reason why we take the throughput as the objective is that the accuracy of many mobile data stream applications such as face/gesture recognition is determined by its throughput. The offloading decision mainly depends on the local computing resources and the wireless networking quality. A few parameters are introduced to model these properties. p is the CPU’s capability of the mobile device, measured by the number of instructions per second. δ is the percentage of the ideal CPU resource. It also indicates the current working load on the mobile device. So the available CPU resource on the mobile device is δ p . B is the bandwidth of the wireless network for the mobile device to access the Internet cloud. We have the following assumptions in our system model. 1) The components running concurrently on the mobile devices are allocated equal CPU resources. 2) If a component is offloaded onto cloud, other components running on the mobile client will speed N up because of the acquisition of the released CPU resources. The speedup factor is N − 1 , where N is the number of components on the mobile device before the offloading event. 3) The cloud always has abundant resources to accommodate the offloaded components such that they will not become the critical component in the dataflow graph. 4) The total wireless bandwidth B are shared by all the crossing channels, where crossing channel in the dataflow graph is defined as the one which connects two components residing two sides of different resources. It is possible allowed for the mobile device to allocate disparate bandwidth to different crossing channels. We do not distinguish between the uplink and downlink bandwidth in our model. 5) If interdependent components are offloaded onto cloud, the channels connecting between them in the cloud will not become the critical channel. 6) The input data of the application is acquired from the sensors on the mobile device, and output data should also be delivered to the mobile device. C. Problem Formulation of Partitioning We define an application as a collection of processing modules interacting with each other. For example, modules are functions, and when a function calls another function, the two functions interact. For a typical client-server application, both the client and server modules belong to the application. The client runs at the weak device, and the server runs in machines in the cloud. We define a partition between client and server as the two sets of modules that cover all modules of the application. Formally, we define D as the entire set of modules, define d as the partition for mobile device, and define s as the partition for the server running in the cloud; d ∪ s = D Fig. 3 shows partitioning examples. D circle represents a module, and an edge represents that two modules connected by the edge interact. In our discussion we focus on the basic partitioning case where two } . Note that non-overlapping sets cover the entire application: d ∪ s = D and d ∩ s = { there are more complex cases like partitioning between a client and multiple servers and partitioning with overlap sets of modules (e.g., the same module executes at the client and the server). 33
  • 5. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME Fig. 3: Examples of partitioning of an application composed of four modules when module 1 is pinned to the client and module 4 is pinned to the server. Note that even with this simple application there are four possible partitioning examples. Dynamic partitioning chooses what partitioning to use at run time among the set of available partitioning configurations. Given the dataflow application { D g (C n , C ), s i , d i , j } the mobile device properties { p , δ } , and the wireless network bandwidth B, the partitioning problem in this study is the problem of allocating a set of n components of the dataflow graph to the resources (the mobile client and the cloud) and allocating the limited wireless bandwidth B to the potential crossing channels such that the throughput of the data stream application is maximized. The optimization problem is formulated in Equation (2). 1 max T p = tp a i , bi , j ∑b ε i, j , i , j ε {0 ,1,..... n +1} Where di , j (a i −a j ) Si ∑ a ), max ( t p = max{ max (a i . )} i i , jε c δP iε c bi , j iε c n n ( ai − a j ) 2 = B , i, j c bi , j > o, ao = 1, an+1 = 1, ai = 0 or 1, iε{ ,2,.... } 1 n The core variables are decision for component i. If otherwise ai = 0 a a ………….. and b i i i , j . a (2) is either 0 or 1 integer, indicating the offloading i equals to 1, component i is executed on the mobile device; means running on the cloud. b i , j is the wireless bandwidth allocated to the channel (i , j ) . Note that two virtual nodes, 0 and n + 1 , are created to satisfy the constraint that the input/output data of the application should be from/delivered to the mobile device. Two edges (0, 1) and (n , n + 1) are added into the set of edges C of the dataflow graph, where node 1 is the entry node and node n is the exit node. Accordingly, d 0,1 is the size of a unit of input data. d n ,n +1 is the size of a unit of output data. 34
  • 6. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME III. FRAMEWORK OF EXECUTION A. Overview Fig. 4 shows the overview of a dataflow execution framework in mobile cloud computing. The runtime framework consists of software modules on both the mobile side and the cloud side. The client side monitors the CPU workload and networking bandwidth. When the application is launched on the mobile client, a request is sent to the Resource Manager in cloud for augmented execution. The resource manager then assigns an Application Master to handle the request. The application master first asks the mobile client for its device characteristics such as CPU capability p, its workload δ , and the current network bandwidth B. Using this dynamic information from mobile device as well as the static application properties stored in cloud, the application master then generates an optimal partitioning result, which is presented in next Section. The components assigned to the client are initiated as threads on the mobile device. Other components assigned to the cloud are invoked as services, namely Component-as-a-Service (CaaS). The application master is also in charge of the data transmission between the mobile client and cloud. In the framework, every mobile application has an Application Master in cloud to augment its execution. The components are shared and invoked by applications as a service in cloud. Resource Manager and the per-machine Node Manager, which monitors the processes on that machine, constitute the computation fabric in the cloud. Resource Manager manages the global assignment of computing resources to Application Masters and CaaSs through cooperation with Node Managers. In our design, we realize multi-tenancy feature for the CaaSs, which allows multiple tenants/applications to share the CaaS instance. The instance is able to be replicated to handle the scaling-up load from tenants. A master and slave architecture is used to implement the multi-tenancy CaaSs, in which Component Master is responsible for scheduling and replicating the component instances (also referred to Component Slaves). Specifically, Component Master negotiates resources from Resource Manager and work with Node Managers to launch/terminate slaves according to the current request load. The purpose of the multi-tenancy CaaS is to guarantee an elastic utilization of underlying resources to accommodate the scalable CaaS requests. Fig. 4: Framework of the application 35
  • 7. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME B. Adaptive Partitioning The application master, in the middle of the mobile clients and the cloud CaaSs, has two distinct functionalities: (a) to determine an optimal partition results and make the partitioning adaptive to the mobile client’s varying environment (local CPU load and wireless networking bandwidth); (b) to coordinate the distributed execution of the dataflow application. Fig. 5: Relationship between the mobile client and the application master Fig. 5 shows the software modules on both the mobile client and application master, which provides support for the adaptive partitioning. It is assumed that two logical communication connections exist between both sides: an ”always-on” connection but low data rate wireless connection which is for transmitting the control message; another wireless connection with bandwidth B, which is to pipeline the data streams between the mobile client and cloud. The profiler on the mobile client measures the device’s characteristics at startup and continuously monitors its CPU workload and wireless network bandwidth. The controller on mobile client side maintains some thresholds on the variance of the profiling parameters. If any of the parameters increases/decreases by a value exceeding the threshold, a request for updating the partitioning result will be sent to the controller on the application master. The controller of application master calls optimization solver to generate a new partitioning result. Taking the result as the input, the underlying module DF Execution provides runtime support for the distributed execution of the dataflow application. In the design of our framework, we make sure that the runtime software will not bring much burden onto the mobile device and should be as lightweight as possible. So we put the optimization solver on the cloud rather than the mobile device to reduce the local resource utilization. Although the design feature requires an always-on connectivity, it is reasonable because unless there is wireless connectivity, all the components of the dataflow application is executed locally by default without the need to call the optimization solver. C. Distributed Execution Fig. 6 shows the distributed execution of dataflow example with two partitioning cases. In the framework, the local components run as threads on mobile device while the remote components are 36
  • 8. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME executed through the invocation of CaaSs. In a partitioned dataflow application, we name the component allocated onto mobile device as local component, and the one offloaded onto cloud as remote component. The application master has one thread for every remote component. These threads are responsible for data transmission as well as CaaS invocation. Since the threads serve as the images of the remote components, we call them as image components. In a partitioned dataflow graph, the shaded node represents the remote component; the blank one is the local component. The channels are classified into two categories, crossing channel and internal channel. The crossing channel, e.g. (2; 3), (2; 4), (7; 8) in graph, refers to the edge in the graph which connects a local component and remote component while the internal channel connects two local components, e.g., (1; 2) in graph, or two remote components, e.g., (3; 6) in graph. The crossing channels are implemented by TCP pipes. Through the TCP pipe, the data is pushed from one component to its successor. Each TCP pipe has one in-memory FIFO at the receiver side to buffer the data that may not be processed. The internal channels are implemented by shared memory FIFOs. As a result of the FIFOs on all the channels, our framework enables an asynchronous and loosely decoupled way to execute the concurrent components. The objective function shown in Equation (2) depends on two variables, a i and b i , j . We first study the problem of allocating the wireless bandwidth B to the crossing edges given a specific partition. It is not difficult to prove theorem 1. Theorem 1: Given a partition X = { a i | i = 1 , 2 ,.... n } , the throughput is maximized when b i , j satisfies the condition that Fig. 6: Dataflow Execution of Distributed system 37
  • 9. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME bi,j = di,j tcomm X) ( bi, j = 0, ∀(i, j )εC , ∀(i, j)εC b 0 ,1 = (1 − a i ) and d 0 ,1 t comm ( X ) b n ,n +1 = (1 − a n ) and ai ≠ aj ai = aj , d n ,n +1 t comm ( X ) ………… , (3) Where t comm (X ) is the communication cost/time that each crossing channel needs to transfer a unit of data. 1 tcommX) = [( − ai )d0,1 + (1− an )dn,n+1 + ∑di,j (ai −aj )2], ( 1 B i , jε c ..……… (4) ………... (5) So, the original problem can be reduced into 1 max T p = max{ t comp ( X ), t comm ( X )} X Where t comp (X ) = Si n ∑ a } max { a i . δ P i =1 i aiε x and X is a v-dimension vector of 0 and 1. The application throughput is constrained either by the speed that the local components process the data or by the speed the crossing channels transfer data. IV. EVALUATION The performance metric we consider in the evaluation is the throughput of the data stream application. First, we evaluate how the controlling parameters affect the performance. Second, we study the effect of the input parameters including application graphs, the wireless networking bandwidth B and the available computing resource at mobile device δ p . At last, we demonstrate the factor that can affect the computational cost. The input application graph we consider is the randomly generated application graphs. We have implemented a graph generator to generate the weighted streaming application graphs. We use the level-by-level method to create the graph which was proposed by Tobita and Kasahara [11]. We could control the graph that we want to generate through the following parameters: 1) number of nodes; 2) average out degree and 3) communicationto-computation ratio (CCR), where CCR is defined as the ratio of the average communication time to the average computation time as shown in equation (6). If an application graph’s CCR is high, it can be considered as a communication-intensive application. Otherwise, it is a computation-intensive application. CCR = [d 0,1 + dn ,n +1 + ∑i , jεC d i , j ] /[(e + 2) × B ] ……….. n (∑iεC S i )/(n × δp ) (6) We have done a group of experiments to evaluate the effect of both controlling parameters and input parameters to the performance. 38
  • 10. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME V. CONCLUSIONS In this paper, we argue for dynamic partitioning of applications between weak device and cloud to better support applications running in diverse devices in different environments. We formalize the dynamic partitioning problem and sketch how to construct a system that supports dynamic partitioning. We then designed an application framework to provide runtime support for the adaptive partitioning and distributed execution of such advanced mobile cloud applications. The framework is able to serve large number of mobile users by leveraging the elastic resources in existing cloud infrastructures. We believe that dynamic partitioning is an important part of future mobile cloud computing. In future, we are going to conduct a series of experimental tests on real-world applications such as hand gesture recognition and mobile augmented reality based on our proposed framework. We are testing the performance of the applications in case of various environment parameters such as mobile devices’ CPU resource and networking bandwidth, and compare the performance of the partitioned application with two strategies like with/without partitioning. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] E. E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices using MapReduce”, in Master Thesis, Carnegie Mellon University, 2009. Gonzalo Huerta-Canepa, Dongman Lee, “A Virtual Cloud Computing Provider for Mobile Devices”, in proceedings of ACM MCS’10, pages 3756–3761. ACM Press, 2010. Eduardo Cuervoy, Aruna Balasubramanianz, Dae-ki Cho, “MAUI: Making Smartphones Last Longer with Code Offload”, in proceedings of MobiSys’10, ACM press, 2010. Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti, “CloneCloud: Elastic Execution between Mobile Device and Cloud”, in proceedings of EuroSys’10. I. Giurgiu, O. Riva, D. Juric, I. Krivulev, and G. Alonso, “Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications”, in proceedings of Middleware’09, pages 1–20. Springer, 2009. Moo-Ryong Ra, Anmol Sheth, Lily Mummert, Padmanabhan Pillai, David Wetherall, Ramesh Govindan, “Odessa: enabling interactive perception applications on mobile devices”, in proceedings of ACM MobiSys’11, 2011. M. Cherniack, H. Balakrishnan, M. Balazinska, “Scalable Distributed Stream processing”, in proceedings of the Conference on Innovative Data Systems Research, pages 422–440. ACM Press, 2003. S. Chandrasekaran, O. Cooper, A. Deshpande, “TelegraphCQ: Continuous Dataflow Processing for an Uncertain World”, in proceedings of the Conference on Innovative Data Systems Research, 2003. J. Dean, S. Ghemawat, “MapReduce: simplified data processing on large clusters”, in proceedings of ACM OSDI’04. M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, “Dryad: distributed data-parallel programs from sequential building blocks”, in proceeding of EuroSys’07. T. Tobita, H. Kasahara, “A standard task graph set for fair evaluation of multiprocessor scheduling algorithms”, Journal of Scheduling, 5(5):379–394, 2002. Monal Mehta, Ishitva Ajmera, Rakesh Jondhale, “Mobile Cloud Computing”, International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN Print: 0976- 6464, ISSN Online: 0976 –6472, Volume 4, Issue 5, pp. 152 - 160, 2013. R. Lakshman Naik, D. Ramesh, B. Manjula, “Instances Selection using Advance Data Mining Techniques”, International Journal of Computer Engineering & Technology (IJCET), ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Volume 3, Issue 2, pp. 47 - 53, 2012. 39