Enviar pesquisa
Carregar
IJCET Dynamic Computation Mobile Cloud Applications
•
0 gostou
•
283 visualizações
Título melhorado com IA
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 10
Baixar agora
Baixar para ler offline
Recomendados
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
IJERA Editor
Evaluation of load balancing approaches for Erlang concurrent application in ...
Evaluation of load balancing approaches for Erlang concurrent application in ...
TELKOMNIKA JOURNAL
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Eswar Publications
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...
IJCNCJournal
Mobile cloud computing
Mobile cloud computing
Dr Amira Bibo
50120130406009 2
50120130406009 2
IAEME Publication
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET Journal
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
ijcsit
Recomendados
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
IJERA Editor
Evaluation of load balancing approaches for Erlang concurrent application in ...
Evaluation of load balancing approaches for Erlang concurrent application in ...
TELKOMNIKA JOURNAL
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Eswar Publications
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...
IJCNCJournal
Mobile cloud computing
Mobile cloud computing
Dr Amira Bibo
50120130406009 2
50120130406009 2
IAEME Publication
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET Journal
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
ijcsit
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
IJECEIAES
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
IJCNCJournal
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
IJCNCJournal
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
Zac Darcy
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
IJECEIAES
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
IJECEIAES
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
HarshitParkar6677
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
eSAT Journals
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
A practical architecture for mobile edge computing
A practical architecture for mobile edge computing
Tejas subramanya
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IJCNCJournal
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
IJECEIAES
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
ijdms
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
IJECEIAES
C0848062312
C0848062312
9000092400
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
SivaSankari36
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
redpel dot com
Proposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud Computing
IJCSIS Research Publications
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
ijceronline
10220140501001 (1)
10220140501001 (1)
IAEME Publication
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
IAEME Publication
Mais conteúdo relacionado
Mais procurados
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
IJECEIAES
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
IJCNCJournal
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
IJCNCJournal
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
IJCI JOURNAL
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
Zac Darcy
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
IJECEIAES
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
IJECEIAES
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
HarshitParkar6677
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
eSAT Journals
IJET-V3I1P24
IJET-V3I1P24
IJET - International Journal of Engineering and Techniques
A practical architecture for mobile edge computing
A practical architecture for mobile edge computing
Tejas subramanya
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IJCNCJournal
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
IJECEIAES
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
ijdms
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
IJECEIAES
C0848062312
C0848062312
9000092400
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
SivaSankari36
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
redpel dot com
Proposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud Computing
IJCSIS Research Publications
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
ijceronline
Mais procurados
(20)
Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
Optimal content downloading in vehicular network with density measurement
Optimal content downloading in vehicular network with density measurement
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
A hierarchical RCNN for vehicle and vehicle license plate detection and recog...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
An optimization framework for cloud based data management model in smart grid
An optimization framework for cloud based data management model in smart grid
IJET-V3I1P24
IJET-V3I1P24
A practical architecture for mobile edge computing
A practical architecture for mobile edge computing
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...
C0848062312
C0848062312
MOBILE COMPUTING BY SIVASANKARI
MOBILE COMPUTING BY SIVASANKARI
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
Proposed Algorithms for UAV based Cloud Computing
Proposed Algorithms for UAV based Cloud Computing
Contemporary Energy Optimization for Mobile and Cloud Environment
Contemporary Energy Optimization for Mobile and Cloud Environment
Destaque
10220140501001 (1)
10220140501001 (1)
IAEME Publication
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
IAEME Publication
50120140501014
50120140501014
IAEME Publication
50120140501016
50120140501016
IAEME Publication
50120130406017
50120130406017
IAEME Publication
20320130405009
20320130405009
IAEME Publication
40220140501008 2
40220140501008 2
IAEME Publication
10120140504014 2
10120140504014 2
IAEME Publication
El razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicial
Daniela Paez
10120130406014 2-3
10120130406014 2-3
IAEME Publication
Destaque
(10)
10220140501001 (1)
10220140501001 (1)
Feature based head pose estimation for controlling movement of
Feature based head pose estimation for controlling movement of
50120140501014
50120140501014
50120140501016
50120140501016
50120130406017
50120130406017
20320130405009
20320130405009
40220140501008 2
40220140501008 2
10120140504014 2
10120140504014 2
El razonamiento jurídico en la sede judicial
El razonamiento jurídico en la sede judicial
10120130406014 2-3
10120130406014 2-3
Semelhante a IJCET Dynamic Computation Mobile Cloud Applications
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
IJECEIAES
40120130405016
40120130405016
IAEME Publication
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
IAEME Publication
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
Suzanne Simmons
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
IJECEIAES
Core of Cloud Computing
Core of Cloud Computing
IJERA Editor
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
IJCSIS Research Publications
9-2020.pdf
9-2020.pdf
fermanrw
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
IRJET Journal
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
Souvik Pal
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
ijccsa
50120140502008
50120140502008
IAEME Publication
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
eSAT Publishing House
Infrastructure of services for a smart city
Infrastructure of services for a smart city
IJCNCJournal
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
iaemedu
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport Structure
IRJET Journal
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
IJCNCJournal
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
IRJET Journal
Semelhante a IJCET Dynamic Computation Mobile Cloud Applications
(20)
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
40120130405016
40120130405016
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Resource provisioning for video on demand in saas
Resource provisioning for video on demand in saas
A Review And Research Towards Mobile Cloud Computing
A Review And Research Towards Mobile Cloud Computing
A review on orchestration distributed systems for IoT smart services in fog c...
A review on orchestration distributed systems for IoT smart services in fog c...
Core of Cloud Computing
Core of Cloud Computing
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
9-2020.pdf
9-2020.pdf
Improving Cloud Performance through Performance Based Load Balancing Approach
Improving Cloud Performance through Performance Based Load Balancing Approach
Efficient architectural framework of cloud computing
Efficient architectural framework of cloud computing
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
Optimization and Evaluation of a Multimedia Streaming Service on Hybrid Telco...
50120140502008
50120140502008
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
Infrastructure of services for a smart city
Infrastructure of services for a smart city
Analysis of programming aspects of wireless sensor networks
Analysis of programming aspects of wireless sensor networks
Cloud Computing for Agent-Based Urban Transport Structure
Cloud Computing for Agent-Based Urban Transport Structure
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
MOBILE CROWD SENSING RPL-BASED ROUTING PROTOCOL FOR SMART CITY
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Survey on Synchronizing File Operations Along with Storage Scalable Mechanism
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
Results
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Katpro Technologies
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Último
(20)
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
IJCET Dynamic Computation Mobile Cloud Applications
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME: www.iaeme.com/ijcet.asp Journal Impact Factor (2014): 4.4012 (Calculated by GISI) www.jifactor.com IJCET ©IAEME DYNAMIC COMPUTATION OF THE APPLICATION BETWEEN SMART MOBILE DEVICE AND CLOUD COMPUTING R. Lakshman Naika, Dr. B. Manjulaa, M. Rajendra Prasadb a b Department of Computer Science, Kakatiya University,Warangal, A.P., India Department of Computer Science, Alluri Institute of Management Sciences, Warangal, A.P., India ABSTRACT The hardware-software partitioning problem is a key aspect of co-design of digital electronic systems; extensive research has been performed with diverse definitions of partitioning problems. However, existent partitioning solutions are not applicable to many real-time applications partly because of restricted input specification or insufficient constraints. By using the off-loading technique, a fundamental problem is to partition the dynamic computation of application involved in between the mobile device and cloud. In this paper, we proposed three approaches for mobile cloud applications: Extending the access to cloud services to mobile devices, to enabling mobile devices to work collaboratively as cloud resource providers, to enhance the execution of mobile applications on portable devices using available cloud resources. Suitable framework is providing for runtime support with dynamic computation of the application was proposed. This is different from existing mechanism, the framework is not only allows the dynamic partitioning for a single user but also supports sharing and computation instances among multiple users in the cloud to achieve efficient utilization of the underlying cloud resources. Keywords: Mobile Cloud Computing, Application Processing and Offloading, FIFO, CaaS. I. INTRODUCTION Over the past few years, advances in the field of network based computing and applications on demand have led to an explosive growth of application models such as cloud computing, software as a service, community network, web store, and so on. As a major application model in the era of the Internet, 30
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME On the other hand, with the advances in technologies of wireless communications and portable devices, mobile computing has become integrated into the fabric of our every day life. With increased mobility, users need to run stand-alone and/or to access remote mobile applications on mobile devices. The application of cloud services in the mobile ecosystem enables a newly emerging mobile computing paradigm, namely Mobile Cloud Computing (MCC). MCC offers great opportunities for mobile service industry, allowing mobile devices to utilize the elastic resources offered by the cloud. There are three MCC approaches: a) extending the access to cloud services to mobile devices; b) enabling mobile devices to work collaboratively as cloud resource providers [1], [2]; c) augmenting the execution of mobile applications using cloud resources, e.g. by offloading selected computing tasks required by applications on mobile devices to the cloud. This will allow us to create applications that far exceed traditional mobile device’s processing capabilities. • • • In the first approach, users use mobile devices, often through web browsers, to access software / applications as services offered by cloud. The mobile cloud is most often viewed as a Softwareas-a-Service (SaaS) cloud. All the computation and data handling are usually performed in the cloud. The second MCC approach makes use of the resource at individual mobile devices to provide a virtual mobile cloud, which is useful in an ad hoc networking environment without the access to the Internet cloud. The third MCC approach uses the cloud storage and processing for applications running on mobile devices. The mobile cloud is considered as an Infrastructure-as-a-Service (IaaS) or Platform-as-a-Service (PaaS) cloud, which is leveraged to augment the capability of mobile devices through partial or full offloading of the computation and data storage from the mobile devices. So far, there is no comprehensive treatment of the fore-mentioned problems. Existing computation partitioning mechanisms enable an adaptive execution of mobile application between mobile devices and the server [3], [4], [5], [6]. However, these efforts are only suitable in traditional mobile Internet computing and do not give any solution on how to use the elastic resources in clouds to make the applications scalable in cases of serving a large number of mobile users. Other efforts [7] [8] [9] [10] in facilitating large scale cloud applications do not fit well in the MCC applications because they do not provide a flexible and adaptive mechanism to schedule the computation across the client and clouds. In this paper, we make use of the third MCC approach to design an execution framework for mobile data stream applications. The framework consists of runtime systems to support the adaptive partitioning and distributed execution of the applications. In order to achieve an efficient way to serve a large number of users, the framework adopts a multi-tendency policy such that the computation instances on the cloud are able to be shared by multiple applications/tenants. II. FRAMEWORK OF DYNAMIC COMPUTATION A. Framework of Application The data flow application, presented as a directed acyclic dataflow graph Dg = (Cn , C ) , is composed of a set of n components Cn = i ; i=1,2,……n and a set of channels C = (i, j ) ; i, jεCn (Component and node terms are interchangeably used.) The components run concurrently with each one performing its own functional operations onto the data. The component has input ports and output ports. Each port is associated with a specific data type. The channel’s capacity is defined as 31
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME the maximum number of units of data the channel is able to hold. The channel also indicates the precedence constraint between the operations/components for processing one unit of data, which means the component, can not process the data until all of its precedent components complete the operation on that data. The component processing the input data of the application is called the entry node. The component generating the output data is called the exit node. In real implementations, the components are mapped into threads or processes. The channels are usually implemented by means of TCP sockets, or shared memory or persistent storage. The dataflow model is based on a data centric approach and usually takes advantage of pipeline to accelerate data processing. Given a specific dataflow application, S i is the average number of CPU instructions required by component i to process one unit of data. d i,j presents the amount of data required to be transmitted on the channel (i , j ) for one unit of data. The weight on a node i denoted as wi presents the computational cost (time). The weight on an edge denoted as communication cost (time). Both • • wi and wei, j are wei, j is the measured by one unit of data. Critical path is defined as the longest path from the entry node to the exit node, where the weight of a path is defined as the summation of the weight of all the nodes and edges on the path. Critical component/channel in a dataflow graph is defined as the one which has the greatest weight among all the components/channels. There are two metrics to evaluate the performance of the dataflow applications, makespan and throughput. Makespan presents the total time to process one unit of input data. It is equal to the weight of the critical path in the dataflow graph. Throughput presents the number of units of input data the dataflow is able to process per second. Assuming that all the channels’ capacity is unlimited and whatever level of pipeline parallelism is allowed, the throughput of the dataflow application is determined by the critical component/channel, which has the slowest speed to compute/transfer the data. So we have the formula for throughput Tp = 1 where tp tp = max{ max (w i ), max iε c n i, jε c Fig.1: framework of application (we i, j )} ……… (1) Fig. 2: framework of Mobile Cloud System B. Framework of System The mobile cloud system shown in Fig. 2 consists of three parts, mobile clients (devices), wireless networks and the cloud (data centers). The mobile client accesses to the Internet cloud services through wireless networks with limited bandwidth. In the cloud are clusters of commodity 32
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME servers which are interconnected to each other through high speed switches. Possibly the mobile client can accelerate the execution of the mobile applications by offloading computing tasks onto the cloud. The benefit of offloading is the computational time saved due to the faster execution on much more powerful CPUs in the cloud. The cost comes from data transmissions over wireless networks between the client and cloud. The question here is which components in the dataflow graph should be offloaded onto cloud such that the throughput of the application is maximized. The reason why we take the throughput as the objective is that the accuracy of many mobile data stream applications such as face/gesture recognition is determined by its throughput. The offloading decision mainly depends on the local computing resources and the wireless networking quality. A few parameters are introduced to model these properties. p is the CPU’s capability of the mobile device, measured by the number of instructions per second. δ is the percentage of the ideal CPU resource. It also indicates the current working load on the mobile device. So the available CPU resource on the mobile device is δ p . B is the bandwidth of the wireless network for the mobile device to access the Internet cloud. We have the following assumptions in our system model. 1) The components running concurrently on the mobile devices are allocated equal CPU resources. 2) If a component is offloaded onto cloud, other components running on the mobile client will speed N up because of the acquisition of the released CPU resources. The speedup factor is N − 1 , where N is the number of components on the mobile device before the offloading event. 3) The cloud always has abundant resources to accommodate the offloaded components such that they will not become the critical component in the dataflow graph. 4) The total wireless bandwidth B are shared by all the crossing channels, where crossing channel in the dataflow graph is defined as the one which connects two components residing two sides of different resources. It is possible allowed for the mobile device to allocate disparate bandwidth to different crossing channels. We do not distinguish between the uplink and downlink bandwidth in our model. 5) If interdependent components are offloaded onto cloud, the channels connecting between them in the cloud will not become the critical channel. 6) The input data of the application is acquired from the sensors on the mobile device, and output data should also be delivered to the mobile device. C. Problem Formulation of Partitioning We define an application as a collection of processing modules interacting with each other. For example, modules are functions, and when a function calls another function, the two functions interact. For a typical client-server application, both the client and server modules belong to the application. The client runs at the weak device, and the server runs in machines in the cloud. We define a partition between client and server as the two sets of modules that cover all modules of the application. Formally, we define D as the entire set of modules, define d as the partition for mobile device, and define s as the partition for the server running in the cloud; d ∪ s = D Fig. 3 shows partitioning examples. D circle represents a module, and an edge represents that two modules connected by the edge interact. In our discussion we focus on the basic partitioning case where two } . Note that non-overlapping sets cover the entire application: d ∪ s = D and d ∩ s = { there are more complex cases like partitioning between a client and multiple servers and partitioning with overlap sets of modules (e.g., the same module executes at the client and the server). 33
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME Fig. 3: Examples of partitioning of an application composed of four modules when module 1 is pinned to the client and module 4 is pinned to the server. Note that even with this simple application there are four possible partitioning examples. Dynamic partitioning chooses what partitioning to use at run time among the set of available partitioning configurations. Given the dataflow application { D g (C n , C ), s i , d i , j } the mobile device properties { p , δ } , and the wireless network bandwidth B, the partitioning problem in this study is the problem of allocating a set of n components of the dataflow graph to the resources (the mobile client and the cloud) and allocating the limited wireless bandwidth B to the potential crossing channels such that the throughput of the data stream application is maximized. The optimization problem is formulated in Equation (2). 1 max T p = tp a i , bi , j ∑b ε i, j , i , j ε {0 ,1,..... n +1} Where di , j (a i −a j ) Si ∑ a ), max ( t p = max{ max (a i . )} i i , jε c δP iε c bi , j iε c n n ( ai − a j ) 2 = B , i, j c bi , j > o, ao = 1, an+1 = 1, ai = 0 or 1, iε{ ,2,.... } 1 n The core variables are decision for component i. If otherwise ai = 0 a a ………….. and b i i i , j . a (2) is either 0 or 1 integer, indicating the offloading i equals to 1, component i is executed on the mobile device; means running on the cloud. b i , j is the wireless bandwidth allocated to the channel (i , j ) . Note that two virtual nodes, 0 and n + 1 , are created to satisfy the constraint that the input/output data of the application should be from/delivered to the mobile device. Two edges (0, 1) and (n , n + 1) are added into the set of edges C of the dataflow graph, where node 1 is the entry node and node n is the exit node. Accordingly, d 0,1 is the size of a unit of input data. d n ,n +1 is the size of a unit of output data. 34
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME III. FRAMEWORK OF EXECUTION A. Overview Fig. 4 shows the overview of a dataflow execution framework in mobile cloud computing. The runtime framework consists of software modules on both the mobile side and the cloud side. The client side monitors the CPU workload and networking bandwidth. When the application is launched on the mobile client, a request is sent to the Resource Manager in cloud for augmented execution. The resource manager then assigns an Application Master to handle the request. The application master first asks the mobile client for its device characteristics such as CPU capability p, its workload δ , and the current network bandwidth B. Using this dynamic information from mobile device as well as the static application properties stored in cloud, the application master then generates an optimal partitioning result, which is presented in next Section. The components assigned to the client are initiated as threads on the mobile device. Other components assigned to the cloud are invoked as services, namely Component-as-a-Service (CaaS). The application master is also in charge of the data transmission between the mobile client and cloud. In the framework, every mobile application has an Application Master in cloud to augment its execution. The components are shared and invoked by applications as a service in cloud. Resource Manager and the per-machine Node Manager, which monitors the processes on that machine, constitute the computation fabric in the cloud. Resource Manager manages the global assignment of computing resources to Application Masters and CaaSs through cooperation with Node Managers. In our design, we realize multi-tenancy feature for the CaaSs, which allows multiple tenants/applications to share the CaaS instance. The instance is able to be replicated to handle the scaling-up load from tenants. A master and slave architecture is used to implement the multi-tenancy CaaSs, in which Component Master is responsible for scheduling and replicating the component instances (also referred to Component Slaves). Specifically, Component Master negotiates resources from Resource Manager and work with Node Managers to launch/terminate slaves according to the current request load. The purpose of the multi-tenancy CaaS is to guarantee an elastic utilization of underlying resources to accommodate the scalable CaaS requests. Fig. 4: Framework of the application 35
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME B. Adaptive Partitioning The application master, in the middle of the mobile clients and the cloud CaaSs, has two distinct functionalities: (a) to determine an optimal partition results and make the partitioning adaptive to the mobile client’s varying environment (local CPU load and wireless networking bandwidth); (b) to coordinate the distributed execution of the dataflow application. Fig. 5: Relationship between the mobile client and the application master Fig. 5 shows the software modules on both the mobile client and application master, which provides support for the adaptive partitioning. It is assumed that two logical communication connections exist between both sides: an ”always-on” connection but low data rate wireless connection which is for transmitting the control message; another wireless connection with bandwidth B, which is to pipeline the data streams between the mobile client and cloud. The profiler on the mobile client measures the device’s characteristics at startup and continuously monitors its CPU workload and wireless network bandwidth. The controller on mobile client side maintains some thresholds on the variance of the profiling parameters. If any of the parameters increases/decreases by a value exceeding the threshold, a request for updating the partitioning result will be sent to the controller on the application master. The controller of application master calls optimization solver to generate a new partitioning result. Taking the result as the input, the underlying module DF Execution provides runtime support for the distributed execution of the dataflow application. In the design of our framework, we make sure that the runtime software will not bring much burden onto the mobile device and should be as lightweight as possible. So we put the optimization solver on the cloud rather than the mobile device to reduce the local resource utilization. Although the design feature requires an always-on connectivity, it is reasonable because unless there is wireless connectivity, all the components of the dataflow application is executed locally by default without the need to call the optimization solver. C. Distributed Execution Fig. 6 shows the distributed execution of dataflow example with two partitioning cases. In the framework, the local components run as threads on mobile device while the remote components are 36
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME executed through the invocation of CaaSs. In a partitioned dataflow application, we name the component allocated onto mobile device as local component, and the one offloaded onto cloud as remote component. The application master has one thread for every remote component. These threads are responsible for data transmission as well as CaaS invocation. Since the threads serve as the images of the remote components, we call them as image components. In a partitioned dataflow graph, the shaded node represents the remote component; the blank one is the local component. The channels are classified into two categories, crossing channel and internal channel. The crossing channel, e.g. (2; 3), (2; 4), (7; 8) in graph, refers to the edge in the graph which connects a local component and remote component while the internal channel connects two local components, e.g., (1; 2) in graph, or two remote components, e.g., (3; 6) in graph. The crossing channels are implemented by TCP pipes. Through the TCP pipe, the data is pushed from one component to its successor. Each TCP pipe has one in-memory FIFO at the receiver side to buffer the data that may not be processed. The internal channels are implemented by shared memory FIFOs. As a result of the FIFOs on all the channels, our framework enables an asynchronous and loosely decoupled way to execute the concurrent components. The objective function shown in Equation (2) depends on two variables, a i and b i , j . We first study the problem of allocating the wireless bandwidth B to the crossing edges given a specific partition. It is not difficult to prove theorem 1. Theorem 1: Given a partition X = { a i | i = 1 , 2 ,.... n } , the throughput is maximized when b i , j satisfies the condition that Fig. 6: Dataflow Execution of Distributed system 37
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME bi,j = di,j tcomm X) ( bi, j = 0, ∀(i, j )εC , ∀(i, j)εC b 0 ,1 = (1 − a i ) and d 0 ,1 t comm ( X ) b n ,n +1 = (1 − a n ) and ai ≠ aj ai = aj , d n ,n +1 t comm ( X ) ………… , (3) Where t comm (X ) is the communication cost/time that each crossing channel needs to transfer a unit of data. 1 tcommX) = [( − ai )d0,1 + (1− an )dn,n+1 + ∑di,j (ai −aj )2], ( 1 B i , jε c ..……… (4) ………... (5) So, the original problem can be reduced into 1 max T p = max{ t comp ( X ), t comm ( X )} X Where t comp (X ) = Si n ∑ a } max { a i . δ P i =1 i aiε x and X is a v-dimension vector of 0 and 1. The application throughput is constrained either by the speed that the local components process the data or by the speed the crossing channels transfer data. IV. EVALUATION The performance metric we consider in the evaluation is the throughput of the data stream application. First, we evaluate how the controlling parameters affect the performance. Second, we study the effect of the input parameters including application graphs, the wireless networking bandwidth B and the available computing resource at mobile device δ p . At last, we demonstrate the factor that can affect the computational cost. The input application graph we consider is the randomly generated application graphs. We have implemented a graph generator to generate the weighted streaming application graphs. We use the level-by-level method to create the graph which was proposed by Tobita and Kasahara [11]. We could control the graph that we want to generate through the following parameters: 1) number of nodes; 2) average out degree and 3) communicationto-computation ratio (CCR), where CCR is defined as the ratio of the average communication time to the average computation time as shown in equation (6). If an application graph’s CCR is high, it can be considered as a communication-intensive application. Otherwise, it is a computation-intensive application. CCR = [d 0,1 + dn ,n +1 + ∑i , jεC d i , j ] /[(e + 2) × B ] ……….. n (∑iεC S i )/(n × δp ) (6) We have done a group of experiments to evaluate the effect of both controlling parameters and input parameters to the performance. 38
10.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 5, Issue 2, February (2014), pp. 30-39 © IAEME V. CONCLUSIONS In this paper, we argue for dynamic partitioning of applications between weak device and cloud to better support applications running in diverse devices in different environments. We formalize the dynamic partitioning problem and sketch how to construct a system that supports dynamic partitioning. We then designed an application framework to provide runtime support for the adaptive partitioning and distributed execution of such advanced mobile cloud applications. The framework is able to serve large number of mobile users by leveraging the elastic resources in existing cloud infrastructures. We believe that dynamic partitioning is an important part of future mobile cloud computing. In future, we are going to conduct a series of experimental tests on real-world applications such as hand gesture recognition and mobile augmented reality based on our proposed framework. We are testing the performance of the applications in case of various environment parameters such as mobile devices’ CPU resource and networking bandwidth, and compare the performance of the partitioned application with two strategies like with/without partitioning. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] E. E. Marinelli, “Hyrax: Cloud Computing on Mobile Devices using MapReduce”, in Master Thesis, Carnegie Mellon University, 2009. Gonzalo Huerta-Canepa, Dongman Lee, “A Virtual Cloud Computing Provider for Mobile Devices”, in proceedings of ACM MCS’10, pages 3756–3761. ACM Press, 2010. Eduardo Cuervoy, Aruna Balasubramanianz, Dae-ki Cho, “MAUI: Making Smartphones Last Longer with Code Offload”, in proceedings of MobiSys’10, ACM press, 2010. Byung-Gon Chun, Sunghwan Ihm, Petros Maniatis, Mayur Naik, Ashwin Patti, “CloneCloud: Elastic Execution between Mobile Device and Cloud”, in proceedings of EuroSys’10. I. Giurgiu, O. Riva, D. Juric, I. Krivulev, and G. Alonso, “Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications”, in proceedings of Middleware’09, pages 1–20. Springer, 2009. Moo-Ryong Ra, Anmol Sheth, Lily Mummert, Padmanabhan Pillai, David Wetherall, Ramesh Govindan, “Odessa: enabling interactive perception applications on mobile devices”, in proceedings of ACM MobiSys’11, 2011. M. Cherniack, H. Balakrishnan, M. Balazinska, “Scalable Distributed Stream processing”, in proceedings of the Conference on Innovative Data Systems Research, pages 422–440. ACM Press, 2003. S. Chandrasekaran, O. Cooper, A. Deshpande, “TelegraphCQ: Continuous Dataflow Processing for an Uncertain World”, in proceedings of the Conference on Innovative Data Systems Research, 2003. J. Dean, S. Ghemawat, “MapReduce: simplified data processing on large clusters”, in proceedings of ACM OSDI’04. M. Isard, M. Budiu, Y. Yu, A. Birrell, and D. Fetterly, “Dryad: distributed data-parallel programs from sequential building blocks”, in proceeding of EuroSys’07. T. Tobita, H. Kasahara, “A standard task graph set for fair evaluation of multiprocessor scheduling algorithms”, Journal of Scheduling, 5(5):379–394, 2002. Monal Mehta, Ishitva Ajmera, Rakesh Jondhale, “Mobile Cloud Computing”, International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN Print: 0976- 6464, ISSN Online: 0976 –6472, Volume 4, Issue 5, pp. 152 - 160, 2013. R. Lakshman Naik, D. Ramesh, B. Manjula, “Instances Selection using Advance Data Mining Techniques”, International Journal of Computer Engineering & Technology (IJCET), ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375, Volume 3, Issue 2, pp. 47 - 53, 2012. 39
Baixar agora