A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Patel, Ravindra
- Way to Component Based Vending Machine
Authors
1 Department of Information Technology, UIT, RGPV, Bhopal, IN
2 Department of Computer Application, UIT, RGPV, Bhopal, IN
3 Department of CSE, Indian Institute of Technology, Indore, IN
Source
Software Engineering, Vol 4, No 10 (2012), Pagination: 447-451Abstract
The paper demonstrates the design and implementation of component based software for building Vending Machine components. Component based software engineering (CBSE) is an approach to system-design that means to move the importance of conventional programming application to component based system. An application is yet developing on a single operating system and a single language. We have implemented the application that is based on platform independent and language independent. Through this paper we are focusing to implement an application in any language and any platform using CORBA middleware standard. The paper describes the use of an open-source IDL Compiler omniORB for C++ to IDL mapping for building the model of vending machine components which are based on multiple server and a single client. The main feature of an application is the distribution of its components to overcome the problem of domain specific application. Here we used an Object Request Broker (ORB), which outlines the common platform for CORBA based applications.Keywords
Component Interoperability, Component Objects, Component Communication.- Security Issues for Hand-Held Devices in the New Era of Mobile Computing
Authors
Source
Networking and Communication Engineering, Vol 1, No 7 (2009), Pagination: 430-438Abstract
This paper describes the function of handheld devices in mobile computing and the consequential security issues. The paper discusses the importance of a robust security policy to meet the challenges thrown up by penetration of handheld devices in business computing. This paper outlines some of these inherent challenges of mobile applications and puts forth the urge for a strong security policy to counter them. The paper starts with a broad scenario on mobile computing and then moves on two describe a few basic terms akin to mobile commerce. In this paper, the term handheld devices are used as a common name for all pocket-sized smart-phones and PDA (Personal Digital Assistant) devices using an open operating system. The central theme of this paper is that as Wireless/mobile devices and networking technology extends the traditional wired LAN, WAN, and even the Internet to include connectivity utilizing radio technology, the very nature of wireless technology presents unique security challenges. We converse security issues and their existing solutions in the mobile ad hoc network. be obligated to the defenseless of the mobile ad ad hoc network, there are abundant security intimidation that disturb the improvement of it. We first evaluate the main vulnerabilities in the mobile ad hoc networks,which have made it much easier to go through from attacks than the long-established wired network. Then we discuss the security criteria of the mobile ad hoc network and present the main attack types that exist in it. Finally we survey the existing security solutions for the mobile ad hoc network.
Keywords
Mobile Computing, Wireless Computing, Pervasive Computing, Nomadic Computing, Mobile Devices, Handheld Devices.- Traceability of Implementation to Design and Requirements Specifications: A Formal Technical Review Method (Reverse Engineering Tool)
Authors
1 Department of Computer Science, Engineering and Application, Rajiv Gandhi Technical University, Bhopal, IN
Source
Oriental Journal of Computer Science and Technology, Vol 8, No 2 (2015), Pagination: 154-163Abstract
The software quality of a software product is challenging for the software industry. The reason that software industry demand of product in less time period so developer or team in on stress due to that they are missing something so software product not up to mark. The purpose of this paper viewing significance of formal technical review of requirement gathering and design any software, products or tools and reviews missing a thing and improve software product quality. This research paper elaborates how to perform requirement gathering and review that, for the reverse reverse engineering tool.Keywords
Formal Technical Review, Traceability, Reverse Engineering.- Learning Based Task Placement Algorithm in the IoT Fog-Cloud Environment
Authors
1 Department of Computer Science and Engineering, University Institute of Technology, RGPV, Bhopal, Madhya Pradesh, IN
2 Department of Computer Applications, University Institute of Technology, RGPV, Bhopal, Madhya Pradesh, IN
3 Department of Computer Engineering and Applications, NITTTR, Bhopal, Madhya Pradesh, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 5 (2021), Pagination: 549-565Abstract
Task scheduling means allocating resources to the tasks in such a way that processing can be accomplished in the most optimal way possible. Here the optimal strategy means processing all the tasks in such a way that it incur the least delay, hence the least response time can be achieved by all the tasks. This becomes a major concern when dealing with the Fog computing environment. Fog have limitations on storage capacity and processing power. So all the real time applications cannot be scheduled at the Fog environment. Also it is required to allocate these resources in the most optimal way possible. So it is best suggested to schedule latency critical applications on the fog and other applications to the cloud. This paper proposes a learning based task placement algorithm (LBTP) which used supervised feed forward neural network to recognize the latency critical applications. This algorithm executes in two phases. In the first phase, the features of the tasks serve as the input to this machine learning based framework for decision making regarding whether to schedule task at the fog environment or forward it to the cloud for execution. In the second phase if the tasks scheduled at fog, then tasks are rearranged in the fog queue based on the priority to achieve the most optimal resource utilization. The simulation results were evaluated using the Matlab 8.0 and Aneka 5.0 platform. The results revealed that the proposed method LBTP recorded the best response time, waiting time and resource utilization when compared with the task scheduling at the fog only and task scheduling at the Cloud only environment. LBTP also recorded better results on horizontal scaling by raising the number of virtual machines at the fog environment.Keywords
Task Scheduling, Resource Allocation, Fog, Edge, Cloud, Latency, Internet of Things, Machine Learning.References
- E. Ahmed, I. Yaqoob, A. Gani, M. Imran, and M. Guizani, ‘‘Internet-ofThings-based smart environments: State of the art, taxonomy, and open research challenges,’’ IEEE Wireless Commun., vol. 23, no. 5, pp. 10–16, Oct. 2016.
- K. Shafique, B. A. Khawaja, F. Sabir, S. Qazi and M. Mustaqim, "Internet of Things (IoT) for Next-Generation Smart Systems: A Review of Current Challenges, Future Trends and Prospects for Emerging 5G-IoT Scenarios," in IEEE Access, vol. 8, pp. 23022-23040, 2020, doi: 10.1109/ACCESS.2020.2970118.
- Co-Operation With the Working Group RFID of the ETP EPOSS, Internet of Things in 2020, Roadmap for the Future, Version 1.1, INFSO D.4 Networked Enterprise RFID INFSO G.2 Micro Nanosystems, May 2008.
- Gedeon, J., Jens Heuschkel, L. Wang and M. Mühlhäuser. “Fog Computing: Current Research and Future Challenges.” (2018).
- S. Dustdar, C. Avasalcai and I. Murturi, "Invited Paper: Edge and Fog Computing: Vision and Research Challenges," 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), San Francisco, CA, USA, 2019, pp. 96-9609, doi: 10.1109/SOSE.2019.00023.
- Kashani, M. H., Ahmad Ahmadzadeh and Ebrahim Mahdipour. “Load balancing mechanisms in fog computing: A systematic review.” ArXiv abs/2011.14706 (2020): n. pag.
- M. Rahimi, M. Songhorabadi, and M. H. Kashani, "Fog-based smart homes: A systematic review," Journal of Network and Computer Applications, vol. 153, p. 102531, 2020/03/01/ 2020.
- O. C. A. W. Group, "OpenFog reference architecture for fog computing," OPFRA001, vol. 20817, p. 162, 2017.
- Pengfei Hu, Sahraoui Dhelim, Huansheng Ning, Tie Qiu, “Survey on fog computing: architecture, key technologies, applications and open issues”,Journal of Network and Computer Applications, Volume 98, 2017, Pages 27-42, ISSN 1084-8045, https://doi.org/10.1016/j.jnca.2017.09.002.
- L. I. Carvalho, D. M. A. da Silva and R. C. Sofia, "Leveraging Context-awareness to Better Support the IoT Cloud-Edge Continuum," 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), Paris, France, 2020, pp. 356-359, doi: 10.1109/FMEC49853.2020.9144760.
- Xuan-Qui Pham, Nguyen Doan Man, Nguyen Dao Tan Tri, Ngo Quang Thai, and Eui-Nam Huh. “A Cost- and Performance-Effective Approach for Task Scheduling Based on Collaboration between Cloud and Fog Computing.” International Journal of Distributed Sensor Networks, (November 2017). https://doi.org/10.1177/1550147717742073.
- Tahani Aladwani, “Scheduling IoT Healthcare Tasks in Fog Computing Based on their Importance”, Procedia Computer Science, Volume 163, 2019, Pages 560-569, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2019.12.138.
- L. Lin, P. Li, J. Xiong and M. Lin, "Distributed and Application-Aware Task Scheduling in Edge-Clouds," 2018 14th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), Shenyang, China, 2018, pp. 165-170, doi: 10.1109/MSN.2018.000-1.
- Minh-Quang Tran, Duy Tai Nguyen, Van An Le, Duc Hai Nguyen, Tran Vu Pham, "Task Placement on Fog Computing Made Efficient for IoT Application Provision", Wireless Communications and Mobile Computing, vol. 2019, Article ID 6215454, 17 pages, 2019. https://doi.org/10.1155/2019/6215454.
- Choudhari, Tejaswini, "Prioritized Task Scheduling In Fog Computing" (2018). Master's Projects.581, DOI: https://doi.org/10.31979/etd.shqa-fdp6, https://scholarworks.sjsu.edu/etd_projects/581.
- F. Fellir, A. El Attar, K. Nafil and L. Chung, "A multi-Agent based model for task scheduling in cloud-fog computing platform," 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, 2020, pp. 377-382, doi: 10.1109/ICIoT48696.2020.9089625.
- J. U. Arshed and M. Ahmed, "RACE: Resource Aware Cost-Efficient Scheduler for Cloud Fog Environment," in IEEE Access, doi: 10.1109/ACCESS.2021.3068817.
- L. Yin, J. Luo and H. Luo, "Tasks Scheduling and Resource Allocation in Fog Computing Based on Containers for Smart Manufacturing," in IEEE Transactions on Industrial Informatics, vol. 14, no. 10, pp. 4712-4721, Oct. 2018, doi: 10.1109/TII.2018.2851241.
- Elarbi Badidi, “QoS-Aware Placement of Tasks on a Fog Cluster in an Edge Computing Environment”, Journal of Ubiquitous Systems & Pervasive Networks, Volume 13, No. 1 (2020) pp. 11-19. doi: 10.5383/JUSPN.13.01.002.
- M. Breitbach, D. Schäfer, J. Edinger and C. Becker, "Context-Aware Data and Task Placement in Edge Computing Environments," 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom, Kyoto, Japan, 2019, pp. 1-10, doi: 10.1109/PERCOM.2019.8767386.
- Shudong Wang, Yanqing Li, Shanchen Pang, Qinghua Lu, Shuyu Wang, Jianli Zhao, "A Task Scheduling Strategy in Edge-Cloud Collaborative Scenario Based on Deadline", Scientific Programming, vol. 2020, Article ID 3967847, 9 pages, 2020. https://doi.org/10.1155/2020/3967847.
- M. K. Hussein and M. H. Mousa, "Efficient Task Offloading for IoT-Based Applications in Fog Computing Using Ant Colony Optimization," in IEEE Access, vol. 8, pp. 37191-37201, 2020, doi: 10.1109/ACCESS.2020.2975741.
- T. Qayyum, Z. Trabelsi, A. W. Malik and K. Hayawi, "Multi-Level Resource Sharing Framework Using Collaborative Fog Environment for Smart Cities," in IEEE Access, vol. 9, pp. 21859-21869, 2021, doi: 10.1109/ACCESS.2021.3054420.
- M. Goudarzi, H. Wu, M. Palaniswami and R. Buyya, "An Application Placement Technique for Concurrent IoT Applications in Edge and Fog Computing Environments," in IEEE Transactions on Mobile Computing, vol. 20, no. 4, pp. 1298-1311, 1 April 2021, doi: 10.1109/TMC.2020.2967041.
- T. S. Nikoui, A. Balador, A. M. Rahmani and Z. Bakhshi, "Cost-Aware Task Scheduling in Fog-Cloud Environment," 2020 CSI/CPSSI International Symposium on Real-Time and Embedded Systems and Technologies (RTEST), Tehran, Iran, 2020, pp. 1-8, doi: 10.1109/RTEST49666.2020.9140118.
- Y. Sahni, J. Cao and L. Yang, "Data-Aware Task Allocation for Achieving Low Latency in Collaborative Edge Computing," in IEEE Internet of Things Journal, vol. 6, no. 2, pp. 3512-3524, April 2019, doi: 10.1109/JIOT.2018.2886757.
- Abbasi, M., Mohammadi Pasand, E. & Khosravi, M.R., “Workload Allocation in IoT-Fog-Cloud Architecture Using a Multi-Objective Genetic Algorithm” J Grid Computing 18, 43–56 (2020). https://doi.org/10.1007/s10723-020-09507-1.
- Lindong Liu, Deyu Qi, Naqin Zhou, Yilin Wu, "A Task Scheduling Algorithm Based on Classification Mining in Fog Computing Environment", Wireless Communications and Mobile Computing, vol. 2018, Article ID 2102348, 11 pages, 2018. https://doi.org/10.1155/2018/2102348.
- Mohammad Khalid Pandit, Roohie Naaz Mir, Mohammad Ahsan Chishti, "Adaptive task scheduling in IoT using reinforcement learning", International Journal of Intelligent Computing and Cybernetics, Vol. 13 No. 3, pp. 261-282, 2020. https://doi.org/10.1108/IJICC-03-2020-0021.
- Xuejing Li, Yajuan Qin, Huachun Zhou, Du Chen, Shujie Yang, Zhewei Zhang, "An Intelligent Adaptive Algorithm for Servers Balancing and Tasks Scheduling over Mobile Fog Computing Networks", Wireless Communications and Mobile Computing, vol. 2020, Article ID 8863865, 16 pages, 2020. https://doi.org/10.1155/2020/8863865.
- N. Mostafaz "Resource Selection Service Based on Neural Network in Fog Environment", Advances in Science, Technology and Engineering Systems Journal, vol. 5, no. 1, pp. 408-417 (2020).
- Bhatia, M., Sood, S.K. & Kaur, S. Quantumized approach of load scheduling in fog computing environment for IoT applications. Computing 102, 1097–1115 (2020). https://doi.org/10.1007/s00607-019-00786-5.
- Fatma M. Talaat, Shereen H. Ali, Ahmed I. Saleh, Hesham A. Ali, “Effective Load Balancing Strategy (ELBS) for Real-Time Fog Computing Environment Using Fuzzy and Probabilistic Neural Networks”, Journal of Network and Systems Management (IF 2.250) Pub Date : 2019-02-06 , DOI: 10.1007/s10922-019-09490-3.
- He Li, Kaoru Ota, and Mianxiong Dong, “Deep Reinforcement Scheduling for Mobile Crowd sensing in Fog Computing”, ACM Trans. Internet Technol. 19, 2, Article 21 (April 2019), 18 pages. DOI: https://doi.org/10.1145/3234463.
- V. P. Kafle and A. H. A. Muktadir, "Intelligent and Agile Control of Edge Resources for Latency-Sensitive IoT Services," in IEEE Access, vol. 8, pp. 207991-208002, 2020, doi: 10.1109/ACCESS.2020.3038439.
- Y. Dong, G. Xu, M. Zhang and X. Meng, "A High-Efficient Joint ’Cloud-Edge’ Aware Strategy for Task Deployment and Load Balancing," in IEEE Access, vol. 9, pp. 12791-12802, 2021, doi: 10.1109/ACCESS.2021.3051672.
- Shifa Manihar, Tasneem Bano Rehman, Ravindra Patel and Sanjay Agrawal, “Intelligent and Scalable IoT Edge-Cloud System” International Journal of Advanced Computer Science and Applications (IJACSA), 11(8), 2020. http://dx.doi.org/10.14569/IJACSA.2020.0110846.