Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Yogi, Manas Kumar
- A Survey of Cyber foraging Systems:Open Issues, Research Challenges
Abstract Views :186 |
PDF Views:4
Authors
Affiliations
1 Department of Computer Science and Engineering, Pragati Engineering College (Autonomous), IN
1 Department of Computer Science and Engineering, Pragati Engineering College (Autonomous), IN
Source
International Journal of Advanced Networking and Applications, Vol 8, No 6 (2017), Pagination: 3274-3282Abstract
This paper presents a survey on current applications which practice the pervasive mechanism of cyber foraging. The applications include the LOCUSTS framework, Slingshot, Pupetter. This applications advocated the operating principle of task sharing among resource deficient mobile devices. These applications face some design issues for providing efficient performance like task distribution and task migration apart from the security aspect. The general operating mechanism of the cyber foraging technique are also discussed upon and the design options to leverage the throughput of the inherent mechanism is also represented in a suitable way.Keywords
Cyber Foraging, Resource Deficient, LOCUSTS, Sligshot, Pupetter, Task Migration.References
- Perry,Mark, O'hara,Kenton, Sellen,Abigail, Brown,Barry&Harper,Richard, (2001) "Dealing with Mobility: Understanding Access Anytime, Anywhere,"Transactions on Computer-Human Interaction (TOCHI), Vol. 8, No. 4, pp. 323-347.
- M. Satyanarayanan, (2001) "Pervasive Computing: Vision and Challenges," IEEE Personal Communication, Vol. 8, No. 4, pp. 10-17..
- Balan, Rajesh Krishna, Flinn, Jason, Satyanarayanan, Mahadev, Sinnamohideen,S.&Yang, H.I.,(2002) "The Case for Cybef Foraging," presented at the 10th Workshop on ACM SIGOPS European Workshop: beyond the PC, New York, NY, USA, pp. 87-92..
- Chun, Byung-Gon & Maniatis, Petros, (2010) "Dynamically Partitioning Applications between Weak Devices and Clouds," in 1st ACM Workshop on Mobile Cloud Computing and Services(MCS 2010), San Francisco, pp. 1-5.
- Kemp, Roelof, Palmer, Nicholas, Kielmann, Thilo, Seinstra, Frank, Drost, Niels, Maassen,Jason&Bal, Henri, (2009) "eyeDentify: Multimedia Cyber Foraging from a Smartphone," in IEEE International Symposium on Multimedia (ISM2009), San Diego, pp. 392-399.
- A. Fox, S. D. Gribble, E. A. Brewer, and E. Amir. Adapting to network and client variability via on-demand dynamic distillation. Sigplan Notices, 31(9):160–170, September 1996.
- Randy H. Katz. Adaptation and mobility in wireless information systems. IEEE Personal Communications, 1(1):6–17, 1994.
- Brian D. Noble, M. Satyanarayanan, Dushyanth Narayanan, James Eric Tilton, Jason Flinn, and Kevin R. Walker. Agile application-aware adaptation for mobility. Operating Systems Review (ACM), 51(5):276–287, December 1997.
- M. Satyanarayanan, (2001) "Pervasive Computing: Vision and Challenges," IEEE Personal Communication, Vol. 8, No. 4, pp. 10-17.
- Balan, Rajesh Krishna, Flinn, Jason, Satyanarayanan, Mahadev, Sinnamohideen,S.&Yang, H.I., (2002) "The Case for Cybef Foraging," presented at the 10th Workshop on ACM SIGOPS European Workshop: beyond the PC, New York, NY, USA, pp. 87-92.
- Balan, Rajesh Krishna, Satyanarayanan, Mahadev, Park, SoYoung&Okoshi, Tadashi,(2003) "Tactics-Based Remote Execution for Mobile Computing," in 1st International Conference on Mobile Systems, Applications and Services, San Francisco, pp. 273-286.
- Gu, Xiaohui, Messer, Alan, Greenbergx, Ira, Milojicic, Dejan&Nahrstedt, Klara, (2004) "Adaptive Offloading for Pervasive Computing," IEEE Pervasive Computing Magazine, Vol. 3, No. 3, pp. 66-73.
- Ou, Shumao, Yang, Kun&Liotta, Antonio,(2006) "An Adaptive Multi-Constraint Partitioning Algorithm for Offloading in Pervasive Systems," in 4th Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM’06), Pisa, Italy, pp. 116-125.
- Robust Fault-Tolerant Training Strategy Using Neural Network to Perform Functional Testing of Software
Abstract Views :140 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Pragati Engineering College, Kakinada City, IN
1 Department of Computer Science, Pragati Engineering College, Kakinada City, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 3 (2017), Pagination: 3455-3460Abstract
This paper is intended to introduce an efficient as well as robust training mechanism for a neural network which can be used for testing the functionality of software. The traditional setup of neural network architecture is used constituting the two phases -training phase and evaluation phase. The input test cases are to be trained in first phase and consequently they behave like normal test cases to predict the output as untrained test cases. The test oracle measures the deviation between the outputs of untrained test cases with trained test cases and authorizes a final decision. Our framework can be applied to systems where number of test cases outnumbers the functionalities or the system under test is too complex. It can also be applied to the test case development when the modules of a system become tedious after modification.Keywords
ATNN, Fault, Neural, Test Case, Test Oracle.References
- Anderson C, von Mayrhauser A, Mraz R. On the use of neural networks to guide software testing activities. In: Proceedings of ITC’95, the International Test Conference; October 21–26, 1995.
- Choi J, Choi B. Test agent system design. In: 1999 IEEE International Fuzzy Systems Conference Proceedings; August 22–25, 1999.
- Khoshgoftaar TM, Allen EB,Hudepohl JP,Aud SJ. Application of neural networks to software quality modeling of a very large telecommunications system. IEEE Transactions on Neural Networks 1997;8(4):902–909.
- Khoshgoftaar TM, Szabo RM. Using neural networks to predict software faults during testing. IEEE Transactions on Reliability 1996;45(3):456– 462.
- J. Yue, C. Bojan, M. Tim, and L. Jie, “Incremental development of fault prediction models,” International Journal of Software Engineering and Knowledge Engineering, vol. 23, no. 10, pp. 1399–1425, 2013.
- Masoud Ahmadzade, Davood Khosroanjom, Toufiq Khezri, Yusef Sofi, ” Test Adequacy Criteria for UML Design Models Based on a Fuzzy - AHP Approach ”, American Journal of Scientific Research ISSN 1450-223X Issue 42(2012), pp. 72-84.
- Park, J., Baik, J.: Improving software reliability prediction through multi-criteria based dynamic model selection and combination. J. Syst. Softw. 101, 236–244 (2015).
- Chang, P.T., Lin, K.P., Pai, P.F.: Hybrid learning fuzzy neural models in forecasting engine system reliability. In: Proceeding of the Fifth Asia Pacific Industrial Engineering and Management Systems Conference, pp. 2361–2366 (2004).
- Noekhah, S., Hozhabri, A.A., Rizi, H.S.: Software reliability prediction model based on ICA algorithm and MLP neural network. In: 7th International Conference on e-Commerce in Developing Countries: With Focus on e-Security (ECDC), pp. 1– 15. IEEE, April 2013.
- BEWOOR, L. A. et al. Predicting Root Cause Analysis (RCA) bucket for software defects through Artificial Neural Network. Imperial Journal of Interdisciplinary Research, [S.l.], v. 3, n. 6, june 2017. ISSN 2454-1362.
- Ruilian zhao, shanshan lv, “Neural network based test cases generation using genetic algorithm” 13th IEEE international symposium on Pacific Rim dependable computing. IEEE, 2007, pp.97 - 100.
- ZhiweiXu,KehanGao,Taghi,M.Khoshgoftaar,Naeem Seliya,System regression test planning with a fuzzy expert system,Information Sciences Volume 259, 20 February 2014, Pages 532-543.
- Bhatnagar R, Bhattacharjee V, Ghose MK (2010) Software development effort estimation—neural network vs regression modeling approach. Int J Eng Sci Technol 2(7): 2950–2956.
- A Propulsive Roadmap for IoT Beyond 2025
Abstract Views :180 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Pragati Engineering College(A), Surampalem, A.P., IN
1 Department of Computer Science, Pragati Engineering College(A), Surampalem, A.P., IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 2 (2018), Pagination: 3808-3815Abstract
IoT is a worldwide-recognized trend that is gaining popularity incredibly fast. The baseline lies in the fact that IoT has already transformed a number of industries and took them to the new level, and these industries include healthcare, finances and much more. No wonder there is such a hype about it .There are tremendous new opportunities with IoT flowing out every couple of months so we highly recommend all to keep an eye on this technology. In this paper will have shed light on the inherent concepts which will affect the working of IoT beyond 2025.We have discussed key points in this paper regarding the operational components of an IoT System where improvements can be done by researchers so as to leverage the usage of IoT environment.Keywords
IoT, Nano, Sensors, Cognitive, Network, RFID.References
- .https://www.brookings.edu/blog/techtank/2015/09/29/n anotechnology-promises-powerful-new-applications-fortheinternet-of-things/
- .https://dzone.com/articles/connected-bees-iot-enabledbeehealth
- .https://cen.acs.org/articles/95/i16/Makingbiodegradablebatteries-silk.html
- .https://medium.com/@maheshwar.ligade/architectureforIoT-applications-d50ece031d38
- .https://cen.acs.org/articles/93/i33/DNA-Protein-SelfAssemble-Biodegradable.html
- .https://ndiastorage.blob.core.usgovcloudapi.net/ndia/20 16/armament/18399_Tillinghast.pdf
- .Routledge, The Internet of Things: From RFID to the NextGeneration Pervasive Networked Systems (Hardback) - Routledge,(2008).
- .M. Zorzi, A. Gluhak, S. Lange, A. Bassi, From Today‘s Intranet of Things to a Future Internet of Things: A Wireless- and Mobility Related View, IEEE Wirel Commun. 17 (2010) 43–51.
- .N. Honle, U.P. Kappeler, D. Nicklas, T. Schwarz, M. Grossmann, Benefits of Integrating Meta Data into a Context Model, in: 2005: pp. 25–29.
- .A. Gluhak, S. Krco, M. Nati, D. Pfisterer, N. Mitton, T. Razafindralambo, A Survey on Facilities for Experimental Internet of Things Research, IEEE Commun Mag. 49 (2011) 58-67.
- .L. Haiyan, C. Song, W. Dalei, N. Stergiou, S. KaChun, A remote markerless human gait tracking for ehealthcare based on contentaware wireless multimedia communications, IEEE Wirel Commun.(2010) 44–50.
- .G. Nussbaum, People with disabilities: assistive homes and environments, Computers Helping People with Special Needs. (2006).
- .A. Alkar, U. Buhur, An Internet based wireless home automation system for multifunctional devices, IEEE T Consum Electr. 51 (2005) 1169–1174.
- .M. Darianian, M.P. Michael, Smart Home Mobile RFID-based Internet-Of-Things Systems and Services, 2008 International Conference on Advanced Computer Theory and Engineering. (2008) 116–120.
- .International Data Corporation (IDC), Explosive Internet of Things Spending to Reach $1.7 Trillion in 2020, According to IDC, 02 June 2015, [Online]. Available: http://www.idc.com/getdoc.jsp?containerId=prUS25658015. [Accessed 22 August 2016].
- .Gartner Inc., The Internet of Things Is a Revolution Waiting to Happen, 30 April 2015. [Online]. Available: http://www.gartner.com/smarterwithgartner/the-internetofthings-is-a-revolution-waitingto-happen. [Accessed 22 August 2016].
- .IoT-Based Big Data: From Smart City towards Next Generation Super City Planning ,M. Mazhar Rathore,et.al.,International Journal on Semantic Web and Information Systems,Volume 13 • Issue 1 , January-March 2017.
- .S. E. Khateeb, "IoT architecture a gateway for smart cities in Arab world," 2018 15th Learning and Technology Conference (L&T), Jeddah, 2018, pp. 153-160.doi: 10.1109/LT.2018.8368500.
- .Ghajargar, M., Wiberg, M., & Stolterman, E. (2018). Designing IoT systems that support reflective thinking: A relational approach. International Journal of Design, 12(1), 21-35.
- .Janlert, L.-E., & Stolterman, E. (2017). The things that keep us busy: The elements of interaction. Cambridge, MA: MIT Press.