This document discusses edge computing, which involves processing data at the edge of networks rather than sending all data to centralized cloud servers. It defines edge computing and describes how it can reduce latency, bandwidth costs, and improve privacy and security over cloud-only systems. Key applications of edge computing mentioned are smart cities and autonomous vehicles. The document outlines some challenges of edge computing, such as ensuring programmability across heterogeneous edge devices and addressing security, privacy, naming, and data abstraction issues.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
3 Computing Paradigms as Enablers of Smart Applications of The FutureMedianova
Serverless Computing, Edge Computing, and GPU Computing may be hard concepts to understand but we have made this document for you to make it easier to digest.
Read and download and don't forget to follow us.
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
Cloud computing is an emerging infrastructure paradigm that allows efficient maintenance
of cloud with efficient uses of servers. Virtualization is a key element in cloud environment as it
provides distribution of computing resources. This distribution results in cost and energy reduction,
thus making efficient utilization of physical resources. Thus resource sharing and use of
virtualization allows improved performance for demanding scientific computing workloads. Number
of data centers and physical servers are underutilized so they are used inefficiently. So performance
evaluation and its enhancement in virtualized environment like public and private cloud are the
challenging issues. Performance of cloud environment is dependent on CPU & memory utilization,
Network and I/O disk operations. In order to improve the performance of the virtualization with
cloud computing, one of the solutions is to allow highly available data in the cluster form. Thus
replicas are available at each data centers and are highly available. In the proposed work, the I/O
parameters are chosen for increasing the performance in this domain. This enhancement can be
achieved through the clustering and caching technologies. The use of technology for data centers
clustering is proposed in this paper. Thus performance and scalability can be improved by reducing
the number of hits to the cloud database.
3 Computing Paradigms as Enablers of Smart Applications of The FutureMedianova
Serverless Computing, Edge Computing, and GPU Computing may be hard concepts to understand but we have made this document for you to make it easier to digest.
Read and download and don't forget to follow us.
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
A survey of Cyber Foraging and Cloud Offload Techniques.
We present a survey of cyber foraging and
cloud computing techniques as a solution to aid computing on resource-constrained mobile devices. We also explain some
important cyber foraging systems and present a categorization of the existing approaches considering various factors like
their dynamics, granularity, metrics used, surrogate types and their overheads.
Edge computing, trends and drivers to enable critical use cases for the digital economy. Types of edge and scale factors are mentioned in this article.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Survey on Virtualization Data Centers For Green Cloud ComputingIJTET Journal
Abstract —Due to trends like Cloud Computing and Green cloud Computing, virtualization technologies are gaining increasing importance. Cloud is a atypical model for computing resources, which intent to computing framework to the network in order to cut down costs of software and hardware resources. Nowadays, power is one of big issue of IDC has huge impacts on society. Researchers are seeking to find solutions to make IDC reduce power consumption. These IDC (Internet Data Center) consume large amounts of energy to process the cloud services, high operational cost, and affecting the lifespan of hardware equipments. The field of Green computing is also becoming more and more important in a world with finite number of energy resources and rising demand. Virtual Machine (VM) mechanism has been broadly applied in data center, including flexibility, reliability, and manageability. The research survey presents about the virtualization IDC in green cloud it contains various key features of the Green cloud, cloud computing, data centers, virtualization, data center with virtualization, power – aware, thermal – aware, network-aware, resource-aware and migration techniques. In this paper the several methods that are utilze to achieve the virtualization in IDC in green cloud computing are discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
A survey of Cyber Foraging and Cloud Offload Techniques.
We present a survey of cyber foraging and
cloud computing techniques as a solution to aid computing on resource-constrained mobile devices. We also explain some
important cyber foraging systems and present a categorization of the existing approaches considering various factors like
their dynamics, granularity, metrics used, surrogate types and their overheads.
Edge computing, trends and drivers to enable critical use cases for the digital economy. Types of edge and scale factors are mentioned in this article.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A Survey on Virtualization Data Centers For Green Cloud ComputingIJTET Journal
Abstract —Due to trends like Cloud Computing and Green cloud Computing, virtualization technologies are gaining increasing importance. Cloud is a atypical model for computing resources, which intent to computing framework to the network in order to cut down costs of software and hardware resources. Nowadays, power is one of big issue of IDC has huge impacts on society. Researchers are seeking to find solutions to make IDC reduce power consumption. These IDC (Internet Data Center) consume large amounts of energy to process the cloud services, high operational cost, and affecting the lifespan of hardware equipments. The field of Green computing is also becoming more and more important in a world with finite number of energy resources and rising demand. Virtual Machine (VM) mechanism has been broadly applied in data center, including flexibility, reliability, and manageability. The research survey presents about the virtualization IDC in green cloud it contains various key features of the Green cloud, cloud computing, data centers, virtualization, data center with virtualization, power – aware, thermal – aware, network-aware, resource-aware and migration techniques. In this paper the several methods that are utilze to achieve the virtualization in IDC in green cloud computing are discussed.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
The Future of Fog Computing and IoT: Revolutionizing Data ProcessingFredReynolds2
Sending a business e-mail, watching a YouTube video, making an online video call meeting, or playing a video game online requires considerable data flow. It necessitates such massive data flow in the direction of servers in data centers. Cloud computing prefers remote data processing and substantial storage systems to develop online apps we use daily. But we must know that other decentralized cloud computing systems exist. Fog computing technology is growing wildly in popularity. As per fog technology experts, the global fog technology market will reach nearly $2.3 billion at the end of 2032. The market for fog technology was $196.7 million at the end of 2022.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Edge computing is a distributed computing paradigm that brings computation and data storage closer to the sources of data. This ppt contains everything about Edge Computing Starting from its Definition, needs, terms involved to its merits, demerits and application use cases
Fog Computing: Issues, Challenges and Future Directions IJECEIAES
In Cloud Computing, all the processing of the data collected by the node is done in the central server. This involves a lot of time as data has to be transferred from the node to central server before the processing of data can be done in the server. Also it is not practical to stream terabytes of data from the node to the cloud and back. To overcome these disadvantages, an extension of cloud computing, known as fog computing, is introduced. In this, the processing of data is done completely in the node if the data does not require higher computing power and is done partially if the data requires high computing power, after which the data is transferred to the central server for the remaining computations. This greatly reduces the time involved in the process and is more efficient as the central server is not overloaded. Fog is quite useful in geographically dispersed areas where connectivity can be irregular. The ideal use case requires intelligence near the edge where ultralow latency is critical, and is promised by fog computing. The concepts of cloud computing and fog computing will be explored and their features will be contrasted to understand which is more efficient and better suited for realtime application.
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Tiarrah Computing: The Next Generation of ComputingIJECEIAES
The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
Latest development of cloud computing technology, characteristics, challenge,...sushil Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc. Keywords: Cloud computing, community model, hybrid model, Public model, private model
www.iosrjournals.org 57 | Page Latest development of cloud computing technolo...Sushil kumar Choudhary
Cloud computing is a network-based environment that focuses on sharing computations, Cloud computing networks access to a shared pool of configurable networks, servers, storage, service, applications & other important Computing resources. In modern era of Information Technology, the accesses to all information about the important activities of the related fields. In this paper discuss the advantages, disadvantages, characteristics, challenge, deployment model, cloud service model, cloud service provider & various applications areas of cloud computing such as small & large scale (manufacturing, automation, television, broadcast, constructions industries), Geographical Information system (GIS), Military intelligence fusion (MIS), business management, banking, Education, healthcare, Agriculture sector, E-Governance, project planning, cloud computing in family etc.
Similar to IRJET- Edge Computing the Next Computational Leap (20)
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...Amil Baba Dawood bangali
Contact with Dawood Bhai Just call on +92322-6382012 and we'll help you. We'll solve all your problems within 12 to 24 hours and with 101% guarantee and with astrology systematic. If you want to take any personal or professional advice then also you can call us on +92322-6382012 , ONLINE LOVE PROBLEM & Other all types of Daily Life Problem's.Then CALL or WHATSAPP us on +92322-6382012 and Get all these problems solutions here by Amil Baba DAWOOD BANGALI
#vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore#blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #blackmagicforlove #blackmagicformarriage #aamilbaba #kalajadu #kalailam #taweez #wazifaexpert #jadumantar #vashikaranspecialist #astrologer #palmistry #amliyaat #taweez #manpasandshadi #horoscope #spiritual #lovelife #lovespell #marriagespell#aamilbabainpakistan #amilbabainkarachi #powerfullblackmagicspell #kalajadumantarspecialist #realamilbaba #AmilbabainPakistan #astrologerincanada #astrologerindubai #lovespellsmaster #kalajaduspecialist #lovespellsthatwork #aamilbabainlahore #Amilbabainuk #amilbabainspain #amilbabaindubai #Amilbabainnorway #amilbabainkrachi #amilbabainlahore #amilbabaingujranwalan #amilbabainislamabad
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.