Mobile cloud computing refers to an infrastructure where data storage and processing occur on centralized cloud servers rather than mobile devices. This improves battery life, data storage capacity, processing power, reliability, availability and allows for dynamic provisioning and scalability. Popular mobile cloud applications include mobile commerce, learning, healthcare and gaming. Key issues include low bandwidth, service availability, heterogeneity and computation offloading approaches either in static or dynamic environments.
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIESOgunlana Kunle
Emerging technologies are always attractive to libraries. Like any other service delivery organizations, libraries and librarians engaged these technologies to provide services effectively and efficiently as well as making information delivery better. Most of these emerging technologies have changed the information-seeking behavior of library users and have put tremendous pressure on libraries to adopt these technologies such as Web 2.0, Web 3.0; library bookmark app, cloud computing and most recently Mobile Cloud Computing (MCC). Mobile cloud computing (MCC) was introduced to be a technology with the explosive growth of mobile applications and evolving cloud computing concept based on Infrastructure as a Service (IaaS) where both data storage and data processing operate outside of the mobile device. It is based on the concept of cloud where concentrated applications, resources, and services are accessed over the wireless network based on the web browser of the mobile phone. Despite its pervasiveness, storage capacity, scalability, reliability and, hype many libraries are yet to adopt mobile cloud computing due to various factors. Such factors are data security, privacy, failed accounts, trust, standards, organizational culture, service outage, data management, and others. Although the use of mobile devices posed a threat to library services, libraries and librarians can adopt these technologies in providing flexible, resilience and edge-cutting services to the users. This article addresses issues and functionalities, opportunities and benefits, challenges and risks of MCC.
Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers.
Cloud computing for mobile users can offloading computation save energyIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
MOBILE CLOUD COMPUTING: ISSUE AND OPPORTUNITIES IN LIBRARIESOgunlana Kunle
Emerging technologies are always attractive to libraries. Like any other service delivery organizations, libraries and librarians engaged these technologies to provide services effectively and efficiently as well as making information delivery better. Most of these emerging technologies have changed the information-seeking behavior of library users and have put tremendous pressure on libraries to adopt these technologies such as Web 2.0, Web 3.0; library bookmark app, cloud computing and most recently Mobile Cloud Computing (MCC). Mobile cloud computing (MCC) was introduced to be a technology with the explosive growth of mobile applications and evolving cloud computing concept based on Infrastructure as a Service (IaaS) where both data storage and data processing operate outside of the mobile device. It is based on the concept of cloud where concentrated applications, resources, and services are accessed over the wireless network based on the web browser of the mobile phone. Despite its pervasiveness, storage capacity, scalability, reliability and, hype many libraries are yet to adopt mobile cloud computing due to various factors. Such factors are data security, privacy, failed accounts, trust, standards, organizational culture, service outage, data management, and others. Although the use of mobile devices posed a threat to library services, libraries and librarians can adopt these technologies in providing flexible, resilience and edge-cutting services to the users. This article addresses issues and functionalities, opportunities and benefits, challenges and risks of MCC.
Mobile Cloud Computing (MCC) is the combination of cloud computing, mobile computing and wireless networks to bring rich computational resources to mobile users, network operators, as well as cloud computing providers.
Cloud computing for mobile users can offloading computation save energyIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
Mobile cloud computing (MCC) at its simplest, refers to an infrastructure where both the data storage and data processing happen outside of the mobile device.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. What is Mobile Cloud Computing?
Mobile computing (MC) at its simplest, refers to
an infrastructure where both the data storage
and data processing happen outside of the
mobile device.
Mobile cloud applications move the computing
power and data storage away from the mobile
devices and into powerful and centralized
computing platforms located in clouds, which are
then accessed over the wireless connection
based on a thin native client.
3. Why Mobile Computing?
• Mobile devices face many resource challenges
(battery life, storage, bandwidth etc.)
• Mobile computing offers advantages to users by
allowing them to use infrastructure, platforms
and software by cloud providers at low cost and
elastically in an on-demand fashion.
• Mobile cloud computing provides mobile users
with data storage and processing services in
clouds, obviating the need to have a powerful
device configuration (e.g. CPU speed, memory
capacity etc), as all resource-intensive computing
can be performed in the cloud.
4. MC Popularity
• According to a recent study by ABI Research,
more than 240 million business will use cloud
services through mobile devices by 2015.
• That traction will push the revenue of mobile
cloud computing to $5.2 billion.
• Mobile computing is a highly promising trend
for the future of mobile computing.
6. MC Architecture
• Mobile devices are connected to the mobile
networks via base stations that establish and control
the connections and functional interfaces between
the networks and mobile devices.
• Mobile users’ requests and information are
transmitted to the central processors that are
connected to servers providing mobile network
services.
• The subscribers’ requests are delivered to a cloud
through the Internet.
• In the cloud, cloud controllers process the requests
to provide mobile users with the corresponding
cloud services.
7. Advantages of MC
• Extending battery lifetime:
– Computation offloading migrates large
computations and complex processing from
resource-limited devices (i.e., mobile devices) to
resourceful machines (i.e., servers in clouds).
– Remote application execution can save energy
significantly.
– Many mobile applications take advantages from
task migration and remote processing.
8. Advantages of MC
• Improving data storage capacity and
processing power:
– MCC enables mobile users to store/access large
data on the cloud.
– MCC helps reduce the running cost for
computation intensive applications.
– Mobile applications are not constrained by
storage capacity on the devices because their data
now is stored on the cloud.
9. Advantages of MC
• Improving reliability and availability:
– Keeping data and application in the clouds reduces
the chance of lost on the mobile devices.
– MCC can be designed as a comprehensive data
security model for both service providers and users:
• Protect copyrighted digital contents in clouds.
• Provide security services such as virus scanning, malicious
code detection, authentication for mobile users.
– With data and services in the clouds, then are
always(almost) available even when the users are
moving.
10. Advantages of MC
• Dynamic provisioning:
– Dynamic on-demand provisioning of resources on a
fine-grained, self-service basis
– No need for advanced reservation
• Scalability:
– Mobile applications can be performed and scaled to
meet the unpredictable user demands
– Service providers can easily add and expand a service
11. Advantages of MC
• Multi-tenancy:
– Service providers can share the resources and
costs to support a variety of applications and large
no. of users.
• Ease of Integration:
– Multiple services from different providers can be
integrated easily through the cloud and the
Internet to meet the users’ demands.
12. MC Applications
• Mobile Commerce:
– M-commerce allows business models for commerce
using mobile devices.
– Examples: Mobile financial, mobile advertising, mobile
shopping…
– M-commerce applications face various challenges (low
bandwidth, high complexity of devices, security, …)
– Integrated with cloud can help address these issues
– Example: Combining 3G and cloud to increase data
processing speed and security level.
13. MC Applications
• Mobile Learning:
– M-learning combines e-learning and mobility
– Traditional m-learning has limitations on high cost of
devices/network, low transmission rate, limited
educational resources
– Cloud-based m-learning can solve these limitations
– Enhanced communication quality between students
and teachers
– Help learners access remote learning resources
– A natural environment for collaborative learning
14. MC Applications
• Mobile Healthcare:
– M-healthcare is to minimize the limitations of traditional
medical treatment (eg. Small storage, security/privacy,
medical errors, …)
– M-healthcare provides mobile users with convenient
access to resources(eg. medical records)
– M-healthcare offers hospitals and healthcare organizations
a variety of on-demand services on clouds
– Examples:
• Comprehensive health monitoring services
• Intelligent emergency management system
• Health-aware mobile devices (detect pulse-rate, blood pressure,
level of alcohol etc)
• Pervasive access to healthcare information
• Pervasive lifestyle incentive management (to manage healthcare
expenses)
15. MC Applications
• Mobile Gaming:
– M-game is a high potential market generating
revenues for service providers.
– Can completely offload game engine requiring large
computing resource (e.g., graphic rendering) to the
server in the cloud.
– Offloading can also save energy and increase game
playing time (eg. MAUI allows fine-grained energy-
aware offloading of mobile codes to a cloud)
– Rendering adaptation technique can dynamically
adjust the game rendering parameters based on
communication constraints and gamers’ demands
16. MC Applications
• Assistive technologies:
– Pedestrian crossing guide for blind and visually-
impaired
– Mobile currency reader for blind and visually
impaired
– Lecture transcription for hearing impaired students
• Other applications:
– Sharing photos/videos
– Keyword-based, voice-based, tag-based searching
– Monitoring a house, smart home systems
– …
17. MC Issues
• Mobile communication issues:
– Low bandwidth: One of the biggest issues, because
the radio resource for wireless networks is much
more scarce than wired networks
– Service availability: Mobile users may not be able to
connect to the cloud to obtain a service due to traffic
congestion, network failures, mobile signal strength
problems
– Heterogeneity: Handling wireless connectivity with
highly heterogeneous networks to satisfy MCC
requirements (always-on connectivity, on-demand
scalability, energy efficiency) is a difficult problem
18. MC Issues
• Computing issues:
Computation offloading:
• One of the main features of MCC
• Offloading is not always effective in saving energy
• It is critical to determine whether to offload and
which portions of the service codes to offload
• Two types:
– Offloading in a static environment
– Offloading in a dynamic environment
19. Computation Offloading Approaches in
a Static Environment
• Kumar and Lu suggest a program partitioning
based on estimation of energy consumption
before execution
• Optimal program partitioning for offloading is
dynamically calculated based on the trade-off
between the communication and computation
costs at run time.
K. Kumar and Y. Lu, “Cloud Computing for Mobile
Users: Can Offloading Computation Save Energy,”
IEEE Computer, vol. 43, no. 4, April 2010.
20. Computation Offloading Approaches in
a Static Environment
• Li et al. present an offloading scheme based on
profiling information about computation time and data
sharing at the level of procedure calls.
• A cost graph is constructed and a branch-and-bound
algorithm is applied to minimize the total energy
consumption of computation and the total data
communication cost.
Z. Li, C. Wang, and R. Xu, “Computation offloading to save
energy on handheld devices: a partition scheme,” in Proc
2001 Intl Conf on Compilers, architecture, and synthesis
for embedded systems (CASES), pp. 238-246, Nov 2001.
21. Computation Offloading Approaches in
a Static Environment
• Chen et al. present an approach to decide which
components of Java programs should be offloaded.
• First divide a Java program into methods and compute
execution costs for these methods.
• Then compare the local execution costs of each method
with the estimated remote execution costs to make an
optimal execution decision.
G. Chen, B. T. Kang, M. Kandermir, N. Vijaykrishnan, M. J.
Irwin, and R. Chandranouli, “Studying energy trade offs in
offloading computation/compilation in Java-enabled mobile
devices,” IEEE Transactions on Parallel and Distributed
Systems, 15(9):795-806, Sept 2004.
22. Computation Offloading Approaches in
a Static Environment
• Wang and Li propose a polynomial time algorithm to find an
optimal program partition.
• First partition a program into distributed subprograms by
producing a program abstraction.
• Then, task allocations and data transfer of the abstract memory
locations are determined subject to the control and data flow
defined over the abstraction.
• The abstraction is divided into clusters and a heuristic algorithm is
applied to find the optimal partition to minimize the execution cost
of the program.
C. Wang and Z. Li, “A computation offloading scheme on handheld
devices,” Journal of Parallel and Distributed Computing, Special issue
on middleware, 64(6):740-746. June 2004.
23. Computation Offloading Approaches in
a Static Environment
• Hunt and Scott present an automatic distributed
partitioning system (ADPS) called Coign, which
automatically transforms a program into distributed
applications without accessing the source codes.
• Coign constructs a graph model of the application’s
inter-component communication through scenario-
based profiling to find the best distribution.
G. C. Hunt and M. L. Scott, “The Coign automatic
distributed partitioning system,” in Proc 3rd Symposium
on Operating systems design and implementation (OSDI),
pp. 187-200, Feb 1999.
24. Computation Offloading Approaches in
a Static Environment
• Xian et al. propose an offloading method which does
not require the estimation of execution time.
• Online statistics of the comp time are used to compute
optimal timeout and if the computation is not finished
within timeout, it is offloaded to the server.
• Saves up to 17% more energy than existing methods.
C. Xian, Y. H. Lu, and Z. Li, “Adaptive computation
offloading for energy conservation on battery-powered
systems,” in Intl Conf on Parallel and Distributed Systems,
vol. 2, pp. 1, December 2009.
25. Computation Offloading Issues in a
Dynamic Environment
• Offloading in a dynamic network environment (e.g.,
changing connection status and bandwidth) is harder.
• Environment changes can cause additional problems.
• The transmitted data may not reach the destination
• The data executed on the server could be lost when it
has to be returned to the sender.
26. Computation Offloading Approaches in
a Dynamic Environment
• Ou et al. analyze offloading systems in wireless
environments
• They consider three circumstances of executing an
application to estimate the efficiency of offloading.
– performed locally (without offloading)
– performed in ideal offloading systems (without failures)
– performed with the presence of offloading and failure
recoveries (re-offload after failure)
S. Ou, K. Yang, A. Liotta, and L. Hu. “Performance Analysis
of Offloading Systems in Mobile Wireless Environments,”
in Proc IEEE Intl Conf on Communications (ICC), pp. 1821,
August 2007.
27. Computation Offloading Approaches in
a Dynamic Environment
• Chun and Maniatis present a system to partition an
application in three steps: application structuring,
partitioning choice, and security.
– Programs are structured to be seamlessly and dynamically
executed between mobile and cloud.
– The application decides what modules to run at the client and at
the server dynamically at a runtime.
– The system will choose a suitable partitioning policy so that the
total energy consumption is minimized.
– Modules containing sensitive data will be executed locally.
B-G. Chun and P. Maniatis, “Dynamically partitioning applications
between weak devices and clouds,” in Proceedings of the 1st ACM
Workshop on Mobile Cloud Computing & Services: Social Networks
and Beyond (MCS), no. 7, June 2010.
28. Computation Offloading Approaches in
a Dynamic Environment
• MAUI is an architecture to dynamically partition an
application at a runtime in three steps.
• First, use code portability to create two versions of a mobile
application (for mobile device and cloud).
• Second, use programing reflection to identify which
methods are marked ‘remoteable’ or not and type safety to
extract only the program state needed by the ‘remoteable’
methods. Then, send the necessary program state to the
cloud.
E. Cuervo, A. Balasubramanian, Dae-ki Cho, A. Wolman, S.
Saroiu, R. Chandra, and P. Bahl, “MAUI: Making Smartphones
Last Longer with Code offload,” in Proc 8th Intl Conf on Mobile
Systems, Applications, and Services, pp. 49-62, June 2010.
29. Computation Offloading Approaches in
a Dynamic Environment
• Angin and Bhargava propose a computation offloading framework
based on mobile agents.
• During installation of the mobile application on the device, it is
partitioned by the application partitioner component.
• When the user launches the application, the offloading manager
component of the framework first contacts a cloud registry to
locate virtual machine instances in the cloud to offload application
partitions to.
• Then these application partitions are packaged in mobile agents
and sent over the network to the selected instances to start
running, and the application task is completed with agent
collaboration without further management by the mobile platform.
P. Angin, B. Bhargava. “An Agent-based optimization framework for
mobile-cloud computing,” Journal of Wireless Mobile Networks,
Ubiquitous Computing, and Dependable Applications, vol. 4, no. 2,
2013.
30. MC Security Issues
• Protecting user privacy and data/application
secrecy from adversaries is key to establish
and maintain consumers’ trust in the mobile
platform, especially in MCC.
• MCC security issues have two main categories:
– Security for mobile users
– Securing data on clouds
31. Security for Mobile Users
• Mobile devices are exposed to numerous security
threats like malicious codes and their
vulnerability.
• GPS can cause privacy issues for subscribers.
• Security for mobile applications:
– Installing and running security software are the
simplest ways to detect security threats.
– Mobile devices are resource constrained, protecting
them from the threats is more difficult than that for
resourceful devices.
32. Mobile User Security Approaches
• Oberheide et al. present an approach to move the threat
detection capabilities to clouds.
• An extension of the CloudAV platform consisting of host
agent and network service components.
• Host agent runs on mobile devices to inspect the file
activity on a system.
• If an identified file is not available in a cache of previous
analyzed files, this file will be sent to the incloud network
service for verification.
• The second major component of CloudAV is a network
service that is responsible for file verification
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F.
Jahanian. “Virtualized in-cloud security services for mobile
devices,” in Proc 1st Workshop on Virtualization in Mobile
Computing (MobiVirt), pp. 31-35, June 2008.
33. Mobile User Security Approaches
• Portokalidis et al. present a paradigm in which
attack detection for a smartphone is performed
on a remote server in the cloud.
• The smartphone records only a minimal
execution trace, and transmits it to the security
server in the cloud.
G. Portokalidis, P. Homburg, K. Anagnostakis, and H.
Bos, “Paranoid Android: versatile protection for
smartphones,” in Proc 26th Annual Computer
Security Application Conference (ACSAC), pp. 347-
356, September 2010.
34. Privacy Issues in MC
• Location based services (LBS) faces a privacy
issue on mobile users’ provide private
information such as their current location.
• This problem becomes even worse if an
adversary knows user’s important
information.
35. Privacy Issues in MC
• Zhangwei and Mingjun propose the location trusted server
(LTS) approach.
• After receiving mobile users’ requests, LTS gathers their
location information and cloaks the information called
“cloaked region” to conceal user’s information.
• The “cloaked region” is sent to LBS, so LBS knows only
general information about the users but cannot identify
them.
• H. Zhangwei and X. Mingjun, “A Distributed Spatial Cloaking
Protocol for Location Privacy,” in Proc 2nd Intl Conf on
Networks Security Wireless Communications and Trusted
Computing (NSWCTC), vol. 2, pp. 468, June 2010.
36. Context-aware Mobile Cloud Services
• It is important to fulfill mobile users’ satisfaction
by monitoring their preferences and providing
appropriate services to each of the users.
• Context-aware mobile cloud services try to utilize
the local contexts (e.g., data types, network
status, device environments, and user
preferences) to improve the quality of service
(QoS).
37. Mobile Service Clouds
• Samimi et al. build the Mobile Service Cloud model.
• When a customer uses a service, the request firstly goes to
a service gateway which will choose an appropriate primary
proxy to meet the requirements and then sends the result
to the user.
• In disconnection, MSCs will establish transient proxies for
mobile devices to monitor the service path, and support
dynamic reconfiguration.
• The model addresses the disconnection issue and can
maintain the QoS at an acceptable level.
F. A. Samimi, P. K. Mckinley, and S. M. Sadjadi, “Mobile Service
Clouds: A Self-Managing Infrastructure for Autonomic Mobile
Computing Services,” in Proceedings of the 2nd International
Workshop on Self-Managed Networks, Systems & Services
(SelfMan), vol. 3996, pp. 130-141, 2006.
38. Context-aware Mobile Cloud
Services
• La and Kim propose an algorithm to choose a context-aware
adapter.
• The algorithm first determines the gaps occurring in the given
contexts. A gap is defined as a result of context changes.
• Then, the algorithm determines a cause of predefined gaps before
saving the current states of the service invocation for
disconnection.
• For each identified gap, this algorithm will choose an appropriate
adapter for the mobile user.
H. H. La and S. D. Kim, “A Conceptual Framework for Provisioning
Context-aware Mobile Cloud Services,” in Proceedings of the 3rd IEEE
International Conference on Cloud Computing (CLOUD), pp. 466,
August 2010.
39. Open Issues in MC
• Network Access Management:
– An efficient network access management not only
improves link performance but also optimizes
bandwidth usage.
– Cognitive radio can be expected as a solution to
achieve the wireless access management.
– Can automatically changes its transmission or
reception parameters, in a way where the wireless
communications can have spectrum agility in terms of
selecting available wireless channels opportunistically.
– Integrated with MCC for better spectrum utilization
40. Open Issues in MC
• Quality of Service:
– How to ensure QoS is still a big issue, especially on
network delay.
– CloneCloud and Cloudlets are expected to reduce the
network delay.
– CloneCloud uses nearby computers or data centers to
increase the speed of smart phone applications.
– The idea is to clone the entire set of data and
applications from the smartphone onto the cloud and
to selectively execute some operations on the clones,
reintegrating the results back into the smartphone.
41. Open Issues in MC
• Quality of Service:
– A cloudlet is a trusted, resource-rich computer or
cluster of computers which is well-connected to the
Internet and available for use by nearby mobile
devices with on one-hop wireless connection.
– Mobile users may meet the demand for real-time
interactive response by low-latency, one-hop, high-
bandwidth wireless access to the cloudlet.
– Can help mobile users overcome the limits of cloud
computing as WAN latency and low bandwidth.
42. Open Issues in MC
• Pricing:
– MC involves with both mobile service provider
(MSP) and cloud service provider (CSP) with
different services management, customers
management, methods of payment and prices.
– This will lead to many issues.
– The business model including pricing and revenue
sharing has to be carefully developed for MCC.
43. Open Issues in MC
• Standard Interface:
– Interoperability becomes an important issue when
mobile users need to interact with the cloud.
– Web interfaces may not be the best option.
– It is not specifically designed for mobile devices.
– May have more overhead.
– Compatibility among devices for web interface could
be an issue.
– Standard protocol, signaling, and interface for
interacting between mobile users and cloud would be
required. (HTML5 & CSS3)
44. Open Issues in MC
• Service Convergence:
– Services will be differentiated according to the types, cost,
availability and quality.
– A single cloud may not be enough to meet mobile user’s
demands.
– New scheme is needed in which the mobile users can utilize
multiple cloud in a unified fashion.
– The scheme should be able to automatically discover and
compose services for user.
– Sky computing is a model where resources from multiple clouds
providers are leveraged to create a large scale distributed
infrastructure.
– The mobile sky computing will enable providers to support a
cross-cloud communication and enable users to implement
mobile services and applications.
– Service integration (i.e., convergence) would need to be
explored.
45. Necessity of Green ICT
• To deal with global warming by either
reducing greenhouse gas emissions or in the
alternative its potential harmful effects on the
planet.
46. The global ICT industry accounts for
approximately 2 percent of global carbon
dioxide (CO2) emissions, a figure equivalent to
aviation“.
Did You Know……..
18% of office workers never switch off their PC at
night or weekends, and a further 13% leave it on
some nights each week,
47. Did You Know……..
A photocopier which is left switched on overnight needs the same amount of
energy as it does to make 1500 photocopies.
With the fast growth of ICT application, the total
electricity consumption of ICT and other consumer
electronics worldwide is predicted to double by 2022.
Switching off: Office workers never switch off their PC at night or weekends and a
further 13% leave it on some nights each week, producing about 700,000 tonnes of
CO2 emissions
49. 1 Turn off your computer sets when not in use –
as this will save energy.
Tips for Greener Computer use
2 Avoid using screen savers because it does not reduce energy use.
3 Configure your printer settings to economy mode as this will save ink
and energy
50. 4 Reuse and repair ICT equipment before
replacing.
5 Choose dark backgrounds for your
screen display—bright-colored displays
consume more power.
Tips for Greener Computer use
51. 6 Use LCD monitors instead of CRT as they provide
up to 70% power savings. The smaller the size of a
LCD monitor, the lesser the energy it consumes.
7 Purchase an Energy Star–compliant computer.
Note that laptop use much less energy than desktops.
8 Buy multi-functional equipments for tasks such as printing, faxing,
copying and scanning as multi-functional equipments save up to 50%
in space and 20% in energy.
9 Buy inks which are made from renewable resources (e.g. vegetable
and non-petroleum products), as it uses less dangerous solvents, and
also produce brighter, cleaner colors.
10 Consider switching to thin client machines and notebooks as these
equipments use less energy than desktop PCs.
Tips for Greener Computer use
52. 11 Read and review documents and e-mails on
screen instead of printing on papers
12 Use double-sided printing functionality of your printer to save paper
and energy.
Tips for Greener Computer use
53. Top 10 Ways to Reduce Power Consumption
of PCs
13) Turn down the brightness setting on your monitor. The
brightest setting on a monitor can consume twice the power
used by the dimmest setting. Note that on most laptop
computers, the display is the single largest consumer of
energy.
55. What is Computer ?
Computer is an electronic device.
Can store large amounts of data.
Can performing operations on data.
Performing given function on the data & displays the result
as output.
Process data whenever needed.
Known from ‘to compute’
56. What is Process?
Computer works on data as per programme is called process.
Processing means operations like…..
Calculations,
Logical decision making,
Outputting data,
Communicating with others computer etc.
57. Characteristics
Speed
Arithmetical and Logical
Operations
Accuracy
Reliability
Storage
Retrieving Data and
Programme
Automation
Versatility (Flexible)
Consistency
Communications
58. Applications of Computer
• Science research
• Education
• Business applications
• Banking
• Office Automation
• Desktop publishing
• Management aids
• Engineering designing
• Road traffic control
• Railway
• Medicine
• Information services
59. What is Internet
Inter connection of many computers via network.
Global connected through network (through LAN or WAN)
To provide the various application services i.e. E-Mail, Usenet (News),
WWW, Telnet, FTP, etc
60. Uses of Internet
Searching
E-mail service
Commercial Services
Electronic books & Publication
Video Conferencing
Sharing data and results quickly
Retrieving files & Program of all types
Find information databases and tutorials
News paper columns
Banking
Downloading / Uploading any information
News, sports, stocks, music etc.
Use of internet in various fields like education, Business, governance, etc.
And many more ………………..
62. What is ICT?
During last decade of twentieth century there was extraordinary development in
information and communication technology (ICT) which led to a transmutation of
processes and practices in almost all aspects of human activities.
Information and communication technologies (ICTs) are the technologies used in
the conveying, manipulation and storage of data by electronic means.
62
63. Information and Communication Technologies
Information is data that has been sorted and arranged.
It consists of organized facts and opinions people receive during daily life.
Changing data into information is called data processing or information processing.
It involves gathering, organizing, and reporting data so it is useful to people.
It is often done using information technology.
64. ICT Tools
Radio, television, video, DVD, telephone (fixed line & mobile), satellite systems,
computer and network hardware and software; (equipment and services associated
with these technologies, such as videoconferencing and electronic mail.) , blogs
64
Blackboard
OHP,
Phone,
Pager
TV/VHS,
Wireless Phone
LCD, PC
Whiteboard,
Interactive
Panel
Forums
Search
Engine,
Blogs,
e-Groups
65. Information and Communication Technologies
People often use the terms information and communication together.
These terms are related, but each means something different.
Two words we need to know to understand communication technology are data and
information.
Data includes individual facts, statistics (numerical data), and ideas.
These facts and ideas are not sorted or arranged in any manner.
66. What is Communication?
Communication is simply the act of transferring
information from one place to another.
Exchanging Information from computer to another
computer
The classic communication system is made up
of an information source, an encoder, a transmitter, a
receiver, a decoder, storage, retrieval, and an
information destination.
67. Synchronous Communication
• Online Chat
– Text based
– Audio based
– Video based
• Mobile Technology
– Conferencing
– Phone
• Satellite
– Television channel
– Video Conferencing
67
69. Scope of Internet as a ICT
• Education
• Research
• Communication
• Leisure and Entertainment
• Exploring the world
• Finance
• Shopping
• And many more ….
69
70. Scope of Internet as a ICT in Education
ICT as a tool to innovate teaching-learning practice via Internet
(i.e. digital content, multimedia, teaching-learning methods,
learning environment)
ICT as an administrative tool (i.e. education management
information systems (EMIS)
ICT as an expanding learning opportunity (i.e. distance learning, e-
Learning)
ICT as a facilitator of higher-order thinking skills (i.e. learner-
centered, self-directed learning, tailored learning)
70
71. Traditional v/s Internet based ICT education
Approach
71
Physical – limited size
Synchronous
Unlimited
Anytime, anywhere
PowerPoint / transparency /
etc
Textbooks / library
Video
Multimedia / simulation
Digital library
On demand
Syn & Asyn. Communication
One learning path Learning path and pace
determined by learner
72. Psychology of using Teaching Aids which include
ICTs
Hear is an effective saying
I hear, I forget : Verbal description only are not enough for learners
to remember and understand. Visualization of objects especially in
science and technology is important
I see, I remember: Knowledge that is gained through the site is more
colorful, accurate and permanent. It is said that 80% of our
knowledge is gained through our eyes.
73. ICT can help learning
Develop understanding
Speed and automatic functions of ICT can enable teachers to demonstrate,
explore or explain aspects of their teaching, and students learning, more
effectively e.g. use of a spread sheet to perform calculations in order that
patterns can be concentrated on rather than the calculating.
74. ICT can help learning
Extend access to sources
the capacity and range of ICT can enable teachers and students to gain access
to historical, recent or immediate information, through, for example,
accessing information on CD-ROM or the Internet
Enhance enquiry skills
search for and compare information from different sources
75. ICT can help learning
Enhance the communication of ideas
communicate with other people, locally and over distances, easily and
effectively
present information in ways which are accessible in different forms for
different audiences.
76. Does ICT increase access to learning opportunity?
Education opportunities in dispersed locations where conventional schools are
not viable;
A choice to students and parents of what they want to learn i.e. Choice based
credit system (CBCS);
A safety net for school drop-outs so they do not lapse into illiteracy;
Alternative venue to schools.
Second chance education.
Standardised curriculum materials
Lifelong learning concept
Limiting fraud in assessment process
76
77. Internet based ICT in Agriculture using web
applications
There are many web sites available for getting information regarding
agricultural products.
One of them is “Soil Health Card” a 12th National e-governance award winner.
It reflects soil testing report (Current composition of soil) and provides
information about which crops farmers should cultivate and which manure
should be applied in what proportion.
Agmarknet (Digital Mandi for Indian Kisan –by IIT, Kanpur)
www.kissankerala.net and Many more …
77
78. Green ICT
Green ICT refers to an approach in reducing the energy and other resources
consumed and the emissions and other waste produced across the ICT lifecycle –
from manufacture, procurement and use of ICT in an organisation to its re-use and
aims to improve environmental sustainability of organisations. Specifically, Green
ICT as applied to the use of ICT resources aims to:
Reduce energy consumption and CO2 emissions during ICT use
-Reduce environmental impact of disposal of ICT waste products
In addition to the above, Green ICT also explores how ICT applications can be used to
help other sectors conserve and optimise energy usage.
78
79. Steps towards Green ICT
Reducing Power Consumption of ICT equipments.
Going Paperless
Buying Energy-efficient ICT equipments
Disposal, Re-use and Recycling ICT Equipments
Server Optimisation and Virtualisation
Indirect ICT Savings
– Tele Conferencing
– Web Conferencing
– Video Conferencing
79
80. Our Commitment
Accelerating Our Daily life activities by
Convergence of Technologies & Sharing of
Experiences and Resources.
Green ICT can reduce costs and the
negative impact
on the environment, making being
green good for all businesses
80
81. Useful Keys Internet
• Network: Connecting computers with each other For exchanging
information
• Client : It is a programme or computer for getting special
information from another compute.
• Server: It is a programme or computer, which gives information to the
client computer.
• Protocol: It’s a rules for connecting to the internet. (TCP/IP)
• Portal: It is a website. Known as a gateway of internet.
(Search engine)
14/08/2022 81
82. Router: It is a device, which decides where data will be send
(Network point)
www : World Wide Web
Browser: It is a programme which helps us to use internet
Website: Group of different web pages.
URL : Universal Resource Locator
83. .com : Commercial organization
.net : Large Networks
.gov : Government organization
.org : non-profit making organization
.edu : educational organization
.mil : military organization
.in : India
.au : Australia
.us : United States
.uk : United Kingdom
Types of Website (Domain)
84.
85. References
• Le Guan, Xu Ke, Meina Song, and Junde Song, “A Survey of
Research on Mobile Cloud Computing”, IEEE/ACIS 10th
International Conference on Computer and Information
Science (ICIS), 2010, pp. 387-392.
• Xiaopeng Fan, Jiannong Cao, and Haixia Mao. “A Survey of
Mobile Cloud Computing,” ZTE Communications, 9(1):4-8,
Mar 2011.
• Hoang T. Dinh, Chonho Lee, Dusit Niyato, and Ping Wang. “A
survey of Mobile Cloud Computing: Architecture,
Applications, and Approaches”, Wireless Communication
and Mobile Computing.
• http://www.csie.ndhu.edu.tw/~showyang/MCloud2012/04
MobileCloudSurvey.pdf
• Chetan S., Gautam Kumar, K. Dinesh, Mathew K. and
Abhimanyu M.A., “Cloud Computing for Mobile World,”
2010. (http://chetan.ueuo.com/projects/CCMW.pdf)