An Analysis of Computation Offloading Mechanisms for Computationally Intensive Mobile Applications

Authors:

C. Anuradha,M. Ponnavaiko,

DOI NO:

https://doi.org/10.26782/jmcms.spl.2019.08.00005

Keywords:

Mobile cloud computing,computation offloading,energy consumption,execution time,bandwidth,network connectivity,

Abstract

Smart phones are generally utilized in our everyday lives. We utilize computationally escalated versatile applications, for example, face location, enlarged reality, video preparing, video gaming and discourse acknowledgment. These applications are perplexing as well as they request high figuring assets. These gadgets show a few constraints, for example, restricted calculation control, little memory estimate, erratic system availability, constrained battery lifetime, and so forth. Every one of these constraints can be survived if distributed computing can be coordinated with cell phones. Versatile distributed computing is the worldview which can be utilized to give boundless access of figuring assets to cell phones. Computational offloading is a ground-breaking system utilized in versatile distributed computing for improving reaction time and battery productivity of the cell phones which are considered as two basic factors in the ease of use of portable applications. By offloading computationally concentrated assignments to committed processing framework, gadgets can diminish load alone assets while profiting by assets given by the devoted foundation. This paper gives a diagram of different foundation, structures and procedures for calculation offloading.

Refference:

I. A.Sangeetha,C.Nalini,”Semantic Ranking based on keywords extractions in the web”, International Journal of Engineering & Technology, 7 (2.6) (2018) 290-292
II. S.V.Gayathiri Devi, C.Nalini, N.Kumar, ”An efficient software verification using multi-layered software verification tool “International Journal of Engineering & Technology, 7(2.21)2018 454-457
III. C.Nalini, ShwtambariKharabe, ”A Comparative Study On Different
Techniques Used For Finger – Vein Authentication”, International Journal Of Pure And Applied Mathematics, Volume 116 No. 8 2017, 327-333, Issn:1314-3395
IV. M.S. Vivekanandan and Dr. C. Rajabhushanam, “Enabling Privacy Protection and Content Assurance in Geo-Social Networks”, International Journal of Innovative Research in Management, Engineering and
Technology, Vol 3, Issue 4, pp. 49-55, April 2018.
V. Dr. C. Rajabhushanam, V. Karthik, and G. Vivek, “Elasticity in Cloud Computing”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3, Issue 4, pp. 104-111, April 2018.
VI. K. Rangaswamy and Dr. C. Rajabhushanamc, “CCN-Based Congestion Control Mechanism In Dynamic Networks”, International Journal of Innovative Research in Management, Engineering and Technology, Vol 3,
Issue 4, pp. 117-119, April 2018.
VII. Kavitha, R., Nedunchelian, R., “Domain-specific Search engine optimization using healthcare ontology and a neural network backpropagation approach”, 2017, Research Journal of Biotechnology, Special Issue 2:157-166
VIII. Kavitha, G., Kavitha, R., “An analysis to improve throughput of high-power hubs in mobile ad hoc network” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 361-363
IX. Kavitha, G., Kavitha, R., “Dipping interference to supplement throughput in MANET” , 2016, Journal of Chemical and Pharmaceutical Sciences, Vol-9, Issue-2: 357-360
X. Michael, G., Chandrasekar, A.,”Leader election based malicious detection and response system in MANET using mechanism design approach”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April -June 2016
XI. Michael, G., Chandrasekar, A.,”Modeling of detection of camouflaging worm using epidemic dynamic model and power spectral density”, Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XII. Pothumani, S., Sriram, M., Sridhar, J., Arul Selvan, G., Secure mobile agents communication on intranet, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S32-S35, 2016
XIII. Pothumani, S., Sriram, M., Sridhar , Various schemes for database encryption-a survey, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg NoS103-S106, 2016
XIV. Pothumani, S., Sriram, M., Sridhar, A novel economic framework for cloud and grid computing, Journal of Chemical and Pharmaceutical Sciences, volume 9, Issue 3, Pg No S29-S31, 2016
XV. Priya, N., Sridhar, J., Sriram, M. “Ecommerce Transaction Security Challenges and Prevention Methods- New Approach” 2016 ,Journal ofChemical and Pharmaceutical Sciences, JCPS Volume 9 Issue 3.page no:S66-S68 .
XVI. Priya, N.,Sridhar,J.,Sriram, M.“Vehicular cloudcomputing security issues and solutions” Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XVII. Priya, N., Sridhar, J., Sriram, M. “Mobile large data storage security in cloud computing environment-a new approach” JCPS Volume 9 Issue 2. April – June 2016
XVIII. Anuradha.C, Khanna.V, “Improving network performance and security in WSN using decentralized hypothesis testing “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016 .
XIX. Anuradha.C, Khanna.V, “A novel gsm based control for e-devices“Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XX. Anuradha.C, Khanna.V, “Secured privacy preserving sharing and data integration in mobile web environments “Journal of Chemical and Pharmaceutical Sciences(JCPS) Volume 9 Issue 2, April – June 2016
XXI. Sundarraj, B., Kaliyamurthie, K.P. Social network analysis for decisive the ultimate classification from the ensemble to boost accuracy rates 2016 8
XXII. International Journal of Pharmacy and TechnologySundarraj, B., Kaliyamurthie, K.P. A content-based spam filtering approach victimisation artificial neural networks 2016 8 3 International Journal of Pharmacy and Technology
XXIII. Sundarraj, B., Kaliyamurthie, K.P. Remote sensing imaging for satellite image segmentation 2016 8 3 International Journal of Pharmacy and Technology.

View | Download