Version-4 (July-August 2017)
Ver-1 Ver-2 Ver-3 Ver-4 Ver-5 Ver-6 Ver-7
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Achieving pedestrian detection by means of computer vision is not a new topic in the field of computer vision research; however it is still being pursued with renewed interest because of the huge scope for performance improvement in the existing systems. Generally, the task of pedestrian detection (PD) involves stages such as pre-processing, ROI selection, feature extraction, classification, verification/refinement and tracking. Of all the steps involved in the PD framework, the paper presents the work done towards implementing the feature extraction and classification stages in particular. It is of paramount importance that the extracted features from the image should be robust and distinct enough to help the classifier distinguish between.................
[1]. World Health Organization (WHO). 2013. Global Status Report on Road Safety 2013: Supporting a Decade of Action.
[2]. Gero´nimo D., Lo´pez A. M., Sappa A. D., and Graf T., "Survey of Pedestrian Detection for Advanced Driver Assistance Systems", IEEE Transactions on Pattern Analysis and Machine Intelligence, 2010 .
[3]. Dalal N. and Triggs B. 2005. Histograms of Oriented Gradients for Human Detection. In Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition.
[4]. Platt J. 1999. Fast training of support vector machines using sequential minimal optimization. Advances in kernel methods—support vector learning 3.
[5]. Yadav R. P., Senthamilarasu V., Kutty K., Vaidya V., Ugale S. P. 2015 (in press). A Review on Day-Time Pedestrian Detection. SAE 2015 World Congress.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Collaborative Web Recommendation System Using Hidden Markov Model |
Country | : | India |
Authors | : | Mr. Y. Vasavi || Mr. T. Venkata Nagaraju |
: | 10.9790/0661-1904040509 |
Abstract: Internet has turned out to be a standout amongst the most broad data assets in a current traverse of time. It for the most part covers all the data required for any client. In any case, discovering information on an expansive site is a not a simple assignment. The clients of the sites for the most part experience the ill effects of the issue of finding the required information in time. Indeed, finding the required dataset on the web has turned out to be one of the troublesome and tedious undertakings today. Gigantic advancement of web as of late requires the change of recommender frameworks that will be easy to use in web applications.................
Keywords: PMF, RAPMF
[1]. P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "GroupLens: an open architecture for collaborative filtering of netnews," in Proceedings of the 1994 ACM conference on Computer supported cooperative work, 1994, pp. 175–186.
[2]. P. Melville, R. J. Mooney, and R. Nagarajan, "Contentboosted collaborative filtering for improved recommendations," in Proceedings of the National Conference on Artificial Intelligence,2002,pp.187– 192.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Green Marketing and Its Impact on Cutomer's Attitude |
Country | : | India |
Authors | : | P. Sivasankarai |
: | 10.9790/0661-1904041013 |
Abstract: Today Environment issues are seen everywhere in the world. These issues are very crucial in global warming, waste disposal, climate change and pollution etc., and influence our daily life. By this time many corporates are still hesitated to use green marketing practices even after government compulsion. The main reason for this is that firm still thinks that green marketing practice may increase their cost of production and reduce the profit. Some golden rules are also given.................
Keywords: Green Marketing, Strategies of Green Marketing 4P's of Green Marketing, Golden rules of Green Marketing.
[1] Fernandez Rd, Bhandarkar SM (2004) Green Marketing – An Indian Perspective.
[2] Mathur LK, Mathur I (2000) An analysis of the wealth effect of green marketing strategies. Journal of Business Research 50 (193 – 200)
[3] www.wipro.com
[4] www.greenenergy.wisein.org
[5] www.livestrong.com
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The research work concentrated on the development of digit corpus for the Urdu language, which starts from siffar (Zero) se Nau (Nine) and three utterances were taken in the development of corpus from 50 persons which were the native language speaker of Urdu. In that 50 speaker 50% male and 50 % female speakers were considered and all were having age above 18 years. Twoutteranceswere considered for training and oneutterance considered for testing.The performance analysis were done using the traditional techniques LPC (Linear Predictive Coding) and HMM.................
Keywords: Speech Recognition System, Linear Predictive Coding, Hidden Markov Model
[1] AbuZeina, D., & Elshafei, M. (2011). Cross-Word Modeling for Arabic Speech Recognition. Springer Science & Business Media.
[2] Akram, M. U., & Arif, M. (2004, December). Design of an urdu speech recognizer based upon acoustic phonetic modeling approach. In Multitopic Conference, 2004. Proceedings of INMIC 2004. 8th International (pp. 91-96). IEEE.
[3] M. A. Anusuya, S. K. Katti, "Speech Recognition by Machine: A Review", International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009, pp. 181-205
[4] Corneliu Octavian DUMITRU, Inge GAVAT, "A Comparative Study of Feature Extraction Methods Applied to Continuous Speech Recognition in Romanian Language", 48th International Symposium ELMAR-2006, 07-09 June 2006, Zadar, Croatia.
[5] DOUGLAS O'SHAUGHNESSY, "Interacting With Computers by Voice: Automatic Speech Recognition and Synthesis", Proceedings of the IEEE, VOL. 91, NO. 9, September 2003, 0018-9219/03$17.00 © 2003 IEEE.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Opinion Mining on Twitter Data of Movie Reviews using R |
Country | : | India |
Authors | : | Ms. Md. Sania Sultana || Mr. G. V Suresh |
: | 10.9790/0661-1904041924 |
Abstract: Supposition investigation is essentially worried with the examination of feelings and assessments from the content. We can allude supposition examination as conclusion mining. Conclusion investigation finds and legitimizes the opinion of the individual regarding a given wellspring of substance. Web-based social networking contain a gigantic measure of the opinion information as tweets, websites, and updates on the status, posts, and so forth. Estimation examination of this..............
Keywords: Naïve Bayes, Machine Learning, Twitter, Sentiment analysis, IMDb, Unigram
[1] Kamps, J. Marx, M. Mokken, R. J. De Rijke, M. (2004 )"Using wordnet to measure semantic orientations of adjectives," Found in Neethu, M. Rajasree R.(2013) 'Sentiment Analysis in Twitter using Machine Learning Techniques' 4th International Conference on Computing, Communications and Networking Technologies (ICCCNT) Tiruchengode India. July 4-6 2013. IEEE.pp1-5 [Accessed April 25th 2014].
[2] Y. Mejova, 'Sentiment analysis: An overview',mejova/publications/CompsYelenaMejova, vol. 2010-02-03, 2009, 2009.
[3] E. Boy, P. Hens, K. Deschacht, and M. Moens, 'Automatic sentiment analysis in on-line text', 11th International Conference onElectronic Publishing, vol. 349360, 2007.
[4] P. Turney, 'Thumbs Up or Thumbs Down? Semantic orientation applied to unsupervised classification of reviews', 40th annualmeeting on association for computational linguistics, vol. 417424, 2002.
[5] J. Kamps, M. Marx, R. Mokken and M. De Rijke, 'Using wordnet to measure semanticorientations of adjectives', 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper presents an attempt to improve efficiency of cut tile measurement function by developing an 'electronic eye' device using image processing techniques. The automated system consists of a mechanical unit and an image processing unit. A conveyer belt used to move cut tiles one after the other. The camera unit situated above the conveyer belt is directly connected to a computer for image acquisition. Constant light condition was maintained by use of an external light system.................
Keywords: Cut Tile, Image Processing, Electronic Eye, Image Acquisition, Ceramic Industry
[1] Singh, R., Yadav, G. C., 2014, Classifying Corner Defects from Square Ceramic Tile at Production Phase , International Journal of Computer Science Trends and Technology (IJCST), Volume 2 Issue 4.
[2] Bansal, U. and Chhabra, R. , 2014, Ceramic Tile's Surface Quality Estimation Using Image Processing Techniques, International Journal of Applied Engineering and Technology ISSN: 2277-212X, 2014 Vol. 4 (2).
[3] Elbehiery, H., Hefnawy, A. and Elewa, A. ,2007, Surface Defects Detection for Ceramic Tiles Using Image Processing and Morphological Techniques, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:1, No:5.
[4] Roberto Márcio de Andrade, Alexandre Carlos Eduardo, 2011, Methodology for Automatic Process of the Fired Ceramic Tile's Internal Defect Using IR Images and Artificial Neural Network, Vol. XXXIII.
[5] Shukla, N., 2015, A Review on Image Based Target Distance & Height Estimation Technique Using Laser Pointer and Single Video Camera for Robot Vision, International Journal of Engineering Research and Reviews, Vol. 3, Issue 1, pp: (128-135).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: There are several applications which are developed where a Professor can access the student's list from the server and can directly upload the attendance to an online database present in the server. All the applications that are developed, till date, are limited to internet connectivity i.e. they work only if internet connectivity is provided due to which still the pen and paper based attendance is followed in many institutes. Thus, in this paper we propose, an android application.................
Keywords: Android-based management system, Client Server Framework, Online mode, Offline mode
[1] Bhalla, Tapodhan Singla, Ankit Gahlot, Vijay Gupta,"Bluetooth Based Attendance Management System", in International Journal of Innovations in Engineering and Technology (IJIET).
[2] Siti Aisah Mohd Noor, Norliza Zaini, Mohd Fuad Abdul Latip, Nabila Hamzah, "Android- based Attendance Management System",in 2015 IEEE Conference on Systems, Process and Control (ICSPC 2015).
[3] Ankita Agrawal and Ashish Bansal, "Online Attendance Management System Using RFID with Object Counter", in International Journal of Information and Computation Technology.ISSN 0974-2239 Volume 3, Number 3 (2013), pp. 131-138
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The concept of outsourcing |
Country | : | India |
Authors | : | Sova Pal Bera |
: | 10.9790/0661-1904043739 |
Abstract: Outsourcing is contracting with another company or person to do a particular function. To stay ahead of competition, control cost, increase quality and for innovative solutions company consider outsourcing. Now it has become popular and common practice among business professions these days. This paper analyzes the concept of outsourcing, causes, impact, advantages and disadvantages of outsourcing..
Keywords: business process outsourcing (BPO), information technology outsourcing (ITO)
[1] A Brief History of Outsourcing, Rob Handfield, SCRC, Jun, 01, 2006 https://www.outsource2india.com/why_india/why_india.asp [2] Brief History of Outsourcing, Loral Narayanan
[3] The concept of Outsourcing, Dennis AuBuchon, Aug,, 09, 2010
[4] Impact of outsourcing on Indian society, Jamalul Haque, Feb, 13, 2017
[5] Outsourcing, Impact on Indian Society, Tanweer Ahmad, 16 June 2014 https://blog.flatworldsolutions.com/7-key-factors-consider-choosing-outsourcing-company/
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Mobile Ad hoc Networks (MANETs) is a self-organized system which includes of multiple mobile nodescommunicated through a wireless medium. MANETs is weakens to malicious attacks owing to the openness in network topology. Therefore, secured routing techniques are required for reliable data packet transmission. A Service Authentic Trust and Coherence key based Routing (SAT-CKR) technique is proposed for providing security in MANETs during communication.................
Keywords: Mobile Ad hoc NETworks (MANETs), mobile nodes, malicious attacks, trust value, coherence key, optimal path
[1] Hui Xia, Zhiping Jia, Xin Li, Lei Ju, Edwin H.-M. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks",Ad Hoc Networks, Elsevier,Volume 11, Issue 7, Pages 2096-2114, September 2013
[2] Shuaishuai Tan, Xiaoping Li, Qingkuan Dong, "Trust based routing mechanism for securing OSLR-based MANET",Ad Hoc Networks, Elsevier, Volume 30, Pages 84–98, July 2015
[3] Suyash Bhardwaj, Swati Aggarwal and Shikha Goel, "A Novel Technique of Securing Mobile Ad hoc Networks using Shared Trust Model",International Journal of Information and Computation Technology,Volume 3, Issue 9, Pages 909-916, 2013
[4] Erman Ayday, Faramarz Fekri, "An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks", IEEE Transactions on Mobile Computing, Volume 11, Issue 9, Pages 1514 – 1531, 2012
[5] Jan Papaj and Lubomir Dobos, "Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN",Hindawi Publishing Corporation, Mobile Information Systems, Volume 2016, Article ID 7353691, Pages 1-18, 2016
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The process of determining eligibility for someone is usually given with the same value. The determination of eligibility is determined based on several criteria. These criteria are the ability to Academic Potential Test (APT) and Grade Point Average (GPA). The Tsukamoto fuzzy system is the model used in this paper. Each input variable is divided into two membership functions. There are nine rules of Tsukamoto's model applied. The system also provides following changes................
Keywords: Fuzzy, Tsukamoto, Expert System, DCS
[1] O. S. Widayanti Deni and A. Sasmita, "Analysis and Implementation Fuzzy Multi-Attribute Decision Making SAW Method for Selection of High Achieving Students in Faculty Level," IJCSI International Journal of Computer Science Issues, vol. 10, no. 1, pp. 674-680, 2013.
[2] M. Iswan, Khairul and A. P. U. Siahaan, "Fuzzy Logic Concept in Technology, Society, and Economy Areas in Predicting Smart City," International Journal of Recent Trends in Engineering & Research, vol. 2, no. 12, 2016.
[3] A. P. U. Siahaan, "Fuzzification of College Adviser Proficiency Based on Specific Knowledge," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 6, no. 7, pp. 164-168, 2016.
[4] Khairul, M. Simaremare and A. P. U. Siahaan, "Decision Support System in Selecting The Appropriate Laptop Using Simple Additive Weighting," International Journal of Recent Trends in Engineering and Research, vol. 2, no. 12, pp. 215-222, 2016.
[5] A. Saepullah and R. S. Wahono, "Comparative Analysis of Mamdani, Sugeno And Tsukamoto Method of Fuzzy Inference System for Air Conditioner Energy Saving," Journal of Intelligent Systems, vol. 1, no. 2, pp. 143-147, 2015
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Nations of the world are now competing to move progressively towards knowledge based societies as well as economics and science and its offshoot technology are playing significant roles. Information and Communication Technology is being increasingly used in day to day life of a common man and it is rapidly becoming an integral part of providing the better governance services to the citizens of a country. e-Governance aims to provide good governance to the public by using the Information and Communication Technology (ICT) for speedy, accurate, transparent and secured services..................
Keywords: Information and Communication Technology, Digital Signature Certificate, e-Governance
[1] Shaikh Imtiyaj, Er. Ratan Kumar Agrawal, Dr. A K Hota "Study of Online Banking Solution for e-Governance initiatives: e-Procurement –A Scientific Knowledge", IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727,Volume 19,Issue 2,Ver. IV(Mar-Apr. 2017), PP 55-61
[2] Shaikh Imtiyaj, Er. Govinda Chandra Mangual, Dr. A K Hota "Study of e-Governance initiatives: e-Procurement a Business Reform Process for Odisha's Development", IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727,Volume 18,Issue 6,Ver. 1(Nov-Dec. 2016), PP 44-53
[3] Shaikh Imtiyaj, Er Govinda Chandra Mangual, "An Indepth Understanding of e-Governance initiatives: e-Procurement –A Great Success in Odisha", IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727,Volume 18,Issue 4,Ver. V(Jul-Aug. 2016), PP 144-147
[4] Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota, "An Indepth Understanding of e-Procurement : A Case Study Approach", IOSR Journal of Computer Engineering(IOSR-JCE) e-ISSN:2278-0661,p-ISSN:2278-8727,Volume 17,Issue 6,Ver. V(Nov-Dec. 2015), PP 20-24
[5] Shaikh Imtiyaj, N.R Biswal, T.P Ray, Dr A.K Hota , "Digital Signature Certificate: A blessing for e-Governance Application in Human Development", International Journal of Advanced Research in Science, Engineering and Technology,Vol. 2, Issue 1 , pp 350-355,January 2015
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Wireless Sensor Networks (WSN) plays vital role in exploration field. Due to its immediately increasing utilization in monitoring various kinds of environment by appreciate physical phenomenon. Clustering is an adequate and compelling method to enhance conduct of the WSNs system. In this printed material, we think about a protected transportation of information for group based WSNs, where the batch are formed dynamically and anyway. We nominate two Secure and Efficient data Transmission protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the Identity-Based digital Signature and the Identity-Based Online/Offline digital Signature respectively. The Leach protocol is treated and improved. In SET-IBS, security relies on the adherence of the Diffie-Hellman problem in the combine area...................
Keywords: Wireless Sensor Network (WSN), Cluster Head (CH),Base Station (BS), Network life time. SET-IBS, SET-IBOOS, LEACH.
[1]. Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, and Mohsen Guizani, Fellow, IEEE, "Secure and Efficient Data Transmission for Cluster-Based Wireless Sensor Networks", IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 3, March 2014.
[2]. T. Hara, V.I. Zadorozhny, and E. Buchmann, Wireless Sensor Network Technologies for the Information Explosion Era, Studies in Computational Intelligence, vol. 278. Springer-Verlag, 2010.
[3]. Y. Wang, G. Attebury, and B. Ramamurthy, "A Survey of Security Issues in Wireless Sensor Networks," IEEE Comm. Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006.
[4]. A.A. Abbasi and M. Younis, "A Survey on Clustering Algorithms for Wireless Sensor Networks," Computer Comm., vol. 30, nos. 14/ 15, pp. 2826-2841, 2007.
[5]. W. Heinzelman, A. Chandrakasan, and H. Balakrishnan, "An Application-Specific Protocol Architecture for Wireless Micro-sensor Networks," IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | On The Node Clone Detection Using Hashing In WSN |
Country | : | India |
Authors | : | Garikapati.Divya || L V Krishna Rao |
: | 10.9790/0661-1904046873 |
Abstract: Wireless sensor networks accommodate a whole lot to thousands of sensor nodes and are wide employed in civilian and security applications. One in every of the intense physical attacks faced by the wireless sensor network is node clone attack. So node clone detection protocols area unit introduced via distributed hash table and arbitrarily directed exploration to detect node clones. The previous primarily based on a hash table value that is already distributed and provides key based facilities like checking and caching to observe node clones. The later one is exploitation probabilistic directed forwarding technique and border determination. The simulation results for storage consumption, communication value and detection chance is completed exploitation NS2 and obtained arbitrarily directed exploration is that the best one having low communication value and storage consumption and has smart detection chance
Keywords: Wireless Sensor network, clones, DHT, RDE.
[1]. Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, "ERCD: An energy-efficient clone detection protocol in WSNs," in Proc. IEEE INFOCOM, Apr. 14-19, 2013, pp. 2436–2444.
[2]. R. Lu, X. Li, X. Liang, X. Shen, and X. Lin, "GRS: The green, reliability, and security of emergingmachine to machine communications," IEEE Commun.Mag., vol. 49, no. 4, pp. 28– 35, Apr. 2011.
[3]. A. Liu, J. Ren, X. Li, Z. Chen, and X. Shen, "Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks," Comput. Netw., vol. 56, no. 7, pp. 1951–1967, May. 2012.
[4]. T. Shu, M. Krunz, and S. Liu, "Secure data collection in wireless sensor networks using randomized dispersive routes," IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, Jul. 2010.
[5]. P. Papadimitratos, J. Luo, and J. P. Hubaux, "A randomized countermeasure against parasitic adversaries in wireless sensor networks," IEEE J. Sel. Areas Commun., vol. 28, no. 7,pp. 1036–1045, Sep. 2010.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Choosing a suitable career may be difficult for students because they have to consider many if they want to be on the best path. Today, E-orientation systems are designed to help students to find the best way for their academic and professional lives. In this context the research center within the University Hassan II Mohammedia AinChock announced the appearance of MMSyOrientation project. This project focuses on the orientation of Moroccan. Our aim here is to have creatable meta-model of E-orientation platforms to make it easy for student to get oriented. In order to obtain the goal mentioned above.................
Keywords: E-Orientation, MMSyOrientation, Platform, WSDL, XSLT.
[1] "MDA." [Online]. Available: http://www.omg.org/mda/. [Accessed: 10-Feb- 2017].
[2] R. Soley, "Model Driven Architecture by OMG Staff Strategy Group, Object Management Group Draft 3.2, and technical report available: http://ftp.omg.org/pub/docs/omg/OO-11- 05.pdf -" 2000.
[3] "Res-Literaria.fr" [Online]. Available: http://www.res-literaria.fr/top-5-des-sites-pour-trouver-son-orientation-apres-le-bac/. [Accessed: 10-Feb- 2017].
[4] "Onisep." [Online]. Available: http://www.orientation.com/. [Accessed: 10-Feb- 2017]
[5] "Orientation." [Online]. Available: http://www.orientation.com/. [Accessed: 10-Feb- 2017]
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In this paper, we describe the application of cloud computing in the field of robotics where a robot is assigned the job of picking up jobs lying in the floor and to keep them in the given space. The robot is connected to the cloud through a network. It receives the answer to the queries of the database residing in the cloud about the location of the jobs to be picked up and receives the coordinates of the location of the spaces where it is to be kept. The robot offloads the calculation of the distances of every job from it and the distances of the spaces from the jobs and the sequence of the jobs and the spaces where it is to be kept..................
Keywords: Automated Robots; Cloud environment; Database; Queries; Overhead.
[1]. P. Mell, T. Grance, The NIST Definition of Cloud Computing, National Institute of Standards and Technology Special Publication 800-145, 2011.
[2]. E. Guizzo, Robots with Their Heads in the Clouds, IEEE Spectrum, March 2011.
[3]. E. Guizzo, Cloud Robotics: Connected to the Cloud Robots Get Smarter, IEEE Spectrum, January 2011.2012 Florida Conference on Recent Advances in Robotics 6 Boca Raton, Florida, May 10-11, 2012
[4]. R. Arumugam, V. R. Enti, L. Bingbing, W. Xiaojun, K. Baskaran, F. F. Kong, A. S. Kumar, K. D. Meng, G. W. Kit, M. Rakotondrabe, and I. Ivan, "Davinci: A cloud computing framework for service robots."International Conference on Robotics and Automation, 2010, pp. 3084– 3089.
[5]. J. M. Rabaey, Ed., Digital Integrated Circuits. Prentice Hall, 1996. Y. Wen, W. Zhang, K. Guan, D. Kilper, and H. Luo, "Energy-optimal execution policy for a cloud-assisted mobile application platform," NTU Technical Report, 2011.