SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 09|| September – 2016 ||
International Journal of Computational Engineering Research (IJCER)
www.ijceronline.com Open Access Journal Page 6
Contemporary Energy Optimization for Mobile and Cloud
Environment
Pavan Kumar Vadrevu1
*, Ravi Kumar Suggala2
**, Tej Varma Gadhiraju3
***
*1,2,3
Assistant Professor,Department of Information Technology, Shri Vishnu Engineering College for Women,
Bhimavaram
.
I INTRODUCTION
Smart phones and tablets are very popular and raising amount of people today not only for entertainment and
communication purpose but also do lot of activities. Hardware and wireless communication technologies are
increasing every day. Cloud is delivering as a service platform forming usability computing. Whereas resources
for computing are on demand, pay as you use to resource provider from end user increased. Cloud becoming
data centers coming from various places providing ultimate resources, storage and processing capabilities.
The basic problem with the mobile phones and mobile computing are processing capabilities and memory
coming from a small power (Battery) source. This gives lot of limitations on the devices. Today mobile
applications are combined with cloud paradigms. As the functionality of the user with mobile applications
increases the power consumptions is also increased. Many people are doing research in this area to increase the
utilization factor and to reduce power consumptions. In order to defeat the source constraints of mobile devices
several solutions projected.
One of the most significant is represent by off load computation. With this loom the mobile device runs only
part of an application that is the components which are less resource concentrated. The rest of the application is
deployed in the cloud and is accessed through a wireless system. But the challenging task is off load the
application. The alternate is to remote access the devices uses small software and connect to a server remotely
and the server has all the processing capabilities means the server is virtualized with the device. The device will
provide only input and output operations correspond to the application.
This paper distinguish the power utilization of mobile and the cloud computing realize from end to end remote
technology. Exclusively to study the routine of extensively used remote protocols like VNC (Virtual Network
Connection), RDP (Remote Desktop Protocol). This paper carries out several experiments connecting sensible
practice scenarios in different wireless communication technologies, Wi Fi and Long Term Evolution. In
addition this paper distinguishes the power consumption and bandwidth utilization of the different solutions
measured and relates them to the protocol features. In conclusion it offer a few considerations on aspect linked
to user experience.
II REMOTE PROTOCOLS
The routine of diverse remote protocols be evaluated particularly on real tests under unreliable workload
equivalent to browsing and multimedia oriented behavior. This evaluation broken as low movement counter
mark, means that customized request counter mark in which the activities touching display updates are divided
by adding up mock delay. Deliberate movement counter mark allow to exactly compute the crash between a
user generated incident at the client and it’s contradict part at the server. Still such a loom alter the actual
communications maybe ensuing in surprising elevation effect. Additionally it is based on mock application
counter mark slightly than on the real input from genuine users. VNC protocol uses interactive programs for
ABSTRACT
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas
extending usability of systems. This review paper gives information about cloud and mobile
applications in terms of resources they consume and the need of choosing variety of features for users
from several locations and the evolutionary provisions for service provider and end users. Both the
fields are combined to provide good functionality, efficiency and effectiveness with mobile phones.
The enhancement by considering power consumption by means of resource constrained nature of
devices, communication media and cost effectiveness. This paper discuss about the concepts related
to power consumption, underlying protocols and the other performance issues.
Keywords: Power Consumption, Usability, Resource Utilization
Contemporary Energy Optimization for Mobile and Cloud Environment
www.ijceronline.com Open Access Journal Page 7
images and for the creation of the documents. Others are used to simulate the large network ranges defined
based on delay and the bandwidth. Based on the satisfaction of the user for the response time characteristics.
SVNC (Smart VNC) is implemented above VNC for getting more benefits in remote protocols.
III MOBILE CLOUD
Calculation in the direction of accessing resources of cloud mobile devices may also be engaged as the resource
providing systems which create the structural design. This is proficient in order to give the mass of the cloud
skin tone such as disseminated and scalable processing and storage inside a restricted location. This has the
main benefit of without usage of wide area network links which are expensive and not mainly reliable. Even
with the unnatural environment of the devices it is argued that the boost in processing power of these devices
day to day as well as the reserves power by using local less power consuming protocols would collect some
payback above offloading to a traditional cloud. However, a number of issues are still common with this type of
cloud with natural networking uniqueness and challenges related to work allotment.
IV POWER CONSUMPTION
Limited amount of power is available in mobile devices, resources like applications which are running
continuously consumes power. The models which optimize the power consumption of the application will be
adapted in the device. The cloud depends upon the standard power source in the resource centers with
networking. There is a need to various strategies to improve the battery performance and life by offload the
work with cloud, but we can save the power consumption for only few tasks like data transfer through WIFI and
offload the computing part with device and assigning computation related elements to cloud based on dividing
the application code like some code is executed by the device and remaining will be done at the cloud.
Researchers are telling that power consumption can be reduced maximum 30 to 70 percent if we do processing
on multimedia applications in cloud instead of doing on the device. In this context power consumption is more if
it streams or buffers the multimedia application through cellular network. By improving the Quality of Service
(QoS) for real time models thereby reducing failure and retransmissions rates. Analysis on cloud and mobile
based power consumptions depends on the data transfer rates of the system. Several times it is important to look
for power consumption by the cloud hardware related devices because they are energy hungry. In order to
overcome this it is necessary to combine the externally hosted distribution systems. The primary goal of the
mobile cloud environment is to reduce the power consumptions and to improve the computation capabilities.
V EXISTING MECHANISMS
Much analysis and research work going on the power consumption of the device, Data centers and in
Distributed computing. Different models are also proposed on power consumption and reducing the economic
costs in combining cloud and mobile offloading. Some parts of the mobile device will typically cause more
power consumption like display, RF receivers etc.. Research is going on the end user profiling also many
suggested variety of models to optimize this power consumption problem in the device. Few mechanisms are
useful they are Data classification, Profiler, Augmenter verdict, conciliation modules under system components.
They are providing lot of benefits with the device as well as the cloud system. By analyzing the system
components mentioned we can clarify that the utilization of the power by the device components. Cloud
providers also realized that offloading advantages based on the components of system and with the existing
models. This paper will give an insight about the issues and the mechanisms to reduce the power consumptions
in the device by using log management, accurate profile on massive amount of devices.
VI LOG MANAGEMENT
Logs are used to monitor, test and diagnosis the system and it is a source of information monitoring. The log
records helps to maintain information for the sessions and the system state. NIST define log Management as
“record of entry occurring in system and network”. Log entries consist of time stamps, source of events,
common users of log in etc. The quantity of logging data increases, an able storage and processing comes as a
question. More over cloud logging, which has been gaining notice from the past years, its own place of issues
that, are to be adequately answered. These are connected, among other entities, to the delegation and instability
of logs, their acquisition over multiple layers, retention policies, availability and accessibility, an appropriate
level of details.
6.1 Log File Format
The given table 6.1.1 describes the log file fields [LOU95] based on the log file we can identify the number of
connections with the server and access time between the remote application along with the data which is
accessed by the client. By finding the total load it is possible to estimate the power consumption of the device as
well as the server to optimize.
Contemporary Energy Optimization for Mobile and Cloud Environment
www.ijceronline.com Open Access Journal Page 8
Term Description
Date Date and time of request.
Auth. User Server authenticated client name.
Remote host Remote host name or IP address.
Method Method of request (Get, Post)
Offset local time offset
Protocol HTTP, VNC used by the client.
URI Full page address or request as it came from the client.
Bytes Bytes transferred.
Status Http server status sent to the client.
Agent Client mobile browser software.
Referrer URI that request originated from.
6.1.1 Mobile application Log Field Description
Each filed given in the table provides some useful information consider the filed Status which provides the
active connection among the severs, Bytes filed gives number of bytes transferred to each Mobile device, if we
take Agent filed it identifies the type of operating system as well as the browser which is connected with the
cloud server.
6.2 Mobile User Identification
Based on the logs we can identify the interacting devices with the cloud and it is not sufficient to determine to
find the load on the cloud to provide better access and to reduce the power consumption one we of finding the
type of users and how frequently they are accessing the data from the cloud is mobile user identification here we
can find the type of connection with the cloud system.
6.2.1 User Identification Based on IP
6.2.2 User Identification Based on Classification
Contemporary Energy Optimization for Mobile and Cloud Environment
www.ijceronline.com Open Access Journal Page 9
The above table 6.2.1 and 6.2.2(Source Internet) gives an idea how we can collect the data about the users based
on the class of IP they generally use this helps us to find several types of connections established from the cloud
with the mobile device.
VII CONCLUSION
The topics discussed in this paper are reviewed from various sources and generalized. We are happy
to acknowledge the authors. Here is a scope to optimize the power consumption and other network
related issues with the cloud and the mobile devices. We express our sincere acknowledgements for
one and all for giving support.
REFERENCES
[1]. First International Workshop on Mobile Cloud Computing Systems, Management, and Security (MCSMS-2015) User Profiling for
Energy Optimisation in Mobile Cloud Computing Elhadj Benkhelifaa,, Thomas Welsh, Loai Tawalbeh, Yaser Jararweh, Anas
Basalamah
[2]. http://www.sciencedirect.com/science/article/pii/S0140366415001619
[3]. Quwaider, M., Jararweh, Y.. Cloudlet-based for big data collection in body area networks. In: Internet Technology and Secured
Transactions (ICITST), 2013 8th International Conference for. 2013, p. 137–141.
[4]. Kumar, K., Lu, Y.H.. Cloud computing for mobile users: Can offloading computation save energy? Computer 2010;43(4):51–56.
doi:10.1109/MC.2010.98.
[5]. ACCORSI, R. On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In Security and privacy in
dynamic environments. Springer, 2006, pp. 329– 339.
[6]. Y.Lu,S.Li,H.Shen,Virtualizedscreen:athirdelementforcloudmobileconvergence,MultimediaIEEE18(2)(2011)411,doi:10.1109/MMU
L.2011.33.
[7]. https://en.wikipedia.org/wiki/Proprietary_format V.R. Gandikota, B.R. Tamma, C.S.R. Murthy, Adaptive FEC-based packet loss
resilience scheme for supporting voice communication over ad hoc wireless networks, IEEE Trans. Mob. Comput. 7 (2008) 1184–
1199.
[8]. Jararweh, Y., Jarrah, M., kharbutli, M., Alshara, Z., Alsaleh, M.N., Al-Ayyoub, M.. Cloudexp: A compre he nsivecloud computing
experimentalframework.SimulationModellingPracticeandTheory2014;49(0):180192.doi:http://dx.doi.org/10.1016/j.simpat.2014.09.
003.

More Related Content

What's hot

Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computingijceronline
 
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...Alexander Decker
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
A survey paper on an improved scheduling algorithm for task offloading on cloud
A survey paper on an improved scheduling algorithm for task offloading on cloudA survey paper on an improved scheduling algorithm for task offloading on cloud
A survey paper on an improved scheduling algorithm for task offloading on cloudAditya Tornekar
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingDr Amira Bibo
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingSaif Salah
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
 
Performance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringPerformance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringEditor IJMTER
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...TELKOMNIKA JOURNAL
 

What's hot (20)

Secured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud ComputingSecured Communication Model for Mobile Cloud Computing
Secured Communication Model for Mobile Cloud Computing
 
Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...Interoperability framework for data exchange between legacy and advanced mete...
Interoperability framework for data exchange between legacy and advanced mete...
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
A survey paper on an improved scheduling algorithm for task offloading on cloud
A survey paper on an improved scheduling algorithm for task offloading on cloudA survey paper on an improved scheduling algorithm for task offloading on cloud
A survey paper on an improved scheduling algorithm for task offloading on cloud
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
Performance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using ClusteringPerformance Enhancement of Cloud Computing using Clustering
Performance Enhancement of Cloud Computing using Clustering
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
G0314043
G0314043G0314043
G0314043
 
D0362035
D0362035D0362035
D0362035
 
A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...A review on serverless architectures - function as a service (FaaS) in cloud ...
A review on serverless architectures - function as a service (FaaS) in cloud ...
 

Viewers also liked

Impact of Canal Irrigation on Improved Agricultural Productivity
Impact of Canal Irrigation on Improved Agricultural ProductivityImpact of Canal Irrigation on Improved Agricultural Productivity
Impact of Canal Irrigation on Improved Agricultural Productivityijceronline
 
A Paper on Problems Generated By Junk Food in India
A Paper on Problems Generated By Junk Food in IndiaA Paper on Problems Generated By Junk Food in India
A Paper on Problems Generated By Junk Food in Indiaijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Fuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW AlgorithmFuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW Algorithmijceronline
 
Description of condensation and evaporation processes in cylindrical-type por...
Description of condensation and evaporation processes in cylindrical-type por...Description of condensation and evaporation processes in cylindrical-type por...
Description of condensation and evaporation processes in cylindrical-type por...ijceronline
 
Comparison between Rectangular and Circular Patch Antennas Array
Comparison between Rectangular and Circular Patch Antennas ArrayComparison between Rectangular and Circular Patch Antennas Array
Comparison between Rectangular and Circular Patch Antennas Arrayijceronline
 
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortar
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer MortarEffect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortar
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortarijceronline
 
Character Recognition System for Modi Script
Character Recognition System for Modi ScriptCharacter Recognition System for Modi Script
Character Recognition System for Modi Scriptijceronline
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computingijceronline
 
Relação entre perímetros e áreas em triângulos semelhantes
Relação entre perímetros e áreas em triângulos semelhantesRelação entre perímetros e áreas em triângulos semelhantes
Relação entre perímetros e áreas em triângulos semelhantesaldaalves
 

Viewers also liked (10)

Impact of Canal Irrigation on Improved Agricultural Productivity
Impact of Canal Irrigation on Improved Agricultural ProductivityImpact of Canal Irrigation on Improved Agricultural Productivity
Impact of Canal Irrigation on Improved Agricultural Productivity
 
A Paper on Problems Generated By Junk Food in India
A Paper on Problems Generated By Junk Food in IndiaA Paper on Problems Generated By Junk Food in India
A Paper on Problems Generated By Junk Food in India
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Fuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW AlgorithmFuzzy Retrial Queues with Priority using DSW Algorithm
Fuzzy Retrial Queues with Priority using DSW Algorithm
 
Description of condensation and evaporation processes in cylindrical-type por...
Description of condensation and evaporation processes in cylindrical-type por...Description of condensation and evaporation processes in cylindrical-type por...
Description of condensation and evaporation processes in cylindrical-type por...
 
Comparison between Rectangular and Circular Patch Antennas Array
Comparison between Rectangular and Circular Patch Antennas ArrayComparison between Rectangular and Circular Patch Antennas Array
Comparison between Rectangular and Circular Patch Antennas Array
 
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortar
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer MortarEffect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortar
Effect of Sand to Fly Ash Ratio on the Hardened Properties of Geopolymer Mortar
 
Character Recognition System for Modi Script
Character Recognition System for Modi ScriptCharacter Recognition System for Modi Script
Character Recognition System for Modi Script
 
An Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud ComputingAn Auditing Protocol for Protected Data Storage in Cloud Computing
An Auditing Protocol for Protected Data Storage in Cloud Computing
 
Relação entre perímetros e áreas em triângulos semelhantes
Relação entre perímetros e áreas em triângulos semelhantesRelação entre perímetros e áreas em triângulos semelhantes
Relação entre perímetros e áreas em triângulos semelhantes
 

Similar to Contemporary Energy Optimization for Mobile and Cloud Environment

ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTIJCNCJournal
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEswar Publications
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Publishing House
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationeSAT Journals
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudGearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudamelpakkath
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyIEEEFINALYEARPROJECTS
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET Journal
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...rajender147
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...IOSR Journals
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationseSAT Publishing House
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...ijasuc
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingHarshitParkar6677
 
URECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud ComputingURECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud ComputingAce Zachary
 

Similar to Contemporary Energy Optimization for Mobile and Cloud Environment (20)

ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENT
 
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud ComputingEnergy Optimized Link Selection Algorithm for Mobile Cloud Computing
Energy Optimized Link Selection Algorithm for Mobile Cloud Computing
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
The common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generationThe common challenges of mobile internet for up coming generation
The common challenges of mobile internet for up coming generation
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Gearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloudGearing up of resource poor mobile devices using cloud
Gearing up of resource poor mobile devices using cloud
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Cloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energyCloud computing for mobile users can offloading computation save energy
Cloud computing for mobile users can offloading computation save energy
 
40120130405016
4012013040501640120130405016
40120130405016
 
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...IRJET-  Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
IRJET- Virtual Network Recognition and Optimization in SDN-Enabled Cloud Env...
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...Improving the Latency Value by Virtualizing Distributed Data  Center and Auto...
Improving the Latency Value by Virtualizing Distributed Data Center and Auto...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Mobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applicationsMobile cloud computing as future for mobile applications
Mobile cloud computing as future for mobile applications
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
DESIGN AND IMPLEMENTATION OF INTELLIGENT COMMUNITY SYSTEM BASED ON THIN CLIEN...
 
E0332427
E0332427E0332427
E0332427
 
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog ComputingFinding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
 
URECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud ComputingURECA Research Paper - Mobile Cloud Computing
URECA Research Paper - Mobile Cloud Computing
 

Recently uploaded

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 

Recently uploaded (20)

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 

Contemporary Energy Optimization for Mobile and Cloud Environment

  • 1. ISSN (e): 2250 – 3005 || Volume, 06 || Issue, 09|| September – 2016 || International Journal of Computational Engineering Research (IJCER) www.ijceronline.com Open Access Journal Page 6 Contemporary Energy Optimization for Mobile and Cloud Environment Pavan Kumar Vadrevu1 *, Ravi Kumar Suggala2 **, Tej Varma Gadhiraju3 *** *1,2,3 Assistant Professor,Department of Information Technology, Shri Vishnu Engineering College for Women, Bhimavaram . I INTRODUCTION Smart phones and tablets are very popular and raising amount of people today not only for entertainment and communication purpose but also do lot of activities. Hardware and wireless communication technologies are increasing every day. Cloud is delivering as a service platform forming usability computing. Whereas resources for computing are on demand, pay as you use to resource provider from end user increased. Cloud becoming data centers coming from various places providing ultimate resources, storage and processing capabilities. The basic problem with the mobile phones and mobile computing are processing capabilities and memory coming from a small power (Battery) source. This gives lot of limitations on the devices. Today mobile applications are combined with cloud paradigms. As the functionality of the user with mobile applications increases the power consumptions is also increased. Many people are doing research in this area to increase the utilization factor and to reduce power consumptions. In order to defeat the source constraints of mobile devices several solutions projected. One of the most significant is represent by off load computation. With this loom the mobile device runs only part of an application that is the components which are less resource concentrated. The rest of the application is deployed in the cloud and is accessed through a wireless system. But the challenging task is off load the application. The alternate is to remote access the devices uses small software and connect to a server remotely and the server has all the processing capabilities means the server is virtualized with the device. The device will provide only input and output operations correspond to the application. This paper distinguish the power utilization of mobile and the cloud computing realize from end to end remote technology. Exclusively to study the routine of extensively used remote protocols like VNC (Virtual Network Connection), RDP (Remote Desktop Protocol). This paper carries out several experiments connecting sensible practice scenarios in different wireless communication technologies, Wi Fi and Long Term Evolution. In addition this paper distinguishes the power consumption and bandwidth utilization of the different solutions measured and relates them to the protocol features. In conclusion it offer a few considerations on aspect linked to user experience. II REMOTE PROTOCOLS The routine of diverse remote protocols be evaluated particularly on real tests under unreliable workload equivalent to browsing and multimedia oriented behavior. This evaluation broken as low movement counter mark, means that customized request counter mark in which the activities touching display updates are divided by adding up mock delay. Deliberate movement counter mark allow to exactly compute the crash between a user generated incident at the client and it’s contradict part at the server. Still such a loom alter the actual communications maybe ensuing in surprising elevation effect. Additionally it is based on mock application counter mark slightly than on the real input from genuine users. VNC protocol uses interactive programs for ABSTRACT Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues. Keywords: Power Consumption, Usability, Resource Utilization
  • 2. Contemporary Energy Optimization for Mobile and Cloud Environment www.ijceronline.com Open Access Journal Page 7 images and for the creation of the documents. Others are used to simulate the large network ranges defined based on delay and the bandwidth. Based on the satisfaction of the user for the response time characteristics. SVNC (Smart VNC) is implemented above VNC for getting more benefits in remote protocols. III MOBILE CLOUD Calculation in the direction of accessing resources of cloud mobile devices may also be engaged as the resource providing systems which create the structural design. This is proficient in order to give the mass of the cloud skin tone such as disseminated and scalable processing and storage inside a restricted location. This has the main benefit of without usage of wide area network links which are expensive and not mainly reliable. Even with the unnatural environment of the devices it is argued that the boost in processing power of these devices day to day as well as the reserves power by using local less power consuming protocols would collect some payback above offloading to a traditional cloud. However, a number of issues are still common with this type of cloud with natural networking uniqueness and challenges related to work allotment. IV POWER CONSUMPTION Limited amount of power is available in mobile devices, resources like applications which are running continuously consumes power. The models which optimize the power consumption of the application will be adapted in the device. The cloud depends upon the standard power source in the resource centers with networking. There is a need to various strategies to improve the battery performance and life by offload the work with cloud, but we can save the power consumption for only few tasks like data transfer through WIFI and offload the computing part with device and assigning computation related elements to cloud based on dividing the application code like some code is executed by the device and remaining will be done at the cloud. Researchers are telling that power consumption can be reduced maximum 30 to 70 percent if we do processing on multimedia applications in cloud instead of doing on the device. In this context power consumption is more if it streams or buffers the multimedia application through cellular network. By improving the Quality of Service (QoS) for real time models thereby reducing failure and retransmissions rates. Analysis on cloud and mobile based power consumptions depends on the data transfer rates of the system. Several times it is important to look for power consumption by the cloud hardware related devices because they are energy hungry. In order to overcome this it is necessary to combine the externally hosted distribution systems. The primary goal of the mobile cloud environment is to reduce the power consumptions and to improve the computation capabilities. V EXISTING MECHANISMS Much analysis and research work going on the power consumption of the device, Data centers and in Distributed computing. Different models are also proposed on power consumption and reducing the economic costs in combining cloud and mobile offloading. Some parts of the mobile device will typically cause more power consumption like display, RF receivers etc.. Research is going on the end user profiling also many suggested variety of models to optimize this power consumption problem in the device. Few mechanisms are useful they are Data classification, Profiler, Augmenter verdict, conciliation modules under system components. They are providing lot of benefits with the device as well as the cloud system. By analyzing the system components mentioned we can clarify that the utilization of the power by the device components. Cloud providers also realized that offloading advantages based on the components of system and with the existing models. This paper will give an insight about the issues and the mechanisms to reduce the power consumptions in the device by using log management, accurate profile on massive amount of devices. VI LOG MANAGEMENT Logs are used to monitor, test and diagnosis the system and it is a source of information monitoring. The log records helps to maintain information for the sessions and the system state. NIST define log Management as “record of entry occurring in system and network”. Log entries consist of time stamps, source of events, common users of log in etc. The quantity of logging data increases, an able storage and processing comes as a question. More over cloud logging, which has been gaining notice from the past years, its own place of issues that, are to be adequately answered. These are connected, among other entities, to the delegation and instability of logs, their acquisition over multiple layers, retention policies, availability and accessibility, an appropriate level of details. 6.1 Log File Format The given table 6.1.1 describes the log file fields [LOU95] based on the log file we can identify the number of connections with the server and access time between the remote application along with the data which is accessed by the client. By finding the total load it is possible to estimate the power consumption of the device as well as the server to optimize.
  • 3. Contemporary Energy Optimization for Mobile and Cloud Environment www.ijceronline.com Open Access Journal Page 8 Term Description Date Date and time of request. Auth. User Server authenticated client name. Remote host Remote host name or IP address. Method Method of request (Get, Post) Offset local time offset Protocol HTTP, VNC used by the client. URI Full page address or request as it came from the client. Bytes Bytes transferred. Status Http server status sent to the client. Agent Client mobile browser software. Referrer URI that request originated from. 6.1.1 Mobile application Log Field Description Each filed given in the table provides some useful information consider the filed Status which provides the active connection among the severs, Bytes filed gives number of bytes transferred to each Mobile device, if we take Agent filed it identifies the type of operating system as well as the browser which is connected with the cloud server. 6.2 Mobile User Identification Based on the logs we can identify the interacting devices with the cloud and it is not sufficient to determine to find the load on the cloud to provide better access and to reduce the power consumption one we of finding the type of users and how frequently they are accessing the data from the cloud is mobile user identification here we can find the type of connection with the cloud system. 6.2.1 User Identification Based on IP 6.2.2 User Identification Based on Classification
  • 4. Contemporary Energy Optimization for Mobile and Cloud Environment www.ijceronline.com Open Access Journal Page 9 The above table 6.2.1 and 6.2.2(Source Internet) gives an idea how we can collect the data about the users based on the class of IP they generally use this helps us to find several types of connections established from the cloud with the mobile device. VII CONCLUSION The topics discussed in this paper are reviewed from various sources and generalized. We are happy to acknowledge the authors. Here is a scope to optimize the power consumption and other network related issues with the cloud and the mobile devices. We express our sincere acknowledgements for one and all for giving support. REFERENCES [1]. First International Workshop on Mobile Cloud Computing Systems, Management, and Security (MCSMS-2015) User Profiling for Energy Optimisation in Mobile Cloud Computing Elhadj Benkhelifaa,, Thomas Welsh, Loai Tawalbeh, Yaser Jararweh, Anas Basalamah [2]. http://www.sciencedirect.com/science/article/pii/S0140366415001619 [3]. Quwaider, M., Jararweh, Y.. Cloudlet-based for big data collection in body area networks. In: Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for. 2013, p. 137–141. [4]. Kumar, K., Lu, Y.H.. Cloud computing for mobile users: Can offloading computation save energy? Computer 2010;43(4):51–56. doi:10.1109/MC.2010.98. [5]. ACCORSI, R. On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In Security and privacy in dynamic environments. Springer, 2006, pp. 329– 339. [6]. Y.Lu,S.Li,H.Shen,Virtualizedscreen:athirdelementforcloudmobileconvergence,MultimediaIEEE18(2)(2011)411,doi:10.1109/MMU L.2011.33. [7]. https://en.wikipedia.org/wiki/Proprietary_format V.R. Gandikota, B.R. Tamma, C.S.R. Murthy, Adaptive FEC-based packet loss resilience scheme for supporting voice communication over ad hoc wireless networks, IEEE Trans. Mob. Comput. 7 (2008) 1184– 1199. [8]. Jararweh, Y., Jarrah, M., kharbutli, M., Alshara, Z., Alsaleh, M.N., Al-Ayyoub, M.. Cloudexp: A compre he nsivecloud computing experimentalframework.SimulationModellingPracticeandTheory2014;49(0):180192.doi:http://dx.doi.org/10.1016/j.simpat.2014.09. 003.