Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications such as mobile crowd sensing, real time mobile health monitoring, mobile social network in proximity and so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and computation power, the frequent usage of high
performance multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device. Although numerous previous researchers have tried to overcome the resource intensive issues in mobile embedded service provisioning domain, most of the efforts were constrained because of the underlying resource intensive technologies. This paper presents a lightweight mobile Web service provisioning framework for mobile sensing which utilises the protocols that were designed for constrained Internet of Things environment. The prototype experimental results show that the proposed framework can provide higher throughput and less resource consumption than the traditional mobile Web service frameworks.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES ijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process.Therefore, information technology is an essential ingredient that integrates these tools in supply chain.With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host.
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching location and data. Smart phones are advanced in terms of processing power, memory with an embedded camera, sensors and same time parallel advancement in wireless network and software web technologies. Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers working on mobile web service provisioning. This paper extends the our previous research work in the cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many concurrent users access mobile host.
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
Services are capabilities that enable applications and are of crucial
importance to pervasive computing in next-generation networks. Service Composition
is the construction of complex services from primitive ones; thus enabling
rapid and flexible creation of new services. The presence of multiple independent
service providers poses new and significant challenges. Managing trust
across providers and verifying the performance of the components in composition
become essential issues. Adapting the composed service to network and
user dynamics by choosing service providers and instances is yet another challenge.
In SAHARA1, we are developing a comprehensive architecture for the
creation, placement, and management of services for composition across independent
providers. In this paper, we present a layered reference model for composition
based on a classification of different kinds of composition.We then discuss
the different overarching mechanisms necessary for the successful deployment of
such an architecture through a variety of case-studies involving composition.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGES ijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process.Therefore, information technology is an essential ingredient that integrates these tools in supply chain.With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
A XMLRPC Approach to the Management of Cloud Infrastructureiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host.
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching location and data. Smart phones are advanced in terms of processing power, memory with an embedded camera, sensors and same time parallel advancement in wireless network and software web technologies. Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers working on mobile web service provisioning. This paper extends the our previous research work in the cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many concurrent users access mobile host.
The SAHARA Model for Service Composition Across Multiple Providers (2002)Tal Lavian Ph.D.
Services are capabilities that enable applications and are of crucial
importance to pervasive computing in next-generation networks. Service Composition
is the construction of complex services from primitive ones; thus enabling
rapid and flexible creation of new services. The presence of multiple independent
service providers poses new and significant challenges. Managing trust
across providers and verifying the performance of the components in composition
become essential issues. Adapting the composed service to network and
user dynamics by choosing service providers and instances is yet another challenge.
In SAHARA1, we are developing a comprehensive architecture for the
creation, placement, and management of services for composition across independent
providers. In this paper, we present a layered reference model for composition
based on a classification of different kinds of composition.We then discuss
the different overarching mechanisms necessary for the successful deployment of
such an architecture through a variety of case-studies involving composition.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
Multiservice Delivery in Wireless Networks Managementrahulmonikasharma
A Wireless Sensor Network is a self-configuring set of connections of tiny sensor nodes communicate in the middle of themselves using radio signals, and deployed in measure to sense, observe and identify with the physical world.WSN provide a bridge between the real physical and virtual worlds. Allow the ability to observe the previously unobservable at a fine resolution over large spatiotemporal scales. A join that execute different than typical behavior (drop packets, scare routing system and save their assets by not ahead the other node packets) is identified as selfish node. The multiservice delivery between the source-destination pairs in distributed selfish wireless networks (SeWN), where selfish relay nodes (RN) expose their selfish behaviors. Research focus evaluating the trust of a node group and excluding selfish nodes for improving the network performance. In the network connectivity of selfish wireless networks (SeWNs) constituted by selfish nodes (SeNs). Source transfer the multi-service delivery to destination through Relay Node (RN). At the time of transfer, the selfish relay nodes expose their selfish behavior by doing dropping multiservice. In this environment, the network need to establish the connection between source and destination, for that source need to find the optimal path. Concept of Node selfishness management is constructed to manage the RN’sto manage the RN’s node-selfishness information (NSI). It includes the degree of node-selfishness (DeNS), the degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). DeNs determines in terms of RN’s historical behaviors, DeIS defines in terms of its available resources and finally DeES described by means of the employed incentive mechanism and the quality-of-service (QoS) requirements. Over the spread node-selfishness administration, a path collection criterion is considered to select the most reliable and through path in terms of RNs’ DeISs precious by their accessible resources, and the optimal incentive are determined by the source to motivate forwarding multiservice of the RNs in the selected path. Simulation results show that this future model effectively manages the RNs’ NSI, and the most select path selection and the optimal incentives are determined.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are
exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...antjjournal
We consider an approach for increasing density of field-effect heterotransistors in a single-stage multi-path operational amplifier. At the same time one can obtain decreasing of
dimensions of the above transistors.Dimensions of the elements could be decreased by manufacturing of these elements in a heterostructure with specific structure. The manufacturing is doing by doping of required areas of the heterostructure by diffusion or ion implantation with future optimization of annealing of dopant and/or radiation defects.
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host
Mobile Web Service Provisioning and Performance Evaluation of Mobile Hostijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host.
A SURVEY ON OPPORTUNISTIC ROUTING PROTOCOLS IN CELLULAR NETWORK FOR MOBILE DA...ijwmn
Currently cellular networks are overloaded, due to rapid growth of various smartphone applications. With
the arrival of 3G and 4G network technologies mobile data traffic has been growing at an unprecedented
pace and increasingly surpassing the network capacity. Mobile data offloading is an effective network
congestion demotion approach to solve the overload issue through opportunistic communication. It is a
beneficiary approach, because there is no monetary cost for it. Subscribe Send Architecture and
Opportunistic forwarding protocol plays a vital role during offloading by allowing users to subscribe the
contents but does not download the subscribed content on the Content Service Provider thereby network
traffic reduces up to a greater extent. A quantitative study on performance evaluation of opportunistic
routing protocols like Epidemic, Spray and Wait, ProPhet and MaxProp are discussed in this paper. We
have compared these protocols based on few performance metrics like overhead ratio, delivery probability
and average latency. Our simulation results verify that MaxProp performs well and can offload cellular
traffic effectively.
Analysis of back propagation and radial basis function neural networks for ha...IJECEIAES
In mobile systems, handoff is a vital process, referring to a process of allocating an ongoing call from one BS to another BS. The handover technique is very important to maintain the Quality of service. Handover algorithms, based on neural networks, fuzzy logic etc. can be used for the same purpose to keep Quality of service as high as possible. In this paper, it is proposed that back propagation networks and radial basis functions may be used for taking handover decision in wireless communication networks. The performance of these classifiers is evaluated on the basis of neurons in hidden layer, training time and classification accuracy. The proposed approach shows that radial basis function neural network give better results for making handover decisions in wireless heterogeneous networks with classification accuracy of 90%.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
The fast growing mobile data traffic causes the deficiency of cellular network capacity. To mitigate this problem, Wi-Fi offloading techniques where the mobile data traffic is offloaded through sparsely deployed Wi-Fi networks have been extensively investigated. Wi-Fi offloading techniques can be classified into: 1) auction game-based offloading and 2) congestion game-based offloading. To proposed system inventing a Finite Horizon Markov Decision Process (FHMDP) to make offloading decisions efficiently. The existing approach use two algorithms such as; 1) Hybrid offloading algorithm and 2) Monotone offloading algorithm. But the previous work of hybrid offloading algorithm and monotone offloading algorithm was not efficient. Based on the Finite Horizon Markov Decision Process (FHMDP) mechanism. The proposed mechanism of offload cellular network traffic of vehicular users through carrier Wi-Fi networks based on the game theory approach. It computes the mobile network offloading performance. In this design of offloading mechanism in order to improve the overall offloading performance. By reducing the number of vehicular users contending for the channel and prioritizing high WIFI data rates and thus the offloading performance can be improved. In the proposed approach is reducing the accessing cost, time and improve the Wi-Fi offloading performance.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
Multiservice Delivery in Wireless Networks Managementrahulmonikasharma
A Wireless Sensor Network is a self-configuring set of connections of tiny sensor nodes communicate in the middle of themselves using radio signals, and deployed in measure to sense, observe and identify with the physical world.WSN provide a bridge between the real physical and virtual worlds. Allow the ability to observe the previously unobservable at a fine resolution over large spatiotemporal scales. A join that execute different than typical behavior (drop packets, scare routing system and save their assets by not ahead the other node packets) is identified as selfish node. The multiservice delivery between the source-destination pairs in distributed selfish wireless networks (SeWN), where selfish relay nodes (RN) expose their selfish behaviors. Research focus evaluating the trust of a node group and excluding selfish nodes for improving the network performance. In the network connectivity of selfish wireless networks (SeWNs) constituted by selfish nodes (SeNs). Source transfer the multi-service delivery to destination through Relay Node (RN). At the time of transfer, the selfish relay nodes expose their selfish behavior by doing dropping multiservice. In this environment, the network need to establish the connection between source and destination, for that source need to find the optimal path. Concept of Node selfishness management is constructed to manage the RN’sto manage the RN’s node-selfishness information (NSI). It includes the degree of node-selfishness (DeNS), the degree of intrinsic selfishness (DeIS) and the degree of extrinsic selfishness (DeES). DeNs determines in terms of RN’s historical behaviors, DeIS defines in terms of its available resources and finally DeES described by means of the employed incentive mechanism and the quality-of-service (QoS) requirements. Over the spread node-selfishness administration, a path collection criterion is considered to select the most reliable and through path in terms of RNs’ DeISs precious by their accessible resources, and the optimal incentive are determined by the source to motivate forwarding multiservice of the RNs in the selected path. Simulation results show that this future model effectively manages the RNs’ NSI, and the most select path selection and the optimal incentives are determined.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
PERFORMANCE ANALYSIS OF MOBILE DATA OFFLOADING IN HETEROGENEOUS NETWORKSnexgentechnology
GET IEEE BIG DATA,JAVA ,DOTNET,ANDROID ,NS2,MATLAB,EMBEDED AT LOW COST WITH BEST QUALITY PLEASE CONTACT BELOW NUMBER
FOR MORE INFORMATION PLEASE FIND THE BELOW DETAILS:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com
Mobile: 9791938249
Telephone: 0413-2211159
www.nexgenproject.com
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...Rida Qayyum
Location-Based Services (LBS) System is rapidly growing due to radio communication services with wireless mobile devices having a positioning component in it. LBS System offers location-based services by knowing the actual user position. A mobile user uses LBS to access services relevant to their locations. In order to provide Point of Interest (POI), LBS confronts numerous privacy related challenges in three different formats including Non-Trusted Third Party (NTTP), Trusted Third Party (TTP), and Mobile Peer-to-Peer (P2P). The current study emphasized the TTP based LBS system where the Location server does not provide full privacy to mobile users. In TTP based LBS system, a user’s privacy is concerned with personal identity, location information, and time information. In order to accomplish privacy under these concerns, state-of-the-art existing mechanisms have been reviewed. Hence, the aim to provide a promising roadmap to research and development communities for the right selection of privacy approach has achieved by conducting a comparative survey of the TTP based approaches. Leading to these privacy attributes, the current study addressed the privacy challenge by proposing a new privacy protection model named “Improved Dummy Position” (IDP) that protects TIP (Time, Identity, and Position) attributes under TTP LBS System. In order to validate the privacy level, a comparative analysis has been conducted by implementing the proposed IDP model in the simulation tool, Riverbed Modeler academic edition. The different scenarios of changing query transferring rate evaluate the performance of the proposed model. Simulation results demonstrate that our IDP could be considered as a promising model to protect user’s TIP attributes in a TTP based LBS system due to better performance and improved privacy level. Further, the proposed model extensively compared with the existing work.
Parallel and Distributed System IEEE 2015 ProjectsVijay Karan
List of Parallel and Distributed System IEEE 2015 Projects. It Contains the IEEE Projects in the Domain Parallel and Distributed System for the year 2015
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are
exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
USING MOBILE SERVICE FOR SUPPLY CHAIN MANAGEMENT: A SURVEY AND CHALLENGESijwscjournal
Efficient supply chain management calls for robust analytical and optimal models to automate its process. Therefore, information technology is an essential ingredient that integrates these tools in supply chain. With the emergence of wireless, the high technologies and the reliability of mobile devices, mobile web services draw a promising horizon facing economic challenges. They offer new personalized services to each actor in the supply chain on their mobile devices at anytime and anywhere. This paper presents a literature review of mobile web service implemented on the industry context based on the supply chain management approach. First, a large definition of mobile web service and some proposal architecture are exposed. Then the paper discuss some generic related work on mobile web service focusing on supply chain management. Finally some challenges on m-service oriented supply chain management are proposed.
ON OPTIMIZATION OF MANUFACTURING OF FIELD EFFECT HETEROTRANSISTORS FRAMEWORK ...antjjournal
We consider an approach for increasing density of field-effect heterotransistors in a single-stage multi-path operational amplifier. At the same time one can obtain decreasing of
dimensions of the above transistors.Dimensions of the elements could be decreased by manufacturing of these elements in a heterostructure with specific structure. The manufacturing is doing by doping of required areas of the heterostructure by diffusion or ion implantation with future optimization of annealing of dopant and/or radiation defects.
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host
Mobile Web Service Provisioning and Performance Evaluation of Mobile Hostijwscjournal
Providing web services from smart phones is current recent research topic, this happened because of
smart phones are used almost every area, where today’s user uses for mobile banking, emailing, searching
location and data. Smart phones are advanced in terms of processing power, memory with an embedded
camera, sensors and same time parallel advancement in wireless network and software web technologies.
Due to these advancement enables the mobile smart phones work as a web service provider instead of web
service consumer. The idea of hosting web services on mobile host is not new, last one decade researchers
working on mobile web service provisioning. This paper extends the our previous research work in the
cellular domain to the current generation platform technologies and standards such as Android OS and
REST. This paper deals with mobile host scalability and experimental result analysis for how many
concurrent users access mobile host.
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
Medium access in cloud-based for the internet of things based on mobile vehic...TELKOMNIKA JOURNAL
Smart cities are made up of a large number of smart, intelligent gadgets that can sense, compute, act, and communicate. Focusing on how data is transferred between sensory devices and applications in the internet of things (IoT), and cyber-physical systems have led to 5G/IoT integration. This paper proposes a revolutionary architecture for mobile vehicular cloud infrastructure that takes variable weather, road, and traffic circumstances into consideration. It proposes a dynamic speed management system for smart cities. To optimize system flexibility and reduce costs, the system makes advantage of the most recent advancements in wireless communication and utilizes current telecommunication infrastructures utilized in data streaming, sound, and video. The study presents an internet protocol (IP) real-time subsystem-network-based framework for requesting bandwidth from free wireless channel resources using the channell quality indicator channel.
The advancement in mobile technology and wireless network increase the using of mobile device in database
driven application, these application require high reliability and availability due to nature inheritance of
mobile environment, transaction is the center component in database systems, In this paper we present
useful work done in mobile transaction, we show the mobile database environment and overview a lot of
proposed model of mobile transaction and show many techniques used to enhance transaction execution.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architectureijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of
managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP preservation and optimal data path management according to application needs. A functional setup validates and assays the proposed evolution in terms of inter-system handover preparation, interruption
and completion time relative to control plane delay requirements of the 5G networks.
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREijmnct
The (r)evolution of wireless access infrastructure can be described as the convergence of the available radio communication systems towards a harmonized, more flexible and reconfigurable access system to match the current and upcoming demands. In recent years Softwarization and Virtualization technologies have moved from server and network domains to wireless domain and provides new perspectives of managing mobile networks functionalities. This paper provides evolution of the mobile network architecture in Software Defined Networking (SDN) and virtualization context and realizes it through the use of distribution of gateway function approach. Key improvements with proposed approach are to support efficient mobility management in heterogeneous access environments, remove the chains of IP
preservation and optimal data path management according to application needs. A functional setup
validates and assays the proposed evolution in terms of inter-system handover preparation, interruption and completion time relative to control plane delay requirements of the 5G networks.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Differentiated Classes of Service and Flow Management using An Hybrid Broker1IDES Editor
Recently, mobile networks have been overloaded
with a considerable amount of data traffic. The current paper
proposes a management service for mobile environments,
using policies and quality metrics, which ensure a better usage
of network resources with a more fine-grained management
based on flows with different classes of service and
transmission rates. This management of flows is supported
through a closed innovative control loop among a flexible
brokerage service in the network, and agents at the mobile
terminals. It also allows the terminals to make well-informed
decisions about their connections to enhance the number of
connected flows per technology and the individual service level
offered to each flow. Our results indicate that the proposed
solution optimizes the usage of available 4G network resources
among a high number of differentiated flows in several
scenarios where access technologies are extremely overloaded
whilst protecting, through a low complexity scheme, the flows
associated to users that have celebrated more expensive
contracts with their network operators.
Towards automated service-oriented lifecycle management for 5G networksEricsson
5G networks will be a key enabler for the Internet of Things by providing a platform for connecting a massive number of devices with heterogeneous sets of network quality requirements. In this environment, 5G network operators will have to solve the complex challenge of managing network services for diverse customer sectors (such as automotive, health or energy) with different requirements throughout their lifecycle.
Similar to LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION (20)
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of user's approach to providing feedback for smart home devices. We will conduct an online survey for a sample of three to five students selected by simple random sampling to study the user's motto for giving feedback on smart home devices and their expectations. We have observed that most users are ready to actively share their input on smart home devices to improve the product's service and quality to fulfill the user’s needs and make their lives easier.
Users Approach on Providing Feedback for Smart Home Devices – Phase IIijujournal
Smart Home technology has accomplished extraordinary success in making individuals' lives more
straightforward and relaxing. Technology has recently brought about numerous savvy and refined frame
works that advanced clever living innovation. In this paper, we will investigate the behavioral intention of
user's approach to providing feedback for smart home devices. We will conduct an online survey for a
sample of three to five students selected by simple random sampling to study the user's motto for giving
feedback on smart home devices and their expectations. We have observed that most users are ready to
actively share their input on smart home devices to improve the product's service and quality to fulfill the
user’s needs and make their lives easier.
October 2023-Top Cited Articles in IJU.pdfijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
ACCELERATION DETECTION OF LARGE (PROBABLY) PRIME NUMBERSijujournal
In order to avoid unnecessary applications of Miller-Rabin algorithm to the number in question, we resort
to trial division by a few initial prime numbers, since such a division take less time. How far we should go
with such a division is the that we are trying to answer in this paper?For the theory of the matter is fully
resolved. However, that in practice we do not have much use.Therefore, we present a solution that is
probably irrelevant to theorists, but it is very useful to people who have spent many nights to produce
large (probably) prime numbers using its own software.
A novel integrated approach for handling anomalies in RFID dataijujournal
Radio Frequency Identification (RFID) is a convenient technology employed in various applications. The
success of these RFID applications depends heavily on the quality of the data stream generated by RFID
readers. Due to various anomalies found predominantly in RFID data it limits the widespread adoption of
this technology. Our work is to eliminate the anomalies present in RFID data in an effective manner so that
it can be applied for high end applications. Our approach is a hybrid approach of middleware and
deferred because it is not always possible to remove all anomalies and redundancies in middleware. The
processing of other anomalies is deferred until the query time and cleaned by business rules. Experimental
results show that the proposed approach performs the cleaning in an effective manner compared to the
existing approaches.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
ENHANCING INDEPENDENT SENIOR LIVING THROUGH SMART HOME TECHNOLOGIESijujournal
The population of elderly folks is ballooning worldwide as people live longer. But getting older often
means declining health and trouble living solo. Smart home tech could keep an eye on old folks and get
help quickly when needed so they can stay independent. This paper looks at a system combining wireless
sensors, video watches, automation, resident monitoring, emergency detection, and remote access. Sensors
track health signs, activities, appliance use. Video analytics spot odd stuff like falls. Sensor fusion and
machine learning find normal patterns so wonks can see unhealthy changes and send alerts. Multi-channel
alerts reach caregivers and emergency folks. A LabVIEW can integrate devices and enables local and
remote oversight and can control and handle emergency responses. Benefits seem to be early illness clues,
quick help, less burden on caregivers, and optimized home settings. But will old folks use all this tech? Can
we prove it really helps folks live longer and better? More research on maximizing reliability and
evaluating real-world impacts is needed. But designed thoughtfully, smart homes could may profoundly
improve the aging experience.
HMR LOG ANALYZER: ANALYZE WEB APPLICATION LOGS OVER HADOOP MAPREDUCEijujournal
In today’s Internet world, log file analysis is becoming a necessary task for analyzing the customer’s
behavior in order to improve advertising and sales as well as for datasets like environment, medical,
banking system it is important to analyze the log data to get required knowledge from it. Web mining is the
process of discovering the knowledge from the web data. Log files are getting generated very fast at the
rate of 1-10 Mb/s per machine, a single data center can generate tens of terabytes of log data in a day.
These datasets are huge. In order to analyze such large datasets we need parallel processing system and
reliable data storage mechanism. Virtual database system is an effective solution for integrating the data
but it becomes inefficient for large datasets. The Hadoop framework provides reliable data storage by
Hadoop Distributed File System and MapReduce programming model which is a parallel processing
system for large datasets. Hadoop distributed file system breaks up input data and sends fractions of the
original data to several machines in hadoop cluster to hold blocks of data. This mechanism helps to
process log data in parallel using all the machines in the hadoop cluster and computes result efficiently.
The dominant approach provided by hadoop to “Store first query later”, loads the data to the Hadoop
Distributed File System and then executes queries written in Pig Latin. This approach reduces the response
time as well as the load on to the end system. This paper proposes a log analysis system using Hadoop
MapReduce which will provide accurate results in minimum response time.
SERVICE DISCOVERY – A SURVEY AND COMPARISONijujournal
With the increasing number of services in the internet, companies’ intranets, and home networks: service
discovery becomes an integral part of modern networked system. This paper provides a comprehensive
survey of major solutions for service discovery. We cover techniques and features used in existing systems.
Although a few survey articles have been published on this object, our contribution focuses on comparing
and analyzing surveyed solutions according eight prime criteria, which we have defined before. This
comparison will be helpful to determine limits of existing discovery protocols and identify future research
opportunities in service discovery.
SIX DEGREES OF SEPARATION TO IMPROVE ROUTING IN OPPORTUNISTIC NETWORKSijujournal
Opportunistic Networks are able to exploit social behavior to create connectivity opportunities. This
paradigm uses pair-wise contacts for routing messages between nodes. In this context we investigated if the
“six degrees of separation” conjecture of small-world networks can be used as a basis to route messages in
Opportunistic Networks. We propose a simple approach for routing that outperforms some popular
protocols in simulations that are carried out with real world traces using ONE simulator. We conclude that
static graph models are not suitable for underlay routing approaches in highly dynamic networks like
Opportunistic Networks without taking account of temporal factors such as time, duration and frequency of
previous encounters.
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PERVASIVE COMPUTING APPLIED TO THE CARE OF PATIENTS WITH DEMENTIA IN HOMECARE...ijujournal
The aging population and the consequent increase in the incidence of dementias is causing many
challenges to health systems, mainly related to infrastructure, low services quality and high costs. One
solution is to provide the care at house of the patient, through of home care services. However, it is not a
trivial task, since a patient with dementia requires constant care and monitoring from a caregiver, who
suffers physical and emotional overload. In this context, this work presents an modelling for development of
pervasive systems aimed at helping the care of these patients in order to lessen the burden of the caregiver
while the patient continue to receive the necessary care.
A proposed Novel Approach for Sentiment Analysis and Opinion Miningijujournal
as the people are being dependent on internet the requirement of user view analysis is increasing
exponentially. Customer posts their experience and opinion about the product policy and services. But,
because of the massive volume of reviews, customers can’t read all reviews. In order to solve this problem,
a lot of research is being carried out in Opinion Mining. In order to solve this problem, a lot of research is
being carried out in Opinion Mining. Through the Opinion Mining, we can know about contents of whole
product reviews, Blogs are websites that allow one or more individuals to write about things they want to
share with other The valuable data contained in posts from a large number of users across geographic,
demographic and cultural boundaries provide a rich data source not only for commercial exploitation but
also for psychological & sociopolitical research. This paper tries to demonstrate the plausibility of the idea
through our clustering and classifying opinion mining experiment on analysis of blog posts on recent
product policy and services reviews. We are proposing a Nobel approach for analyzing the Review for the
customer opinion
International Journal of Ubiquitous Computing (IJU)ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
USABILITY ENGINEERING OF GAMES: A COMPARATIVE ANALYSIS OF MEASURING EXCITEMEN...ijujournal
Usability engineering and usability testing are concepts that continue to evolve. Interesting research studies
and new ideas come up every now and then. This paper tests the hypothesis of using an EDA-based
physiological measurements as a usability testing tool by considering three measures; which are observers‟
opinions, self-reported data and EDA-based physiological sensor data. These data were analyzed
comparatively and statistically. It concludes by discussing the findings that has been obtained from those
subjective and objective measures, which partially supports the hypothesis.
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
Ubiquitous Computing uses mobile phones or tiny devices for application development with sensors
embedded in mobile phones. The information generated by these devices is a big task in collection and
storage. For further, the data transmission to the intended destination is delay tolerant. In this paper, we
made an attempt to propose a new security algorithm for providing security to Pervasive Computing
Environment (PCE) system using Public-key Encryption (PKE) algorithm, Biometric Security (BS)
algorithm and Visual Cryptography Scheme (VCS) algorithm. In the proposed PCE monitoring system it
automates various home appliances using VCS and also provides security against intrusion using Zigbee
IEEE 802.15.4 based Sensor Network, GSM and Wi-Fi networks are embedded through a standard Home
gateway.
PERFORMANCE COMPARISON OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijujournal
Routing protocols have an important role in any Mobile Ad Hoc Network (MANET). Researchers have
elaborated several routing protocols that possess different performance levels. In this paper we give a
performance evaluation of AODV, DSR, DSDV, OLSR and DYMO routing protocols in Mobile Ad Hoc
Networks (MANETS) to determine the best in different scenarios. We analyse these MANET routing
protocols by using NS-2 simulator. We specify how the Number of Nodes parameter influences their
performance. In this study, performance is calculated in terms of Packet Delivery Ratio, Average End to
End Delay, Normalised Routing Load and Average Throughput.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
Optical Character Recognition (OCR) is a technique, used to convert scanned image into editable text
format. Many different types of Optical Character Recognition (OCR) tools are commercially available
today; it is a useful and popular method for different types of applications. OCR can predict the accurate
result depends on text pre-processing and segmentation algorithms. Image quality is one of the most
important factors that improve quality of recognition in performing OCR tools. Images can be processed
independently (.png, .jpg, and .gif files) or in multi-page PDF documents (.pdf). The primary objective of
this work is to provide the overview of various Optical Character Recognition (OCR) tools and analyses of
their performance by applying the two factors of OCR tool performance i.e. accuracy and error rate.
DETERMINING THE NETWORK THROUGHPUT AND FLOW RATE USING GSR AND AAL2Rijujournal
In multi-radio wireless mesh networks, one node is eligible to transmit packets over multiple channels to
different destination nodes simultaneously. This feature of multi-radio wireless mesh network makes high
throughput for the network and increase the chance for multi path routing. This is because the multiple
channel availability for transmission decreases the probability of the most elegant problem called as
interference problem which is either of interflow and intraflow type. For avoiding the problem like
interference and maintaining the constant network performance or increasing the performance the WMN
need to consider the packet aggregation and packet forwarding. Packet aggregation is process of collecting
several packets ready for transmission and sending them to the intended recipient through the channel,
while the packet forwarding holds the hop-by-hop routing. But choosing the correct path among different
available multiple paths is most the important factor in the both case for a routing algorithm. Hence the
most challenging factor is to determine a forwarding strategy which will provide the schedule for each
node for transmission within the channel. In this research work we have tried to implement two forwarding
strategies for the multi path multi radio WMN as the approximate solution for the above said problem. We
have implemented Global State Routing (GSR) which will consider the packet forwarding concept and
Aggregation Aware Layer 2 Routing (AAL2R) which considers the both concept i.e. both packet forwarding
and packet aggregation. After the successful implementation the network performance has been measured
by means of simulation study.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxnikitacareer3
Looking for the best engineering colleges in Jaipur for 2024?
Check out our list of the top 10 B.Tech colleges to help you make the right choice for your future career!
1) MNIT
2) MANIPAL UNIV
3) LNMIIT
4) NIMS UNIV
5) JECRC
6) VIVEKANANDA GLOBAL UNIV
7) BIT JAIPUR
8) APEX UNIV
9) AMITY UNIV.
10) JNU
TO KNOW MORE ABOUT COLLEGES, FEES AND PLACEMENT, WATCH THE FULL VIDEO GIVEN BELOW ON "TOP 10 B TECH COLLEGES IN JAIPUR"
https://www.youtube.com/watch?v=vSNje0MBh7g
VISIT CAREER MANTRA PORTAL TO KNOW MORE ABOUT COLLEGES/UNIVERSITITES in Jaipur:
https://careermantra.net/colleges/3378/Jaipur/b-tech
Get all the information you need to plan your next steps in your medical career with Career Mantra!
https://careermantra.net/
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Online aptitude test management system project report.pdf
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATION
1. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
DOI:10.5121/iju.2017.8102 17
LIGHTWEIGHT MOBILE WEB SERVICE
PROVISIONING FOR THE INTERNET OF THINGS
MEDIATION
Mohan Liyanage, Chii Chang and Satish Narayana Srirama
Mobile & Cloud Lab, Institute of Computer Science, University of Tartu, Ülikooli 17 -
324, Tartu 50090, Estonia
ABSTRACT
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
KEYWORDS
Mobile Web service; CoAP; Llightweight; Cconstrained Service Provider
1. INTRODUCTION
The capabilities of recent mobile devices such as smart phones and tablets have been steadily
enhanced with faster processing power, larger and higher resolution display screens, greater
memory, and enhanced power saving mechanisms. Additionally, accessing high speed mobile
Internet (e.g., 3G/4G or LTE1
) with mobile devices has become a common phenomenon in most
urban areas of the world. Cisco Visual Networking Index Forecast Project predicts that, by 2018,
the population of mobile device users will reach around 5 billion together with more than 10
billion mobile devices connecting to the Internet2.
Confluence of these mobile developments with the evolution of service-oriented architecture
technologies have led to the mobile Web services (MWS), where the mobile terminals are being
used as both Web service clients and providers (which is termed-Mobile Hosts [1]). Mobile Web
1
http://www.3gpp.org/technologies/keywords-acronyms/98-lte
2
http://newsroom.cisco.com/release/1340551
2. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
18
service provisioning has been utilized in numerous fields such as Location Based Services (LBS)
[2], Mobile Health Services [3], Mobile Social Networking applications [4], etc.
Although recent smartphones has enough processing power and capable of high speed data
transmission, the challenge of resource constraints still exists when providing MWS. The battery
power of the mobile device will drain quickly due to the extensive usage of the high performance
multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission. Therefore,
in past years, several lightweight mobile Web service provisioning approaches [5], [6] have been
proposed to address the resource intensive issues in MWS.
In general, there are two trends of approaches:
(1) Reducing the complexity of the messaging. e.g., utilising Representational State Transfer
(REST) based service provisioning instead of Simple Object Access Protocol (SOAP);
(2) Utilising external resources to enhance the overall performance. e.g., offloading the
complex computational tasks to static Cloud [7] or to the Mobile Ad Hoc Cloud [8] and
also using optimistic collaboration and scheduling to reduce the consumed bandwidth in
order to serve energy [9], [10].
However, when considering MWS based sensing provisioning systems, they still have some other
challenges that need to be addressed in order to increase their efficiency. For example, when
considering the mobile sensing scenarios, instead of providing the information regularly based on
the requests, sometimes it may be ideal to store the information on the cloud and provide access
to the data, for the further requests. This way, the communications latencies can be significantly
reduced, if there are server bunch of clients requesting the same information.
In addition, there should be a proper way to handle the conflicts and compatibility of services.
Mobile devices have limited sensing components and they may not be able to operate
concurrently. Conversely, some services may be able to operate at the same time, even though
they are using the same sensing components. For example, video-based sensing and image-based
sensing services both use camera component and may operate at the same time depending on the
specification of the devices. In such cases, how does the Mobile-Host manage the services and
provide timely service publishing? Similarly, in the case of real-time or a periodical sensing
service operation, the executed service can affect the availability of other services. How does the
Mobile Host measure or prioritize the availability of the services?
To address these issues, in this paper, we extend ourprevious work [11] towards presenting a
lightweight mobile Web service provisioning framework based on integrating a number of
lightweight protocols including Constrained Application Protocol (CoAP) [12], Bluetooth Low
Energy (BTLE) [13] and Efficient XML Interchange (EXI) [14]. We also have added a service
scheduling feature to address the discussed challenges and to provide uninterrupted service
provisioning while maintaining the basic functionality of the mobile device.
The experimental results, which focused on the performance comparison between the traditional
MWS and the proposed lightweight MWS, have shown the efficiency of the proposed lightweight
MWS framework in terms of resource consumption and service provisioning throughput.
The rest of the paper is organized as follows: Section 2 provides background on applications of
Mobile Host and comparison of related work. Section 3 discusses protocols related to service
provisioning. Section 4 presents the design details of the proposed framework followed by the
description of the main components of the MWS. Section 5 provides the implementation details
of the prototype and Section 6 presents the performance evaluation of the proposed protocol
stack. The paper concludes in Section 7 along with future research directions.
3. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
19
2. BACKGROUND AND RELATED WORK
This section explores the applications of the mobile host and state-of-art research on the mobile
Web service provisioning.
2.1 APPLICATIONS OF MOBILE HOST
MWS has been utilized in different application domains over the past years.
Berger et al. [15] were successful in provisioning a SOAP-based retail Web application where a
mobile device presents wallet services to an electronic check-out at kiosk. The kiosk station uses
mobile wallet service hosted by the customer mobile devices that delivers a complete payment
transaction within the mobile device, the retail store system and the bank system. Two other
fascinating applications are a) Mobile Picture album with the location information service and b)
Cooperative Journalism, where mobile host engages the coordination of journalists and their
associations, which are presented in the work by Srirama et al. [16], and in [17] respectively.
MobiCrop [18] is an application which grants crop farmers to use their mobile devices to get
information about utilizing pesticides. Another interesting mobile health application provided in
[19] called SOPHRA, which supports healthcare professionals to access patients' medical
information that is hosted on their mobile devices.
2.2 COMPARISON OF EXISTING MOBILE HOST FRAMEWORKS
Most of earlier approaches were based on providing a SOAP-based MWS architectures. The work
in Srirama et al. [16], [1], [20] presented a lightweight mobile host with Personal Java
implementation. In that work, authors utilised HTTP and TCP for the application and transport
layer protocols respectively, and SOAP messages format with the WSDL as service description.
Gehlen and Pham [21] presented a P2P Web services on Java enable mobiles. In this architecture,
each mobile node work as both client/server role which provides service in the distributed
environment. The authors developed a mobile SOAP server that capable of providing XML Web
services. In another work Srirama [22] , Srirama et al. [23] described a framework based on
JXTA technology for service provisioning in the P2P network environment. The light version of
JXTA for mobile devices called JXME applied to set up a virtual P2P network. However, JXTA
uses either TCP or HTTP protocols to traverse network barriers, and also the work used WSDL
for service discovery and SOAP message format. Moreover, Ou et al. [24] designed a Layered
P2P architecture to provide Web services in converged cellular and ad-hoc network environments
with the vertical tunneling model to speed up the service discovery. The framework consists of
eight modules including a WSDL module for service publishing and a SOAP Module for
generating and parsing SOAP messages between the client and the service provider.
In order to reduce the workload at the mobile host, Kim and Lee [25] proposed to sharing a task
between devices. The authors suggested that migration and replication of Web services are
necessary to provide a reliable service. The migration or replication of a service, initiate by the
service provider, when a request received and there is a change in its context information. For
instance, changes of context information such as shortage of battery level, changes of the device
location, etc., which stops it providing the service on its own. Even though, migration of the
services reduces the workload at the mobile, still the communication based on the same
traditional protocols like HTTP, TCP, WSDL and SOAP, which is heavyweight.
The RESTful Web service approach has been used in later mobile host frameworks, which is
more appropriate for the constrained conditions because of their lightweight features. For
4. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
20
instance, Chang [26] proposed the context aware cache pre-fetching strategy for MP2P Web
Service provisioning. Instead of XML formatted documents like SOAP, this frame work used
RESTful architecture which is more suitable in the infrastructure-less decentralized MP2P
environment. Also, Srirama and Paniagua [27] proposed a mobile host for Android devices based
on OSGi (Open Services Gateway initiative) framework which is capable of providing services in
a RESTful fashion using HTTP and XMPP.
Mohamed and Wijesekera [5] proposes a lightweight framework for providing Web services on
mobile devices which based on the REST architecture with JSON data representation. Moreover,
the framework consists of main elements such as "HTTP Request/Response Listener",
"Deployment Agent","Request Processor" to integrate the Web ser- vices, and the "Security
Agent" to provide security services for the Web services. In addition to that, another framework
that enables context-aware services, utilizing a hybrid model of both Mobile P2P and JmDNS for
service discovery presented by Charl van der [28]. Accordingly, the JSON formatted messages
reduce the communication over- head between devices and the multicast interchange messages
increasing the reliability of the proposed framework.
Although, 6LoWPAN protocols (i.e., IPv6 over Low Power Wireless Personal Area Networks)
provide WSNs to use IP to communicate with other networks, the application protocols need to
develop or modify in order to enable the fully device communication across the WSN settings.
With this intention, use of the Devices Profile for Web Services (DPWS) as an application layer
protocol in WSNs was introduced Moritz et al. [29]. The authors presented a SOAP-binding on
top of the IETF Constrained Application Protocol (CoAP) coupled with Efficient XML
Interchange (EXI) format to reduce overhead as well as to increase the efficient delivery of SOAP
messages. However, the main shortcoming of using SOAP is that it needs heavy-weight parsers,
which degrades the overall performance of the mobile Web server.
Doukas et al [30] presented a generic Mobile SDK that allows developers to easily integrate IoT
protocols (i.e., WebSockets and MQTT) into their applications in order to communicate with
cloud based IoT environment. The authors described how a mobile device can communicate to an
IoT application with the generic Mobile Software Development Kit (SDK) called COMPOSE.
The SDK enables developers to implement communication with devices and IoT services
leveraging various IoT protocols, like MQTT, RESTful communication and WebSockets, etc.
Although, in the above mentioned frameworks, the service architecture has been switched from
the SOAP to REST, but HTTP was still being used for the application protocol. Since the HTTP
uses TCP as the transport layer protocol, the overhead of the protocol combination is also
relatively high. To reduce the protocol overhead, should utilize lightweight application protocol
such as CoAP, EXI, etc. which do not included in the existing MWS frameworks.
3. RELATED SERVICE PROVISIONING PROTOCOLS
This section describes the related protocols/technologies used in our framework. It consists of
four major parts of MWS: message format, data transmission, service description and service
discovery mechanism.
3.1 MESSAGE FORMAT
In MWS provisioning, reducing the payload size in data transmission phase is improve the
performance and energy efficiency. Moreover, binary XML and JSON are common options in
past works [31]. However, the recent W3C standard - Efficient XML Interchange (EXI) is
capable of outperforming Binary XML and JSON in reducing the data size. In the EXI
5. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
21
compression, the XML document is encoded into binary format that improves encoding/decoding
performance and significantly reduces bandwidth requirements [32]. Overall EXI has a high
compression efficiency of 50 times when compared to other compression schemes [33].
3.2 DATA TRANSMISSION
Traditional Web service provisioning relies on SOAP over HTTP. Past MWS frameworks [26],
[5], [27] tended to utilize Representational State Transfer (REST) [34] based service provisioning
in order to reduce the resource consumption of mobile host.
3.3 REPRESENTATIONAL STATE TRANSFER
REST is a communication protocol which handles the client-server communication over HTTP. A
Web service designed based on REST is termed---RESTful service. URIs (Uniform Resource
Identifiers) are used to access the resources over the Web server. The part of REST URI contains
the ‘‘resource’’ which is also called Uniform Resource Name (URN) that is requested by clients.
RESTful applications use the basic HTTP methods (i.e. GET, POST, PUT and DELETE) to
access the Web servers. Based on the experimental results [35],[27],[28] REST is more suitable
for resource constrained mobile computing environments.
3.4 CONSTRAINED APPLICATION PROTOCOL (COAP)
CoAP is a RESTful Web transfer protocol that is designed for constrained environments [12].
CoAP provides a more compact message format mechanism, which introduces low overhead
binary encoded header and reduces the message parsing complexity.CoAP is built on top of the
User Datagram Protocol (UDP) that has significantly lower overhead with the multicast support
contrast to the TCP.
3.5 LOCAL SERVICE DISCOVERY
Local service discovery in peer-to-peer (P2P) manner is one of the major features of MWS
provisioning in many scenarios [23],[7]. Different to the global service discovery, which can be
achieved by utilizing central service repository/registry, local P2P-based MWS discovery requires
P2P communication protocols that are commonly available in existing mobile devices. In a
classic design, the mobile host might utilize Wi-Fi or Bluetooth to support the P2P-based service
discovery mechanism. We proposed to use Bluetooth Low Energy (BTLE) protocol that was
designed for applications which require low power consumption and low radio duty cycle.
3.6 SERVICE DESCRIPTION
Service description metadata plays an important role in dynamic service composition systems. By
providing standard service description metadata (e.g. WSDL), software clients can automatically
identify the operations provided by the service. In the following sections, we discuss three main
service description approaches that are suitable for MWS provisioning.
3.7 WEB SERVICE DESCRIPTION LANGUAGE
Original WSDL was designed to describe SOAP-based Web services. However, WSDL 2.0 is
capable of describing RESTful services. Following is a portion of a WSDL 2.0 document that was
used to describe a RESTful operation provided by the mobile host. An alternative Web service
6. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
22
description beside WSDL is Web Application Description Language (WADL)3
which was
introduced specifically to describe RESTful services. Although WADL was not accepted as a
W3C standard, it has been broadly used in practice4
.
3.8 SENSOR MODEL LANGUAGE (SENSORML)
SensorML5
is a metadata-based resource description language. It provides XML encodings for
describing sensors, actuators, and processes. The schema and namespace information are defined
under the header of the SensorML document. Generally, the elements defined in the document are
mainly depending on the services and resources associated with the devices. Additionally,
SensorML supports semantic description, which is not provided by WSDL 2.0 by default.
4. SYSTEM DESIGN
4.1 OVERVIEW OF ARCHITECTURE
Error! Reference source not found. illustrates the architecture of the proposed MWS
provisioning. In this environment, mobile host represents the Web service provider that is capable
of providing various data to its clients. For example, the mobile host can collect sensory data
from its surrounding sensor devices - SN1 and SN2 - and interpret the data to the useful
information, then provide the interpreted data via its Web service mechanism. The
communication protocol of the mobile host is mainly based on CoAP, and the message payload is
in EXI format.
Figure 1. Mobile Web Service Provisioning Framework
The mobile host supports two types of service discovery: global service discovery and local
service discovery. The global service discovery is realized by publishing its service description
metadata (e.g., WSDL, WADL or SensorML) to a global service registry (e.g., DNS-SD). A
remote client that knows the location of the service registry can discover the mobile host by
requesting the service registry. Afterwards, the remote client can perform the regular service
request to the mobile host by sending the CoAP service requests. The local service discovery is
based on BTLE. As the Error! Reference source not found. shows, a client can discover the
3
http://www.w3.org/Submission/wadl/
4
http://eclipse.org/jetty/
5
http://www.ogcnetwork.net/SensorML
7. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
23
mobile host in proximal range via BTLE. The mobile host will provide certain information via
BTLE to help the client to identify the communication requirement. If the client moves out of the
BTLE range with the mobile host, it can still communicate with the mobile host via a mobile
Internet connection. The mobile host has been assigned a public static IP address from the mobile
Internet service provider (e.g. Estonian TELE2 and EMT both provide this service). In the
situations where the public IP address allocation is not possible, the mobile host can utilize proxy
services [6], or hole-punching/relaying mechanisms [38].
4.2 SENSING SERVICE PROVISIONING
The mobile host can provide services based on time or resource allowance. For example, the user
of the mobile host can set 5 hours as the service provisioning period and 50% as the maximum
battery allowance. Hence, whether the 5 hours period has past or the battery has consumed 50%,
the service provisioning will be terminated, and the corresponding service publishing will be
withdrawn from the discovery server. Mobile host supports three types of sensing services:
One-time sensing represents a generic Web service request/response operation that triggers
corresponding sensing components to retrieve data and delivering the data to either the requester
or specific end-points.
Real-time sensing represents the streaming-based sensing service. The mobile host will perform
the sensing activity continuously and provide the data to the client concurrently.
Periodical sensing represents the activity that is triggered for each timestamp based on the
request. For example, the request message may describe that for every 30 minutes; the mobile
host will perform the sensing activity once, and provide the data to a specific endpoint based on
the address described in the request message. Basic protocol stack.
4.3 BASIC PROTOCOL STACK
Figure 2. Protocol Stack of the Mobile Web Server
Error! Reference source not found. illustrates the conceptual design of the protocol stack
used in the proposed mobile host. The proposed framework is mainly based on lightweight
protocols to make the process simple. In the lower layer of the protocol stack, the mobile host can
utilize numerous common protocols such as the 3G/4G mobile Internet (for global service
interaction), Wi-Fi/Wi-Fi Direct, Bluetooth (BT)/BTLE, IEEE 802.15.4 (e.g., ZigBee), or LTE-A
(LTE Direct) for the local service interaction.
Unlike traditional web servers based on HTTP, our application layer utilizes CoAP that provides
a solution with a compact header size, simple, lightweight, RESTful message exchange in
between mobile host and clients over constrained network.
8. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
24
As mentioned in the earlier, the proposed mobile host also utilizes EXI to compress the size of the
message payload. Since the design of the mobile host is for provisioning sensory data in IoT
scenarios, service description is very important because it facilitates to communicate smart object
over the network. We proposed to use SensorML based resource description which provides
XML encoding and the semantic description of sensory data.
4.4 COMPONENTS OF THE MOBILE HOST
Error! Reference source not found. illustrates the component architecture of the proposed
mobile host. It consists of following main components.
4.4.1 REQUEST/RESPONSE LISTENER
It is the first contact point for the clients to the mobile host. Once the mobile host is started, it
listens on port 5683 which is reserved for the CoAP services. Clients will get the contact details
of the server with the service description from the local/global service discovery components that
will be discussed later.
Figure 3. Main Components of Mobile Host Web Server
4.4.2 SERVICE ENGINE
This is the core module of the mobile host that coordinates all the parts of the mobile host. Main
tasks include analysing requests from the clients, processing and executing relevant methods to
get data from a particular resource, and then sends data back to the clients with the response
messages. In order to handle services, the service engine has two main sub components:
URI Mapper - Once the client request is received from the Request/Response Listener, URI
Mapper analyzes the URI to fetch the service information which is requested by the client. The
requested service indicates what kind of data or service it requires and the URI Mapper locates
the corresponding resource within the engine to fetch the data.
Resource Pool - Service engine maintains a collection of resources that has context data about
particular Web services. Resource Pool has an instance for each CoAP resource which will
execute upon the client request. The Resource Pool also communicates with the Data Collector to
fetch data from the data providers for particular resources.
9. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
25
4.4.3 DATA COLLECTOR
Data collector is responsible for collecting data from available resource providers. Such providers
can be the inbuilt sensor components of the mobile host, external environmental sensory service
providers or spatial data from mobile social network in proximity. The Service Engine selects the
type of Data Collector that can retrieve data from the sensors.
4.4.4 MESSAGE PROCESSER
To reduce the size of the CoAP message the Message Processor processes the payload of
the messages used in the communications. The proposed mobile host framework utilizes
EXI-formatted binary scheme. EXI Parser gets data from the Service Engine, compresses
it, and forwards to the service engine which will wrap it to the CoAP message.
4.4.5 SENSOR MANAGER (SM)
It is responsible to communicate with the inbuilt sensors. One of the main fact which consume
more energy is applications that are reading data from inbuilt sensors of a mobile device. When
the client request is related to inbuilt sensory data, the Sensor Manager collaborates with the
operating system to activate the sensor components, fetch the data and deactivate the sensor.
Sensor manager only activates the sensor components when it is necessary and helps to minimize
the energy consumption of the mobile host.
4.4.6 LOCAL SERVICE DISCOVERY COMPONENT
When the client device locates itself in close proximity to the mobile host, it can receive the
BTLE advertisement broadcasted by the mobile host which is more energy efficient than other
types of discovery mechanisms. After the BTLE connection is established, the client can explore
the basic services that are provided by the mobile host.
4.4.7 GLOBAL SERVICE DISCOVERY COMPONENT
To enable the mobile Web services provisioning across other networks, the mobile host registers
its service description with the global DNS server. In RESTfull architecture, all Web services
publish with associated URIs that can be discovered by the clients.
4.4.8 GLOBAL SERVICE SCHEDULE MANAGER
Mobile host can provide services based on available time and resources. The main task of the
service scheduler manager is providing a schedule for the service provisioning which is defined
as below:
Definition 1 (Global Sensing Service Schedule - GS)
GS is defined as a tuple ( T , ) where:
T is a set of timestamps for service provisioning period. Each timestamp is scheduled as 1 minute.
i.e. for a 1 hour service provisioning, |T | = 60.
: → maps timestamps with the scheduled sensing service executions.
Mobile host supports three main types of sensing services as described earlier in this section. The
sensing service request can be performed in two forms as simple or complex. To enhance the
sensing service provisioning, a model of the sensing service schedule is defined and described in
10. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
26
the following section.
4.5 SENSING SERVICE SCHEDULER MODEL
In order to optimize the service provisioning, use of the sensing service pool in service schedule
and defined as below:
Definition 2 (Sensing Services Pool- SSP)
SSP describes the information of sensing services provided by the mobile host. It is defined as a
tuple ( ,ς,κ,ε)where:
: is a set of sensing services
ς: → maps sensing services to sensing components (e.g.,GPS sensor, accelerometer camera,
audio recorder, network signal browser etc.)
κ: → maps sensing services to conflict services
ε: → maps sensing services to the system resource usage sets (e.g. CPU, RAM, network
transmission bandwidth usage, etc.)
Example 1 (Conflict Service)
Let s1 and s2 be two services. Let Τ` ⊆ Τ. Assume s1 has been requested by a real-time sensing
request, which has its timestamp period withinΤ`, and s2 is not requested by any client.
Suppose 2 ∈ 1 , then s2 will be marked as unavailable duringΤ`.
4.5.1 SENSING SERVICE REQUEST PROCESSING
If the request is a simple service request that involves only a one-time service invocation that has
only one activity. Otherwise, the request will be handled as the description provided in the request
itself. It is defined as below:
Definition 3 (Request Processing - RP)
RP is defined as a tuple ( , , , ) where:
• is a set of nodes
• ⊆ is a set of flow relation rule
• ∶ → maps nodes to node types. A node type can be an activity, a gateway, an
event, a sub-process, etc. An activity node that involves sensor service is marked as sType
• = !", … !$%, & ∈ is a set of work schedule plan that identifies when and how long
the process needs to be performed. Each ! ∈ is defined as a tuple (st, et), which
correspond to start time (st) and end time (et)
Example 2 (Work Schedule Plan Handling)
Suppose a RPcontains = !", … !$%. Let (st1, et1) be the start time and end time of !". st1 =
14:00 and et1= 14:10, which denotes a 10 minutes sensing task. Schedule Manager will model !"
as a set of timestamp that consists of {14:00, 14:01, 14:02, 14:03,..., 14:10} when it is processing
the request.
Schedule Manager analyses the request type based on the elements in P. It is based on the
following rules:
11. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
27
• One-time request: |P| = 0
• Real-time request: | P | = 1, the end time - et of !" ∈ is not null
• Periodical request:| | ≥ 1, ∀ ! ∈ ∶ +,- ≠ &/00 ⋀ ,- ≠ &/00
For any request that exceed the scope defined above, is considered as an invalid (i.e. insufficient
parameter) request, which will trigger an error.
4.5.2 ONE-TIME REQUEST PROCESSING
A one-time request involves 1...N sensing service invocation (services of sType nodes), which is
denoted by SXR
, 23
= 4
23
5 ≤ 7 ≤ %.
Let ,8 =∈ 9 , :&; 8 = ,8 a set of executed services at ,8 :&; 8 ≅ &=>, in which now
denotes the current system time.
Let ` = 23
∩ 8,7@ | `| > 0 ,ℎ+& ∀ ∈ `, sensing service - s will be assigned for executing
the activity. Let " = 23
8. For each s∈S'', the corresponding task will be replaced from the
original sensing service invocation task that will forward to the new service which retrieves
sensing data which has already been gathered during the previous real-time or periodical requests.
4.5.3 REAL-TIME AND PERIODICAL REQUEST PROCESSING
There are two main differences in between periodical sensing and real-time sensing. First, in
periodical request, the request processing can be executed in a number of periods, but the request
executes only once in the real-time sensing. Second, in periodical request, the request can set a
specific start time, while, the real-time sensing just executes.
4.5.4 SERVICE AVAILABILITY MEASUREMENT AND SCHEDULE PUBLISHING
Schedule Manager updates the service availability information when it progresses a new request.
The service availability is influenced by two factors: service conflicts and system resource
allowance (i.e. CPU, RAM, network bandwidth, etc.).
Let Stx
be a set of scheduled service executions at the timestamp ,8 ∈ Τ, G8
= H
G8| 1 ≤ I ≤
% . J H
G8
denotes a set of conflict services of H
G8
. Hence, a set of conflict services at
timestamp - ,8 (denoted by KG8
) will be: KG8
= ∪H ∈| MNO| J H
G8
, and the available services at
timestamp ,8 (denoted by G8
) will be G8
= KG8
.
The above process has only filtered the services based on conflicts. Following is the process that
considers the system resource availability.
Let PQP
= R+S
PQP
5 ≤ 0 ≤ %, be a set of the available system resources (Note that available
system resources are different to the hardware specification of the mobile device. User can set the
availability in percentage to avoid the service provisioning affecting to the normal use of the
mobile device).
Let G8
be a set of sensing services assigned at ,8 =∈ 9. For each service - T ∈ G8
, its system
resource consumption is found in U T . Let PV = U T in which PV = R+S
PV
51 ≤ 0 ≤ %
in which the system resource denoted by +S
PV
and +S
PQP
are the same, and let W+S
PV
be the usage
12. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
28
value of +S
PV
and W+S
PQP
be the remaining value of +S
PQP
. For each ,8the W+S
PQP
after assigning
GO
(denoted by W+S
GO
) will be: W+S
GO
= W+S
PQP
− ∑ W+S
PV
PT∈MNO .
Let GO = W +S
GO
. Referring to the previous result, G8
is a set of services that has been identified
as available at ,8. For a service Q ∈ GO, let PZ be the system resource usage required by the
service. If ∃+S
PZ
∈
PZ
, such that W+S
PZ
> W+S
GO
, which indicates that the service Q requires a
higher usage value than the actual available resource value. Hence, the Q is considered as
unavailable at the time stamp ,8.
5. IMPLEMENTATION
This section describes the prototype implementation of the proposed framework.
5.1.1 MOBILE HOST
The mobile host was implemented on Google/LG Nexus 5 running Android version 5.0.1. The
implementation is basically adapted from the JCoAP6
that provides a Java API for the CoAP. The
mobile host has also been tested on Raspberry Pi B+ and Nexus 9 tablets.
For the external sensory data collection we implemented Arduino based temperature sensor
module which senses the ambient temperature and sends the data to the mobile host over the
BTLE connection. The Arduino setup includes the MEGA ADK board (microcontroller board
based on the ATmega2560), LM35 temperature sensor and the RedBear BLE Shield (based on
the Nordic nRF8001 Bluetooth Low Energy IC). We implemented the Bluetooth communication
at the Raspberry Pi with the LogiLink CSR Bluetooth v4.0 dongle, BlueZ 5.29 and Node.js. To
start an instance of the Web server, the mobile host needs to instantiate a new CoAP local
endpoint. In our implementation, we defined four types of resources:
TmpResource - provides the current room temperature
LocationResource - provides current GPS details of the mobile host
AltitudeResource - provides current altitude information of the mobile host
LightResource - provides the ambient light of the environment
At the present implementation, these resources are only designed to perform the GET method
which is called by the clients to get services from the mobile host.
5.1.2 EXI DATA PROCESS
We used ExiProcessor7
the open source Java-based library that encodes text-XML files into
binary EXI and decodes EXI files back to XML. Current prototype uses pre-compressed EXI files
because the current Android OS SDK does not support a number of required API libraries for
ExiProcessor. For the testing, we managed to implement ExiProcessor on the Raspberry Pi with
the 3G dongle for the mobile Internet connectivity.
6
https://github.com/dapaulid/JCoAP
7
http://sourceforge.net/p/exiprocessor/home/Home/
13. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
29
5.1.3 LOCAL AND GLOBAL SERVICE DISCOVERY
Clients within the proximity can discover the mobile host from the IP described by the BTLE
advertisement without establishing Bluetooth pairing connection with the mobile host. For the
global discovery, the DNS server was simulated in a regular laptop computer.
6. PERFORMANCE EVALUATION
We designed a case study to investigate the performance of the proposed Web service framework.
6.1.1 EXPERIMENT 1
The mobile host implemented in Google/LG Nexus 5 running Android version 5.0.1 with the
TELE2 4G mobile Internet connection. The clients simulate on a computer that connects to the
University's Wi-Fi network. Clients request the altitude of the mobile host that replies the CoAP
response message with the payload of 23 Bytes. We simulated different number of simultaneous
client requests from 10 to 300 per second.
Then we measured the average throughput using the request/response ratio in each occasion. We
repeated the same test case with the mobile host that use the conventional Web service framework
(HTTP/REST) to contrast the lightweight in our mobile Web service framework. We also
performed the same test case in the University Wi-Fi network to evaluate the performance of the
framework further.
6.6.2 THROUGHPUT COMPARISON
Figure 4. Throughput Of MWS
Error! Reference source not found.4. illustrates the throughput comparison between the
conventional HTTP-based MWS framework and the proposed lightweight MWS framework. The
proposed framework can maintain the 100% success rate up to 140 coinciding requests per
second and at least maintains 95% success rate up to 160 coinciding requests per second in the
Wi-Fi network. Furthermore, we observed that improved performance in the 4G network because
of the inconsistent packet delay than the Wi-Fi network. On the other hand, the conventional
mobile Web server showed that it can only handle up to 70 simultaneous requests per second in
the Wi-Fi network and 130 simultaneous requests per second in the 4G network with the
throughput of 95%. Moreover, we can see the throughput of the conventional MWS dropped
drastically after reaching its maximum capability.
6.6.3 CPU USAGE COMPARISON
In order to record the CPU usage while the mobile host operating MWS, we utilised the Android
Device Monitor that displays the CPU Load for the top applications running on the mobile
device. As the Error! Reference source not found.. shows, the average CPU load is below
14. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
30
5% in the CoAP-mobile host. Conversely, in HTTP-mobile host, it is around 11.75% for 100
simultaneous client requests per second. When the numbers of client requests are increasing
(around 110/Sec), the HTTP-based mobile host application crashed because it is CPU intensive.
On the other hand, CoAP-based mobile host can accommodate even a higher load from clients.
Another interesting factor we observed is that the kernel CPU loads of both applications. In the
HTTP-based mobile host, kernel CPU load is at a very high level while comparing with the
CoAP-mobile host, which is as little as about 1%.
Figure 5. CPU load of MWS
6.6.4 ENERGY CONSUMPTION COMPARISON
To measure the energy consumption, we monitored total energy consumption of the device when
the mobile host is running under the different loads. During the test the mobile host serves 20, 40,
60 and 80 clients per second with the size of payload from 100 bytes to 1000bytes. Our test bed
consists of PeakTech® Digital Multimeter which provides the visualised real-time energy
consumption logging of the mobile devices. The Multimeter coupled to the battery of the phone
and measures the current flow and the voltage level during the experiment. As shown in the
Error! Reference source not found., the CoAP server consumes less energy than the HTTP
server. With 20 concurrent client requests, the average energy consumption is increased
according to the size of the payload for the both protocols as expected (Error! Reference
source not found.. Chart (a) ). However, we noticed that decrement of power consumption of
the HTTP server at higher payloads (800 bytes & upwards). For instance, as shown in the Error!
Reference source not found.6. Chart (c), with 60 concurrent client requests, HTTP and CoAP
consume 65.78 J and 52.61 J for 800 bytes respectively. Consequently, when the payload
increases, the energy consumption increases accordingly in CoAP server, but slightly decreases in
HTTP server. Furthermore, we can see that HTTP consumes less energy than CoAP when the
payload is 1000 bytes. The reason that we observed is many sessions have been dropped at this
point due to the limitations of the HTTP server which caused the drop of energy consumption.
15. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
31
Figure 6. Comparison of Energy Consumption (Coap Vs HTTP)
6.6.5 EXPERIMENT 2
After observing the high performance of the proposed CoAP-mobile host, we designed a test case
to investigate the performance of a mobile phone and a Raspberry Pi model B+. We wanted to
explore the feasibility of using a Raspberry Pi over the mobile phone in the mobile Web service
provision.
First, we installed our CoAP Webserver on the Raspberry Pi model B+ and used a 4G dongle to
connect to the internet. We measured the energy consumption of the device in idle state and when
the server running under a different number of client requests and payloads. We applied the same
setup for the mobile phone and record the measurements as explained in the previous case study
with help from the PeakTech Digital Multimeter. According to the result (shown in the Error!
Reference source not found.), the mobile phone consumes less energy than the Raspberry Pi
(RPi). With 20 concurrent client request (Figure 7. Chart (a)), energy consumption of the phone
varies in a large range according to the size of the payload (from 12 J to 45.5 J). However, RPi
behave differently because it consumes from 50 J to 60.9 J for the same amounts of payloads.
There is a limitation we observed that we could not increase the size of the payload along with the
number of client requests due to the large number of packets lost at the RPi. For instance, when
using RPi server, there were a large number of packet losses on the client device when the
payload beyond the 500 bytes and the energy consumption also decreased accordingly. Moreover,
we only able to measure the energy consumption at the RPi up to the payload of 500 bytes during
the rest of the experiment. The overall result shows that at the RPi, the size of the payload is not
that much affected to the average energy consumption because there is no big variance in
consumed energy against the size of the payload (Figure 7. Chart (a) & (b).
16. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
32
Figure 7. Comparison Of Energy Consumption (Phone Vs Raspberry Pi )
6.6.6 EXPERIMENT 3
In this experiment we added Global Sensing Service Scheduler into the mobile host. Then we
measured the energy consumption for different number of coinciding client requests that are
asking the list of temperatures in five buildings for the last six hours. The size of the payload of
the reply message is around 800kb.
Figure 8. Comparison Of Energy Consumption
With the Sensing Service Scheduler, mobile host does not have to send a reply with the same data
for all the clients, instead after sending response for the first request, it copies the data to a cloud
instance and replies with the URL of the server which has the data to the subsequent requests.
According to the result shown in the Error! Reference source not found.. the Sensing
Service Scheduler keeps minimizing the energy consumption by handling multiple service
requests for the same resource. More details of experiments conducted with the Global Sensing
Service Scheduler can be found in our work at [9].
7. CONCLUSION
In this paper, we have presented a lightweight mobile Web service provisioning framework for
resource constrained environment. We extended our original work by adding service scheduling
and the management of conflicts in order to improve the quality of service provisioning. Together
with this improvement our mobile host enables mobile users to participate in different mobile
phone sensing systems without affecting much of their hardware resources. During our
17. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
33
implementation and testing, we used REST and lightweight protocols in order to maintain the less
complexity and energy efficiency of the framework.
The evaluation results have shown that the proposed lightweight MWS framework can provide a
more cost efficient MWS provisioning solution than the past traditional MWS frameworks.
As for the future research directions, we would like to improve the efficient service discovery
features which are most important in the Machine-to-Machine communication.
ACKNOWLEDGEMENTS
This research is supported by the Estonian Science Foundation grant PUT360.
REFERENCES
[1] S. N. Srirama, M. Jarke, and W. Prinz, “Mobile web service provisioning,” in Telecommunications,
2006. AICT-ICIW’06. International Conference on Internet and Web Applications and
Services/Advanced International Conference on, 2006, p. 120.
[2] Z. Yun, G. Ren, and B. Fuling, “A Conceptual Architecture for Advanced Location Based Services in
4G Networks,” in Wireless Communications, Networking and Mobile Computing, 2007. WiCom
2007. International Conference on, 2007, pp. 6525–6528.
[3] I. K. Kim and J. H. Song, “Mobile Health reference architectures,” in Information Society (i-Society),
2013 International Conference on, 2013, pp. 158–164.
[4] Z. Yu, D. Zhang, and D. Yang, “Participant Selection for Offline Event Marketing Leveraging
Location-Based Social Networks.”
[5] K. Mohamed and D. Wijesekera, “A lightweight framework for web services implementations on
mobile devices,” in Mobile Services (MS), 2012 IEEE First International Conference on, 2012, pp.
64–71.
[6] M. Jansen, O. Hordt, and J. Milatovic, “About the development of scenarios for mobile Web Service
provisioning,” in Computer and Information Technology (WCCIT), 2013 World Congress on, 2013,
pp. 1–6.
[7] C. Chang, S. N. Srirama, and S. Ling, “An adaptive mediation framework for mobile P2P social
content sharing,” in Service-Oriented Computing, Springer, 2012, pp. 374–388.
[8] C. Chang, S. N. Srirama, and S. Ling, “SPiCa: a social private cloud computing application
framework,” in Proceedings of the 13th International Conference on Mobile and Ubiquitous
Multimedia, 2014, pp. 30–39.
[9] C. Chang, S. N. Srirama, and M. Liyanage, “A Service-Oriented Mobile Cloud Middleware
Framework for Provisioning Mobile Sensing as a Service,” in Parallel and Distributed Systems
(ICPADS 2015) , 21st IEEE International Conference on, 2015.
[10] C. Chang, S. W. Loke, H. Dong, F. Salim, S. N. Srirama, M. Liyanage, and S. Ling, “An energy-
efficient inter-organizational wireless sensor data collection framework,” in Web Services (ICWS),
2015 IEEE International Conference on, 2015, pp. 639–646.
[11] M. Liyanage, C. Chang, and S. N. Srirama, “Lightweight Mobile Web Service Provisioning for
Sensor Mediation,” in Mobile Services (MS), 2015 IEEE International Conference on, 2015, pp. 57–
64.
[12] Z. Shelby, B. Frank, and D. Sturek, “Constrained Application Protocol (CoAP) draft-shelby-core-
coap-00,” Online at http://tools. ietf. org/html/draft-shelby-core-coap-01, 2010.
[13] Bluetooth SIG, “Bluetooth Low Energy.” .
[14] “Efficient XML Interchange (EXI) Format 1.0 (Second Edition).” [Online]. Available:
http://www.w3.org/TR/2014/REC-exi-20140211/.
[15] S. Berger, S. McFaddin, C. Narayanaswami, and M. Raghunath, “Web services on mobile devices-
implementation and experience,” in Mobile Computing Systems and Applications, 2003. Proceedings.
Fifth IEEE Workshop on, 2003, pp. 100–109.
[16] S. N. Srirama, M. Jarke, and W. Prinz, “Mobile Host: A Feasibility Analysis of Mobile Web Service
Provisioning.,” in UMICS, 2006.
18. International Journal of UbiComp (IJU), Vol.8, No.1, January 2017
34
[17] S. N. Srirama and M. Jarke, “Mobile hosts in enterprise service integration,” Int. J. Web Eng.
Technol., vol. 5, no. 2, pp. 187–213, 2009.
[18] R. K. Lomotey, Y. Chai, K. A. Ahmed, and R. Deters, “Web Services Mobile Application for
Geographically Dispersed Crop Farmers,” in Computational Science and Engineering (CSE), 2013
IEEE 16th International Conference on, 2013, pp. 151–158.
[19] R. K. Lomotey, S. Jamal, and R. Deters, “SOPHRA: a mobile web services hosting infrastructure in
mHealth,” in Mobile Services (MS), 2012 IEEE First International Conference on, 2012, pp. 88–95.
[20] S. Srirama and W. Prinz, “Concept, implementation and performance testing of a mobile Web Service
provider for smart phones,” phdthesis, Master’s thesis, RWTH Aachen, Germany.(Cited on pages 2,
35, 36 and 45.), 2004.
[21] G. Gehlen and L. Pham, “Mobile web services for peer-to-peer applications,” in Consumer
Communications and Networking Conference, 2005. CCNC. 2005 Second IEEE, 2005, pp. 427–433.
[22] S. N. Srirama, “Publishing and discovery of mobile web services in peer to peer networks,” arXiv
Prepr. arXiv1007.2980, 2010.
[23] S. N. Srirama, M. Jarke, H. Zhu, and W. Prinz, “Scalable mobile web service discovery in peer to
peer networks,” in Internet and Web Applications and Services, 2008. ICIW’08. Third International
Conference on, 2008, pp. 668–674.
[24] Z. Ou, M. Song, H. Chen, and J. Song, “Layered peer-to-peer architecture for mobile web services via
converged cellular and ad hoc networks,” in Grid and Pervasive Computing Workshops, 2008. GPC
Workshops’ 08. The 3rd International Conference on, 2008, pp. 195–200.
[25] Y.-S. Kim and K.-H. Lee, “A lightweight framework for mobile web services,” Comput. Sci. Dev.,
vol. 24, no. 4, pp. 199–209, 2009.
[26] C. Chang, S. Ling, and S. Krishnaswamy, “Promws: Proactive mobile web service provision using
context-awareness,” in Pervasive Computing and Communications Workshops (PERCOM
Workshops), 2011 IEEE International Conference on, 2011, pp. 69–74.
[27] S. N. Srirama and C. Paniagua, “Mobile web service provisioning and discovery in android days,” in
Proceedings of the 2013 IEEE Second International Conference on Mobile Services, 2013, pp. 15–22.
[28] C. van der Westhuizen and M. Coetzee, “A framework for provisioning restful services on mobile
devices,” in Adaptive Science and Technology (ICAST), 2013 International Conference on, 2013, pp.
1–7.
[29] G. Moritz, F. Golatowski, C. Lerche, and D. Timmermann, “Beyond 6LoWPAN: Web services in
wireless sensor networks,” Ind. Informatics, IEEE Trans., vol. 9, no. 4, pp. 1795–1805, 2013.
[30] C. Doukas, L. Capra, F. Antonelli, E. Jaupaj, A. Tamilin, and I. Carreras, “Providing generic support
for IoT and M2M for mobile devices,” in Computing & Communication Technologies-Research,
Innovation, and Vision for the Future (RIVF), 2015 IEEE RIVF International Conference on, 2015,
pp. 192–197.
[31] S. N. Srirama, “MWSMF: A mediation framework for mobile hosts and enterprise on cloud,” Int. J.
Pervasive Comput. Commun., vol. 7, no. 4, pp. 316–338, 2011.
[32] A. P. Castellani, M. Gheda, N. Bui, M. Rossi, and M. Zorzi, “Web Services for the Internet of Things
through CoAP and EXI,” in Communications Workshops (ICC), 2011 IEEE International Conference
on, 2011, pp. 1–6.
[33] Z. Shelby, “Embedded web services,” IEEE Wirel. Commun., vol. 17, no. 6, p. 52, 2010.
[34] R. T. Fielding, “Architectural styles and the design of network-based software architectures,”
phdthesis, University of California, Irvine, 2000.
[35] F. AlShahwan and K. Moessner, “Providing soap web services and restful web services from mobile
hosts,” in Internet and Web Applications and Services (ICIW), 2010 Fifth International Conference
on, 2010, pp. 174–179.
[38] S. N. Srirama and M. Liyanage, “Tcp hole punching approach to address devices in mobile
networks,” in 2014 2nd International Conference on Future Internet of Things and Cloud (FiCloud),
2014, pp. 90–97.