ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
Efficient architectural framework of cloud computing Souvik Pal
Cloud computing is that enables adaptive, favorable and on-demand network access to a collective pool of adjustable and configurable computing physical resources which networks, servers, bandwidth, storage that can be swiftly provisioned and released with negligible supervision endeavor or service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. However, clouds are Internet-based concept and try to disguise complexity overhead for end users. Cloud service providers (CSPs) use many structural designs combined with self-service capabilities and ready-to-use facilities for computing resources, which are enabled through network infrastructure especially the internet which is an important consideration. This paper provides an efficient architectural Framework for cloud computing that may lead to better performance and faster access.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
Swiftly increasing demand of computational
calculations in the process of business, transferring of files
under certain protocols and data centers force to develop an
emerging technology cater to the services for computational
need, highly manageable and secure storage. To fulfill these
technological desires cloud computing is the best answer by
introducing various sorts of service platforms in high
computational environment. Cloud computing is the most
recent paradigm promising to turn around the vision of
“computing utilities” into reality. The term “cloud
computing” is relatively new, there is no universal agreement
on this definition. In this paper, we go through with different
area of expertise of research and novelty in cloud computing
domain and its usefulness in the genre of management. Even
though the cloud computing provides many distinguished
features, it still has certain sorts of short comings amidst with
comparatively high cost for both private and public clouds. It
is the way of congregating amasses of information and
resources stored in personal computers and other gadgets
and further putting them on the public cloud for serving
users. Resource management in a cloud environment is a
hard problem, due to the scale of modern data centers, their
interdependencies along with the range of objectives of the
different actors in a cloud ecosystem. Cloud computing is
turning to be one of the most explosively expanding
technologies in the computing industry in this era. It
authorizes the users to transfer their data and computation to
remote location with minimal impact on system performance.
With the evolution of virtualization technology, cloud
computing has been emerged to be distributed systematically
or strategically on full basis. The idea of cloud computing has
not only restored the field of distributed systems but also
fundamentally changed how business utilizes computing
today. Resource management in cloud computing is in fact a
typical problem which is due to the scale of modern data
centers, the variety of resource types and their inter
dependencies, unpredictability of load along with the range of
objectives of the different actors in a cloud ecosystem.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Advancement in computing facilities marks back from 1960’s with introduction of mainframes. Each of the computing has one or the other issues, so keeping this in mind cloud computing was introduced. Cloud computing has its roots in older technologies such as hardware virtualization, distributed computing, internet technologies, and autonomic computing. Cloud computing can be described with two models, one is service model and second is deployment model. While providing several services, cloud management’s primary role is resource provisioning. While there are several such benefits of cloud computing, there are challenges in adopting public clouds because of dependency on infrastructure that is shared by many enterprises. In this paper, we present core knowledge of cloud computing, highlighting its key concepts, deployment models, service models, benefits as well as security issues related to cloud data. The aim of this paper is to provide a better understanding of the cloud computing and to identify important research directions in this field
A Survey of Cloud Computing Approaches, Business Opportunities, Risk Analysis...Eswar Publications
In recent years, cloud computing become mainstream technology in IT industry offering new trends to software,
platform and infrastructure as a service over internet on a global scale by centralizing storage, memory and bandwidth. This new technology raises some new opportunities in producing different business operations which influence some new business benefits also some different risks issues are involved using cloud computing. This paper attempts to identify cloud computing approaches, highlights its business opportunities and help cloud computing user to analysis the cloud computing risks and to produce different solving approaches. This paper is targeted towards business and IT leaders considering a move to the cloud for some or all of their business applications.
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDijccsa
Nowadays, the demand of using resources, using services via the intranet system or on the Internet is rapidly growing. The respective problem coming is how to use these resources effectively in terms of time and quality. Therefore, the network QoS and its economy are people concerns, cloud computing was born in an inevitable trend. However, managing resources and scheduling tasks in virtualized data centres on the cloud are challenging tasks. Currently, there are a lot of Load Balancing algorithms applied in clouds and proposed by many authors, scholars, and experts. These existing methods are more about natural and heuristic, but the application of AI, or modern datamining technologies, in load balancing is not too popular due to the different characteristics of cloud. In this paper, we propose an algorithm to reduce the processing time (makespan) on cloud computing, helping the load balancing work more efficiency. Here, we use the SVM algorithm to classify the coming Requests, K - Mean to cluster the VMs in cloud, then the LB will allocate the requests into the VMs in the most reasonable way. In this way, request with the least processing time will be allocated to the VMs with the lowest usage. We name this new proposal as MCCVA - Makespan Classification & Clustering VM Algorithm. We have experimented and evaluated this algorithm in CloudSim, a cloud simulation environment, we obtained better results than some other wellknown algorithms. With this MCCVA, we can see the big potential of AI and datamining in Load Balancing, we can further develop LB with AI to achieve better and better results of QoS.
Cloud computing is envisioned as the next generation architecture for IT Enterprises, and has proliferated itself due to the advantages it provides.Cloud computing provides solutions for carrying out efficient, scalable and low cost computing. The pay per usage concept of Cloud computing increases the resource utilisation of a vendor’s computing power and resources; at the same time,it results in reduced hardware costs forits users. It also provides access mobility, easier maintenance, scalabilityand operability in terms of its management and usage. Because of the facilities and solutions it provides to the industry for the next generation computing, it is vulnerable to a variety of known and unknown attacks from attackers.Hence, securinga Cloud environment is a critical problem that needs urgent attention.This articlefocuses on a taxonomy of possible attacks on a Cloud environment and a taxonomy of the defence .The attack taxonomy describes existing threats on Cloud security, and the defence taxonomy gives a classification of the various counter measures that can be taken to protect the Cloud environment from such attacks. The aim of this article is to provideresearchers, academicians and industry with a better understanding of existing attacks and defence mechanisms on Cloud security.This is to provide a clearvision of the challenges that should be worked onto ensure next generation security forCloud computing.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
M2C2: A Mobility Management System For Mobile Cloud ComputingKaran Mitra
Mobile devices have become an integral part of our daily lives. Applications
running on these devices may avail storage and compute resources from
the cloud(s). Further, a mobile device may also connect to heterogeneous
access networks (HANs) such as WiFi and LTE to provide ubiquitous
network connectivity to mobile applications. These devices have limited
resources (compute, storage and battery) that may lead to service
disruptions. In this context, mobile cloud computing enables offloading
of computing and storage to the cloud. However, applications running
on mobile devices using clouds and HANs are prone to unpredictable
cloud workloads, network congestion and handoffs. To run these applications
efficiently the mobile device requires the best possible cloud and
network resources while roaming in HANs. This paper proposes, develops
and validates a novel system called M2C2 which supports mechanisms
for: i.) multihoming, ii.) cloud and network probing, and iii.) cloud
and network selection. We built a prototype system and performed extensive
experimentation to validate our proposed M2C2. Our results
analysis shows that the proposed system supports mobility efficiently
in mobile cloud computing.
Paper can be downloaded from: http://karanmitra.me/wp-content/uploads/2015/02/MitraetalLTUWCNC_Preprint2015.pdf
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Secured Communication Model for Mobile Cloud Computingijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Now a days the work is being done by hiring the space and resources from the cloud providers in order to do work effectively and less costly. This paper describes the cloud, its challenges, evolution, attacks along with the approaches required to handle data on cloud. The practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. The need of this review paper is to provide the awareness of the current emerging technology which saves the cost of users.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
Advance Computing Paradigm with the Perspective of Cloud Computing-An Analyti...Eswar Publications
Internet has been a driving force towards the various technologies that have been developed. Arguably, one of the
most discussed among all of these is Cloud Computing. Cloud computing is seen as a trend in the present day scenario with almost all the organizations trying to make an entry into it. It is a promising and emerging technology for the next generation of IT applications. This paper presents the evolution, history, and definition of cloud computing and also presents a comprehensive analysis of the cloud computing by explaining its services and deployment models, and identifying various characteristics of concern.
Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision-Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
MCCVA: A NEW APPROACH USING SVM AND KMEANS FOR LOAD BALANCING ON CLOUDijccsa
Nowadays, the demand of using resources, using services via the intranet system or on the Internet is rapidly growing. The respective problem coming is how to use these resources effectively in terms of time and quality. Therefore, the network QoS and its economy are people concerns, cloud computing was born in an inevitable trend. However, managing resources and scheduling tasks in virtualized data centres on the cloud are challenging tasks. Currently, there are a lot of Load Balancing algorithms applied in clouds and proposed by many authors, scholars, and experts. These existing methods are more about natural and heuristic, but the application of AI, or modern datamining technologies, in load balancing is not too popular due to the different characteristics of cloud. In this paper, we propose an algorithm to reduce the processing time (makespan) on cloud computing, helping the load balancing work more efficiency. Here, we use the SVM algorithm to classify the coming Requests, K - Mean to cluster the VMs in cloud, then the LB will allocate the requests into the VMs in the most reasonable way. In this way, request with the least processing time will be allocated to the VMs with the lowest usage. We name this new proposal as MCCVA - Makespan Classification & Clustering VM Algorithm. We have experimented and evaluated this algorithm in CloudSim, a cloud simulation environment, we obtained better results than some other wellknown algorithms. With this MCCVA, we can see the big potential of AI and datamining in Load Balancing, we can further develop LB with AI to achieve better and better results of QoS.
Cloud computing is envisioned as the next generation architecture for IT Enterprises, and has proliferated itself due to the advantages it provides.Cloud computing provides solutions for carrying out efficient, scalable and low cost computing. The pay per usage concept of Cloud computing increases the resource utilisation of a vendor’s computing power and resources; at the same time,it results in reduced hardware costs forits users. It also provides access mobility, easier maintenance, scalabilityand operability in terms of its management and usage. Because of the facilities and solutions it provides to the industry for the next generation computing, it is vulnerable to a variety of known and unknown attacks from attackers.Hence, securinga Cloud environment is a critical problem that needs urgent attention.This articlefocuses on a taxonomy of possible attacks on a Cloud environment and a taxonomy of the defence .The attack taxonomy describes existing threats on Cloud security, and the defence taxonomy gives a classification of the various counter measures that can be taken to protect the Cloud environment from such attacks. The aim of this article is to provideresearchers, academicians and industry with a better understanding of existing attacks and defence mechanisms on Cloud security.This is to provide a clearvision of the challenges that should be worked onto ensure next generation security forCloud computing.
Cost Benefits of Cloud vs. In-house IT for Higher EducationCSCJournals
Cloud Computing is an excellent alternative for Higher Education in a resource limited setting. Universities should take advantage of available cloud-based application offered by service providers and enable their own user/student to perform business and academic tasks. In this paper, we will compare the cost between on-premise options and Cloud Computing. Two cost estimates will be created, the firstfor building and setting up IT infrastructure in-house in Federal University of Technology (FUTO), Nigeria while the second cost estimate will be for setting up IT in the cloud for the same Institution.This will enable us know the cost benefit cloud has over onpremise in setting up IT in Higher Educations.
M2C2: A Mobility Management System For Mobile Cloud ComputingKaran Mitra
Mobile devices have become an integral part of our daily lives. Applications
running on these devices may avail storage and compute resources from
the cloud(s). Further, a mobile device may also connect to heterogeneous
access networks (HANs) such as WiFi and LTE to provide ubiquitous
network connectivity to mobile applications. These devices have limited
resources (compute, storage and battery) that may lead to service
disruptions. In this context, mobile cloud computing enables offloading
of computing and storage to the cloud. However, applications running
on mobile devices using clouds and HANs are prone to unpredictable
cloud workloads, network congestion and handoffs. To run these applications
efficiently the mobile device requires the best possible cloud and
network resources while roaming in HANs. This paper proposes, develops
and validates a novel system called M2C2 which supports mechanisms
for: i.) multihoming, ii.) cloud and network probing, and iii.) cloud
and network selection. We built a prototype system and performed extensive
experimentation to validate our proposed M2C2. Our results
analysis shows that the proposed system supports mobility efficiently
in mobile cloud computing.
Paper can be downloaded from: http://karanmitra.me/wp-content/uploads/2015/02/MitraetalLTUWCNC_Preprint2015.pdf
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
International Journal of Business and Management Invention (IJBMI) is an international journal intended for professionals and researchers in all fields of Business and Management. IJBMI publishes research articles and reviews within the whole field Business and Management, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGijistjournal
Mobile device has become essential part of human life. Apart from call and receive functions, user can access many function in his/her mobile. A user wants everything on his/her mobile device for the ease of work. Some people use tablets instead of laptop or desktop. In this paper, insights into Mobile Cloud Computing (MCC) are presented. First overview of cloud computing system is discussed. Then after architecture of MCC is presented. Some applications based on MCC are also discussed and paper is concluded by exploring the problems and solutions of these in MCC.
Opportunistic job sharing for mobile cloud computingijccsa
Cloud Computing is the evolution of new business era which is covered with many of technologies.These
technology are taking advantage of economies of scale and multi tenancy which are used to decrees the
cost of information technology resources. Many of the organization are eager to reduce their computing
cost through the means of virtualization. This demand of reducing the computing cost and time has led to
the innovation of Cloud Computing. Itenhanced computing through improved deployment and
infrastructure costs and processing time. Mobile computing & its applications in smart phones enable a
new, rich user experience. Due to extreme usage of limited resources in smart phones it create problems
which are battery problems, memory space and CPU. To solve this problem, we propose a dynamic mobile
cloud computing architecture framework to use global resources instead of local resources. In this
proposed framework the usefulness of job sharing workload at runtime reduces the load at the local client
and the dynamic throughput time of the job through Wi-Fi Connectivity.
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
A Virtualization Model for Cloud ComputingSouvik Pal
Cloud Computing is now a very emerging field in the IT industry as well as research field. The advancement of Cloud Computing came up due to fast-growing usage of internet among the people. Cloud Computing is basically on-demand network access to a collection of physical resources which can be provisioned according to the need of cloud user under the supervision of Cloud Service provider interaction. From business prospective, the viable achievements of Cloud Computing and recent developments in Grid computing have brought the platform that has introduced virtualization technology into the era of high performance computing. Virtualization technology is widely applied to modern data center for cloud computing. Virtualization is used computer resources to imitate other computer resources or whole computers. This paper provides a Virtualization model for cloud computing that may lead to faster access and better performance. This model may help to combine self-service capabilities and ready-to-use facilities for computing resources.
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...IJERD Editor
The development of cloud computing and mobility,mobile cloud computing has emerged and
become a focus of research. By the means of on-demand self-service and extendibility, it can offer the
infrastructure, platform, and software services in a cloud to mobile users through the mobile network. Security
and privacy are the key issues for mobile cloud computing applications, and still face some enormous
challenges. In order to facilitate this emerging domain, we firstly in brief review the advantages and system
model of mobile cloud computing, and then pay attention to the security and privacy in the mobile cloud
computing. MCC provides a platform where mobile users make use of cloud services on mobile devices. The
use of MCC minimizes the performance, compatibility, and lack of resources issues in mobile computing
environment. By deeply analyzing the security and privacy issues from three aspects: mobile terminal, mobile
network and cloud, we give the current security and privacy approaches. The users of MCC are still below
expectations because of the associated risks in terms of security and privacy. These risks are playing important
role by preventing the organizations to adopt MCC environment. Significant amount of research is in progress in
order to reduce the security concerns but still a lot work has to be done to produce a security prone MCC
environment. This paper presents a comprehensive literature review of MCC and its security issues,challenges
and possible solutions for the security issues.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
Addressing Security Issues and Challenges in Mobile Cloud ComputingEditor IJCATR
The emergence of cloud computing has brought tremendous impact on software organizations and software architecture design. With the development of cloud computing and mobile internet, mobile cloud computing is becoming a new mode of application. With the widespread development of mobile applications and advances in mobile cloud computing, some other forms of requirements and security issues have been emerged. Mobile cloud computing provides resources residing over cloud and services provided for mobile devices. These resources and services from cloud are available for mobile user over their mobile devices. It also provides benefits for developing specialized mobile applications for them. However, increased security and privacy risks exists due to data outsourcing and synchronization over the Internet. This research paper provides the review on mobile cloud computing, its security issues, challenges and suggests some solutions.
Introduction to Cloud Computing and Cloud InfrastructureSANTHOSHKUMARKL1
Introduction, Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud vulnerabilities, Cloud computing at Amazon, Cloud computing the Google perspective, Microsoft Windows Azure and online services, Open-source software platforms for private clouds.
starts with an introduction to mobile cloud computing with a definition, architecture, and advantages/disadvantages. At the next sections, continues with the applications of MCC, detailed challenges in mobile environment and solutions. Lastly the document concludes the main issues about the mobile cloud computing with the conclusion part.
In recent years, mobile devices such as smart phones, tablets empowered with tremendous
technological advancements. Augmenting the computing capability to the distant cloud help us
to envision a new computing era named as mobile cloud computing (MCC). However, distant
cloud has several limitations such as communication delay and bandwidth which brings the idea
of proximate cloud of cloudlet. Cloudlet has distinct advantages and is free from several
limitations of distant cloud. However, limited resources of cloudlet negatively impact the
cloudlet performance with the increasing number of substantial users. Hence, cloudlet is a
viable solution to augment the mobile device task to the nearest small scale cloud known as
cloudlet. However, this cloudlet resource is finite which in some point appear as resource
scarcity problem. In this paper, we analyse the cloudlet resource scarcity problem on overall
performance in the cloudlet for mobile cloud computing. In addition, for empirical analysis, we
make some definitions, assumptions and research boundaries. Moreover, we experimentally
examine the finite resource impact on cloudlet overall performance. By, empirical analysis, we
explicitly establish the research gap and present cloudlet finite resource problem in mobile
cloud computing. In this paper, we propose a Performance Enhancement Framework of
Cloudlet (PEFC) which enhances the finite resource cloudlet performance. Our aim is to
increase the cloudlet performance with this limited cloudlet resource and make the better user
experience for the cloudlet user in mobile cloud computing.
Research on Mobile Cloud Computing Review,Trend and Perspec.docxaudeleypearl
Research on Mobile Cloud Computing: Review,
Trend and Perspectives
Han Qi
Faculty of Computer Science and Information Technology
University of Malaya
Kuala Lumpur, Malaysia
[email protected]
Abdullah Gani
Faculty of Computer Science and Information Technology
University of Malaya
Kuala Lumpur, Malaysia
[email protected]
Abstract—Mobile Cloud Computing (MCC) which combines
mobile computing and cloud computing, has become one of
the industry buzz words and a major discussion thread in the
IT world since 2009. As MCC is still at the early stage of
development, it is necessary to grasp a thorough understanding
of the technology in order to point out the direction of future
research. With the latter aim, this paper presents a review on
the background and principle of MCC, characteristics, recent
research work, and future research trends. A brief account on the
background of MCC: from mobile computing to cloud computing
is presented and then followed with a discussion on characteristics
and recent research work. It then analyses the features and
infrastructure of mobile cloud computing. The rest of the paper
analyses the challenges of mobile cloud computing, summary
of some research projects related to this area, and points out
promising future research directions.
Keywords—Mobile Cloud Computing; Mobile Computing;
Cloud Computing; Research Directions.
I. INTRODUCTION
Over the past few years, advances in the field of network
based computing and applications on demand have led to
an explosive growth of application models such as cloud
computing, software as a service, community network, web
store, and so on. As a major application model in the era of the
Internet, Cloud Computing has become a significant research
topic of the scientific and industrial communities since 2007.
Commonly, cloud computing is described as a range of ser-
vices which are provided by an Internet-based cluster system.
Such cluster systems consist of a group of low-cost servers or
Personal Computers (PCs), organizing the various resources
of the computers according to a certain management strategy,
and offering safe, reliable, fast, convenient and transparent
services such as data storage, accessing and computing to
clients. According to the top ten strategic technology trends
for 2012 [1] provided by Gartner (a famous global analytical
and consulting company), cloud computing has been on the
top of the list, which means cloud computing will have an
increased impact on the enterprise and most organizations in
2012.
Meanwhile, smartphones are considered as the representa-
tive for the various mobile devices as they have been connected
to the Internet with the rapidly growing of wireless network
technology. Ubiquity and mobility are two major features
in the next generation network which provides a range of
personalized network services through numerous network ter-
minals and modes of accessing. The core technology of cloud
computing is centralizing computing, service ...
Steganography methods using network protocolsDr Amira Bibo
The covert channels of type covert storage channels were used in this research to
hide textual data or an (image hiding secrete data) in the transmission protocol layer and
the internet protocol layer of TCP/IP module. We use IP protocol in designing covert
channel by using Identification field, and use TCP protocol in designing covert channel
by using Urgent Pointer field, and UDP by using Source Port field. Finally ICMP
protocol by using Echo request message and Message field.
The result of Covert channel after analyzing the protocols (IP, TCP, UDP,
ICMP) header depends on the field that used in the designing the Covert channel. The
access ratio of hidden data in the two protocols TCP/IP was %100. UDP protocol on the
other hand depends on a mechanism of unsafe communication. ICMP protocol provided
a good transmission, though unreliable, in that the message structure can be unreliable
or clear.
An investigation for steganography using different color systemDr Amira Bibo
ABSTRACT
Steganographic techniques are generally used to maintain the confidentiality of
valuable information and to protect it from any possible theft or unauthorized use
especially over the internet. In this paper, Least Significant Bit LSB-based
Steganographic techniques is used to embed large of data in different color space
models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by
transforming the RGB value of the secret image pixels into three separate components
into the pixels of the cover image.
The measures (MSE, SNR, PSNR) were used to compare between the color
space models, the comparisons proved that steganography with color systems (RGB
and HIS) shown a best results.
ABSTRACT
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not. It is important to say that there are differences between mobile devices and PC machines in resource management mechanism, the security solutions for computer malware are not compatible with mobile devices. Consequently, the anti-malware organizations and academic researchers have produced and proposed many security methods and mechanisms in order to recognize and classify the security threat of the Android operating system. By means of the proposed methods are different from one to another, they can be arranged into various classifications. In this review paper, the present Android security threats is discussed and present security proposed solutions and attempt to classify the proposed solutions and evaluate them.
Supervised classification and improved filtering method for shoreline detection.Dr Amira Bibo
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection andthe Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,the image undergoes image classification process by using Support Vector Machine. The proposed method performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmDr Amira Bibo
In this paper, scheduling dependent threads in distributed real-time
system where considered. We present a distributed real-time
scheduling algorithm called (EOE-DRTSA (end-to-end distributed
real time system Scheduling algorithm)). Now a day completed realtime
systems are distributed. One of least developed areas of realtime
scheduling is distributed scheduling where in Distributed
systems action and information timeliness is often end-to-end.
Designers and users of distributed systems often need to dependably
reason about end-to-end timeliness. Our scheduling model includes
threads and their time constraints depend on developed DTUF value
and maintaining end-to-end prosperities of distributed real-time
system.
Developing fault tolerance integrity protocol for distributed real time systemsDr Amira Bibo
In the distributed real time systems, tasks must meet their deadline even in the
presence of hardware/software faults. Fault tolerance in distributed real time systems
refers to the ability of the system to meet the tasks deadline and to detect their failure
and recover them. In this paper, we considered the problem of fault tolerance and
developed a fault tolerance protocol called DRT-FTIP (Distributed Real Time – Fault
Tolerance Integrity Protocol).This protocol increases the integrity of the scheduling in
distributed real time systems.
Constructing sierpinski gasket using gp us arraysDr Amira Bibo
A fractal is a mathematical set that typically displays self-similar
patterns, which means it is "the same from near as from far".
Fractals may be exactly the same at every scale, they may be
nearly the same at different scales. The concept of fractal extends
beyond trivial self-similarity and includes the idea of a detailed
pattern repeating itself. The algorithms to constructing different
fractal shapes in many cases typically involve large amounts of
floating point computation, to which modern GPUs are well
suited. In this paper we will construct Sierpinski Gasket using
GPUs arrays.
ABSTRACT
Shoreline monitoring is important to overcome the problems in the measurement of the shoreline. Recently,
many researchers have directed attention to methods of predicting shoreline changes by the use of
multispectral images. However, the images being captured tend to have several problems due to the weather.
Therefore, identification of multi class features which includes vegetation and shoreline using multispectral
satellite image is one of the challenges encountered in the detection of shoreline. An efficient framework
using the near infrared–histogram equalisation and improved filtering method is proposed to enhance the
detection of the shoreline in Tanjung Piai, Malaysia, by using SPOT-5 images. Sub-pixel edge detection and
the Wallis filter are used to compute the edge location with the subpixel accuracy and reduce the noise. Then,
the image undergoes image classification process by using Support Vector Machine. The proposed method
performed more effectively and reliable in preserving the missing line of the shoreline edge in the SPOT-5
images.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
2. Original article | doi: 10.25007/ajnu.v6n3a96
130 Academic Journal of Nawroz University (AJNU)
its inherent confinements. MCC is a computing worldview
which causes the mobile gadget to get to and prepare
petabytes of information and run calculation concentrated
applications which generally would have been
incomprehensible because of the impediments of the
gadget [14]. This paper review the resent papers in mobile
cloud computing and the common concepts and issues in
its context. The rest of the paper is structured as follows: in
section II we reviewed the most recent papers in this
domain. In section III we illustrate the meaning of Cloud
computing and mobile cloud computing. In section IV we
illustrated the architecture of MCC, and then the
advantages and the challenges of MCC are argued in
section V and VI In sequence. Finally, we concluded in
section VII.
Fig.1 Mobile Cloud Computing Architecture
II. LITERATURE REVIEW
In this section we reviewed resent papers that they discus
different issues in Mobile Cloud Computing (MCC).
In [1] the concentration is on analysing security issues in
Mobile Cloud Computing (M2C). A generic model is
initially described for M2C that relies on utilizing case
scenarios description. Next, the security intimidations are
evaluated faced to the proposed model. This will be helpful
for indicating the collection of security needs to frustrate
the attacks and security threats. Additionally an
observation is argued regarding to the model.
In [2] a middleware is suggested for making choices and
adjusting cloud services consistent with recent user’s
context, it collects context of data as of mobile gadgets, such
as location. Next, a service is chosen regarding to the
accessible cloud services and clients’ desires. In addition,
the client’s acceptable cost is consumed which provides
more precise information to make a enhanced selection of
the service supplier. Moreover, in this paper, the
architecture of middleware is provided with the
explanation of the interaction among its modules. Finally,
an experiment is presented to assess the suggested
middleware.
In [3] the most common problems in Mobile cloud
computing is discussed with presenting the related works
in this field. The duty is organized into three offloading
operation types: anchored in a client-server
communication, virtualization, or else various arranged
mobile agents, converse in brief every one’s benefits /
drawbacks and provide paradigms of some operations.
After that, a little of papers’ influence is assigned for
utilizing mobile-devices as the source meant for an ad-hoc
cloud computing. The last part of the paper states a
substitute Map-Reduce based method for structure a
virtual cloud computing supplier, one’s
benefits/drawbacks, and instances of operations.
In [4] a “multisite computation offloading solution” is
presented in mobile cloud computing surroundings by the
way of public and clouds as well as cloudlets. The projected
method utilizes the genetic algorithm for discovering a
sufficient offloading clarification in a appropriate mode.
The process of initialization the population, selection
techniques, generation making through the crossover
mechanism, and mutation process are organized as a result
the possibility of meet to the global best enhances. The
experimental result illustrates that the proposed solution
outstrips the recent literatures regarding to both
implementation time and energy expenditure.
In [5] indicated that “Tsai and Lo’s PAA” method is
susceptible to a crucial attack and is unable to maintain
client secrecy. To crack such crucial faults, the paper
suggested a new PAA system designed for MCC utilities.
Security investigation demonstrates that the suggested
PAA system be able to crack the security trouble belonging
to “Tsai and Lo’s PAA” method. Besides, the performance
analysis shows that our proposed PAA scheme has better
performance than their PAA scheme.
In [6] the most selectable offloading form is offered that
breaks up an application into many duties and offloads the
divided applications on the origin of their features and
implementation pattern. The offloading farm that is
recommended includes the origins of the main principles
belonging to Mobile Cloud Computing. Throughout
application offloading the projected form obtains into
deliberation the communication charge during to the
implementation charge of operating a duty on cloud.
3. Original article | doi: 10.25007/ajnu.v6n3a96
Academic Journal of Nawroz University (AJNU) 131
Duties operating on cloud or internally on the mobile
gadget are in fully sync with each other and swap
information that could perform like inputs for one and
output for the other.
In [7] a mobile agent is suggested to optimize big quantity
data broadcasting for mobile users in mobile cloud
computing. This agent provides a helpful gate for
decreasing energy exploitation and decline waiting time.
The agent optimization technique is applied as well as
performed some experimentation on Android platform.
The tentative consequence points that the proposed system
does considerably develop energy effectiveness and
performance for huge quantity of data broadcasting in
mobile cloud computing.
In [8] a new design of energy optimization technique is
proposed for Mobile Cloud Computing (MCC) named
“Organic Mobile Cloud Computing”. This scheme permits
other methods to be remarked and offloaded involuntarily
to Cloud Servers. The technique also clarify precedent
schemes to these troubles that depended greatly on
programmer sustain to separate the application, they do
not obtain into deliberation the enormous computation
owing to permanent profiling. Moreover, The proposed
scheme happens at runtime, that techniques have to be run
distantly from the list of techniques involuntarily
remarked, for this, organic computing schemes is
employed to generate optimum results.
In [9] stated that generally cloudlet based contributions
depend on the selection of a single resource for offloading
that provides appropriate network circumstance and
elevated computing abilities. The accomplishment of the
identified cloudlet could humiliate after a while, as a result
guides to the make selection again of another one to
complete flawless service stability. the paper suggested to
gain benefit of making selection of two cloudlets; the first
one is to certify appropriate network connection and the
second one is to certify elevated performance execution of
the application so as to maintain the mobile user ”Always
Best Connected and Served” (ABC&S) happening in both
stages: network and cloud. Initial consequence confirms the
effectiveness of the proposed method in preserving a
realistic response time contrast to other schemes based just
on latency parameter for selection.
In [10] the “mobile application offloading” is studied for
mobile cloud computing. For eliminating the energy
utilization of mobile gadgets, a user might offload the
mobile applications to access cloud servers. Nonetheless,
offloading applications to cloud servers earns additional
time for executing the mobile applications. To steadiness
the exchange between the energy utilization by the mobile
gadgets and the execution delay by the mobile applications,
a “novel optimization problem” is invented, which reduces
the total of energy utilization and delay consistent with an
assured weightage. At the beginning, is confirmed that the
described trouble is NP-hard. For a particular manner with
infinite energy ability of mobile gadgets and the equal
volume of the resources is necessary to perform all mobile
applications, they suggested a polynomial-time best result,
that is initiated on bipartite corresponding trouble. Next,
they have proposed a proficient heuristic technique in
support of the universal manner of the trouble.
III. CLOUD COMPUTING AND MOBILE CLOUD
COMPUTING
In this section we are discussing the meaning of the
concepts of Cloud computing and mobile cloud computing.
A. Cloud Computing
Cloud computing alludes to both the applications
conveyed as utilities over the Internet and the hardware
and system software through the datacenters that give
those utilities. A bunch of PC hardware and software that
propose the utilities to the overall population constitutes a
'public cloud'. Computing is in this manner proposed as
usefulness much like power, water, gas, and so forth
wherever you just pay for each utilization. For instance,
“Amazon’s Elastic cloud, Microsoft’s Azure platform,
Google’s App Engine and Salesforce” are some public
clouds that are accessible today. In any case, cloud
computing does exclude 'private clouds' which points to
“datacenter” to an association. Hence, cloud computing can
be characterized as the total of computing as a helpfulness
and software as a utility. Virtualization of assets is a key
prerequisite for a cloud supplier—for it is required by
statistical multiplexing that is needed by versatility of the
cloud and furthermore to make the fantasy of vast assets to
the cloud client. To acquire a case as of the current cloud
suppliers, an example of “Amazon's EC2” is especially
similar to a physical machine and provides the cloud client
satisfied permission of the software heap through a slight
API. This provides the client lots of adaptability in coding;
nonetheless, it likewise implies that Amazon has minimal
programmed versatility and collapse alternatives.
Interestingly, “Google's App Engine” implements an API
on the client however provides great programmed
adaptability and collapse alternatives. Microsoft's Azure
stage is something in the middle of the previously
mentioned suppliers by providing the client several
decisions to select in the language and provides fairly
programmed extent and collapse occupations. All of the
previously mentioned suppliers have diverse alternatives
for “virtualizing computation, storage, and
communication” [14].
B. Mobile Cloud Computing (MCC)
There are some existing meanings of mobile cloud
computing, we will introduce some of them. Usually, the
term mobile cloud computing intends to run an
application, for example, Google's Gmail for Mobile on a
remote asset rich server, while the mobile gadget goes
about as a thin customer interfacing over to the remote
server through 3G. Some different cases of this sort are
Facebook's area mindful services, Twitter for mobile,
mobile climate gadgets and so on. Another approach is to
consider other mobile gadgets themselves too as asset
4. Original article | doi: 10.25007/ajnu.v6n3a96
132 Academic Journal of Nawroz University (AJNU)
suppliers of the cloud making up a mobile peer-to-peer
network. Along these lines, the aggregate assets of the
different mobile gadgets in the neighborhood region, and
other stationary gadgets too if accessible, will be used. This
approach underpins client versatility and perceives the
capability of mobile clouds to do aggregate detecting too.
Peer-to-peer frameworks, for example, SATIN for mobile
self-sorting out exist, however these depend on part
demonstrate frameworks speaking to frameworks made up
of interoperable neighborhood segments as opposed to
offloading employments to nearby mobile assets. The
cloudlet idea proposed by Satyanarayanan is another way
to deal with mobile cloud computing. The mobile gadget
offloads its workload to a nearby "cloudlet" contained a few
multi-center PCs with availability to the remote cloud
servers. Fitting Computers can be viewed as great
contender for cloudlet servers as a result of their frame
factor, differing qualities, and low power utilization. They
have an indistinguishable general engineering from a
typical PC, however are less capable, littler, and more
affordable, making them perfect for part little scale servers
introduced in the general population framework. These
cloudlets would be arranged in like manner territories, for
example, cafés with the goal that mobile gadgets can
interface and capacity as a thin customer to the cloudlet
rather than a remote cloud server which would show
inactivity and transfer speed issues [11] [12] [14].
IV. MOBILE CLOUD COMPUTING ARCHITECTURE
In the present mobile cloud architecture, mobile gadgets
can access cloud benefits in two routes, i.e., through mobile
network or through access points, as appeared in Fig1.
In the mobile network case, the mobile gadgets, for
example, cell/satellite cell phones are associated with a
mobile network through a Base Station (BS) or by means of
a satellite link. Be that as it may, if the cell phones are not
furnished with a satellite correspondence module, at that
point outside satellite specialized gadgets are utilized. The
telecom networks are additionally associated with the
Internet and give Internet availability to the clients. Along
these lines, if the clients have mobile network availability,
the clients can access cloud based administrations through
the Internet. In the access point case, the mobile clients
interface with the access points through Wi-Fi that is
additionally associated with the Internet specialist
organization to give Internet network to the clients. Along
these lines, the mobile cloud clients are able to admission
cloud services lacking of using telecom administrations,
this might indict them for information activity. Besides, Wi-
Fi based associations give little idleness and devour fewer
vitality contrasted with 3G associations. Therefore, mobile
cloud clients want to utilize Wi-Fi Internet associations at
whatever point accessible-[11] [12] [14].
V. ADVANTAGE OF MOBILE CLOUD COMPUTING
Cloud computing is recognized to be a talented solution
for mobile processing because of a lot of causes. In the
accompanying, it portrays how the cloud can be utilized to
defeat hindrances in mobile computing, thus indicating
advantages of MCC.
a. Expanding Battery Lifetime
The battery is one of the major subjects for mobile
gadgets. Some arrangements are proposed to enhance the
CPU implementation as well as to administer the diskette
an intelligent mode for eliminating power consumption.
Nonetheless, these solutions need modifies through
construction in mobile gadgets, or they need hardware that
results in an increasing the cost and it is impossible for each
single mobile gadget. The offloading procedure is offered
by means of the goal to move the vast calculations as well
as compound computing as of asset restricted gadgets
(mobile gadgets) to ingenious machines (servers in clouds).
This refrains to have an extended application
implementation time on mobile gadgets because this
produce lot of energy consumption. The result shows that
the distant application implementation has ability to
maintain energy considerably [8] [12].
b. Enhancing data storage ability and processing
power
Storage ability is additionally a limitation for mobile
gadgets. MCC is produced to empower mobile abuser to
store/get to the vast information on the cloud through
wireless networks. The primary illustration is the Amazon
Simple Storage Service (Amazon S3) which bolsters record
storage benefit. Mobile snap sharing service allows
customers to transfer pictures to the clouds instantly
subsequent to catching. Thus the users are able to get all
pictures from any device. In the cloud, the clients have
ability to keep a lot of capacity and energy on their mobile
gadgets as every picture is sent and handled in clouds.
Facebook is the most excellent informal community
application in nowadays, and it is as well a run of the mill
case of utilizing the cloud in sharing pictures. Cloud
computing can productively bolster different assignments
for information warehousing, overseeing and
synchronizing numerous reports on the web. Mobile
applications likewise are not obliged by storage limit on the
gadgets in light of the fact that their information now is put
away in the cloud [8] [12].
c. Enhancing reliability
Putting away information or running applications on
clouds is a successful approach to enhance the reliability
since the application as well as the data are amassed moved
down in a variety of computer systems. This diminishes the
possibility of information and application lost on the
mobile gadgets. Furthermore, Mobile Cloud Computing is
planned like an extensive security data packet display for
both specialist co-ops and clients. For instance, the cloud
may operate to protected copyrighted advanced materials
(such as: videos, snips, and sound files) as of being bundle
with unapproved dispersion. Additionally, the cloud may
distantly furnish to the users with security utilities, such as,
infection checking, malevolent code location, and
5. Original article | doi: 10.25007/ajnu.v6n3a96
Academic Journal of Nawroz University (AJNU) 133
validation. Likewise, such cloud-based services of security
have ability to make proficient exploitation of the collected
record as of diverse users to develop the feasibility of the
services [8] [12].
Additionally, there are some more advantages that
Mobile Cloud Computing takes of clouds such as:
simplicity of Integration, Multi-tenancy, Scalability,
Dynamic provisioning, and so on.
VI. CHALLENGES IN MOBILE CLOUD COMPUTING
Several difficulties are confronted in mobile cloud
computing; a portion of the essential ones are talked about
in this section.
d. Network Latency
Mobile cloud computing confront troubles caused by the
network latency, due to the constraints and restricted
bandwidth of the wireless networks. Some applications,
video game, and concurrent applications for video calls
have need of least amount of network latency and
dependable bandwidth [11].
e. Security and privacy protection
This is an exceptional issue and the investigations are still
in the essential level. Main matters for computational
offloading in MCC are the insurance of area data and other
individual touchy data of clients. The information put
away in the cloud might be perused by the cloud specialist
co-op without the learning of information proprietor.
Moreover, the cloud supplier may not be trusted by all
methods and there is an extensive possibility of
information being caught by an unapproved client in spite
of the security measures attempted by the cloud supplier.
In this way, it is a test to understand the security and
privacy assurance of clients for computational offloading in
MCC [11] [15].
f. Various access mechanisms
The majority of the network systems are varied in
nowadays. They are sent with different advances, for
example, 3G, Wi-Fi, Wi-Max and so on. Mobile cloud
computing needs to be always-on, even on-demand
accessible remote connections with adaptable bandwidth
and vitality productive gadgets [11].
VII. CONCLUSION
Mobile cloud computing is a rising and quickly developing
field of cloud computing. The goal of this innovation is to
utilize services, storage space, or applications on the cloud
by mobile gadgets. Mobile cloud computing will give
advantage to clients and undertakings all-round the world.
The quantity of mobile clients has been expanded radically
since couple of years, the number of utilizations have been
increased for mobile applications. Even though mobile
cloud computing provides many points of interest and
convenience of services on mobile gadgets,
notwithstanding, many difficulties are been confronted by
this innovation. In this paper, we reviewed the recent
researches associated with Mobile Cloud Computing.
Firstly, we illustrate the concepts of Cloud computing and
then utilizing this technique for mobile devices. Second, we
reviewed most recent papers associated with this Mobile
Cloud Computing. After that we discussed the meaning of
cloud computing and mobile cloud computing. The
architecture of Mobile Cloud Computing is also presented.
Finally, we discussed the advantages and challenges of
mobile cloud computing.
REFERENCES
[1] A. H. Gamlo, N. Zhang, and O. Bamasag, “Mobile
Cloud Computing : Security Analysis,” IEEE Int.
Conf. Mob. Cloud Comput. Serv. Eng. Mob., 2017.
[2] H. Bangui, S. Rakrak, and S. Raghay, “Selecting
Location-based services in mobile cloud
computing,” 2016 11th Int. Conf. (pp. 1-5). IEEE,
2016.
[3] C. Barca, C. Barca, C. Cucu, O. Fratu, and S.
Halunga, “A Virtual Cloud Computing Provider
for Mobile Devices,” 2016 8th Int. Conf. (pp. 1-4).
IEEE., 2016.
[4] M. Goudarzi and Z. Movahedi, “Mobile Cloud
Computing : A Multisite Computation
Offloading,” 2016 8th Int. Symp. (pp. 660-665).
IEEE, pp. 660–665, 2016.
[5] D. He, N. Kumar, M. K. Khan, L. Wang, and J.
Shen, “Efficient Privacy-Aware Authentication
Scheme for Mobile Cloud Computing Services,”
IEEE Syst. J., pp. 1–11, 2016.
[6] A. Khanna, A. Kero, and D. Kumar, “Mobile Cloud
Computing Architecture for Computation
Offloading,” Next Gener. Comput. Technol.
(NGCT), 2016 2nd Int. Conf. (pp. 639-643). IEEE,
2016.
[7] X. Li and Q. Li, “DTM: a new data transmission
method in mobile cloud computing ,” Adv. Cloud
Big Data (CBD), 2016 Int. Conf. (pp. 252-257). IEEE,
pp. 252–257, 2016.
[8] S. Nadouri and H. Fellah, “OMCC : Organic
Mobile Cloud Computing,” Model. Identif. Control
(ICMIC), 2016 8th Int. Conf. (pp. 169-173). IEEE,
pp. 169–173, 2016.
[9] H. Ben Saad, M. Kassar, and K. Sethom, “Always
Best Connected and Served based Scheme in
Mobile Cloud Computing,” Smart Cloud Networks
Syst. (pp. 1-8). IEEE, 2016.
[10] X. Wang, J. Wang, X. Wang, and X. Chen, “Energy
and Delay Tradeoff for Application Offloading in
Mobile Cloud Computing,” IEEE Syst. J., vol. 1, pp.
1–10, 2015.
[11] M. A. Amin and H. Al-Hashimi, “A Review of
Mobile Cloud Computing Architecture and
Challenges to Enterprise Users,” GCC Conf. Exhib.
(GCC), IEEE, pp. 240–244, 2013.
[12] D. Dev and K. L. Baishnab, “A Review and
Research towards Mobile Cloud Computing,”
Mob. Cloud Comput. Serv. Eng. (MobileCloud),
6. Original article | doi: 10.25007/ajnu.v6n3a96
134 Academic Journal of Nawroz University (AJNU)
2014 2nd IEEE Int. Conf. (pp. 252-256). IEEE., 2014.
[13] R. Khan, M. Othman, S. A. Madani, and I. Member,
“A Survey of Mobile Cloud Computing
Application Models,” IEEE Commun. Surv.
Tutorials, Accept. Publ., pp. 1–21, 2013.
[14] N. Fernando, S. W. Loke, and W. Rahayu, “Mobile
cloud computing : A survey,” Futur. Gener.
Comput. Syst, vol. 29, pp. 84–106, 2013, Elsevier,
2012.
[15] Z. Zhang and S. Li, “A Survey of Computational
Offloading in Mobile Cloud Computing,” Mob.
Cloud Comput. Serv. Eng. (MobileCloud), 2016 4th
IEEE Int. Conf. (pp. 81-82). IEEE., pp. 6–7, 2016.