The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The article provides a solution to the problem of correct use of cloudlets located on the movement route of mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route model in metropolitan environments and suggests a method for solving the problem.
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
The document proposes an air-ground integrated mobile edge computing (MEC) framework to address challenges posed by growing demands for massive connectivity, ultra-low latency, and high reliability in emerging IoT applications. The framework conceives a new MEC approach from an air-ground integration perspective by systematically integrating communication, computing, and storage resources from both air segments (e.g. unmanned aerial vehicles) and ground segments (e.g. vehicles). This provides on-demand deployment of edge servers for efficient resource utilization and reliable service provisioning. The framework architecture and its technological benefits, such as enhanced connectivity, adaptive resource allocation, differentiated quality of service guarantees, and effective mobility management, are then described.
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
This document discusses virtual machine allocation policies in cloud computing environments using the CloudSim simulation tool. It begins with an introduction to cloud computing and discusses challenges related to resource management and energy consumption. It then reviews previous research on modeling approaches, energy optimization techniques, and network topologies. A UML class model is presented for analyzing energy consumption when accessing cloud servers arranged in a step network topology. The methodology section outlines how energy consumption by system components like processors, RAM, hard disks, and motherboards will be calculated. Simulation results will depict response times and cost details for different data center configurations and allocation policies.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
ABSTRACT
In today’s world, the swift increase of utilizing mobile services and simultaneously discovering of the cloud computing services, made the Mobile Cloud Computing (MCC) selected as a wide spread technology among mobile users. Thus, the MCC incorporates the cloud computing with mobile services for achieving facilities in daily using mobile. The capability of mobile devices is limited of computation context, memory capacity, storage ability, and energy. Thus, relying on cloud computing can handle these troubles in the mobile surroundings. Cloud Computing gives computing easiness and capacity such provides availability of services from anyplace through the Internet without putting resources into new foundation, preparing, or application authorizing. Additionally, Cloud Computing is an approach to expand the limitations or increasing the abilities dynamically. The primary favourable position of Cloud Computing is that clients just use what they require and pay for what they truly utilize. Mobile cloud computing is a form for various services, where a mobile gadget is able to utilize the cloud for data saving, seeking, information mining, and multimedia preparing. Cloud computing innovation is also causes many new complications in side of safety and gets to direct when users store significant information with cloud servers. As the clients never again have physical ownership of the outsourced information, makes the information trustworthiness, security, and authenticity insurance in Cloud Computing is extremely difficult and conceivably troublesome undertaking. In MCC environments, it is hard to find a paper embracing most of the concepts and issues such as: architecture, computational offloading, challenges, security issues, authentications and so on. In this paper we discuss these concepts with presenting a review of the most recent papers in the domain of MCC.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
Digital Disruption is all around us. Mobile is overtaking desktop, Social Media is beating search, Messaging Application are challenging e-mails and everything around us is becoming connected. Mobile devices especially the smart phones are fueling the culture of “Anytime, Anywhere, And Anything’’. Smartphone is not only ubiquitous but also the primary computing device for many .These paradigm shifts are fueled by the explosive growth of smart phones which has touched a volume of 1.6 billion units globally. Smartphone growth has also triggered the explosive growth of mobile applications and cloud computing .Together, Mobile cloud computing is now a potential technology for mobile services .MCC overcomes obstacles related to battery life, storage capacity and low bandwidth. Current smart phones uses 2x2 MIMO which gives a speed 300Mbps, by using massive MIMO technology speed can be enhanced up to 1Gbps. This paper gives a BER (Bit Error Ratio) analysis to prove that by increasing number of transmitting and receiving antennas the performance can be enhanced.
The document proposes an air-ground integrated mobile edge computing (MEC) framework to address challenges posed by growing demands for massive connectivity, ultra-low latency, and high reliability in emerging IoT applications. The framework conceives a new MEC approach from an air-ground integration perspective by systematically integrating communication, computing, and storage resources from both air segments (e.g. unmanned aerial vehicles) and ground segments (e.g. vehicles). This provides on-demand deployment of edge servers for efficient resource utilization and reliable service provisioning. The framework architecture and its technological benefits, such as enhanced connectivity, adaptive resource allocation, differentiated quality of service guarantees, and effective mobility management, are then described.
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
This document discusses virtual machine allocation policies in cloud computing environments using the CloudSim simulation tool. It begins with an introduction to cloud computing and discusses challenges related to resource management and energy consumption. It then reviews previous research on modeling approaches, energy optimization techniques, and network topologies. A UML class model is presented for analyzing energy consumption when accessing cloud servers arranged in a step network topology. The methodology section outlines how energy consumption by system components like processors, RAM, hard disks, and motherboards will be calculated. Simulation results will depict response times and cost details for different data center configurations and allocation policies.
Cloud-Based Impact for Mobile and Pervasive Environments: A SurveyIOSR Journals
Abstract: Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has
become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite
increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such
as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the
mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and
bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and
privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to
grasp a thorough understanding of the technology in order to point out the direction of future research. With
the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent
research work, and future research trends.
Keywords: Cloud computing, Distributed Computing, Mobile Cloud Computing
CYBER INFRASTRUCTURE AS A SERVICE TO EMPOWER MULTIDISCIPLINARY, DATA-DRIVEN S...ijcsit
In supporting its large scale, multidisciplinary scientific research efforts across all the university campuses and by the research personnel spread over literally every corner of the state, the state of Nevada needs to build and leverage its own Cyber infrastructure. Following the well-established as-a-service model, this state-wide Cyber infrastructure that consists of data acquisition, data storage, advanced instruments, visualization, computing and information processing systems, and people, all seamlessly linked together through a high-speed network, is designed and operated to deliver the benefits of Cyber infrastructure-as-aService (CaaS).There are three major service groups in this CaaS, namely (i) supporting infrastructural
services that comprise sensors, computing/storage/networking hardware, operating system, management tools, virtualization and message passing interface (MPI); (ii) data transmission and storage services that provide connectivity to various big data sources, as well as cached and stored datasets in a distributed
storage backend; and (iii) processing and visualization services that provide user access to rich processing and visualization tools and packages essential to various scientific research workflows. Built on commodity hardware and open source software packages, the Southern Nevada Research Cloud(SNRC)and a data repository in a separate location constitute a low cost solution to deliver all these services around CaaS. The service-oriented architecture and implementation of the SNRC are geared to encapsulate as much detail of big data processing and cloud computing as possible away from end users; rather scientists only need to learn and access an interactive web-based interface to conduct their collaborative, multidisciplinary, dataintensive research. The capability and easy-to-use features of the SNRC are demonstrated through a use case that attempts to derive a solar radiation model from a large data set by regression analysis.
Contemporary Energy Optimization for Mobile and Cloud Environmentijceronline
Cloud and mobile computing applications are increasing heavily in terms of usage. These two areas extending usability of systems. This review paper gives information about cloud and mobile applications in terms of resources they consume and the need of choosing variety of features for users from several locations and the evolutionary provisions for service provider and end users. Both the fields are combined to provide good functionality, efficiency and effectiveness with mobile phones. The enhancement by considering power consumption by means of resource constrained nature of devices, communication media and cost effectiveness. This paper discuss about the concepts related to power consumption, underlying protocols and the other performance issues
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
A survey of fog computing concepts applications and issuesRezgar Mohammad
This document provides a survey of fog computing that discusses its key concepts, applications, and issues. It defines fog computing as a scenario that provides computation, storage, and networking services between end devices and cloud servers at the edge of the network. Representative applications of fog computing discussed include augmented reality, real-time video analytics, content delivery/caching, and mobile big data analytics. Potential issues covered include fog networking, quality of service concerns regarding connectivity, reliability, and capacity, and resource management challenges in dynamically provisioning and scheduling resources across fog nodes.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
This document describes a proposed circuit breaker monitoring system using mobile apps. Key points:
- The system would replace traditional circuit breakers with mobile app-controlled breakers for remote management of home appliances for safety and energy savings.
- It would include a home security system against intrusion using a mobile app-controlled door lock and gas leak detection.
- The proposed system architecture uses ESP 32 microcontrollers and Bluetooth modules in each "slave" unit installed at circuit breakers to collect data, and a "master" unit to store and process the collected data from all slaves.
The document discusses the development of 5G wireless technology, including anticipated features like small cell networks, smart data pricing, and SDN-based mobility management to address increasing traffic demands. It provides an example application scenario of using these 5G features for internet of vehicles. The objectives for 5G technology are described as focusing on performability, adaptivity, scalability, and security to enable new mobile applications and services.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesIJAEMSJORNAL
This document discusses a study on using cloud computing to access smart energy metering in the Philippines. Key findings from interviews with industry professionals include:
1) Most participants believed that smart energy meters can be controlled remotely through cloud computing and offer reliable communication.
2) Some applications currently provide accurate data analysis, management, and customer engagement.
3) Participants saw advantages in the scalability, central data storage, cost efficiency, and security provided by cloud-based systems.
Mobile cloud computing (MCC) integrates cloud computing into the mobile environment. The document provides an overview of MCC, including its definition, architectures, and advantages. The key points are:
1) MCC defines mobile applications that move data processing and storage from mobile devices to cloud servers, allowing users to access data and applications from any device via thin clients or web browsers.
2) MCC architectures involve mobile devices connecting to mobile networks and then to cloud data centers, where cloud controllers provide cloud services like storage, processing power, and software to mobile users.
3) MCC extends battery life by offloading processing to energy-efficient servers, improves storage capacity and processing power available to mobile users, and enhances reliability
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesThuy An Dang
Mobile cloud computing (MCC) integrates cloud computing into the mobile environment. The document provides an overview of MCC, including its definition, architectures, and advantages. The key points are:
1) MCC defines mobile applications that move data processing and storage from mobile devices to cloud servers, allowing users to access data and applications from any device via thin clients or web browsers.
2) MCC architectures involve mobile devices connecting to mobile networks and then to cloud data centers, where cloud controllers provide cloud services like storage, computing platforms and software to mobile users.
3) MCC provides advantages like extending battery life through computation offloading, improving storage capacity and processing power by storing large data and running intensive apps in clouds,
The advent of Big Data has seen the emergence of new processing and storage challenges. These challenges are often solved by distributed processing. Distributed systems are inherently dynamic and unstable, so it is realistic to expect that some resources will fail during use. Load balancing and task scheduling is an important step in determining the performance of parallel applications. Hence the need to design load balancing algorithms adapted to grid computing. In this paper, we propose a dynamic and hierarchical load balancing strategy at two levels: Intrascheduler load balancing, in order to avoid the use of the large-scale communication network, and interscheduler load balancing, for a load regulation of our whole system. The strategy allows improving the average response time of CLOAK-Reduce application tasks with minimal communication. We first focus on the three performance indicators, namely response time, process latency and running time of MapReduce tasks.
This document summarizes a research paper on mobile cloud computing. It begins with definitions of mobile cloud computing, discussing how it combines mobile computing and cloud computing. It then describes the general architecture of mobile cloud computing and some of its key advantages, such as extending battery life, improving data storage and processing power, and improving reliability. Several applications of mobile cloud computing are discussed, including mobile commerce, mobile learning, and mobile healthcare. Potential limitations around cloud service costs, mobile network costs, availability, and security are also outlined. The document concludes by discussing future research directions, such as overcoming low bandwidth issues through 4G networks and femtocells.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
This document summarizes a research paper that proposes a framework for dynamically partitioning mobile applications between a mobile device and cloud computing resources. The framework consists of runtime systems on both the mobile device and cloud to support adaptive partitioning and distributed execution. It aims to efficiently serve large numbers of users by allowing computation instances on the cloud to be shared among multiple applications and tenants. The paper formulates the partitioning problem as an optimization problem that allocates application components and wireless bandwidth to maximize throughput.
A survey of fog computing concepts applications and issuesRezgar Mohammad
This document provides a survey of fog computing that discusses its key concepts, applications, and issues. It defines fog computing as a scenario that provides computation, storage, and networking services between end devices and cloud servers at the edge of the network. Representative applications of fog computing discussed include augmented reality, real-time video analytics, content delivery/caching, and mobile big data analytics. Potential issues covered include fog networking, quality of service concerns regarding connectivity, reliability, and capacity, and resource management challenges in dynamically provisioning and scheduling resources across fog nodes.
Optimal content downloading in vehicular network with density measurementZac Darcy
The existence of Internet-connected navigation and infotainment systems is becoming a truth that will easily lead to a remarkable growth in bandwidth demand by in-vehicle users. In Examples the applications of vehicular communication proliferate, and range from the updating of road maps to the repossession of nearby points of interest, downloading of touristic information and multimedia files. This content downloading system will induce the vehicular user to use the resource to the same extent as today’s mobile customers. By this approach communication-enabled vehicles are paying attention in downloading different contents from Internet-based servers. We summarize the performance limits of such a vehicular multimedia content downloading system by modeling the content downloading process as an effective problem and developing the overall system throughput with density measurement. Results highlight the methods where the Roadside infrastructure i.e., access points are working at different capabilities irrespective of vehicle density, the vehicle-to-vehicle communication.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
CIRCUIT BREAK CONNECT MONITORING TO 5G MOBILE APPLICATIONijcsit
This document describes a proposed circuit breaker monitoring system using mobile apps. Key points:
- The system would replace traditional circuit breakers with mobile app-controlled breakers for remote management of home appliances for safety and energy savings.
- It would include a home security system against intrusion using a mobile app-controlled door lock and gas leak detection.
- The proposed system architecture uses ESP 32 microcontrollers and Bluetooth modules in each "slave" unit installed at circuit breakers to collect data, and a "master" unit to store and process the collected data from all slaves.
The document discusses the development of 5G wireless technology, including anticipated features like small cell networks, smart data pricing, and SDN-based mobility management to address increasing traffic demands. It provides an example application scenario of using these 5G features for internet of vehicles. The objectives for 5G technology are described as focusing on performability, adaptivity, scalability, and security to enable new mobile applications and services.
Emerging cloud computing paradigm vision, research challenges and development...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
creating a new environment, namely the Internet of Things
(IoT), that enables a wide range of future Internet applications.
In this work, we present Mobile Fog, a high level
programming model for future Internet applications that are
geospatially distributed, large–scale, and latency–sensitive.
We analyze use cases for the programming model with camera
network and connected vehicle applications to show the
efficacy of Mobile Fog. We also evaluate application performance
through simulation.
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges...Rida Qayyum
With the explosive growth of mobile applications and extensive praxis of cloud computing, mobile cloud computing has been introduced to be a potential technology for mobile services. But privacy is the main concern for a mobile user in the modern era. In the current study, we address the privacy challenges faced by mobile users while outsourcing their data to the service provider for storage and processing. However, a secure mobile user is required to protect these fundamental privacy factors such as their personal data, real identity, current location and the actual query sent to the cloud vendor server while availing different cloud services. Under these privacy metrics, we evaluated the existing approaches that are counting privacy challenge in mobile cloud computing. The primary focus of this study is to presents a critical survey of recent privacy protection techniques. Leading to objective, the current study conduct a comparative analysis of these state of the art methods with their strong points, privacy level and scalability. After analysis, this paper suggests the pseudo-random permutation method could be a promising solution that can be taken into consideration for preserving user personal information and data query privacy in MCC more efficiently. Primarily, the purpose of the survey was to focus on further advancements of the suggested method. Furthermore, we present the future research directions in the mobile cloud computing paradigms.
With a rapid growth of the mobile applications and development of cloud computing concept, mobile cloud
computing (MCC) has been introduced to be a potential technology for mobile services. MCC integrates the cloud
computing into the mobile environment and overcomes obstacles related to the performance, security etc discussed in
mobile computing. This paper gives an overview of the MCC including the definition, architecture, and applications. The
issues, existing solutions and approaches are presented.
Efficient architectural framework of cloud computing Souvik Pal
This document discusses an efficient architectural framework for cloud computing. It begins by providing background on cloud computing and discusses challenges such as security, privacy, and reliability. It then proposes a new architectural framework that separates infrastructure as a service (IaaS) into three sub-modules: IaaS itself, a hypervisor monitoring environment (HME), and resources as a service (RaaS). The HME acts as middleware between IaaS and physical resources, using a hypervisor to allocate resources from a pool managed by RaaS. This proposed framework is intended to improve performance and access speed for cloud computing.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesIJAEMSJORNAL
This document discusses a study on using cloud computing to access smart energy metering in the Philippines. Key findings from interviews with industry professionals include:
1) Most participants believed that smart energy meters can be controlled remotely through cloud computing and offer reliable communication.
2) Some applications currently provide accurate data analysis, management, and customer engagement.
3) Participants saw advantages in the scalability, central data storage, cost efficiency, and security provided by cloud-based systems.
Mobile cloud computing (MCC) integrates cloud computing into the mobile environment. The document provides an overview of MCC, including its definition, architectures, and advantages. The key points are:
1) MCC defines mobile applications that move data processing and storage from mobile devices to cloud servers, allowing users to access data and applications from any device via thin clients or web browsers.
2) MCC architectures involve mobile devices connecting to mobile networks and then to cloud data centers, where cloud controllers provide cloud services like storage, processing power, and software to mobile users.
3) MCC extends battery life by offloading processing to energy-efficient servers, improves storage capacity and processing power available to mobile users, and enhances reliability
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesThuy An Dang
Mobile cloud computing (MCC) integrates cloud computing into the mobile environment. The document provides an overview of MCC, including its definition, architectures, and advantages. The key points are:
1) MCC defines mobile applications that move data processing and storage from mobile devices to cloud servers, allowing users to access data and applications from any device via thin clients or web browsers.
2) MCC architectures involve mobile devices connecting to mobile networks and then to cloud data centers, where cloud controllers provide cloud services like storage, computing platforms and software to mobile users.
3) MCC provides advantages like extending battery life through computation offloading, improving storage capacity and processing power by storing large data and running intensive apps in clouds,
The advent of Big Data has seen the emergence of new processing and storage challenges. These challenges are often solved by distributed processing. Distributed systems are inherently dynamic and unstable, so it is realistic to expect that some resources will fail during use. Load balancing and task scheduling is an important step in determining the performance of parallel applications. Hence the need to design load balancing algorithms adapted to grid computing. In this paper, we propose a dynamic and hierarchical load balancing strategy at two levels: Intrascheduler load balancing, in order to avoid the use of the large-scale communication network, and interscheduler load balancing, for a load regulation of our whole system. The strategy allows improving the average response time of CLOAK-Reduce application tasks with minimal communication. We first focus on the three performance indicators, namely response time, process latency and running time of MapReduce tasks.
This document summarizes a research paper on mobile cloud computing. It begins with definitions of mobile cloud computing, discussing how it combines mobile computing and cloud computing. It then describes the general architecture of mobile cloud computing and some of its key advantages, such as extending battery life, improving data storage and processing power, and improving reliability. Several applications of mobile cloud computing are discussed, including mobile commerce, mobile learning, and mobile healthcare. Potential limitations around cloud service costs, mobile network costs, availability, and security are also outlined. The document concludes by discussing future research directions, such as overcoming low bandwidth issues through 4G networks and femtocells.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...IJECEIAES
Method of broadcasting is the well known operation that is used for providing support to different computing protocols in cloud computing. Attaining energy efficiency is one of the prominent challenges, that is quite significant in the scheduling process that is used in cloud computing as, there are fixed limits that have to be met by the system. In this research paper, we are particularly focusing on the cloud server maintenance and scheduling process and to do so, we are using the interactive broadcasting energy efficient computing technique along with the cloud computing server. Additionally, the remote host machines used for cloud services are dissipating more power and with that they are consuming more and more energy. The effect of the power consumption is one of the main factors for determining the cost of the computing resources. With the idea of using the avoidance technology for assigning the data center resources that dynamically depend on the application demands and supports the cloud computing with the optimization of the servers in use.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
This document provides a survey of machine and deep learning techniques for resource allocation in multi-access edge computing (MEC). It first presents tutorials on applying machine learning (ML) and deep learning (DL) in MEC to address its challenges. It then discusses enabling technologies for running ML/DL training and inference quickly in MEC. It provides an in-depth survey of ML/DL methods for task offloading, scheduling, and joint resource allocation in MEC. Finally, it discusses key challenges and future research directions of applying ML/DL for resource allocation in MEC networks.
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
This document summarizes a research paper that proposes using cloud computing to improve storage models for wireless devices. The paper develops a new storage model that uses cloud computing techniques like public and private clouds, topology algorithms, and cloudlets to improve battery life and data storage for mobile devices. It derives a mathematical equation to measure the power provided by a battery and the average battery time under different usage scenarios. The paper also discusses techniques like virtual cloud providers, WINC sleep mode, and Google Location services to further optimize wireless device performance and energy efficiency when using cloud-based storage and applications.
Abstract: Cloud computing is a latest trend and a hot topic in today global world. In which sources are provided to concern as local user on an on demand basically as usual it provides the path or means of internet. Mobile cloud computing is simply cloud computing throughout that at all smallest variety of devices could be involved as wireless equipment this paper concern multiple procedure and procedure for the mobile cloud computing . It developed every General mobile cloud computing solution and application specific solution. It also concern about the cloud computing in which mobile phones are used to browse the web, write e-mails, videos etc. Mobile phones are become the universal interface online services and cloud computing application general run local on mobile phones.
This document provides a survey of mobile cloud computing. It discusses the definitions and models of cloud computing including infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Mobile cloud computing is defined as using cloud infrastructure for data storage and processing instead of on the mobile device. The document reviews several research papers on mobile cloud computing and discusses challenges like network latency, limited bandwidth, security, and privacy. It proposes architectures and techniques to address these challenges and better utilize mobile cloud computing.
Cloud-based augmentation for mobile devices: Motivation, Taxonomy, and Open C...Saeid Abolfazli
Comprehensive Survey on Mobile Cloud Computing. The paper abstract is here:
Recently, Cloud-based Mobile Augmentation (CMA) approaches have gained remarkable ground from academia and industry. CMA is the state-of-the-art mobile augmentation model that employs resource-rich clouds to increase, enhance, and optimize computing capabilities of mobile devices aiming at execution of resource-intensive mobile applications. Augmented mobile devices envision to perform extensive computations and to store big data beyond their intrinsic capabilities with least footprint and vulnerability. Researchers utilize varied cloud-based computing resources (e.g., distant clouds and nearby mobile nodes) to meet various computing requirements of mobile users. However, employing cloud-based computing resources is not a straightforward panacea. Comprehending critical factors (e.g., current state of mobile client and remote resources) that impact on augmentation process and optimum selection of cloud-based resource types are some challenges that hinder CMA adaptability. This paper comprehensively surveys the mobile augmentation domain and presents taxonomy of CMA approaches. The objectives of this study is to highlight the effects of remote resources on the quality and reliability of augmentation processes and discuss the challenges and opportunities of employing varied cloud-based resources in augmenting mobile devices. We present augmentation definition, motivation, and taxonomy of augmentation types, including traditional and cloud-based. We critically analyze the state-of-the-art CMA approaches and classify them into four groups of distant fixed, proximate fixed, proximate mobile, and hybrid to present a taxonomy. Vital decision making and performance limitation factors that influence on the adoption of CMA approaches are introduced and an exemplary decision making flowchart for future CMA approaches are presented. Impacts of CMA approaches on mobile computing is discussed and open challenges are presented as the future research directions.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the integrated embedded hardware and software sensor components, and mobile network technologies, smartphones are capable of providing various environmental context information via embedded mobile device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications such as mobile crowd sensing, real time mobile health monitoring, mobile social network in proximity and so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and computation power, the frequent usage of high
performance multi-core mobile CPU and the high speed 3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device. Although numerous previous researchers have tried to overcome the resource intensive issues in mobile embedded service provisioning domain, most of the efforts were constrained because of the underlying resource intensive technologies. This paper presents a lightweight mobile Web service provisioning framework for mobile sensing which utilises the protocols that were designed for constrained Internet of Things environment. The prototype experimental results show that the proposed framework can provide higher throughput and less resource consumption than the traditional mobile Web service frameworks.
LIGHTWEIGHT MOBILE WEB SERVICE PROVISIONING FOR THE INTERNET OF THINGS MEDIATIONijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
Lightweight Mobile Web Service Provisioning for the Internet of Things Mediat...ijujournal
Emerging sensor-embedded smartphones motivated the mobile Internet of Things research. With the
integrated embedded hardware and software sensor components, and mobile network technologies,
smartphones are capable of providing various environmental context information via embedded mobile
device-hosted Web services (MWS). MWS enhances the capability of various mobile sensing applications
such as mobile crowdsensing, real time mobile health monitoring, mobile social network in proximity and
so on. Although recent smartphones are quite capable in terms of mobile data transmission speed and
computation power, the frequent usage of high performance multi-core mobile CPU and the high speed
3G/4G mobile Internet data transmission will quickly drain the battery power of the mobile device.
Although numerous previous researchers have tried to overcome the resource intensive issues in mobile
embedded service provisioning domain, most of the efforts were constrained because of the underlying
resource intensive technologies. This paper presents a lightweight mobile Web service provisioning
framework for mobile sensing which utilises the protocols that were designed for constrained Internet of
Things environment. The prototype experimental results show that the proposed framework can provide
higher throughput and less resource consumption than the traditional mobile Web service frameworks.
ENERGY EFFICIENT COMPUTING FOR SMART PHONES IN CLOUD ASSISTED ENVIRONMENTIJCNCJournal
In recent years, the employment of smart mobile phones has increased enormously and are concerned as an area of human life. Smartphones are capable to support immense range of complicated and intensive applications results shortened power capability and fewer performance. Mobile cloud computing is the newly rising paradigm integrates the features of cloud computing and mobile computing to beat the constraints of mobile devices. Mobile cloud computing employs computational offloading that migrates the computations from mobile devices to remote servers. In this paper, a novel model is proposed for dynamic task offloading to attain the energy optimization and better performance for mobile applications in the cloud environment. The paper proposed an optimum offloading algorithm by introducing new criteria such as benchmarking for offloading decision making. It also supports the concept of partitioning to divide the computing problem into various sub-problems. These sub-problems can be executed parallelly on mobile device and cloud. Performance evaluation results proved that the proposed model can reduce around 20% to 53% energy for low complexity problems and up to 98% for high complexity problems.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
In this study, a mobile cloud offloading system has been developed to decide that a process run on the cloud or on the mobile platform. A context-aware decision algorithm has been developed. The low performance and problem of battery consumption of mobile devices have been fundamental challenges on the mobile computing. To overcome this kind of challenges, recent advances towards mobile cloud computing propose a selective mobile-to-cloud offloading service by moving a mobile application from a slow mobile device to a fast server in the cloud during run time. Determine whether a process running on cloud or not is an important issue. Power consumption and time limits are vitally important for decision. In this study we used PowerTutor application which is a dynamic power measurement modelling tool. Another important factor is the process completion time. Calculate the power consumption is very difficult
MOBILE CLOUD COMPUTING –FUTURE OF NEXT GENERATION COMPUTINGijistjournal
Mobile device has become essential part of human life. Apart from call and receive functions, user can access many function in his/her mobile. A user wants everything on his/her mobile device for the ease of work. Some people use tablets instead of laptop or desktop. In this paper, insights into Mobile Cloud Computing (MCC) are presented. First overview of cloud computing system is discussed. Then after architecture of MCC is presented. Some applications based on MCC are also discussed and paper is concluded by exploring the problems and solutions of these in MCC.
AN OPEN JACKSON NETWORK MODEL FOR HETEROGENEOUS INFRASTRUCTURE AS A SERVICE O...IJCNCJournal
Cloud computing is an environment which provides services for user demand such as software, platform, infrastructure. Applications which are deployed on cloud computing have become more varied and complex to adapt to increase end-user quantity and fluctuating workload. One popular characteristic of
cloud computing is the heterogeneity of network, hosts and virtual machines (VM). There were many studies on cloud computing modeling based on queuing theory, but most studies have focused on homogeneity characteristic. In this study, we propose a cloud computing model based on open Jackson
network for multi-tier application systems which are deployed on heterogeneous VMs of IaaS cloud computing. The important metrics are analyzed in our experiments such as mean waiting time; mean request quantity, the throughput of the system. Besides that, metrics in model is used to modify number VMs
allocated for applications. Result of experiments shows that open queue network provides high efficiency.
SCALABLE AND ENERGY EFFICIENT TASK OFFLOADING SCHEMES FOR VEHICULAR CLOUD COM...IJCNCJournal
Smart vehicles of today on road are equipped with advanced computational units, multiple communication technologies, intelligent sensing platforms, and human-computer interaction devices which utilize Vehicular Edge Networks to support services offered by the remote cloud. This being named as
Opportunistic Vehicular Edge Computing recently, has the possibility to supplement the services provided by the Edge gadgets. Many Vehicular Edge Computing architectures have been proposed as of late which support task offloading. One among the premier difficulties in these networks is efficiently utilizing the resources available at the vehicular nodes. The present work uses APEATOVC, a conveyed and versatile
protocol for economical, efficient and effective task offloading in these networks which address the adaptability of vehicular clouds. The results obtained by extensive simulations are presented to assess and contrast its performance with existing protocols.
A Resource Allocation Scheme for Real-Time Energy-Aware.pdfSadafAyesha9
This research article proposes a real-time energy-aware offloading scheme for vehicular networks with mobile edge computing (MEC) to optimize resource allocation and decrease energy consumption and latency. It formulates the computation offloading and resource allocation as a mixed-integer nonlinear problem and solves it using a bi-level optimization method. Furthermore, it adopts a deep reinforcement learning-based offloading scheme to help users make optimal offloading decisions given mobility and cloud resource availability. Simulation results show the proposed approach reduces total overhead by nearly 40% compared to other algorithms.
Intelligent task processing using mobile edge computing: processing time opti...IAESIJAI
The fast-paced development of the internet of things led to the increase of computing resource services that could provide a fast response time, which is an unsatisfied feature when using cloud infrastructures due to network latency. Therefore, mobile edge computing became an emerging model by extending computation and storage resources to the network edge, to meet the demands of delay-sensitive and heavy computing applications. Computation offloading is the main feature that makes Edge computing surpass the existing cloud-based technologies to break limitations such as computing capabilities, battery resources, and storage availability, it enhances the durability and performance of mobile devices by offloading local intensive computation tasks to edge servers. However, the optimal solution is not always guaranteed by offloading computation, there-fore, the offloading decision is a crucial step depending on many parameters that should be taken in consideration. In this paper, we use a simulator to compare a two tier edge orchestrator architecture with the results obtained by implementing a system model that aims to minimize a task’s processing time constrained by time delay and the limited device’s computational resource and usage based on a modified version.
Similar to PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK ENVIRONMENT (20)
International Journal of Computer Networks & Communications (IJCNC) - ---- Sc...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
• Network Protocols & Wireless Networks
• Network Architectures
• High speed networks
• Routing, switching and addressing techniques
• Next Generation Internet
• Next Generation Web Architectures
• Network Operations & management
• Adhoc and sensor networks
• Internet and Web applications
• Ubiquitous networks
• Mobile networks & Wireless LAN
• Wireless Multimedia systems
• Wireless communications
• Heterogeneous wireless networks
• Measurement & Performance Analysis
• Peer to peer and overlay networks
• QoS and Resource Management
• Network Based applications
• Network Security
• Self-Organizing Networks and Networked Systems
• Optical Networking
• Mobile & Broadband Wireless Internet
• Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
• Submission Deadline : June 30, 2024
• Notification : July 29, 2024
• Final Manuscript Due : August 05, 2024
• Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation w...IJCNCJournal
Paper Title
Particle Swarm Optimization–Long Short-Term Memory based Channel Estimation with Hybrid Beam Forming Power Transfer in WSN-IoT Applications
Authors
Reginald Jude Sixtus J and Tamilarasi Muthu, Puducherry Technological University, India
Abstract
Non-Orthogonal Multiple Access (NOMA) helps to overcome various difficulties in future technology wireless communications. NOMA, when utilized with millimeter wave multiple-input multiple-output (MIMO) systems, channel estimation becomes extremely difficult. For reaping the benefits of the NOMA and mm-Wave combination, effective channel estimation is required. In this paper, we propose an enhanced particle swarm optimization based long short-term memory estimator network (PSOLSTMEstNet), which is a neural network model that can be employed to forecast the bandwidth required in the mm-Wave MIMO network. The prime advantage of the LSTM is that it has the capability of dynamically adapting to the functioning pattern of fluctuating channel state. The LSTM stage with adaptive coding and modulation enhances the BER.PSO algorithm is employed to optimize input weights of LSTM network. The modified algorithm splits the power by channel condition of every single user. Participants will be first sorted into distinct groups depending upon respective channel conditions, using a hybrid beamforming approach. The network characteristics are fine-estimated using PSO-LSTMEstNet after a rough approximation of channels parameters derived from the received data.
Keywords
Signal to Noise Ratio (SNR), Bit Error Rate (BER), mm-Wave, MIMO, NOMA, deep learning, optimization.
Volume URL: https://airccse.org/journal/ijc2022.html
Abstract URL:https://aircconline.com/abstract/ijcnc/v14n5/14522cnc05.html
Pdf URL: https://aircconline.com/ijcnc/V14N5/14522cnc05.pdf
#scopuspublication #scopusindexed #callforpapers #researchpapers #cfp #researchers #phdstudent #researchScholar #journalpaper #submission #journalsubmission #WBAN #requirements #tailoredtreatment #MACstrategy #enhancedefficiency #protrcal #computing #analysis #wirelessbodyareanetworks #wirelessnetworks
#adhocnetwork #VANETs #OLSRrouting #routing #MPR #nderesidualenergy #korea #cognitiveradionetworks #radionetworks #rendezvoussequence
Here's where you can reach us : ijcnc@airccse.org or ijcnc@aircconline.com
June 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Abstract: Accurate latency computation is essential for the Internet of Things (IoT) since the connected
devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not
an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while
still allowing communication with the cloud. Many applications rely on fog computing, including traffic
management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to
address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog
computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the
simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses
various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which
are essential for evaluating the performance of the ITCMS. Our system model is also compared with other
models to assess its performance. A comparison is made using two parameters, namely throughput and the
total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend
Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system
outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Supermarket Management System Project Report.pdfKamal Acharya
Supermarket management is a stand-alone J2EE using Eclipse Juno program.
This project contains all the necessary required information about maintaining
the supermarket billing system.
The core idea of this project to minimize the paper work and centralize the
data. Here all the communication is taken in secure manner. That is, in this
application the information will be stored in client itself. For further security the
data base is stored in the back-end oracle and so no intruders can access it.
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
We have designed & manufacture the Lubi Valves LBF series type of Butterfly Valves for General Utility Water applications as well as for HVAC applications.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
3rd International Conference on Artificial Intelligence Advances (AIAD 2024)GiselleginaGloria
3rd International Conference on Artificial Intelligence Advances (AIAD 2024) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the area advanced Artificial Intelligence. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the research area. Core areas of AI and advanced multi-disciplinary and its applications will be covered during the conferences.
A high-Speed Communication System is based on the Design of a Bi-NoC Router, ...DharmaBanothu
The Network on Chip (NoC) has emerged as an effective
solution for intercommunication infrastructure within System on
Chip (SoC) designs, overcoming the limitations of traditional
methods that face significant bottlenecks. However, the complexity
of NoC design presents numerous challenges related to
performance metrics such as scalability, latency, power
consumption, and signal integrity. This project addresses the
issues within the router's memory unit and proposes an enhanced
memory structure. To achieve efficient data transfer, FIFO buffers
are implemented in distributed RAM and virtual channels for
FPGA-based NoC. The project introduces advanced FIFO-based
memory units within the NoC router, assessing their performance
in a Bi-directional NoC (Bi-NoC) configuration. The primary
objective is to reduce the router's workload while enhancing the
FIFO internal structure. To further improve data transfer speed,
a Bi-NoC with a self-configurable intercommunication channel is
suggested. Simulation and synthesis results demonstrate
guaranteed throughput, predictable latency, and equitable
network access, showing significant improvement over previous
designs
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK ENVIRONMENT
1. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
DOI: 10.5121/ijcnc.2019.11106 93
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN
WIRELESS METROPOLITAN AREA NETWORK
ENVIRONMENT
Rashid Alakbarov and Oqtay Alakbarov
Institute of Information Technology, Azerbaijan National Academy of Sciences,
Azerbaijan
ABSTRACT
The article develops a method to ensure the efficient use of cloudlet resources by the mobile users. The
article provides a solution to the problem of correct use of cloudlets located on the movement route of
mobile users in Wireless Metropolitan Area Networks - WMAN environment. Conditions for downloading
necessary applications to the appropriate cloudlet using the possible values that determine the importance
and coordinates of the cloudlets were studied. The article provides a model of the mobile user's route
model in metropolitan environments and suggests a method for solving the problem.
KEYWORDS
Mobile computing clouds, cloudlet network, mobile user, route model, connection channel, metropolitan
area network, virtual machine.
1. INTRODUCTION
Currently intensive research works are being carried out worldwide to effectively use computing
and memory resources of data processing centers through cloud computing technologies. Such
systems with large computing and memory resources are developed based on computer networks
with high-speed connection channel. Cloud Computing technology allows to use computing and
memory resources of organizations’ data processing centers more effectively. Thus, Cloud
Computing is an Internet service that consists of technical-software that allows using distantly
located computer resources (computing and memory resources, program and data etc.) [1, 2].
Rapid growth of the use of mobile devices (laptops, tablets, smartphones etc.) and their
connection to computing clouds via internet using their compatible telecommunication
technologies (GPS, 3G/4G, Wi-Fi etc.) has prompted development of a new technology – mobile
computing cloud technology.
It is known that, capabilities of any mobile device (computing and memory resources) are limited.
But users use these devices to solve problems requiring great computing memory resources. For
this purpose, cloud computing technologies are widely used. Thus, it is possible to eliminate the
deficiency of computing and memory resources in mobile users’ devices using cloud technologies
[3]. Conducted researches show that, production volume of mobile equipment and number of
mobile internet users is constantly increasing. The number of mobile devices to be produced in
the world in 2018 will amount to 12,165 billion, while the number of mobile users will be 6,228
billion. This will increase the number of mobile cloud computing users in the near future. With
the widespread use of mobile devices, there is a dramatic increase in mobile applications like
surface navigation, email, web search and mobile gaming. This once again proves that mobile
devices have gradually become a dominant computing platform.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
94
In mobile computing clouds, mobile devices connect to the computing cloud systems via Internet
with the assistance of base stations and use the services they need. Currently, users are widely
using three types of cloud services (IaaS, PaaS and SaaS).
The article considers the problems of balanced placement of mobile users' queries (problems or
applications) taking into consideration the location and technical capabilities of cloudlets located
near base stations of Wireless Metropolitan Area Networks – WMAN. Second section reviews
the research on the development of network infrastructure based on cloudlets and the efficient
utilization of their resources. In the third section, the issue of creating a hierarchical architecture
based on cloudlets was considered. The third section reviews the issue of creating a hierarchical
architecture based on cloudlets. The fourth section describes elimination of problems by placing
the software used by mobile users in motion in wireless metropolitan area network environment
in nearby cloudlets or those located on their movement route. In Section Five, a more efficient
use of the cloudlet network resources has been proposed, which provides for the minimization of
communication channels and increased reliability. Computational experiments based on the
method proposed were conducted in Section Six.
2. RELATED WORK
Let's review the research studies on the selection of cloudlets that meet the set of requirements for
the solution of the problem. Optimizing the placement of problems of the multiple mobile users
that require different volume resources are among topical problems. Majority of researches in
Mobile Cloud Computing technologies are dedicated to effectively organizing the processing user
requests on cloud remote servers [4, 5]. By solving user problems in nearby cloudlets, you can
eliminate delays and ensure the reliable operation of the network by reducing the number of
connection channels between users and cloudlets. It is also possible to reduce energy
consumption, delays and disconnections by relevantly storing the applications (interface) and
main parts used by the users on mobile devices and cloud servers [6]. Some researchers note that
cloud servers are usually physically far from the users, which causes long-term delays in data
exchange among the user and the remote cloud [7]. Close location of cloud servers to the users
significantly reduces delays in data exchange [8]. Some researchers have suggested that the few
number of communication channels between the user and the cloudlet perform the software in the
cloudlets with high quality, minimal delay and disconnections [9].
In [10], article proposes to use cloudlets mobile application of which are located in close
proximity to mobile devices in order to eliminate access restrictions to remote clouds. In [11] the
article examined the mobile user's cloudlet access capabilities, the duration of communication
between the user and the cloudlet, and the duration of resolution of problems.
In [12], the article reviews the solution of selection issue of virtual machines that can provide a
faster resolution of the issue, based on the user's requirements, using the technical capabilities of
the cloudlets and the virtual machines created in the cloudlets. In [13], the article reviews optimal
balanced distribution of mobile network of mobile applications among cloud servers. Significant
impact of conductivity of inter-cloudlet connection channel on rapid implementation of mobile
applications was reviewed [14]. Some research works [15, 16] are dedicated to development
problems of a cloudlet network infrastructure located in proximity of metropolitan wireless area
network access points. It is best to create cloudlets in proximity of all Access Points of the noted
network. It is not economically efficient and makes the value of created network more expensive.
On the hand, it is possible that cloudlets located in proximity to certain access points are rarely
used or unused. Thus, it is proposed to place more cloudlets in proximity of locations with a
higher number of mobile users (malls, libraries, schools, universities, stadiums, stations, airports
etc.).
3. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
95
Some research works [17] analyze conditions that necessitate creation of cloudlets on mobile
computing clouds and forecasting problems of placement of cloudlets near certain base stations.
In [18], article reviews the issue of reducing energy consumption by optimizing the distribution of
user-solved issue between the cloudlet and the remote cloud server. Some researchers have
looked into the problem of quickly resolving the issue by distributing applications among several
cloudlets [19]. Some authors have looked into migration of services in mobile cloud services
(placing services closer to users in cloudlets) and have demonstrated some advantages of this
method. A simple algorithm can be created by taking into account the frequency of inquiries to
implement this process. When the need for higher-priority software is needed, a relatively less
commonly used software tool can be erased from the cloud's memory resources [20]. In [21]
article examined the issue of creating initial computing resources (virtual machines) using a
hierarchical analysis method to effective use of computing cloud environments
3. CREATING A HIERARCHICALLY - STRUCTURED NETWORK
INFRASTRUCTURE AMONG CLOUDLETS
Although the centralized clouds currently used the by users have high computing and memory
resources, the processed data cannot be delivered to users at a high speed. Rapid increase in the
number of mobile users in the computing cloud results in overloading of the network, causing
great delays in delivering the information to the user. To eliminate the noted shortage, it is
necessary to place the computing cloud resources close to the user.
Conducted research has shown that mobile Cloud Computing systems with centralized
architecture are not capable of providing quality services to many users. This means that
occurrence of situations such as network download, late delivery of results to the users, expensive
service, delays, traffic download, etc. in such mobile computing systems, does not allow for
quality service. Hierarchical (2-level) mobile Cloud Computing systems (Figure 1) are used to
eliminate noted problem [22-23].
Figure 1. Architecture of hierarchically structured mobile computing clouds
4. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
96
As seen in the diagram, a mobile internet user download and use the required application to the
closest cloudlet system servers, this in its turn, frees the Internet network from overloading. This
architecture, although partially, improves the indicators of certain parameters. Servers of Cloud
Computing system are located on the 1st level; cloudlets are located near base stations in the 2nd
level.
Determining which base stations are located near the base stations and what their characteristics
are among topical problems. Thus, mobile servers (cloudlet) are created next to base stations of
mobile operators for the wider use of mobile equipment cloud technologies. Cloudlet (small
computing cloud) is a device (server) located near the users and ensures faster provision of the
users with necessary information. The cloud services that users need are implemented through
cloudlets, which improve the quality of services [24, 25].
Advantages of cloudlet use includes possibility of high-speed access to the service, mobility
support, and reducing roaming fees. As user software applications are located in nearby cloudlets,
users can instantly access information by eliminating connection delays that occur in the network.
Also, as in computing clouds, technical capabilities of the cloudlets are higher than those of the
mobile devices, which allows executing software applications that cannot be processed on mobile
devices. Another cloudlet is selected to solve the problem when the resources of the cloudlet near
the mobile user do not allow the user to solve the problem.
One of the major problems that arise when using cloudlets is the related to the connection
between mobile devices and cloudlets, due to mobility of the mobile device. Sometimes a mobile
user enters the area where there is no cloudlet in the coverage area of his mobile device, and in
other cases there is an excessive number of cloudlets in the surroundings. In real life, mobile
users visit many locations to perform office work, shop in malls and perform social activities.
Most likely, there are numerous computers that can be used to create cloudlets in the noted areas.
The article proposes methods and examines the conditions for downloading the necessary
software applications to certain cloudlets by using the possible evaluation to determine the
importance of cloudlets in order to efficiently utilize cloudlet resources that have different
technical capabilities in mobile computing clouds [26].
One way to effectively utilize cloudlet resources is to preliminarily download software
applications that are frequently used by mobile users (games, translation software, etc.) to the
cloudlet and use them, and store those software applications there for the required period. It
should be noted that placing the applications on mobile devices on clouds that are closer to them
and that will be connected to them for a long period of time will allow the implementation issue
to be faster and more efficient. Proximity is determined by the number of inter-cloudlet
connection channels. On the other hand, applications that have high usage frequencies can be
stored in cloudlets for a certain amount of time. Thus, there is no need to invoke any type of
application from the remote (level 1) server. The quality of service cloudlets near base stations
depends on the technical capabilities of the computer hardware used (operating speed of
processors, the number of cores and virtual machines, memory, bandwidth, etc.) used in its
creation. For this reason, technical capabilities of cloudlets should allow the users to download
and execute software applications.
It is known that various architectures have been proposed for the efficient use of the clouds. A
hierarchically structured architecture created using the Resource Manager Center has been
proposed to effectively utilize cloudlet resources [27]. There is information about the location and
technical capabilities of cloudlets in the RM center of the hierarchically structured network. Here,
when the mobile users enter the cloud software, they first connect to the proposed RM, which
then connects the user to the relevant cloud resource in the shortest period of time. MCC
5. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
97
architecture is shown in Figure 1. Here, mobile devices are connected to mobile networks through
the base stations (e.g., base transmission station - 3G / 4G, access point - Wi-Fi, etc.) that build
and manage functional interfaces and connections (air communication) between network and
mobile devices. Mobile users' inquiries and information (e.g., ID and location) are transmitted to
the Resource Management Center (central processor connected to the server), which provides
mobile network services. Here, mobile network operators can provide mobile users with services
such as AAA (authentication, authorization and accounting) based on HA-home agent and
subscriber information stored in data bases. Subsequently, the requests of the subscribers are sent
to the server that communicates with the Internet from the Resource Manager of the proposed
model, where it communicates with the relevant cloud over the internet. There are information
about the computer hardware (server, desktop, notebook, etc.) used to create cloudlets in the
management center. At the same time, the management center collects information on the
technical capabilities of the cloudlets (operating speed of processors, the number of cores of the
processor, number and technical characteristics, memory, etc.) and the proximity of users to
which cloudlets on the mobile network. Therefore placement of invoked (selected) application
from mainly cloud servers based on incoming inquiry on which cloudlet and which virtual
machine that meets user requirements are among topical problems. The cloudlet Network
Management Center will provide information about the cloudlet location coordinates along the
movement route of the mobile user. The article is devoted to the effective placement of selected
applications based on user inquiries in cloudlets located along the route.
4. STATEMENT OF THE PROBLEM
No problems arise when users use the cloudlet resources in a stationary state (not in motion). For
instance, the software needed by the user is downloaded and used at the nearby cloudlet.
However, a problem arises in using the cloudlet resources when the user is in motion (pedestrian
or machine). Cloudlets are placed near the base stations of wireless city-type mobile networks.
The mobile user first downloads the software application to the nearby cloudlet.
Whenever a mobile user moves, the application used by the user is on the initially downloaded
cloud. When the user reaches the necessary point moving along the route, he is connected to the
initial cloudlet that stores the application using base stations located along the route and solves his
or her problems. In this case, as the distance increases, the mobile user connects to the cloudlet he
uses through multiple communication channels. This increases the distance between the user and
the cloudlet and the number of connection channels used for connection. Thus, the mobile user in
motion cannot effectively use the resources of cloudlets. The increased distance between the
cloudlet and the user, and the large number of contact channels, will affect the rapid processing of
the problem, increase disconnections, reduce reliability, and weaken the network bandwidth.
Therefore, the article recommends a method for eliminating the noted deficiencies by placing the
applications used by users in the cloudlets that are on route and in long-term connection with the
users. When the user is in motion, he / she starts to move away from the base station he / she is
currently using and after a certain period of time the user starts to disconnect from the base
station. To ensure uninterrupted connection, the user is connected to the next nearest base station.
On the other hand, the user is close to several base stations (depending on the signal area). User
may only be connected with one of the base stations near him. At this connection, the closest base
station is selected. The may be in short-term contact with the nearest base station, due to his / her
movement route. In this case, the user connects with multiple cloudlets before reaching the
destination point, based on base station proximity principle. Thus, the application is used in the
process of getting from point A to Point B by loading multiple cloudlets. This leads to uploads on
the transmission channels in the cloudlet network. The goal is to efficiently manage the needed
application by using fewer cloudlets while the user is in motion. The route used by the user to get
6. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
98
from Point A to Point B is determined by the navigational programs. Cloudlets on this route are
defined. Clouds in proximity to the direction of movement are selected. The cloudlet that will
remain the longest on the user's route and will resolve the issue is determined among the selected
cloudlets and user’s application is uploaded to selected cloudlet. Thus the user will use fewer
cloudlets while moving along the route. Proposed method will help to utilize the cloud network
resources more efficiently, load the connection channels less and increase the reliability.
5. SOLUTION OF THE PROBLEM
Resolution of the mobile user problem within provided period depends on technical capabilities
of the cloudlet. Let’s assume that, cloudlet network consists of n number of cloudlets. Network
resource management center has information about technical capabilities of the cloudlets
(processor operation speed, number of cores, number of virtual machines, memory etc.).
Computing issue of the mobile user consists of number of instructions. Let’s mark computing
productivity of virtual machines used in cloudlets as . Computing period of the noted issues in
selected cloudlet will be . Let’s mark the transmission speed of the
channel between the mobile user and the cloud as . When mobile user has to send Dout bite
volume of information to the cloudlet and the cloudlet has to send Din bite volume of information
back to the user, relevantly and amount of time is needed to transmit and
receive information.
Let’s mark the completion time of the issue as , which is the sum of
processing, transmitting and receiving periods of information in cloudlet [11]. At this time, we
need to direct the mobile user’s issue to such a cloudlet that will solve his/her issue while the
mobile user is connected to the cloudlet. If the mobile user is in motion, then his/her connection
period with the initial cloudlet may be shorter that resolution period of the issue. In this case, in
order to continue to solving the problem, connection of the user to next cloudlet along the route of
the user must be provided and process must be continued along the route until the end. The
article focuses on resolution of the noted problem.
Solution of the issue can provide solution of set forward problems by being connection to the
fewest number of cloudlets until reaching the final point of the route.
Structural diagram of the wireless metropolitan area networks created based on cloudlet is
demonstrated in figure 2. Let’s assume that, mobile user passes by multiple base stations and
cloudlets of the wireless metropolitan area network as shown on Figure 2.
Coordinates of the cloudlets located in the wireless metropolitan area can be written as following:
– coordinates of the first cloudlet;
- coordinates of the second cloudlet;
...
– coordinates of the Nth cloudlet.
Mobile user can write the coordinates of the points along the route as following:
- Coordinates of the first point of the route;
- Coordinates of the second point of the route;
...
- Coordinates of the Kth point of the route;
7. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
99
Figure 2. Route of the mobile user in wireless metropolitan area network
It is known that, if the mobile user remains at any point of the route, as well as the first point of
the route for a lengthy period of time, he can solve his problems without creating a new
connection with another cloudlet, while being connected to one (nearest) cloudlet. If the mobile
user will remain at the kth point of the route for a long period of time, then he can form a
connection with a cloudlet located at the shortest distances from the cloudlet of this point. If
mobile user’s connection to the connected cloudlet is interrupted during movement, he can
connect to the near cloudlet that meets certain requirements. Let's mark the locations
(coordinates) of the mobile user and cloudlet with and
respectively. Let's mark the transmitting range of the mobile device with . Connection of mobile
user to cloudlet in period is only possible when
condition is met. Here, is the Euclidean norm in 2 Dimension. This norm is widely used to
measure the distance between points in dual dimension systems.
For example, distance between any jth point along the route and nth cloudlet is determined as
following [11].
(1)
The shortest distance between the j point of the route and the cloudlets can be determined as
following.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
100
Such r (signal reception range of the mobile device) distance can be determined within the
network environment shown in Figure 2, in case of at this point mobile user can create
a connection with determined cloudlet or created connection can continue, otherwise a connection
cannot be formed or created connection can interrupt.
But connecting to the nearest cloudlet at every disconnection moment cannot always provide
achieving set objectives (connection of the most connected cloudlet timewise). The issue can be
solved as following. Portions of the route can be imagined as segments and the entire route can be
imagined as a sum (connection) of straight segments. The route depicted in Figure 2 can be
presented as following formula:
(2)
In this formula, there are K-1 number of segments and .
For the solution of the problem, we can assume that there are one or more cloudlets that can
connect with the mobile user can at any point on the route:
(3)
Straight line formula passing through each segment can be written as following:
It is known that, such formulation of the straight line formula can be written within
and conditions. If we simplify this formula, then we will obtain
the formula of a straight line that is passing through two points and general:
(4)
If condition is met, (4) straight line can be written as following equation with
angle coefficient:
and conditions
Short distance from and cloudlet until the straight line will
be .
Straight line equation within and conditions
Short distance from and cloudlet until the straight line will
be .
9. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
101
If the velocity of the mobile is ) at any t point of its movement, after passing of t amount of
time from the start of the movement, this user will be at point. As this point
belongs to the route
And coordinates of the point can be determined as following.
(5)
(6)
In formulas (5)-(6), and are the components of the movement velocity of the mobile
user along the coordinate axes. Here equality is met.
As the metropolitan area route consists of the sum of straight-line segments, integrals in (5)-(6)
formulas can be replaced with relevant sums.
Let’s mark the cloudlet set that allows forming a connection with first the first of the route at the
beginning of the movement, i.e. setting of cloudlets that meet
Conditions with C(0), and mark the set of cloudlets that can form a connection with
point at any t moment of the movement and meets
Conditions with C(t). At the beginning of the movement, cloudlet must be selected in such
manner that, connection with the cloudlet could last for a long period of time. For this purpose
cloudlet or one of the cloudlets can meet
(7)
Conditions must be selected. This cloudlet determines long-term connection at the beginning of
the movement.
A cloudlet that provides long-term connection during the remaining second part of the route from
point of the route must be selected. If we move as in the starting point, let’s
mark the set of cloudlets that can form a connection with at which the mobile
can be at any moment as . And this set consists of cloudlets that meet
Conditions. The cloudlet that provided long-term connection during the second part of the route
must meet following conditions:
10. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
102
(8)
Shown operations are carried out until the end of the movement of the mobile user along the route
and cloudlets that provide a long-term connection at any part of the movement are selected.
Sequence of selected R number of cloudlets can be marked as
.
It is known that this sequence can be determined at the beginning of the movement using the
movement route information of the mobile user and set of cloudlets in metropolitan environment.
Sequence can be modified if information about technical conditions of the cloudlets changes
during the movement. It should be noted that the found solution allows the mobile user to use a
minimum number of cloudlets for connection while moving to the final point of the route. At the
same time, the given method enhances the efficiency of use of cloudlet resources by establishing
connection with a few cloudlets. Thus, frequent establishment of frequent connections and
disruption of connection leads to the inefficient use of cloudlet resources.
6. EXPERIMENT
Computing experiments on developed model was implemented using following data. Here, all
measurements are provided in proportion to r distance. Movement route of mobile users
surrounded with cloudlets is depicted in Figure 3.
Figure 3. Movement route of the mobile user in cloudlet network
11. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
103
Points along the movement route of the mobile user:
M(r,4r), M(2r,4r), M(2r, 5r), M(5r, 2r).
Coordinates of the cloudlets:
Let’s assume that the mobile user moves at a stable speed of v=0,2r. For this reason, we can
present time-coordinate dependence since the beginning of the movement using following
formula:
If the nearest cloudlet to the M1(r,4r) point of the route is selected at the beginning of the
movement, then it is C1(0,5r; 4,5r) cloudlet.
The distance between this route point and the cloudlet is
and it is the shortest distance.
The second cloudlet that is close to the starting point of the movement and with which we can
establish a connection is C2(1,5r; 4,5r).
the distance from these cloudlets to the starting point of the movement is
and meets condition. It must be
noted that, cloudlets that belong to C(0) set consists of these two cloudlets:
.
But, if the first cloudlet is selected, connection will last until the first t period that meets the
Inequality.
As both sides of the inequality are greater than 0, we can increase both sides to the square to solve
it:
If we simplify it, we obtain:
12. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
104
If we transfer all components to the left and divide both sides by , we will obtain
If we split into multipliers:
Here, we obtain the following systems of inequalities:
Solution of the first system
Solution of the second system
As in our problem, then
is the solution we are interested in.
After the value of t, which is the solution of this in quality, connection is
disrupted and new cloudlets must be found. The point which is relevant to the shown value of
is located at the first part of the route (Figure 3).
The second cloudlet provides a connection until the B (2,5r, 4,5r) point located in the third part of
the route (Figure 3). The distance until this point of the route from the starting point of the
movement is greater and for this reason, this cloudlet (mobile user will be connected to this cloud
for a long period of time) must be selected for connection.
Effectiveness of established method is clear from this point. Afterwards, other cloudlets that
provide long-term connection can be found applying the analogical algorithm.
7. CONCLUSIONS
The article provides a solution for the issue of correct use of cloudlets located along the route of
mobile user in motion in Wireless Metropolitan Area Networks (WMAN). For this purpose, we
provided a model of the mobile users’ route consisting of straight line segments located in
13. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
105
cloudlet network. A method for selecting the sequence of cloudlets that can provide long-term
connection while moving along this route is developed. This sequence (set of cloudlets) can be
determined at the start of the movement using the information about movement route of the
mobile user. Algorithm can be applied starting at any point of the route. This allows to repeatedly
apply the algorithm in necessary cases. Proposed method assists to use the cloudlet network
resources more efficiently, load the connection channels less and increase the reliability.
In the future, the solution to the problem of selecting virtual machines in cloudlets located along
the movement routes will be reviewed for faster execution of software applications by mobile
users. As mobile users of the cloudlet network are moving, the solution of the problem that
provides less loading of connection channels of the network by using less cloudlet will be
reviewed.
REFERENCES
[1] R.M. Alguliyev, R.K. Alekperov, “Cloud Computing: Modern State, Problems and Prospects”,
Telecommunications and Radio Engineering, vol.72, no.3, 2013, pp.255-266.
[2] H. T. Dinh, C. Lee, D. Niyato, P. Wang, “A survey of mobile cloud computing: Architecture,
applications, and approaches,” Wireless Communications and Mobile Computing, vol.13, no.18,
2013, pp.1587-1611.
[3] T. Diaby, B.B. Rad, “Cloud Computing: A review of the Concepts and Deployment Models”,
International Journal of Information Technology and Computer Science, vol.9, no.6, 2017, pp.50-58.
[4] R. Alakbarov, F. Pashayev, M. Hashimov, “Development of the Method of Dynamic Distribution of
Users’ Data in Storage Devices in Cloud Technology,” Advances in Information Sciences and Service
Sciences, vol.8, no.1, 2016, pp.16-21.
[5] O.P. Akomolafe, M.O. Abodunrin, “A Hybrid Cryptographic Model for Data Storage in Mobile
Cloud Computing,” I. J. Computer Network and Information Security, no.6, 2017, pp.53-60.
[6] Y.C. Shim, “Effects of cloudlets on interactive applications in mobile cloud computing
environments,” International Journal of Advanced Computer Technology, vol.4, no.1, 2015, pp. 54-
62.
[7] M.Satyanarayanan, P.Bahl, R.Caceres, N.Davies, “The case forvm-based cloudlets in mobile
computing,” Pervasive Computing, IEEE, vol.8, no.4, 2009, pp.14-23.
[8] K. Ha, P. Pillai, W. Richter, Y. Abe, M. Satyanarayanan. “Just-in-time provisioning for
cyberforaging,” in Proceeding of the 11th annual international conference on Mobile systems,
applications, and services. ACM, 2013, pp.153-166.
[9] Y.C. Shim, ”Effects of cloudlets on interactive applications in mobile cloud computing
environments,” International Journal of Advanced Computer Technology, vol.4, no.1, 2015, pp.54-62.
[10] H. Qi, A. Gani, “Research on Mobile Cloud Computing: Review, Trend and Perspectives,” İEEE 2nd
International Conference on Digital Information and Communication Technology and its
Applications, 2012, pp. 195-202.
[11] Y.Li ,W. Wang, “The Unheralded Power of Cloudlet Computing in the Vicinity of Mobile Devices,”
IEEE Global Communications Conference (GLOBECOM), 2013, pp. 4959-4964.
14. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
106
[12] R.K. Alekberov, F.H. Pashayev, O.R. Alekperov, “Effective Use Method of Cloudlet Resources by
Mobile Users,” 11th IEEE International Conference on Application of Information and
Communication Technologies. Moscow, 2017, pp. 401-403.
[13] M.Jia, W.Liang, Z.Xu, M.Huang, “Cloudlet load balancingin wireless metropolitanarea networks,”
IEEE, 10-14 April, 2016, pp. 730-738.
[14] C. Shi, V. Lakafosis, M.H. Ammar, E.W. Zegura, “Serendipity: enabling remote computing among
intermittently connected mobile devices,” in Proc. of the ACM MobiHoc, 2012, pp.145-154.
[15] R.G. Alakbarov, F.H. Fahrad, O.R. Alakbarov, “Forecasting Cloudlet Development on Mobile
Computing Clouds,” I.J. Information Technology and Computer Science, no.11, 2017, pp.23-34.
[16] D. Sarddar, R. Bose, “A Mobile Cloud Computing Architecture with Easy Resource Sharing,”
International Journal of Current Engineering and Technology. vol.4, no.3, 2014, pp.1249-1254.
[17] M. Jia, J. Cao, W. Liang, “Optimal Cloudlet Placement and User to Cloudlet Allocation in Wireless
Metropolitan Area Networks,” IEEE Transactions on Cloud Computing, vol.5, no.4, 2017, pp.725-
737.
[18] E. Gelenbe, R. Lent, M. Douratsos, “Choosing a local or remote cloud,” Proceedings of 2nd
International Symposium on Network Cloud Computing and Applications, 2012, pp.25-30.
[19] T. Verbelen, P. Simoens, F. D. Turck, and B. Dhoedt, “Cloudlets: Bringing the cloud to the mobile
user,” Proceedings of 3rd workshop on Mobile Cloud Computing and Services, ACM, 2012. pp.29-
36,
[20] F. Liu, P. Shu, H. Jin, L. Ding, J. Yu, D. Niu, B. Li, “Gearing resource-poor mobile devices with
power fulclouds: architectures, challenges, and applications,” IEEE Wireless Communications.
vol.20, no.3, 2013, pp.14-22.
[21] A.A. Mikryukov. R.I. Hantimirov, “The task of the initial allocation of resources in cloud computing
environments based on the analytic hierarchy process,” Applied Informatics. no.8, 2015, pp.184-185.
[22] Z. Xu, W. Liang, W. Xu, M. Jia, S. Guo, “Efficient Algorithms for Capacitated Cloudlet,”
Placements. IEEE Transactions on Parallel and Distributed Systems, vol.27, no.10, 2016, pp. 2866-
2880.
[23] P. Gupta, S. Gupta, “Mobile Cloud Computing: The Future of Cloud,” International Journal of
Advanced Research in Electrical, Electronics and Instrumentation Engineering. vol.1, no.3, 2012,
pp.134-144.
[24] M. Goyal, S. Singh, “Mobile Cloud Computing,” International Journal of Enhanced Research in
Science Technology& Engineering, vol.3, no.4, 2014, pp. 517-521.
[25] T. Diaby, B.B. Rad. “Cloud Computing: A review of the Concepts and Deployment Models,”
International Journal of Information Technology and Computer Science, vol. 9, no. 6, 2017, pp. 50-
58.
[26] G. Huerta-Canepa, D. Lee, “A virtual cloud computing provider for mobile devices,” International
Journal of Advance Research, Ideas and Innovations in Technology. Vol. 3, issue3, 2017, pp. 411-
414.
[27] D. Sarddar, R. Bose, “A Mobile Cloud Computing Architecture with Easy Resource Sharing,”
International Journal of Current Engineering and Technology. vol.4, no.3, 2014, pp.1249-1254.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.1, January 2019
107
AUTHORS
Dr. Rashid Alakbarov graduated from-Automation and Computer Engineering‖ faculty of
Azerbaijan Polytechnic University named after C.Ildirim. He received his PhD degree in
2006 from Supreme Attestation Commission under the President of the Republic of
Azerbaijan. His primary research interests include various areas in cloud computing, data
processing, computer networks, virtual computing, particularly in the area of distributed
computing. He is head of department at the Institute of Information Technology as of
2002. Since 2010, he has been leading the development of "AzScienceNet" infrastructure.
In 2011, he was appointed a deputy director of the institute by the decision of the
Presidium of Azerbaijan National Academy of Sciences. He is the author of 85 scientific papers, including
5 inventions.
Mr. Oqtay Alakbarov is PhD student of Institute of Information Technology of
Azerbaijan National Academy of Sciences. His primary research interests include various
areas in cloud computing, mobile cloud computing, mobile technologies, particularly in
the area of cloud technology applications. He is the author of 3 journal scientific papers
and 3 proceedings.