SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol. 8, No. 3, June 2018, pp. 1933~1938
ISSN: 2088-8708, DOI: 10.11591/ijece.v8i3.pp1933-1938  1933
Journal homepage: http://iaescore.com/journals/index.php/IJECE
An Empirical study on Peer-to-Peer sharing of resources in
Mobile Cloud Environment
R. K. Nadesh1
, M. Aramudhan2
1
School of Information Technology and Engineering, VIT University, Vellore, India
2
Department of Information Technology, PKIET, Karaikal, India
Article Info ABSTRACT
Article history:
Received Dec 9, 2016
Revised Mar 27, 2017
Accepted Apr 11, 2017
The increase usage of mobile users with internet and interoperability among
the cloud services intensifies the role of distributed environemtnt in today’s
real world application. Modern technologies are important for building rich,
scalable and interoperable applications. To meet the requirements of
client,the cloud service provider should offer adequate infrastructure
especially under heavy multi-client load.To provide solution for large scale
requirements and to statisfy the mobile client from the critical situation like
lacking with bandwidth,connectivity issues,service completion ratio, we
present adhoc virtual cloud model for different scenarios that include single
and multiple client configurations with various file sizes of various file
formats for retrieving files in the mobile cloud environement.We evaluate the
strategies with the socket and RMI implemented using java and identify the
best model for real world applications. Performance evaluation is done with
the results obtained and recommends that when sockets and RMI can be
appropriately used in peer-to-peer environment when the mobile user cannot
connect directly to the cloud services.
Keywords:
Adhoc virtual cloud
Mobile cloud
Peer-to-peer
RMI
Socket
Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
R.K.Nadesh,
School of Information Technology and Engineering,
VIT University,
Vellore, India.
Email: rknadesh@gmail.com
1. INTRODUCTION
With heavy increase of computer system in our regular life, the usage of computer network also
increases exponentially. The distributed environment provides the sharing the resource among the peers or
execute a set of instruction in the peers [1], [2]. For the end user, it looks the job is completed in the machine
itself but originally completed in the another machine and ensure their location, storage, replication, load
balancing and functionality is well maintained [3], [4]. The cloud service provider provides anything as a
service like Software-as-a-Service, Platform-as-a-Service, Infrastrcture-as-a-Service, Storage-as-a-Service,
Database-as-a-Service etc [5]. Today potential mobile user look for mass storage location to store and access
their files on the move with large set of applications like business application, healthcare application, gaming,
e-learning [6], [7]. These require highest bandwidth and connectivity in the mobile device which is provided
by the cellular network service provider in different forms like GSM/CDMA/UMTS/LTE and the device
portability is more important [8]. Not all times, the connectivity is stronger on the move, if there is drop in
connectivity the idea is to connect to the nearest local server referred as cloudlet and due to high mobility the
connection state changes very often [9]. The next direction of the research in mobile cloud computing is to
provide mobile cloudlet, a mobile device can act as a cloudlet and serve the need the moving user on demand
[10]. Our focus is now identifying the mobile cloudlet and provide services to the user. We propose Peer-to-
Peer environment where one mobile user share the resource of the other mobile user.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938
1934
In addition, we propose mobile cloud network where mobile device form a network and one device
is constrained to be the master and identify the volunteering nodes and supports the demand of the moving
user.
2. RELATED WORKS
A cloudlet is a server or a collection of servers used to store files that can be accessed, with proper
authorization rights, by any number of remote clients in the network [10], [11]. However,the distributed
system is accepted worldwide to cater the needs of the end user.
The rapid growth of the mobile user and the smart phones,availability of cloud services in a regional
basis made the client user to access any kind of files in a minimum amount of time [12], [13]. When the
client device retrieves a file from the cloudlet, the file appears as a normal file on the client machine, and the
user is able to work with the file in the same ways as if it were stored locally on the workstation. Later, the
file is returned to the central server and the client machine is not utilized to store the file [14].
However the cloudlet is also fixed and the mobility is provided by the Wi-Fi acces point but this has
limitation that the mobile device should be within the range of the central server and covered by the access
point [15]. The deployment cost for this model is also high and it is very useful when more client users are
available [16].
Considering the less number of remote user interms of usage of cloudlet is less but interested in
accessing the cloud service one such model designed is Virtual Mobile Cloud [17]. Any mobile device can
volunteer the resource to the needed mobile user. The development of volunteering computing leads to the
formation of Virtual Cloud using mobile devices [18]. However, to comprise the volunteers to share the
resources some pricing schemes and the support is provided by the cloud service provider.
3. PROPOSED MOBILE CLOUD MODEL
The volunteer devices may provide their resources in Peer-to –Peer fashion or redirects to the
available device in the nearest place. In P2P sharing of resoruces, only the identification of the device will be
shared via Bluetooth and the data transfer can be done using TCP/IP and the connection estabilishment is
done viz socket or RMI.
In a distributed environment we implement two way communications for sending different types of
files of various sizes from one node to another. Figure 1 show the peer-to-peer mobile environment.
Figure 1. Peer-to-peer mobile environment
Virtual cloud is formed with support of master and slave model where master node has the details
about the other nodes. When the end user needs the resoruces it is identified through the master node which is
authorized by the concern service provider. Our coverage in this work is limited to a homogenous service
provider community. The selection of mobile node is done by pricing schemes and the master node should
have the highest resources including the good backup of battery.
Figure 2. Virtual cloud with mobile devices
Int J Elec & Comp Eng ISSN: 2088-8708 
Herb Leaves Recognition using Gray Level Co-occurrence Matrix and Five Distance- … (R. Rizal Isnanto)
1935
In the Figure 2 stated virtual cloud model,the mobile client is initially connected to the cloud
services using cellular network and when there is high latency the node is redirected to the nearest virtual
cloud. In the virtual cloud, being a first time user request the designated master node to allocate the needed
resources and identify to the volunteered nodes.
4. EXPERIMENTAL NETWORK SETUP
For this analysis we proposed three test approaches like peer machine interaction, mobiel nodes
within a cloud, mobile nodes between a cloud which uses a common programming aspect. Implementation is
done in JAVA and we used various classes supported as java.net and java.rmi. Different loads with different
files sizes and format like text, images and video file are used for the study. We use switches to interconnect
the mobile nodes.
a. P2P Transfer
In this peer-to-peer test method file retrieval is done by mobile client and mobile server running in the
different location but by giving the ip address of the machine and the port number 5011 for
communication.
b. Within a Mobile Cloud
For this scenario 64 nodes in a single switch is used. At various network traffic the files are retrieved
from one mobile node to another using socket and rmi.
c. Inter Mobile Cloud
We consider multiple nodes in multiple switches in light and heavy traffic loads.
5. RESULT AND DISCUSSIONS
The various file sizes ranging from 21kb to 56.5 mb are taken to study the similarities and
differences of the each model in a low to high traffic times.
In the Figure 3, Comparisons are made for file transfer within the same switch with file size 21kb on
six different slots and the roundtrip time is measured in milliseconds. Incase of using RMI the time slot is
almost the same where as in socket it varies from one point of time to another.
When the comparison is made between virtual cloud of keeping the same file size 21kb. In Figure 4
it is understood that whenever the file is accessed for the first time using RMI the roundtrip time is more as
compared to sockets and otherwise both yields the same time in delivery.
Figure 3. Text file retrieval within a mobile cloud Figure 4. Text File Retrieval in Inter Cloud Model
In Figure 5 it is clearly shown that using socket gives the best average round trip time when
compared with RMI. However the roundtrip time is reduced after the first time access in the registry in RMI.
The file transfer in the text file format the round trip time for all the three test models says both RMI
and Socket are best and both can be used which may varies in small deviation in time that too in
milliseconds.
In the Figure 6 Image file retrieval within a switch implies that RMI is the best by yielding a
minimum 297ms and 328ms for the initial access when compared to socket which gives maximum of 375ms
and 312ms at the minimum.
File Size of 21kb within cloud
0
50
100
150
200
250
1 2 3 4 5 6
Slots
Socket
RMI
Timein
Millise
conds
File Size 21kb between switches
0
500
1000
1500
1 2 3 4 5 6
Slot
Timein
Milliseconds
Socket
RMI
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938
1936
In the Figure 7 Image file retrieval between switches helps to know that whenever the first access is
made using RMI it takes more time and repeative access reduces the time for the same ile retrieval but it is
clearly know that the socket connection serves better for the single slot of access.
Figure 5. Text file retrieval in peer-to-peer Figure 6. Image file retrieval within a mobile cloud
Figure 7. Image File Retrieval between inter mobile
cloud
Figure 8. Image file retrieval in peer-to-peer
In the Figure 8 Image file retrieval in Peer-to-Peer Model RMI takes more time than the socket
connection. However it may be stated that using socket will be useful. Therefore the image files retrieval in
all the three models clearly state that using RMI in Switches and Socket in P2P will be the driving force for
the image file transfer.
In the Figure 9 a video file of size 56.6MB has been retrieved within switch implies that socket
gives the lesser time value when compared to the RMI value but RMI here is giving a constant value which
can be taken as a best case. Because sometimes it is much more required to achieve a constant time rate than
to achieve a variable lesser time rate.
Figure 9. Video File Retrieval within a mobile Cloud
File size 21kb Peer-to-Peer
0
100
200
300
400
500
600
1 2 3 4 5 6
Slot
TimeinMilliseconds
Socket
RMI
File Size 1.12mb within Switch
0
100
200
300
400
1 2 3 4 5 6
Slot
TimeinMilliseconds
Socket
RMI
File size 1.12mb Peer-to-Peer
0
200
400
600
800
1 2 3 4 5 6
Slot
TimeinMilliseconds
Socket
RMI
Filesize 56.5mb within switch
5000
5500
6000
6500
7000
1 2 3 4 5 6
Slot
TimeinMilliseconds
Socket
RMI
Int J Elec & Comp Eng ISSN: 2088-8708 
Herb Leaves Recognition using Gray Level Co-occurrence Matrix and Five Distance- … (R. Rizal Isnanto)
1937
In the Figure 10 when the same image retrieval has been performed between switches it is showing
that socket is giving batter performance that RMI. But the difference between both is very small, its of a few
millisecond. So keeping RMI’s facility in mind it is also can be taken as a preferred one for use in such bed.
In Figure 11 the same operation has been performed in a peer to peer environment which depicts
that socket and RMI both are giving similar kind of time value. However it may be stated that using socket
will be more useful.
Therefore in case of video file retrieval in all three models socket is favorable within switches and
RMI is favorable in P2P system environment.
Figure 10. Video File Retrieval between inter mobile
cloud
Figure 11. Video File Retrieval Peer-toPeer
6. CONCLUSION
The proposed mobile cloud model is an experimental study to understand the feasibility of forming
virtual cloud among mobile devices.This work fully focus on file retrival interms of text, image, video
formats and we planning to set up an environment to transfer virtual machine from one mobile device and to
another device which will help in many real time applications as extension of this work.
REFERENCES
[1] Rahimi, M. Reza, Nalini Venkatasubramanian, Sharad Mehrotra, and Athanasios V. Vasilakos, “MAPCloud:
mobile applications on elastic and scalable 2-tier cloud architecture”, In Utility and Cloud Computing (UCC), IEEE
Fifth International Conference on, pp. 83-90, IEEE, 2012.
[2] Fang, Weiwei, Yangchun Li, Huijing Zhang, Naixue Xiong, Junyu Lai, and Athanasios V. Vasilakos, “On the
throughput-energy tradeoff for data transmission between cloud and mobile devices”, Information Sciences, 283,
pp. 79-93, 2014.
[3] Mashayekhy, Lena, Mahyar Movahed Nejad, Daniel Grosu, and Athanasios V. Vasilakos, “An online mechanism
for resource allocation and pricing in clouds”, IEEE transactions on computers, vol. 65, no. 4, pp. 1172-1184,
2016.
[4] Meena Jose, Sneha Baby Thomas, Merris Mary Chacko, R.K. Nadesh, “Cloud Based Health Monitoring System”,
published in International Journal of Advanced Research in Computer Science, vol. 3, no. 5, pp. 283-286,
Sep-Oct 2012.
[5] Mahendra Kumar Gourisaria, S. S. Patra , P. M. Khilar, “Minimizing Energy Consumption by Task Consolidation
in Cloud Centers with Optimized Resource Utilization”, International Journal of Electrical and Computer
Engineering (IJECE), vol. 6, no. 6, pp. 3283-3292, December 2016.
[6] R. K. Nadesh, Meduri Jagadeesh and M. Aramudhan, “A Quantitative Study on the Performance of Cloud Data
Centre: Dynamic Maintenance Schedules with Effective Resource Provisioning Schema”, Indian Journal of
Science and Technology, vol. 8, no. 23, September 2015.
[7] Nadesh R. K, Mustaque Bin Rashid, Usama Aafaq Khwas, Darshan Katte, “Trust based mobile cloudlet
coordinator selection method for heterogeneous mobile cloud”, International Journal of Pharmacy and
Technology, vol. 8, noo.4, pp. 25802-25806, Dec-2016.
[8] Toni Mastelic, Ariel Oleksiak, Holger Claussen, Ivona Brandic, Jean-Marc Pierson, and Athanasios V. Vasilakos,
“Cloud Computing: Survey on Energy Efficiency”, ACM Comput. Surv., vol. 47, no. 2, pp. 33, 2014.
[9] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini Venkatasubramanian “Mobile
cloud computing: A survey, state of art and future directions”, Mobile Networks and Applications, vol. 19, no. 2 ,
pp. 133-143, 2014.
Filesize 56.5mb between switch
0
2000
4000
6000
8000
10000
12000
14000
1 2 3 4 5 6
Slot
TimeinMillisecond
Socket
RMI
Filesize 56.5 mb Peer-to-Peer
0
5000
10000
15000
20000
1 2 3 4 5 6
Slot
Timeinmillsecond
Socket
RMI
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938
1938
[10] Meduri Jagadeesh, R.K. Nadesh, “Minimization of System Resources for cloud based application using web
browser add-on”, International Journal of Engineering and Technology, vol. 5, no. 3, pp. 2777-2784,
June-July, 2013.
[11] K. Lakshmi Narayanan, Nadesh R.K, “Elastic Calculator: A mobile Application for windows mobile using mobile
cloud services”, International Journal of Engineering and Technology, vol. 5, no. 3, pp. 2759-2764, June-July,
2013.
[12] Tamanna Jena, J. R. Mohanty, “Disaster Recovery Services in Intercloud Using Genetic Algorithm Load
Balancer”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4, pp. 1828-1838,
August, 2016
[13] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini Venkatasubramanian, “Mobile
cloud computing: A survey, state of art and future directions”, Mobile Networks and Applications, vol. 19, no. 2,
pp. 133-143, 2014.
[14] Bharat Khatavkar and Nadesh R.K, “A comparative study and performance evaluations for using reactive and
hybrid routing approaches in intra and inter communication in vanet”, International Journal of Pharmacy and
Technology, vol. 8, no. 3, pp. 17776-17783, Sep-2016.
[15] R.K. Nadesh, K. Arivuselvan, and Srinivasan Pathanjali, “A Quantitative Review on Introducing the Election
Process with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce”, Indian Journal
of Science and Technology, vol. 9, no. 39, October 2016.
[16] Bahar Asgari, Mostafa Ghobaei Arani, Sam Jabbehdari, “An Effiecient Approach for Resource Auto-Scaling in
Cloud Environments”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 5,
pp. 2415-2424, October 2016.
[17] Rahimi, M. Reza, Nalini Venkatasubramanian, and Athanasios V. Vasilakos, “MuSIC: Mobility-aware optimal
service allocation in mobile cloud computing”, In Cloud Computing (CLOUD), 2013 IEEE Sixth International
Conference on, pp. 75-82. IEEE, 2013.
[18] Cai H., Gu, Y., Vasilakos, A., Xu, B. and Zhou, J., “Model-driven development patterns for mobile services in
cloud of things”, IEEE Transactions on Cloud Computing, 2016.

More Related Content

What's hot

Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITGovt. P.G. College Dharamshala
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery inambitlick
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...inventionjournals
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networkingIJCNCJournal
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Istabraq M. Al-Joboury
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20reportAnmol Tikoo
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the CloudIJCNC
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET Journal
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...IJCNCJournal
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelijcsit
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud ComputingIJERA Editor
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationspoojagupta010
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter9505567198
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya pptMaurya Shah
 

What's hot (20)

121 124
121 124121 124
121 124
 
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & ITIntroduction of Cloud Computing By Pawan Thakur HOD CS & IT
Introduction of Cloud Computing By Pawan Thakur HOD CS & IT
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
Key management in information centric networking
Key management in information centric networkingKey management in information centric networking
Key management in information centric networking
 
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
Performance Analysis of Internet of Things Protocols Based Fog/Cloud over Hig...
 
Sdn03
Sdn03Sdn03
Sdn03
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20report
 
A New Improved Storage Model of Wireless Devices using the Cloud
A New Improved Storage Model of  Wireless  Devices using the CloudA New Improved Storage Model of  Wireless  Devices using the Cloud
A New Improved Storage Model of Wireless Devices using the Cloud
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant NetworkIRJET- Fog Route:Distribution of Data using Delay Tolerant Network
IRJET- Fog Route:Distribution of Data using Delay Tolerant Network
 
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
CONTAINERIZED SERVICES ORCHESTRATION FOR EDGE COMPUTING IN SOFTWARE-DEFINED W...
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Core of Cloud Computing
Core of Cloud ComputingCore of Cloud Computing
Core of Cloud Computing
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Aj04602248254
Aj04602248254Aj04602248254
Aj04602248254
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
 
Teja pp matter
Teja pp matterTeja pp matter
Teja pp matter
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
140320702029 maurya ppt
140320702029 maurya ppt140320702029 maurya ppt
140320702029 maurya ppt
 

Similar to An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Environment

A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsIJORCS
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...HarshitParkar6677
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...IJCNCJournal
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...journalBEEI
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...IRJET Journal
 
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfSuitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfDr. Richard Otieno
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...IJCSIS Research Publications
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingSouvik Pal
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingijccsa
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...IJTET Journal
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...pharmaindexing
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systemsijwmn
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...IJIR JOURNALS IJIRUSA
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resourcecsandit
 

Similar to An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Environment (20)

A Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated CloudsA Threshold Secure Data Sharing Scheme for Federated Clouds
A Threshold Secure Data Sharing Scheme for Federated Clouds
 
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
Mobile Fog: A Programming Model for Large–Scale Applications on the Internet ...
 
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
PROCEDURE OF EFFECTIVE USE OF CLOUDLETS IN WIRELESS METROPOLITAN AREA NETWORK...
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
Live migration using checkpoint and restore in userspace (CRIU): Usage analys...
 
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...Decision to offload the task to Cloud for increasing energy efficiency of Mob...
Decision to offload the task to Cloud for increasing energy efficiency of Mob...
 
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdfSuitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
Suitability_of_Addition-Composition_Full_Homomorphic_Encryption_Scheme.pdf
 
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
Suitability of Addition-Composition Fully Homomorphic Encryption Scheme for S...
 
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
A Virtualization Model for Cloud Computing
A Virtualization Model for Cloud ComputingA Virtualization Model for Cloud Computing
A Virtualization Model for Cloud Computing
 
Opportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computingOpportunistic job sharing for mobile cloud computing
Opportunistic job sharing for mobile cloud computing
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
ENHANCING SECURITY IN CLOUD COMPUTING BY COMBINING DYNAMIC BROADCAST ENCRYPTI...
 
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
Ijirsm choudhari-priyanka-backup-and-restore-in-smartphone-using-mobile-cloud...
 
Towards enhancing resource
Towards enhancing resourceTowards enhancing resource
Towards enhancing resource
 
Distributed system.pptx
Distributed system.pptxDistributed system.pptx
Distributed system.pptx
 

More from IJECEIAES

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...IJECEIAES
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionIJECEIAES
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...IJECEIAES
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningIJECEIAES
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...IJECEIAES
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...IJECEIAES
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...IJECEIAES
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...IJECEIAES
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyIJECEIAES
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationIJECEIAES
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceIJECEIAES
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...IJECEIAES
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...IJECEIAES
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...IJECEIAES
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...IJECEIAES
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...IJECEIAES
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...IJECEIAES
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...IJECEIAES
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...IJECEIAES
 

More from IJECEIAES (20)

Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...Cloud service ranking with an integration of k-means algorithm and decision-m...
Cloud service ranking with an integration of k-means algorithm and decision-m...
 
Prediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regressionPrediction of the risk of developing heart disease using logistic regression
Prediction of the risk of developing heart disease using logistic regression
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...Optimal model of vehicular ad-hoc network assisted by  unmanned aerial vehicl...
Optimal model of vehicular ad-hoc network assisted by unmanned aerial vehicl...
 
Improving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learningImproving cyberbullying detection through multi-level machine learning
Improving cyberbullying detection through multi-level machine learning
 
Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...Comparison of time series temperature prediction with autoregressive integrat...
Comparison of time series temperature prediction with autoregressive integrat...
 
Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...Strengthening data integrity in academic document recording with blockchain a...
Strengthening data integrity in academic document recording with blockchain a...
 
Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...Design of storage benchmark kit framework for supporting the file storage ret...
Design of storage benchmark kit framework for supporting the file storage ret...
 
Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...Detection of diseases in rice leaf using convolutional neural network with tr...
Detection of diseases in rice leaf using convolutional neural network with tr...
 
A systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancyA systematic review of in-memory database over multi-tenancy
A systematic review of in-memory database over multi-tenancy
 
Agriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimizationAgriculture crop yield prediction using inertia based cat swarm optimization
Agriculture crop yield prediction using inertia based cat swarm optimization
 
Three layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performanceThree layer hybrid learning to improve intrusion detection system performance
Three layer hybrid learning to improve intrusion detection system performance
 
Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...Non-binary codes approach on the performance of short-packet full-duplex tran...
Non-binary codes approach on the performance of short-packet full-duplex tran...
 
Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...Improved design and performance of the global rectenna system for wireless po...
Improved design and performance of the global rectenna system for wireless po...
 
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...Advanced hybrid algorithms for precise multipath channel estimation in next-g...
Advanced hybrid algorithms for precise multipath channel estimation in next-g...
 
Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...Performance analysis of 2D optical code division multiple access through unde...
Performance analysis of 2D optical code division multiple access through unde...
 
On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...On performance analysis of non-orthogonal multiple access downlink for cellul...
On performance analysis of non-orthogonal multiple access downlink for cellul...
 
Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...Phase delay through slot-line beam switching microstrip patch array antenna d...
Phase delay through slot-line beam switching microstrip patch array antenna d...
 
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...A simple feed orthogonal excitation X-band dual circular polarized microstrip...
A simple feed orthogonal excitation X-band dual circular polarized microstrip...
 
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
A taxonomy on power optimization techniques for fifthgeneration heterogenous ...
 

Recently uploaded

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Environment

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol. 8, No. 3, June 2018, pp. 1933~1938 ISSN: 2088-8708, DOI: 10.11591/ijece.v8i3.pp1933-1938  1933 Journal homepage: http://iaescore.com/journals/index.php/IJECE An Empirical study on Peer-to-Peer sharing of resources in Mobile Cloud Environment R. K. Nadesh1 , M. Aramudhan2 1 School of Information Technology and Engineering, VIT University, Vellore, India 2 Department of Information Technology, PKIET, Karaikal, India Article Info ABSTRACT Article history: Received Dec 9, 2016 Revised Mar 27, 2017 Accepted Apr 11, 2017 The increase usage of mobile users with internet and interoperability among the cloud services intensifies the role of distributed environemtnt in today’s real world application. Modern technologies are important for building rich, scalable and interoperable applications. To meet the requirements of client,the cloud service provider should offer adequate infrastructure especially under heavy multi-client load.To provide solution for large scale requirements and to statisfy the mobile client from the critical situation like lacking with bandwidth,connectivity issues,service completion ratio, we present adhoc virtual cloud model for different scenarios that include single and multiple client configurations with various file sizes of various file formats for retrieving files in the mobile cloud environement.We evaluate the strategies with the socket and RMI implemented using java and identify the best model for real world applications. Performance evaluation is done with the results obtained and recommends that when sockets and RMI can be appropriately used in peer-to-peer environment when the mobile user cannot connect directly to the cloud services. Keywords: Adhoc virtual cloud Mobile cloud Peer-to-peer RMI Socket Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: R.K.Nadesh, School of Information Technology and Engineering, VIT University, Vellore, India. Email: rknadesh@gmail.com 1. INTRODUCTION With heavy increase of computer system in our regular life, the usage of computer network also increases exponentially. The distributed environment provides the sharing the resource among the peers or execute a set of instruction in the peers [1], [2]. For the end user, it looks the job is completed in the machine itself but originally completed in the another machine and ensure their location, storage, replication, load balancing and functionality is well maintained [3], [4]. The cloud service provider provides anything as a service like Software-as-a-Service, Platform-as-a-Service, Infrastrcture-as-a-Service, Storage-as-a-Service, Database-as-a-Service etc [5]. Today potential mobile user look for mass storage location to store and access their files on the move with large set of applications like business application, healthcare application, gaming, e-learning [6], [7]. These require highest bandwidth and connectivity in the mobile device which is provided by the cellular network service provider in different forms like GSM/CDMA/UMTS/LTE and the device portability is more important [8]. Not all times, the connectivity is stronger on the move, if there is drop in connectivity the idea is to connect to the nearest local server referred as cloudlet and due to high mobility the connection state changes very often [9]. The next direction of the research in mobile cloud computing is to provide mobile cloudlet, a mobile device can act as a cloudlet and serve the need the moving user on demand [10]. Our focus is now identifying the mobile cloudlet and provide services to the user. We propose Peer-to- Peer environment where one mobile user share the resource of the other mobile user.
  • 2.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938 1934 In addition, we propose mobile cloud network where mobile device form a network and one device is constrained to be the master and identify the volunteering nodes and supports the demand of the moving user. 2. RELATED WORKS A cloudlet is a server or a collection of servers used to store files that can be accessed, with proper authorization rights, by any number of remote clients in the network [10], [11]. However,the distributed system is accepted worldwide to cater the needs of the end user. The rapid growth of the mobile user and the smart phones,availability of cloud services in a regional basis made the client user to access any kind of files in a minimum amount of time [12], [13]. When the client device retrieves a file from the cloudlet, the file appears as a normal file on the client machine, and the user is able to work with the file in the same ways as if it were stored locally on the workstation. Later, the file is returned to the central server and the client machine is not utilized to store the file [14]. However the cloudlet is also fixed and the mobility is provided by the Wi-Fi acces point but this has limitation that the mobile device should be within the range of the central server and covered by the access point [15]. The deployment cost for this model is also high and it is very useful when more client users are available [16]. Considering the less number of remote user interms of usage of cloudlet is less but interested in accessing the cloud service one such model designed is Virtual Mobile Cloud [17]. Any mobile device can volunteer the resource to the needed mobile user. The development of volunteering computing leads to the formation of Virtual Cloud using mobile devices [18]. However, to comprise the volunteers to share the resources some pricing schemes and the support is provided by the cloud service provider. 3. PROPOSED MOBILE CLOUD MODEL The volunteer devices may provide their resources in Peer-to –Peer fashion or redirects to the available device in the nearest place. In P2P sharing of resoruces, only the identification of the device will be shared via Bluetooth and the data transfer can be done using TCP/IP and the connection estabilishment is done viz socket or RMI. In a distributed environment we implement two way communications for sending different types of files of various sizes from one node to another. Figure 1 show the peer-to-peer mobile environment. Figure 1. Peer-to-peer mobile environment Virtual cloud is formed with support of master and slave model where master node has the details about the other nodes. When the end user needs the resoruces it is identified through the master node which is authorized by the concern service provider. Our coverage in this work is limited to a homogenous service provider community. The selection of mobile node is done by pricing schemes and the master node should have the highest resources including the good backup of battery. Figure 2. Virtual cloud with mobile devices
  • 3. Int J Elec & Comp Eng ISSN: 2088-8708  Herb Leaves Recognition using Gray Level Co-occurrence Matrix and Five Distance- … (R. Rizal Isnanto) 1935 In the Figure 2 stated virtual cloud model,the mobile client is initially connected to the cloud services using cellular network and when there is high latency the node is redirected to the nearest virtual cloud. In the virtual cloud, being a first time user request the designated master node to allocate the needed resources and identify to the volunteered nodes. 4. EXPERIMENTAL NETWORK SETUP For this analysis we proposed three test approaches like peer machine interaction, mobiel nodes within a cloud, mobile nodes between a cloud which uses a common programming aspect. Implementation is done in JAVA and we used various classes supported as java.net and java.rmi. Different loads with different files sizes and format like text, images and video file are used for the study. We use switches to interconnect the mobile nodes. a. P2P Transfer In this peer-to-peer test method file retrieval is done by mobile client and mobile server running in the different location but by giving the ip address of the machine and the port number 5011 for communication. b. Within a Mobile Cloud For this scenario 64 nodes in a single switch is used. At various network traffic the files are retrieved from one mobile node to another using socket and rmi. c. Inter Mobile Cloud We consider multiple nodes in multiple switches in light and heavy traffic loads. 5. RESULT AND DISCUSSIONS The various file sizes ranging from 21kb to 56.5 mb are taken to study the similarities and differences of the each model in a low to high traffic times. In the Figure 3, Comparisons are made for file transfer within the same switch with file size 21kb on six different slots and the roundtrip time is measured in milliseconds. Incase of using RMI the time slot is almost the same where as in socket it varies from one point of time to another. When the comparison is made between virtual cloud of keeping the same file size 21kb. In Figure 4 it is understood that whenever the file is accessed for the first time using RMI the roundtrip time is more as compared to sockets and otherwise both yields the same time in delivery. Figure 3. Text file retrieval within a mobile cloud Figure 4. Text File Retrieval in Inter Cloud Model In Figure 5 it is clearly shown that using socket gives the best average round trip time when compared with RMI. However the roundtrip time is reduced after the first time access in the registry in RMI. The file transfer in the text file format the round trip time for all the three test models says both RMI and Socket are best and both can be used which may varies in small deviation in time that too in milliseconds. In the Figure 6 Image file retrieval within a switch implies that RMI is the best by yielding a minimum 297ms and 328ms for the initial access when compared to socket which gives maximum of 375ms and 312ms at the minimum. File Size of 21kb within cloud 0 50 100 150 200 250 1 2 3 4 5 6 Slots Socket RMI Timein Millise conds File Size 21kb between switches 0 500 1000 1500 1 2 3 4 5 6 Slot Timein Milliseconds Socket RMI
  • 4.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938 1936 In the Figure 7 Image file retrieval between switches helps to know that whenever the first access is made using RMI it takes more time and repeative access reduces the time for the same ile retrieval but it is clearly know that the socket connection serves better for the single slot of access. Figure 5. Text file retrieval in peer-to-peer Figure 6. Image file retrieval within a mobile cloud Figure 7. Image File Retrieval between inter mobile cloud Figure 8. Image file retrieval in peer-to-peer In the Figure 8 Image file retrieval in Peer-to-Peer Model RMI takes more time than the socket connection. However it may be stated that using socket will be useful. Therefore the image files retrieval in all the three models clearly state that using RMI in Switches and Socket in P2P will be the driving force for the image file transfer. In the Figure 9 a video file of size 56.6MB has been retrieved within switch implies that socket gives the lesser time value when compared to the RMI value but RMI here is giving a constant value which can be taken as a best case. Because sometimes it is much more required to achieve a constant time rate than to achieve a variable lesser time rate. Figure 9. Video File Retrieval within a mobile Cloud File size 21kb Peer-to-Peer 0 100 200 300 400 500 600 1 2 3 4 5 6 Slot TimeinMilliseconds Socket RMI File Size 1.12mb within Switch 0 100 200 300 400 1 2 3 4 5 6 Slot TimeinMilliseconds Socket RMI File size 1.12mb Peer-to-Peer 0 200 400 600 800 1 2 3 4 5 6 Slot TimeinMilliseconds Socket RMI Filesize 56.5mb within switch 5000 5500 6000 6500 7000 1 2 3 4 5 6 Slot TimeinMilliseconds Socket RMI
  • 5. Int J Elec & Comp Eng ISSN: 2088-8708  Herb Leaves Recognition using Gray Level Co-occurrence Matrix and Five Distance- … (R. Rizal Isnanto) 1937 In the Figure 10 when the same image retrieval has been performed between switches it is showing that socket is giving batter performance that RMI. But the difference between both is very small, its of a few millisecond. So keeping RMI’s facility in mind it is also can be taken as a preferred one for use in such bed. In Figure 11 the same operation has been performed in a peer to peer environment which depicts that socket and RMI both are giving similar kind of time value. However it may be stated that using socket will be more useful. Therefore in case of video file retrieval in all three models socket is favorable within switches and RMI is favorable in P2P system environment. Figure 10. Video File Retrieval between inter mobile cloud Figure 11. Video File Retrieval Peer-toPeer 6. CONCLUSION The proposed mobile cloud model is an experimental study to understand the feasibility of forming virtual cloud among mobile devices.This work fully focus on file retrival interms of text, image, video formats and we planning to set up an environment to transfer virtual machine from one mobile device and to another device which will help in many real time applications as extension of this work. REFERENCES [1] Rahimi, M. Reza, Nalini Venkatasubramanian, Sharad Mehrotra, and Athanasios V. Vasilakos, “MAPCloud: mobile applications on elastic and scalable 2-tier cloud architecture”, In Utility and Cloud Computing (UCC), IEEE Fifth International Conference on, pp. 83-90, IEEE, 2012. [2] Fang, Weiwei, Yangchun Li, Huijing Zhang, Naixue Xiong, Junyu Lai, and Athanasios V. Vasilakos, “On the throughput-energy tradeoff for data transmission between cloud and mobile devices”, Information Sciences, 283, pp. 79-93, 2014. [3] Mashayekhy, Lena, Mahyar Movahed Nejad, Daniel Grosu, and Athanasios V. Vasilakos, “An online mechanism for resource allocation and pricing in clouds”, IEEE transactions on computers, vol. 65, no. 4, pp. 1172-1184, 2016. [4] Meena Jose, Sneha Baby Thomas, Merris Mary Chacko, R.K. Nadesh, “Cloud Based Health Monitoring System”, published in International Journal of Advanced Research in Computer Science, vol. 3, no. 5, pp. 283-286, Sep-Oct 2012. [5] Mahendra Kumar Gourisaria, S. S. Patra , P. M. Khilar, “Minimizing Energy Consumption by Task Consolidation in Cloud Centers with Optimized Resource Utilization”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 6, pp. 3283-3292, December 2016. [6] R. K. Nadesh, Meduri Jagadeesh and M. Aramudhan, “A Quantitative Study on the Performance of Cloud Data Centre: Dynamic Maintenance Schedules with Effective Resource Provisioning Schema”, Indian Journal of Science and Technology, vol. 8, no. 23, September 2015. [7] Nadesh R. K, Mustaque Bin Rashid, Usama Aafaq Khwas, Darshan Katte, “Trust based mobile cloudlet coordinator selection method for heterogeneous mobile cloud”, International Journal of Pharmacy and Technology, vol. 8, noo.4, pp. 25802-25806, Dec-2016. [8] Toni Mastelic, Ariel Oleksiak, Holger Claussen, Ivona Brandic, Jean-Marc Pierson, and Athanasios V. Vasilakos, “Cloud Computing: Survey on Energy Efficiency”, ACM Comput. Surv., vol. 47, no. 2, pp. 33, 2014. [9] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini Venkatasubramanian “Mobile cloud computing: A survey, state of art and future directions”, Mobile Networks and Applications, vol. 19, no. 2 , pp. 133-143, 2014. Filesize 56.5mb between switch 0 2000 4000 6000 8000 10000 12000 14000 1 2 3 4 5 6 Slot TimeinMillisecond Socket RMI Filesize 56.5 mb Peer-to-Peer 0 5000 10000 15000 20000 1 2 3 4 5 6 Slot Timeinmillsecond Socket RMI
  • 6.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 8, No. 3, June 2018 : 1933 – 1938 1938 [10] Meduri Jagadeesh, R.K. Nadesh, “Minimization of System Resources for cloud based application using web browser add-on”, International Journal of Engineering and Technology, vol. 5, no. 3, pp. 2777-2784, June-July, 2013. [11] K. Lakshmi Narayanan, Nadesh R.K, “Elastic Calculator: A mobile Application for windows mobile using mobile cloud services”, International Journal of Engineering and Technology, vol. 5, no. 3, pp. 2759-2764, June-July, 2013. [12] Tamanna Jena, J. R. Mohanty, “Disaster Recovery Services in Intercloud Using Genetic Algorithm Load Balancer”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 4, pp. 1828-1838, August, 2016 [13] Rahimi, M. Reza, Jian Ren, Chi Harold Liu, Athanasios V. Vasilakos, and Nalini Venkatasubramanian, “Mobile cloud computing: A survey, state of art and future directions”, Mobile Networks and Applications, vol. 19, no. 2, pp. 133-143, 2014. [14] Bharat Khatavkar and Nadesh R.K, “A comparative study and performance evaluations for using reactive and hybrid routing approaches in intra and inter communication in vanet”, International Journal of Pharmacy and Technology, vol. 8, no. 3, pp. 17776-17783, Sep-2016. [15] R.K. Nadesh, K. Arivuselvan, and Srinivasan Pathanjali, “A Quantitative Review on Introducing the Election Process with Cloud Based Electronic Voting and Measuring the Performance using Map Reduce”, Indian Journal of Science and Technology, vol. 9, no. 39, October 2016. [16] Bahar Asgari, Mostafa Ghobaei Arani, Sam Jabbehdari, “An Effiecient Approach for Resource Auto-Scaling in Cloud Environments”, International Journal of Electrical and Computer Engineering (IJECE), vol. 6, no. 5, pp. 2415-2424, October 2016. [17] Rahimi, M. Reza, Nalini Venkatasubramanian, and Athanasios V. Vasilakos, “MuSIC: Mobility-aware optimal service allocation in mobile cloud computing”, In Cloud Computing (CLOUD), 2013 IEEE Sixth International Conference on, pp. 75-82. IEEE, 2013. [18] Cai H., Gu, Y., Vasilakos, A., Xu, B. and Zhou, J., “Model-driven development patterns for mobile services in cloud of things”, IEEE Transactions on Cloud Computing, 2016.