Open Access   Article Go Back

Design of an Efficient Memory Management Model for Mobile Device Using C-Ram

Rajeev Kumar Bedi1 , Vandana 2 , Sunil Kumar Gupta3

  1. Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab India.
  2. Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab India.
  3. Department of Computer Science and Engineering, Beant College of Engineering and Technology, Gurdaspur, Punjab India.

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-3 , Page no. 149-156, Mar-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i3.149156

Online published on Mar 30, 2018

Copyright © Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta, “Design of an Efficient Memory Management Model for Mobile Device Using C-Ram,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.3, pp.149-156, 2018.

MLA Style Citation: Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta "Design of an Efficient Memory Management Model for Mobile Device Using C-Ram." International Journal of Computer Sciences and Engineering 6.3 (2018): 149-156.

APA Style Citation: Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta, (2018). Design of an Efficient Memory Management Model for Mobile Device Using C-Ram. International Journal of Computer Sciences and Engineering, 6(3), 149-156.

BibTex Style Citation:
@article{Bedi_2018,
author = {Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta},
title = {Design of an Efficient Memory Management Model for Mobile Device Using C-Ram},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {6},
Issue = {3},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {149-156},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1775},
doi = {https://doi.org/10.26438/ijcse/v6i3.149156}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i3.149156}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1775
TI - Design of an Efficient Memory Management Model for Mobile Device Using C-Ram
T2 - International Journal of Computer Sciences and Engineering
AU - Rajeev Kumar Bedi, Vandana,Sunil Kumar Gupta
PY - 2018
DA - 2018/03/30
PB - IJCSE, Indore, INDIA
SP - 149-156
IS - 3
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
529 251 downloads 242 downloads
  
  
           

Abstract

Cloud computing demand is expanding because of which it is essential to redress benefits within the sight of faults too. The Resources in cloud computing can be progressively scaled that too in a manner that is cost effective. Adaptation to non-critical failure is the way toward discovering faults and failures in a system. Mobile gadgets are portrayed by constrained and non-adaptable assets, for example, low handling power, inadequate essential memory and short battery life. Asset concentrated applications, for example, increased reality, counterfeit consciousness, simulated vision, protest following, picture handling and common dialect preparing are getting to be famous. These applications cannot be executed adequately on asset requirement mobile gadgets. Over the most recent couple of years impressive research has been done on Mobile Cloud Computing to expand the abilities of mobile gadgets. Different models and structures have been proposed to offload asset escalated parts of uses to cloud for productive execution. The system should work appropriately even if there is chance of failure happens or hardware failure or programming failure. Failure ought to be overseen viably for dependable Cloud Computing. It will likewise guarantee accessibility and robustness. This paper depicts a profile based approach for energy efficient mobile cloud computing environment.

Key-Words / Index Term

Cloud Computing, Faults, Failures, Energy Consumption

References

[1] T. H. Noor, Q. Z. Sheng, L. Yao, S. Dustdar, and A. H. H. Ngu, “CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 367–380, Feb. 2016.
[2] P. Zhang, S. Hu, J. He, Y. Zhang, G. Huang, and J. Zhang, “Building cloud-based healthcare data mining services,” Proc. - 2016 IEEE Int. Conf. Serv. Comput. SCC 2016, pp. 459–466, 2016.
[3] Z. Amin, “Review on Fault Tolerance Techniques in Cloud Computing,” vol. 116, no. 18, pp. 11–17, 2015.
[4] D. Singh, J. Singh, and A. Chhabra, “High availability of clouds: Failover strategies for cloud computing using integrated checkpointing algorithms,” Proc. - Int. Conf. Commun. Syst. Netw. Technol. CSNT 2012, pp. 698–703, 2012.
[5] B. Nicolae, “BlobCR : Efficient Checkpoint-Restart for HPC Applications on IaaS Clouds using Virtual Disk Image Snapshots.”
[6] B. H. Oh and J. Lee, “Constraint-based proactive scheduling for MPTCP in wireless networks,” Comput. Networks, vol. 91, pp. 548–563, 2015.
[7] T. Hirofuchi, H. Nakada, S. Itoh, and S. Sekiguchi, “Reactive Consolidation of Virtual Machines Enabled by Postcopy Live Migration,” pp. 11–18, 2011.
[8] J. Hursey, J. M. Squyres, T. I. Mattox, and A. Lumsdaine, “The Design and Implementation of Checkpoint / Restart Process Fault Tolerance for Open MPI ∗.”
[9] B. Schroeder and G. a. Gibson, “Disk failures in the real world: What does an MTTF of 1,000,000 hours mean to you,” Conf. File Storage Technol., no. September, pp. 1–16, 2007.
[10] G. Aupy, A. Benoit, M. E. M. Diouri, O. Glück, and L. Lefèvre, “Energy-Aware Checkpointing Strategies,” pp. 279–317, 2015.
[11] W. Chen, S. Member, R. Ferreira, E. Deelman, and T. Fahringer, “Dynamic and Fault-Tolerant Clustering for Scientific Workflows,” vol. 7161, no. FEBRUARY, pp. 1–14, 2015.
[12] K. Akherfi, M. Gerndt, and H. Harroud, “Mobile cloud computing for computation offloading : Issues and challenges,” Appl. Comput. Informatics, 2017.
[13] X. Chen, “Decentralized Computation Offloading Game for Mobile Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 26, no. 4, pp. 974–983, Apr. 2015.
[14] J. Xu and S. Pears, “A Dynamic Shadow Approach to Fault-Tolerant Mobile Agents in an Autonomic Environment,” Real-Time Syst., vol. 32, no. 3, pp. 235–252, Mar. 2006.
[15] X. Cui, B. Mills, T. Znati, and R. Melhem, “Shadow replication: An energy-aware, fault-tolerant computational model for green cloud computing,” Energies, vol. 7, no. 8, pp. 5151–5176, 2014.
[16] A. Tchana, L. Broto, and D. Hagimont, “Fault Tolerant Approaches in Cloud Computing Infrastructures,” no. c, pp. 42–48, 2012.
[17] A. Bala and I. Chana, “Fault Tolerance-Challenges , Techniques and Implementation in Cloud Computing Fault Tolerance- Challenges , Techniques and Implementation in Cloud Computing,” no. January 2012, 2015.
[18] D. Terry, “Toward a New Approach to IoT Fault Tolerance,” Computer (Long. Beach. Calif)., vol. 49, no. 8, pp. 80–83, 2016.
[19] I. P. Egwutuoha, S. Cheny, D. Levy, B. Selic, and R. Calvo, “Energy efficient fault tolerance for high performance computing (HPC) in the cloud,” IEEE Int. Conf. Cloud Comput. CLOUD, pp. 762–769, 2013.
[20] V. M. Sivagami, “Survey on Fault Tolerance Techniques in Cloud Computing Environment,” no. 9, pp. 419–425, 2015.
[21] G. A. Kaur and S. Sharma, “Fault Tolerance in Cloud Computing : A Review,” vol. 8491, pp. 94–98, 2017.
[22] S. Choi, K. Chung, and H. Yu, “Fault tolerance and QoS scheduling using CAN in mobile social cloud computing,” 2013.
[23] C. A. Chen, M. Won, R. Stoleru, and G. G. Xie, “Energy-efficient fault-tolerant data storage and processing in mobile cloud,” IEEE Trans. Cloud Comput., vol. 3, no. 1, pp. 28–41, 2015.
[24] R. Jhawar, V. Piuri, and M. Santambrogio, “A Comprehensive Conceptual System-Level Approach to Fault Tolerance in Cloud Computing,” pp. 0–4, 2012.
[25] S. K. Suman, “Effective Fault Tolerance Management in Cloud Computing,” vol. 6, no. 3, pp. 192–198, 2016.
[26] D.-W. Sun, G.-R. Chang, S. Gao, L.-Z. Jin, and X.-W. Wang, “Modeling a Dynamic Data Replication Strategy to Increase System Availability in Cloud Computing Environments,” J. Comput. Sci. Technol., vol. 27, no. 2, pp. 256–272, 2012.
[27] K. Ranganathan, A. Iamnitchi, and I. Foster, “Improving data availability through dynamic model-driven replication in large peer-to-peer communities,” 2nd IEEE/ACM Int. Symp. Clust. Comput. Grid, CCGrid 2002, pp. 0–5, 2002.
[28] D. Boru, D. Kliazovich, F. Granelli, P. Bouvry, and A. Y. Zomaya, “Energy-efficient data replication in cloud computing datacenters,” Globecom Work. (GC Wkshps), 2013 IEEE, pp. 446–451, 2013.
[29] W. Lang, J. M. Patel, and J. F. Naughton, “On energy management, load balancing and replication,” ACM SIGMOD Rec., vol. 38, no. 4, p. 35, 2010.
[30] J. Wang, X. Yao, and H. Zhu, “Exploiting in-memory and on-disk redundancy to conserve energy in storage systems,” IEEE Trans. Comput., vol. 57, no. 6, pp. 733–747, 2008.
[31] B. Mills, T. Znati, R. Melhem, and K. B. Ferreira, “Shadow Computing An Energy-Aware Resiliency Scheme for High Performance Computing.”
[32] M. Mishra and A. Das, “Dynamic resource management using virtual machine migrations,” IEEE Commun. Mag., vol. 50, no. September, pp. 34–40, 2012.
[33] K. Hwang, X. Bai, Y. Shi, M. Li, W.-G. Chen, and Y. Wu, “Cloud Performance Modeling with Benchmark Evaluation of Elastic Scaling Strategies,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 130–143, Jan. 2016.
[34] H. Wang, Z. Kang, and L. Wang, “Performance-Aware Cloud Resource Allocation via Fitness-Enabled Auction,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 4, pp. 1160–1173, Apr. 2016.
[35] K. Yang and X. Jia, “An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing,” IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 9, pp. 1717–1726, Sep. 2013.
Authors Profile

Rajeev Kumar Bedi is currently working as Assistant Professor in Beant College of Engineering and Technology, Gurdaspur (Punjab). He has completed B.Tech and Post graduation M.Tech from Punjab Technical University, Jalandhar. He is currently persuing Ph.D from Punjabi University, Patiala. He has published papers in reputed journals including Springers, Elsevier etc. His main Research work focusses on Cloud Computing, Mobile Cloud Computing and Wireless Netwok.

Mrs. Vandana is currently pursuing M.Tech (CSE) from Beant College of Engineering and Technology (BCET), Gurdaspur under IKG Punjab Tachnical University, Jalandhar, Punjab.
Dr. Sunil Kumar Gupta did B.E. in Computer Science from Gorakhpur University, Gorakhpur, India in 1988, and M.S. in 1991 and completed Ph.D. in Computer Science from Kurukshetra University, Kurukshetra, India. He possesses 28 years of teaching experience. He has worked as teaching faculty in many reputed institutions in India including N.I.T., Hamirpur (HP). Presently, he is working as Associate Professor in Computer Science & Engg. Department at Beant College of Engineering and Technology, Gurdaspur (India).He has more than 40 research publications. His work is published and cited in highly reputed journals of Elsevier, Springer, Taylor and Francis and IEEE. His areas of interest include database management systems, distributed systems, cloud computing and mobile computing and security.