Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure
<p>Super-peer network model.</p> "> Figure 2
<p>Proposed topology model. All connections between groups are based on the topology of the small world.</p> "> Figure 3
<p>Flowchart of the proposed method’s implementation process.</p> "> Figure 4
<p>Domain division’s hierarchical structure [<a href="#B41-sensors-23-07416" class="html-bibr">41</a>].</p> "> Figure 5
<p>Number of connections between clusters.</p> "> Figure 6
<p>Number of queries submissions in achieving the optimal answer in the first iteration of the flood algorithm.</p> "> Figure 7
<p>The number of queries submitted to achieve the best answer in the flood algorithm’s hundredth iteration.</p> "> Figure 8
<p>Number of question submissions in achieving the optimal answer in the first iteration.</p> "> Figure 9
<p>The number of question submissions required to obtain the best response in the hundredth iteration.</p> "> Figure 10
<p>Sum of the costs per repetition to achieve the answer.</p> "> Figure 11
<p>Average number of steps per repetition to achieve the answer.</p> "> Figure 12
<p>Comparison of the number of steps taken by the proposed method, flood, study [<a href="#B16-sensors-23-07416" class="html-bibr">16</a>], parallel diffusion algorithm and ISM method.</p> "> Figure 13
<p>Comparison of the number of steps taken by the proposed method in the number of different nodes, flood, study [<a href="#B16-sensors-23-07416" class="html-bibr">16</a>], parallel diffusion algorithm and ISM method.</p> "> Figure 14
<p>Comparing the number of steps taken by the proposed method with the number of different nodes.</p> "> Figure 15
<p>Comparison of execution time of the proposed algorithm and flood algorithm.</p> ">
Abstract
:1. Introduction
1.1. Peer-to-Peer System Characteristics
1.1.1. Ad-Hoc
1.1.2. Limited Capacity and Reliance on Members
1.2. Advantages of Peer-to-Peer Systems
- These systems enhance the system’s scalability by reducing the system’s reliance on centralized management.
- Because nodes communicate directly with one another, we won’t require ca costly structure to communicate with and manage the nodes.
- Because of its great scalability, it will be possible to increase the number of system nodes, thereby expanding the system’s available resources, and a powerful system will thus be formed.
1.2.1. Split and Reduce Costs
1.2.2. Improve Scalability and Reliability
1.2.3. Increase Autonomy
1.2.4. Anonymous
1.2.5. Model of Software Architecture
1.3. The Necessity and Importance of Conducting Research
- Improve scalability by sharing resources among members and minimizing dependency on a centralized server.
- Cost-effectiveness in terms of utilizing available resources and avoiding the need for costly infrastructure
- Capability to grow by completing all procedures in the final system
1.4. Hypotheses
- Peer-to-peer networks are highly significant today, and data replication is one of the primary issues of data management in peer-to-peer networks.
- Dynamic data replication is an effective method for controlling the volume of traffic and the performance of peer-to-peer networks.
- Data replication approaches based on intelligent searches have been used successfully for resource management concerns in cloud computing, grid networks, and other domains.
- In peer-to-peer networks, data replication operations are carried out using intelligent and hybrid processing algorithms.
- Synchronous updating of a copy of data by distinct nodes causes duplicates to diverge and collisions to occur. Dynamic data replication methods are employed for this purpose.
1.5. Peer-to-Peer Systems and Research Background
[29] | HRI | Try to select the best super node to refer to prevent duplication and fetching of queries between nodes in an area [30]. |
[31] | An intelligent fuzzy search method based on clustering topology | The existence of a cluster means that when a request for a particular object reaches the cluster, the request can be sent to the part of the cluster that has the best chance of finding the desired file and source [32]. |
[33] | Random-walk algorithm is used | The Random-walk algorithm is used to improve the response time [34]. In order to solve the flooding problem that causes problems, such as heavy traffic on the network |
[35] | object replacement | In this method, distributing a file within the network and repeating it between different nodes reduces the search pressure and also the time to find that file within the network [12]. |
[36] | From a data structure | Intelligent strategies based on the Digistra method and Storage Strategy Query categorizations classify the output results as approximate or accurate [37]. |
[38] | Maintain the node list | Each node holds a list of other nodes that are connected to a network. In this list, nodes that are directly connected to the node are referred to as neighboring nodes, and the number of these neighbors is considered a degree for this node. |
[39] | Schedule called CSS | Divides the optimization problem into several pieces and distributes them over the network so that it can be used to monitor lost information and retrieve missing pieces of information from neighboring peers [40]. |
[28] | Query | The search techniques considered by researchers today are very different and have many capabilities in the field of intelligence, some of which are discussed below. Data Grid is a distributed environment that deals with high-volume centralized data applications. |
[27] | OPRA | Compensates for time lags caused by node queries by pointing method |
[26] | RPAT | This detection method is based on calculating the similarity of data sources on the path of request and service nodes, which can be used in decentralized networks and dynamic algorithms due to the ability to create rules and optimize them. |
[25] | FIRE | In a peer-to-peer network environment, the DRS data replication strategy is used to improve data access, which reduces network latency and detects access algorithm changes, speeds up data access, reduces long-distance data transfers, and increases performance and reduces bandwidth. |
[24] | Data management for large organizations | This system has several dedicated storage engines and has high access through transparent duplication and automatic partitioning. |
[23] | Insert effective mass in a table | In this method, the planning phase is before the actual degrees. The use of parallel clusters, balance between interpolation and reduction of partition transfer costs with the development of operational capacity are the features of this method. |
[21] | Eestore | A principled distribution list with a duplication layer in the middle and a transaction management layer in the top layer. |
[20] | Blind lookup | Nodes do not hold any information about the location of documents, while in conscious methods, there is a distributed or centralized directory service that helps to search for the requested objects. |
2. Research Statement and Proposed Methods
2.1. Intelligent Object Search
- Choose the neighbor who provided the most results for earlier queries.
- Choose a neighbor who returns reply messages with the fewest stations on average. Fewer stations may mean that this neighbor is closer to nodes that have useful data.
- Choose the neighbor who has sent the most messages (of any type) since our client connected with the neighbor. The enormous quantity of messages suggests that the neighbor is stable, implying that we have been connected to it for a long time and that it can handle a significant flow of communications.
- Choose the neighbor who has the shortest message queue. The long message queue indicates that the neighbor level has reached saturation or that the neighbor has died.
2.2. Network Structure in a Peer-to-Peer System
2.3. The Proposed Structure
2.4. How to Select a Peer to Transmit Information
2.5. Local Indexing Policy
2.6. Routing Indices
2.7. How to Conduct a Client Queries
2.8. Search Algorithm
Algorithm 1: Pseudo-algorithm The proposed method for source search. |
FUNCTION MatchQueryLocalResource(query) localResource = NULL // Logic to match the query with the local resources in the cluster // … RETURN localResource FUNCTION FindNextBestNeighbor(query, toTry) nextBestNeighbor = NULL // Logic to find the next best neighbor using HRI (Hybrid Routing Index) // … RETURN nextBestNeighbor FUNCTION ForwardQueryToRecipient(query, recipient) // Logic to forward the query to the recipient // … // … // … // Ensure the query is forwarded to the recipient PRINT “Forwarding query to recipient:” + recipient FUNCTION SendResponseToRequester(query) // Logic to send the response back to the requester // … // … // Ensure the response is sent back to the requester PRINT “Sending response to requester” FUNCTION MainAlgorithm(requests) FOR EACH query IN requests localResource = MatchQueryLocalResource(query) IF localResource IS NULL THEN nextBestNeighbor = FindNextBestNeighbor(query, toTry) IF nextBestNeighbor IS NULL THEN recipient = Sender(query) ELSE recipient = nextBestNeighbor END IF ForwardQueryToRecipient(query, recipient) ELSE SendResponseToRequester(query) END IF END FOR |
2.9. In-Depth Explanation of the Proposed Method
- Choosing the Neighbor with Most Results: Selecting a neighbor who has provided the most results for previous queries.
- Choosing the Neighbor with Fewest Stations on Average: Preferring a neighbor who returns reply messages with the fewest stations on average. Fewer stations may indicate that the neighbor is closer to nodes with useful data.
- Choosing the Neighbor with the Most Messages Sent: Prioritizing a neighbor who has sent the most messages (of any type) since connecting with the current node. A higher number of messages suggests stability and an ability to handle significant communication.
- Choosing the Neighbor with Shortest Message Queue: Preferring a neighbor with the shortest message queue. A long message queue might indicate that the neighbor has reached saturation or is no longer active.
3. Simulation and Results
3.1. Simulation Environment
3.2. Initial Values
3.3. Simulated Peer-to-Peer System
3.4. The Implementation Process
3.5. A Peer-to-Peer System’s Data Structure
3.6. Clustering of Peers
3.7. Values of Parameters
3.8. Obtaining the Adjacency Matrix
3.9. How to Ask and Respond to Questions
3.10. Implement a Flood Algorithm in Query Transmission
3.11. The Proposed Method’s Results
3.12. Compare the Proposed Method
3.13. Comparison of Execution Times
- The suggested algorithm exhibits competitive execution times compared to the flood algorithm. This demonstrates the effectiveness of the proposed intelligent search mechanism and profile-based node selection in optimizing query processing.
- As the network size and complexity increase, the advantage of the suggested algorithm becomes more pronounced, showing its ability to handle larger-scale distributed environments efficiently.
- The flood algorithm, while straightforward, may suffer from increased run time as it involves broadcasting requests to all nodes, leading to higher network resource utilization and potential bottlenecks.
- On the other hand, the suggested algorithm, leveraging intelligent node selection and limited message exchanges, demonstrates better scalability and resource management, contributing to its overall reduced execution time.
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Shakarami, A.; Ghobaei-Arani, M.; Shahidinejad, A.; Masdari, M.; Shakarami, H. Data replication schemes in cloud computing: A survey. Cluster Comput. 2021, 24, 2545–2579. [Google Scholar] [CrossRef]
- Chang, C.-Y.; Yen, H.-C.; Deng, D.-J. V2V QoS Guaranteed Channel Access in IEEE 802.11p VANETs. IEEE Trans. Dependable Secur. Comput. 2016, 13, 5–17. [Google Scholar] [CrossRef]
- Javadpour, A.; Wang, G.; Rezaei, S. Resource management in a peer to peer cloud network for IoT. Wirel. Pers. Commun. 2020, 115, 2471–2488. [Google Scholar] [CrossRef]
- Cherba, S.; Barouchi, I. ZRR-P2P: Zone-Based Mechanism for Data Replication and Research Optimization in Unstructured P2P Systems. Ingénierie Systèmes d’Information 2021, 26, 23–32. [Google Scholar] [CrossRef]
- Masinde, N.; Graffi, K. Peer-to-Peer-Based Social Networks: A Comprehensive Survey. SN Comput. Sci. 2020, 1, 299. [Google Scholar] [CrossRef]
- Moreno-Díaz, R.; Pichler, F.; Quesada-Arencibia, A. Computer Aided Systems Theory—EUROCAST 2011: 13th International Conference, Las Palmas de Gran Canaria, Spain, 6–11 February 2011, Revised Selected Papers, Part 1; Springer: Berlin/Heidelberg, Germany, 2012. [Google Scholar]
- Ismail, A.; Kastner, W. Co-operative peer-to-peer systems for industrial middleware. In Proceedings of the 2016 IEEE World Conference on Factory Communication Systems (WFCS), Aveiro, Portugal, 3–6 May 2016; pp. 1–8. [Google Scholar]
- Shene, S.J.; Emmanuel, W.R.S. An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment. Peer-to-Peer Netw. Appl. 2021, 14, 2084–2098. [Google Scholar] [CrossRef]
- Yan, J.; Vyatkin, V. Distributed Software Architecture Enabling Peer-to-Peer Communicating Controllers. IEEE Trans. Ind. Inform. 2013, 9, 2200–2209. [Google Scholar] [CrossRef]
- Feng, S.; Chen, Y.; Zhai, Q.; Huang, M.; Shu, F. Optimizing computation offloading strategy in mobile edge computing based on swarm intelligence algorithms. EURASIP J. Adv. Signal Process. 2021, 2021, 36. [Google Scholar] [CrossRef]
- Javadpour, A.; Wang, G. cTMvSDN: Improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 2022, 78, 3477–3499. [Google Scholar] [CrossRef]
- Javadpour, A.; Abadi, A.M.H.; Rezaei, S.; Zomorodian, M.; Rostami, A.S. Improving load balancing for data-duplication in big data cloud computing networks. Cluster Comput. 2022, 25, 2613–2631. [Google Scholar] [CrossRef]
- Gage, J. Some Thoughts on How ICTs Could Really Change the World. In The Global Information Technology Report 2001–2002: Readiness for the Networked World; 2002; pp. 4–9. Available online: https://cyber.harvard.edu/itg/libpubs/gitrr2002_ch01.pdf (accessed on 1 August 2023).
- To, O.; On, C. Commitments to Action on Building a Sustainable Water Future. The Executive Office of the President. 2016. Available online: https://obamawhitehouse.archives.gov/sites/whitehouse.gov/files/documents/White_House_Water_Summit_commitments_report_032216_v3_0.pdf (accessed on 1 August 2023).
- Rahmani, A.M.; Mohammadi, M.; Mohammed, A.H.; Karim, S.H.T.; Majeed, M.K.; Masdari, M.; Hosseinzadeh, M. Towards Data and Computation Offloading in Mobile Cloud Computing: Taxonomy, Overview, and Future Directions. Wirel. Pers. Commun. 2021, 119, 147–185. [Google Scholar] [CrossRef]
- Javadpour, A.; Ja’fari, F.; Pinto, P.; Zhang, W. Mapping and embedding infrastructure resource management in software defined networks. Clust. Comput. 2023, 26, 461–475. [Google Scholar] [CrossRef]
- Mohammadi, S.; Pedram, H.; Abdi, S.; Farrokhian, A. An Enhanced Data Replication Method in P2P Systems. J. Comput. 2010, 2, 1–5. [Google Scholar]
- Xhafa, F.; Kolici, V.; Potlog, A.D.; Spaho, E.; Barolli, L.; Takizawa, M. Data Replication in P2P Collaborative Systems. In Proceedings of the 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, Victoria, BC, Canada, 12–14 November 2012; pp. 49–57. [Google Scholar]
- Charrada, F.B.; Ounelli, H.; Chettaoui, H. A Model for Dynamic Period in Data Grid Replication. Int. J. Model. Optim. 2013, 3, 163–166. [Google Scholar] [CrossRef]
- Yang, J.-P. Elastic Load Balancing Using Self-Adaptive Replication Management. IEEE Access 2016, 5, 7495–7504. [Google Scholar] [CrossRef]
- Zhang, Y.; Liu, L. Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs. IEEE Trans. Knowl. Data Eng. 2012, 24, 1556–1569. [Google Scholar] [CrossRef]
- Qi, X.; Qiang, M.; Liu, L. A balanced strategy to improve data invulnerability in structured P2P system. Peer-to-Peer Netw. Appl. 2020, 13, 368–387. [Google Scholar] [CrossRef]
- Lodi, S.; Sartori, C. Distributed Data Clustering in Multi-Dimensional Peer-To-Peer Networks. In Proceedings of the 21st Australasian Database Conference (ADC 2010), Brisbane, Australia, 18–22 January 2010; pp. 171–178. [Google Scholar]
- Marin, M.; Gil-Costa, V.; Hernandez, C. Dynamic P2P Indexing and Search Based on Compact Clustering. In Proceedings of the 2009 Second International Workshop on Similarity Search and Applications, Prague, Czech Republic, 29–30 August 2009; pp. 124–131. [Google Scholar]
- Raigoza, J.; Sun, J. Temporal join processing with the adaptive Replacement Cache—Temporal Data policy. In Proceedings of the 2014 IEEE/ACIS 13th International Conference on Computer and Information Science (ICIS), Taiyuan, China, 4–6 June 2014; pp. 131–136. [Google Scholar]
- Peng, L.; Man, Y. A novel data exchange model based on P2P and ontology. In Proceedings of the 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), Shenyang, China, 20–22 December 2013; pp. 1693–1696. [Google Scholar]
- Yang, D.; Fang, X.; Xue, G. OPRA: Optimal Relay Assignment for Capacity Maximization in Cooperative Networks. In Proceedings of the 2011 IEEE International Conference on Communications (ICC), Kyoto, Japan, 5–9 June 2011; pp. 1–6. [Google Scholar]
- Li, X.; Wu, J. Searching techniques in peer-to-peer networks. Asp. Ad Hoc Sens. Peer-to-Peer Netw. 2006, 1–31. [Google Scholar]
- Silhavy, R.; Senkerik, R.; Oplatkova, Z.K.; Prokopova, Z.; Silhavy, P. Artificial Intelligence Perspectives and Applications: Proceedings of the 4th Computer Science Online Conference 2015 (CSOC2015), Vol 1: Artificial Intelligence Perspectives and Applications; Springer International Publishing: Berlin/Heidelberg, Germany, 2015. [Google Scholar]
- Awaysheh, F.M.; Alazab, M.; Garg, S.; Niyato, D.; Verikoukis, C. Big Data Resource Management amp; Networks: Taxonomy, Survey, and Future Directions. IEEE Commun. Surv. Tutor. 2021, 23, 2098–2130. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, W. On Studying P2P Topology Based on Modified Fuzzy Adaptive Resonance Theory. In Computational Intelligence: International Conference on Intelligent Computing, ICIC 2006 Kunming, China, August 16–19, 2006 Proceedings, Part II; Huang, D.-S., Li, K., Irwin, G.W., Eds.; Springer: Berlin/Heidelberg, Germany, 2006; pp. 410–420. [Google Scholar]
- Liu, H.; Huizhu, X.; Dapeng, D.; Fengming, L.; Jian, S.; Haofei, M.; Qiang, W. Topology Identification of Low-voltage Transformer Area Based on Improved Particle Swarm Algorithm. J. Phys. Conf. Ser. 2021, 1972, 12049. [Google Scholar] [CrossRef]
- Liu, H.; Chen, G.; Chen, Y.; Chen, Q. A trust-based P2P resource search method integrating with Q-learning for future Internet. Peer-to-Peer Netw. Appl. 2015, 8, 532–542. [Google Scholar] [CrossRef]
- Pham, Q.-V.; Nguyen, D.C.; Mirjalili, S.; Hoang, D.T.; Nguyen, D.N.; Pathirana, P.N.; Hwang, W.J. Swarm intelligence for next-generation networks: Recent advances and applications. J. Netw. Comput. Appl. 2021, 191, 103141. [Google Scholar] [CrossRef]
- Zhou, X.; Lu, Z.; Gao, Y.; Yu, Z. An Effective Cooperative Caching Scheme for Mobile P2P Networks. In Proceedings of the 2014 International Conference on Computational Intelligence and Communication Networks, Bhopal, India, 14–16 November 2014; pp. 408–411. [Google Scholar]
- Wang, Y.; Song, B.; Wang, J.; Zhang, L.; Wang, L. Geometry-Based Distributed Spatial Skyline Queries in Wireless Sensor Networks. Sensors 2016, 16, 454. [Google Scholar] [CrossRef] [PubMed]
- Chen, Y.; Singh, G. Graph Indexing for Efficient Evaluation of Label-constrained Reachability Queries. ACM Trans. Database Syst. 2021, 46, 1–50. [Google Scholar] [CrossRef]
- Shen, H.; Liu, G.; Ward, L. A Proximity-Aware Interest-Clustered P2P File Sharing System. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1509–1523. [Google Scholar] [CrossRef]
- Shen, W.W.; Su, S.; Shuang, K.; Yang, F.C. SKIP: An efficient search mechanism in unstructured P2P networks. J. China Univ. Posts Telecommun. 2010, 17, 64–71. [Google Scholar] [CrossRef]
- Reddyvari, V.; Bobbili, S.C.; Parag, P.; Shakkottai, S. Mode-Suppression: A Simple, Stable and Scalable Chunk-Sharing Algorithm for P2P Networks. IEEE/ACM Trans. Netw. 2021, 29, 2548–2559. [Google Scholar] [CrossRef]
- Ebrahimi, M.; Rankoohi, S.M.T.R. An ant-based approach to cluster peers in P2P database systems. Knowl. Inf. Syst. 2015, 43, 219–247. [Google Scholar] [CrossRef]
HDD | Bandwidth | RAM | Number of CPU | Resources |
---|---|---|---|---|
5 TB | 10 GB | 32 GB | 8 | MAX |
500 GB | 2 GB | 2 GB | 2 | MIN |
100 GB | 1 GB | 256 MB | 1 | Step |
Storage | Bandwidth | RAM | CPU | Index Number | Cluster |
---|---|---|---|---|---|
23 | 9 | 31 | 7 | 4 | Cluster 1 |
43 | 6 | 19 | 7 | 8 | Cluster 2 |
48 | 9 | 18 | 4 | 3 | Cluster 3 |
11 | 8 | 25 | 4 | 7 | Cluster 4 |
14 | 10 | 16 | 7 | 5 | Cluster 5 |
12 | 6 | 19 | 3 | 10 | Cluster 6 |
14 | 10 | 16 | 7 | 5 | Cluster 7 |
48 | 9 | 18 | 4 | 3 | Cluster 8 |
9 | 7 | 3 | 5 | 14 | Cluster 9 |
15 | 8 | 13 | 6 | 1 | Cluster 10 |
48 | 9 | 18 | 4 | 3 | Cluster 11 |
Cluster Head | Number of Indexes Stored | ||||
---|---|---|---|---|---|
1 | 5 | 23 | 25 | 30 | - |
2 | 4 | 9 | 19 | 26 | 27 |
3 | 7 | 9 | 15 | 19 | 32 |
4 | 6 | 7 | 16 | 25 | 26 |
5 | 5 | 7 | 14 | 25 | - |
6 | 15 | 17 | 20 | 29 | 30 |
7 | 2 | 17 | 19 | 28 | - |
8 | 3 | 9 | 23 | - | - |
9 | 1 | 12 | 16 | 19 | - |
10 | 2 | 15 | 29 | 30 | - |
Cluster Head | Number of Indexes Stored | ||||
---|---|---|---|---|---|
1 | 5 | 23 | 25 | 30 | 35 |
2 | 4 | 9 | 19 | 26 | 27 |
3 | 7 | 9 | 15 | 19 | 32 |
4 | 6 | 7 | 35 | 25 | 26 |
5 | 5 | 7 | 14 | 25 | - |
6 | 15 | 17 | 20 | 29 | 30 |
7 | 2 | 17 | 19 | 28 | - |
8 | 3 | 9 | 23 | - | - |
9 | 1 | 12 | 16 | 19 | 35 |
10 | 2 | 15 | 29 | 30 | - |
Value | Description | Parameter |
---|---|---|
1024 | Initial number of peers | n |
32 | number of peers in each cluster | eachCluster |
Group 1 | Group 2 | Group 3 | Group 4 | Group 5 | Group 6 | Group 7 |
---|---|---|---|---|---|---|
4 | 2 | 7 | 6 | 6 | 8 | 5 |
First Iteration | Tenth Iteration | Fiftieth Iteration | Seventieth Iteration | Hundredth Iteration |
---|---|---|---|---|
617 | 632 | 480 | 4101 | 3290 |
First Iteration | Tenth Iteration | Fiftieth Iteration | Seventieth Iteration | Hundredth Iteration |
---|---|---|---|---|
4.93 | 5.05 | 3.84 | 32.80 | 26.32 |
First Iteration | Tenth Iteration | Fiftieth Iteration | Hundredth Iteration |
---|---|---|---|
3 | 4 | 4 | 3 |
4 | 4 | 2 | 2 |
4 | 3 | 3 | 3 |
5 | 4 | 4 | 3 |
4 | 3 | 4 | 3 |
3 | 3 | 2 | 2 |
3 | 3 | 2 | 3 |
4 | 4 | 3 | 2 |
First Iteration | Tenth Iteration | Fiftieth Iteration | Seventieth Iteration | Hundredth Iteration |
---|---|---|---|---|
215 | 287 | 206 | 186 | 170 |
First Iteration | Tenth iteration | Fiftieth Iteration | Seventieth Iteration | Hundredth Iteration |
---|---|---|---|---|
1.73 | 2.31 | 1.66 | 1.5 | 1.4 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sangaiah, A.K.; Javadpour, A.; Pinto, P.; Chiroma, H.; Gabralla, L.A. Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure. Sensors 2023, 23, 7416. https://doi.org/10.3390/s23177416
Sangaiah AK, Javadpour A, Pinto P, Chiroma H, Gabralla LA. Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure. Sensors. 2023; 23(17):7416. https://doi.org/10.3390/s23177416
Chicago/Turabian StyleSangaiah, Arun Kumar, Amir Javadpour, Pedro Pinto, Haruna Chiroma, and Lubna A. Gabralla. 2023. "Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure" Sensors 23, no. 17: 7416. https://doi.org/10.3390/s23177416
APA StyleSangaiah, A. K., Javadpour, A., Pinto, P., Chiroma, H., & Gabralla, L. A. (2023). Cost-Effective Resources for Computing Approximation Queries in Mobile Cloud Computing Infrastructure. Sensors, 23(17), 7416. https://doi.org/10.3390/s23177416