Downloads: 105 | Views: 295
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.9 / 10
Enhancement of High SRs and Low SDs of bTSE using Trace Based Simulation in Mobile Social Network
Rajesh Kumar, R. Hariharan
Abstract: In this paper we are going to proposed trace based simulation to enable user to share service review in service oriented mobile social network. Trace based simulation refers to system simulation performed by looking at trace of program execution or system component access with purposed performance prediction. Trace based simulation works on two component one that executes action and stores the result and another which reads the log files. The simulator reads log file and simulation performance of very large application based on the execution trace on much smaller number of nodes. Trace based mechanism will enhanced the submission rate because files are submitted in the log file and this mechanism also reduce the (SDs) submission delay increase the (SRs) submission relay in (TSE) trustworthy service evolution. This paper describes a new trace-based simulation technology that captures dependencies between social network messages observed in full-system simulation of multithreaded applications. Validation of protocols for these network relies almost exclusively on simulation. Using trace based simulation to study different network topologies and properties which can be done much faster unfortunately unless the traces that are used include information about dependencies between messages (packets), full system simulation is very slow the execution time can grow quadratic ally with increased node counts. These traces only include information about the order of and time between packet transmissions. Trace based simulation we have developed a technique that allows us to add dependency information to traces.
Keywords: Index terms- Trace based simulation, Log file, Mobile social network, bTSE
Edition: Volume 4 Issue 3, March 2015
Pages: 895 - 898
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 106
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 2173 - 2176Knowledge Retrieval from Web Server Logs Using Web Usage Mining
Naresh Kumar Kar, H. R. Sharma, Asha Ambhaikar
Downloads: 108
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2374 - 2376A Survey of Novel Clustering and Knowledge Extraction from Log
Vasim Dilawar Mujawar, Prof. Pratima Bhati
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 2225 - 2229A Novel Real Time Offline Patching Scheme with Secured Logging Over Cloud
Sunita, Shridevi Soma
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1360 - 1365Implementation of Highly Secured Log Management System over Cloud
Rajebhosale Sagar S., Pawar Anil B.
Downloads: 113
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017
Pages: 2451 - 2452Analysis to Improve Performance of Website Using Pattern Recognition Techniques
Neha Sharma