<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>E2CT: Energy Efficient Cipher Technique Harshit Bhatia 1, Rahul Johari 2, Kalpana Gupta 3</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>REVAL India Private Limited</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gurugram</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>India</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>SWINGER (Security</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wireless IoT Network Group of Engineering</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Research) Lab</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>C-DAC</institution>
          ,
          <addr-line>NOIDA</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>USICT, GGSIP University</institution>
          ,
          <addr-line>Sector-16C, Dwarka, Delhi</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The conventional techniques for symmetric and asymmetric cryptography are not optimized for usage on handheld devices in their raw form. They do not focus on optimized usage of battery over mobile devices and hence drain significant battery when deployed over the wireless handheld devices. Furthermore, they make use of a limited domain of keys and a limited number of mathematical operations. The major portion of the existing traditional symmetric cipher techniques is covered by those that rely on a single key-function for generation of keys that are used to garble the plain-text to unintelligible text before sending it over an unsecure network. The increase in the number of encoding operations and keys add significantly to the strength of a cryptographic technique. This paper presents a power optimized symmetric key technique that aims to reduce battery footprint without compromising on security by using multiple keys coupled with multiple encryption operations.</p>
      </abstract>
      <kwd-group>
        <kwd>Green</kwd>
        <kwd>Symmetric</kwd>
        <kwd>Cryptography</kwd>
        <kwd>Encryption</kwd>
        <kwd>Decryption</kwd>
        <kwd>Energy Efficient</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        There exist plenty of cryptographic techniques that provide the security of the
sensitive data. [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. However, such traditional techniques were not aimed at catering to
the handheld devices with limited battery and resources. The techniques are not power
optimized and consume enormous amount of battery thus making them an unsuitable
choice for deployment in the mobile devices over the wireless network. The demand
for new and improved cryptographic techniques is high, especially for the intricate
hand-held devices that transmit sensitive information over network. The newer
techniques aimed for handheld devices need to be cheaper (in terms of battery
consumption) and faster without making any compromises with the security to ensure data
transmission at an overall lower energy cost. The technique proposed in this text is a
power optimized cryptographic approach aimed for mobile hand-held devices to
secure the data with minimal consumption of the energy and hardware resources. 1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Proposed System</title>
      <sec id="sec-2-1">
        <title>The cryptosystem</title>
        <p>The proposed system introduces a lightweight cipher technique that aims at reduction
of overall battery consumption over a mobile handled device without making heavy
compromises on data security. The power optimized version of the predecessor,
PentaPlicative Cipher Technique, also uses a set of five predefined keys as an input to a
symmetric key cipher technique. However, unlike the PentaPlicative technique, the
power optimized version makes use of much cheaper mathematical operations –
XOR. In order to disguise the true length of plaintext from the sniffer, the power
optimized technique also makes use of the bit-dispersion technique. The technique has
the strong grounds because of the multiple number of keys with multiple
mathematical operations, which makes it difficult to decipher the plain text and hence
effectively decreasing the overall probability of the cipher text to get decrypted by anyone
other than the intended recipient.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Related Work</title>
        <p>
          In [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] authors(s) present a new technique, the Cross-Language Cipher (CLCT)
Technique, which is aimed at securing the plaintext data by character mapping. In [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]
author(s) presented a new tool built in Java that demonstrates how the Dictionary attack
and Brute Force attacks are used to break the authentication and highlights the
Injection via SQL. In [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] authors presented a rudimentary cipher technique that is aimed at
providing the security by employing three set of pre-defined keys in the process of
encryption and decryption. In [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] author(s) presented the Pentaplicative Cipher
Technique which makes use of five keys to encrypt the plaintext input by the user. In [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]
author(s) had designed, implemented and evaluated a new Algorithm for Scheduling
that makes use of a neural network predictor model to power off the unused servers in
a Cloud computing environment and essentially reducing the consumption of power.
In [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] author(s) propose various queuing algorithms to utilize the resources and task
assignment is done in an efficient manner to ensure that the overall cost of operations
is reduced while also making it a cleaner approach by decreasing the ill-effects of the
data center on environment resulting in Green Eco System.
3
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Methodology</title>
      <p>The Energy Efficient extension of PentaPlicative cipher technique aims at being
readily used in mobile handheld devices. This expects the technique to be stricter
when it comes to resource consumption and in turn battery consumption. Considering
this, Energy Efficient Cipher technique makes use of caching principle to store the
keys to cut down the dependency of gathering keys from device’s GPS and physical
address for every operation performed. Furthermore, the technique is lightweight
without making significant compromises with the security.</p>
      <p>
        The GPS along with the mobile network data consumes a considerable amount of
battery from device, hence limiting the pings made to them for grabbing the location
helps in reduction of battery usage by a noticeable amount. Biggest culprits in faster
battery discharge is Screen brightness and CPU usage [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. The PentaPlicative Cipher
technique caters to this problem of on-screen time by reduction of screen brightness
during the process. The CPU and memory usage have been notably reduced by
employing garbage collection to free up memory and killing any lingering daemon
threads upon completion of encryption/decryption process, thereby making an
observable reduction in the overall battery consumption by the handheld device.
3.1
      </p>
      <sec id="sec-3-1">
        <title>Key Arrangement</title>
        <p>The Energy Efficient Cipher technique makes use of a set of five private keys (kept
secret) which are derived from the physical information of the handheld device. The
set of keys is unique to every device; hence authentication of sender can easily be
made. The IMEI number along with the location coordinates form the input key
vector. The five keys (K1, K2, K3, K4 and K5) are derived from the input domain as the
following text describes. The unique International Mobile Equipment Identity (IMEI)
number forms the first three keys (K1, K2, K3) with each key of length five integer
numbers and the other two keys (K4, K5) are given by first five integers (without
decimal) derived from latitude and longitude coordinates respectively. The length of keys
has been fixed to five to make computations faster and cheaper in terms of resource
consumption. This allows for an optimized lightweight technique that would limit the
actual battery discharge.</p>
        <p>Additionally, using the physical information available on devices decreases the
human intervention to bare minimum in the complete process, thus enabling the
technique to be easily plugged in with other data storage or transmission applications that
require data encryption.</p>
        <p>The caching mechanism is also embedded in the key generation process. This is
necessary because the key generation relies heavily on the physical information of the
device and this would require the technique to make connection to the network for
grabbing the location coordinates and reading of the hardware chipset for the IMEI
number. This entire process wastes many precious CPU cycles as well as adds an
additional burden by using the heavy battery sucking resources of the device. The
technique makes sure to close the network connections if there are cached keys
available to it and hence saving an appreciable number of unnecessary pings that would
have been wasted otherwise.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Encryption operation</title>
        <p>The paper introduces the technique with an example that draws by taking a sample
plaintext and sample keys portraying the encryption and decryption on input domain.
The technique, like its predecessor, also makes use of the ASCII character set. The
input characters of the plaintext are first converted into the decimal numbers by
making use of the ASCII character to decimal conversion and then further mathematical
operations are performed on them with the set of five input keys.</p>
        <p>In order to mask the true length of the Plaintext (PT), the technique makes use of an
operation called the “Bit-Dispersion”. This operation first converts the ASCII
characters to their corresponding decimal values and then converts the decimal values to a
Base2 Binary number. Each decimal number is thus converted to an 8-digit binary
number. These 8-digit binary numbers are grouped together to form a long stream of
binaries. The function further makes a group of 6 bits from this stream and then
converts this -bit binary number to the corresponding ASCII character. If there are any
remainder bits which are left after the grouping, are appending with padding of zeroes
to make it a 6-bit binary number and this is converted to the corresponding ASCII
character too. This new set of ASCII characters will be the final Cipher Text (CT)
which would be of a different length as the original Plaintext.</p>
        <p>There are five other pre-defined mathematical operations other than the
BitDispersion that the technique uses. These mathematical operations when performed in
a sequential manner would result in the Ciphertext (CT) which can then be sent out by
the sender to the receiver. These operations, denoted by E1, E2, E3, E4, E5, are as
follows:</p>
        <p>E1 = (PT XOR K1)
E2 = (E1 + K2) mod 256
E3 = (E2 * K3) mod 256
E4 = (E3 - K4) mod 256</p>
        <p>E5 = (E4 XOR K5)
CT = bit dispersion (E5)
(1)
(2)
(3)
(4)
(5)
(6)
The table 1and 2 depicts the process of encryption with the help of an example. The
example clearly defines the input domain of plaintext and secret set of keys, followed
by the set of encoding operations. Please note that for this example the keys that are
selected are very small and simplistic numbers to ease the demonstration of
mathematical operations, but in the practical world much larger keys would be used.
Plaintext (PT) - CIPHER
Let the private keys be:</p>
        <p>K1 = 17
K2 = 19
K3 = 17
K4 = 13
K5 = 15</p>
        <p>Final transmitted Cipher text for ‘CIPHER’ plaintext is $ 8$A3$@
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Decryption operation</title>
        <p>The Ciphertext received at the receiver’s end needs to be converted to the actual plain
text message and this process is called the decryption. In order to decrypt the garbled
cipher text message, the receiver also uses the same set of keys that sender used to
encrypt the message. The first step is to change the length of the cipher text to match
the original length of the plain text message. The Bit-dispersion operation that sender
performed needs to be neutralized by the reverse bit-dispersion mechanism. This
process now re-groups the 6-bit binary characters to the 8-bit binary characters and then
converts the 8-bit binary to the corresponding ASCII Character. The extra padding
bits in the form of zeroes, that were added during the Bit-Dispersion process are also
removed and the original length of plaintext is restored on received cipher text. This is
followed by the set of pre-defined mathematical operations using the set of private
keys to count the effects of encryption to finally obtain the original desired plaintext
message. The mathematical steps are denoted as D1, D2, D3, D4 and Dc denoted the
reverse bit-dispersion operation. The mathematical operations to compute the
plaintext (PT) on the receiver’s end are depicted as follows:</p>
        <p>Dc = reverse bit dispersion (CT)</p>
        <p>D1 = (Dc XOR K5)
D2 = (D1 + K4) mod 256
D3 = (D1 * K3-1) mod 256
D4 = (D3 – K2) mod 256</p>
        <p>PT = (D4 XOR K1)
The tables 3 and 4 depict the usage of the mathematical operations in the decryption
process by making use of an example. The example depicted here is an extension of
the same example depicted in Tables 1 and 2. The decryption operation takes in the
input the same set of five keys as private keys and also uses the output of encryption
operation as the input of decryption operation as a cipher text.
The modulo inverse of the Key K3 is denoted as K3-1 and is computed to be: 197
(satisfies K3 K3-1 ≡ 1 mod 256)
The mathematical operations cannot be applied directly to the plain text which is a
string of characters. Before the encryption operations may be applied, the plain text
character needs to be converted from the text format to the corresponding ASCII
decimal number value. Upon this ASCII decimal encoding, the encryption operation can
be summarized as a set of mathematical equations which when applied in the correct
order result in the final cipher text which can then be transmitted to the receiver. Each
individual encryption equation from the set of mathematical equations can be denoted
by En(x); and each equation when applied on the plain text, denoted by P(x), outputs
the final Cipher text which is denoted by C(x) as follows:</p>
        <p>C(x) = fdispersion (E5(x))
where, E5(x) = (E4(x) XOR K5(x)),
and, E4(x) = (E3(x) - K4(x)) mod 256,
and, E3(x) = (E2(x) * K3(x)) mod 256,
and, E2(x) = (E1(x) + K2(x)) mod 256,</p>
        <p>and, E2(x) = (P(x) XOR K1(x))</p>
        <p>
          The Bit-dispersion function in the above equations, is given by the function
fdispersion(En(x)) and the private keys are given by the function Kn(x), where n  [
          <xref ref-type="bibr" rid="ref1 ref5">1, 5</xref>
          ].
The length of the plain text is given as ‘n’ and that of cipher text is denoted by ‘m’
(13)
(14)
(15)
(16)
(17)
(18)
where n &lt; m, since the bit dispersion function eliminates the one-to-one character
mapping and thus changes the length of final cipher text.
1. The conversion of the string of characters into their corresponding ASCII decimal
numbers is the first operation which is performed. This encoding of plan text
characters can be represented as a function P(x), where P(x) comprises of individual
decimal values and each of these decimal value for ‘n’ number of characters of
plain text can be represented as P1(x) P2(x) P3(x) … Pn(x) and each character Pi(x)
represented in Base10 decimal value belongs to the range 0 ≤ Pi(x) ≤ 255.
2. Each encryption operation is a linear mathematical operation which involves the
five private keys and each encryption mathematical operation can be represented as
the function E(x) comprised of a mathematical operation (represented as  ) and a
key function K(x) and is represented as, Ei(x) = Ei-1(x)  Ki(x)
3. The Base10 decimal number that is obtained from the encryption functions E4(x)
needs to be converted to a Base2 binary number. This Decimal to Binary
conversion is carried out for each individual decimal number from the set of ‘n’ numbers
and for a decimal number represented as xi the binary number can be obtained as a
set of following procedure – “Keep dividing the quotient by 2 until the quotient is
0 and the all the remainder represented in a reverse order is the binary number”.
This can be illustrated as a set of equations:
        </p>
        <p>Q0 = xi / 2 remainder R0</p>
        <p>Q1 = Q0 / 2 remainder R1</p>
        <p>
          Qj = Qj-1 /2 remainder Rj, Qj  [
          <xref ref-type="bibr" rid="ref1">1, 0</xref>
          ]
Qj+1 = Qj / 2 remainder Rj+1, Rj+1  [
          <xref ref-type="bibr" rid="ref1">1, 0</xref>
          ]
(19)
(20)
(21)
(22)
(23)
(24)
(25)
(26)
R1
        </p>
        <p>The Base2 binary number representation of decimal integer xi is Rj+1Rj …. R2
4. The bit-dispersion function fdispersion groups all the 8-bit binary numbers together
and then combine them into a 6-bit binary number which is then converted back to
the Base10 decimal number. The binary numbers need to be converted back to the
decimal numbers and this Base2 to Base10 conversion involves, “multiplying the
sum total by 2 and adding the remainder bit to it” and is shown as follows for a
binary number Rj+1Rj …. R2R1 the final Decimal number is Dj+1:</p>
        <p>D1 = 2 x 0 + R1
D2 = 2 x D1 + R2
Dj = 2 x Dj-1 + Rj</p>
        <p>Dj+1 = 2 x Dj + Rj+1
5. Conclusively, these transformed decimal integers obtained as the result of
encryption operation E5(x) is mapped to an ASCII character each and this reverse ASCII
mapping gives the final Cipher text C(x) which is then returned to the receiver as
the message. This transmitted cipher text is of length ‘m’ which is greater than the
length of plaintext ‘n’, i.e. m &gt; n.
6. The average execution time is given by equation, T = (∆T0 +∆T1 +∆T2+ ∆T3+ ∆T4+
∆T5+ ∆T6+ ∆T7+∆T8+ ∆T9+∆T10) / 11.
7. The Time complexity can be computed and depicted in Big-Oh notation as ‘O(n)’
where ‘n’ is the length of the plaintext. The calculation of the Time taken for
various process is specified in table 5.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Results: PentaPlicative vs Affine Cipher Technique</title>
      <p>
        A comparison is drawn between two symmetric key techniques, PentaPlicative Cipher
technique and Affine Cipher technique. The PentaPlicative Cipher technique uses five
keys as opposed to the two-key cryptosystem of affine cipher. The use of limited keys
makes the affine cipher highly vulnerable to attacks that make use of a system of
linear equations to decipher the text. However, the use of increased number of keys and
operations coupled with the bit dispersion operation used in PentaPlicative cipher
technique makes it impenetrable to such attacks. It would be expected that since
affine cipher uses lesser keys and lesser operations, hence it would also result in a lower
consumption of battery than PentaPlicative. However, this would have been true if no
battery discharge optimizations were not included for PentaPlicative technique. It
makes use of cached keys thus reducing the hefty battery consumption as opposed to
the standard implementation of the affine cipher with the same input vector of keys of
IMEI number and location coordinates. The PentaPlicative also reduces screen
brightness and prompts garbage collection upon exit, thus making a significant
improvement in effectively curbing memory as well as battery utilization. Battery usage
and discharge speed were measured for both PentaPlicative and Affine Cipher using
AccBattery App [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. It reveals that battery usage for Affine Cipher is relatively
higher than PentaPlicative (Fig 1) and the former has a greater battery discharge speed
over the period (Fig 2). The CPU Usage along with foreground and background
battery usage has also been included for the comparative analysis of the two apps
provided by GSamBattery [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] and TrepnProfiler [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. It indicates a greater foreground
task and higher usage of CPU in the background and as result a larger resource
utilization for Affine Cipher (Fig 3 and 4). The obtained results have been briefed in the
mentioned table. Please note that the simulation of the Energy Efficient Cipher
Technique was carried out in a controlled environment (Table. 6). Both techniques were
coded as android applications and the performance results were measured under the
same conditions. The running time of Pentaplicative Cipher Technique is 1.9
milliseconds. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
The Energy Efficient Cipher technique is a Green Cryptographic technique that is
robust and lightweight to cater to the handheld devices. It has been optimized to make
minimal use of the hardware resources and to use light-weight operations to secure
the data. This, in turn, reduces the battery consumption by the Energy Efficient
Cipher Technique. The additional mechanisms implemented in the crypto system in
form of caching greatly reduce the number of CPU cycles and thereby significantly
reducing the battery consumption and making it a perfect fit for the hand-held
devices. Moreover, the reduction of human interaction in the process of the selection of
private keys by automatically selecting the five private keys as the physical
information of the device, contributes to the security and make it much more difficult for
the keys to be deciphered. Furthermore, the obtained results clearly support the
Energy Efficient Cipher Technique in terms of the battery drainage and CPU usage over a
less secure traditional affine cipher technique. Conclusively, the result is a strong
green cipher technique.
      </p>
    </sec>
    <sec id="sec-5">
      <title>References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Behrouz</surname>
            <given-names>A</given-names>
          </string-name>
          . Forouzan, “
          <article-title>Cryptography and Network Security”</article-title>
          ,
          <source>Tata McGraw-Hill Special Indian Edition</source>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>William</given-names>
            <surname>Stallings</surname>
          </string-name>
          . “
          <article-title>Cryptography and Network Security-Principles and Practices” Pearson Education</article-title>
          ,
          <source>fourth Edition</source>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>L.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Johari</surname>
          </string-name>
          .
          <article-title>"CLCT: Cross Language Cipher Technique."</article-title>
          <source>In International Symposium on Security in Computing and Communication</source>
          , pp.
          <fpage>217</fpage>
          -
          <lpage>227</lpage>
          . Springer International Publishing,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>I. Jain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Johari</surname>
          </string-name>
          , R.L Ujjwal “
          <article-title>CAVEAT: Credit Card Vulnerability Exhibition and Authentication Tool”</article-title>
          .
          <source>In: Second International Symposium on Security in Computing and Communications (SSCC‟14)</source>
          , pp
          <fpage>391</fpage>
          -
          <lpage>399</lpage>
          .Springer 2014.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>R.</given-names>
            <surname>Johari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bhatia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Singh</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Chauhan</surname>
          </string-name>
          . “
          <source>Triplicative Cipher Technique” Procedia Computer Science</source>
          <volume>78</volume>
          :
          <fpage>217</fpage>
          -
          <lpage>223</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Garg</surname>
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bhatia</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johari</surname>
            <given-names>R.</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Pentaplicative Cipher Technique</article-title>
          . In: Bhattacharyya S.,
          <string-name>
            <surname>Hassanien</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khanna</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pan</surname>
            <given-names>I</given-names>
          </string-name>
          . (eds) International
          <source>Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems</source>
          , vol
          <volume>55</volume>
          . Springer, Singapore.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Duy</surname>
            , Truong Vinh Truong,
            <given-names>Yukinori</given-names>
          </string-name>
          <string-name>
            <surname>Sato</surname>
            , and
            <given-names>Yasushi</given-names>
          </string-name>
          <string-name>
            <surname>Inoguchi</surname>
          </string-name>
          .
          <article-title>"Performance evaluation of a green scheduling algorithm for energy savings in cloud computing."</article-title>
          <source>In Parallel &amp; Distributed Processing, Workshops and Phd Forum (IPDPSW)</source>
          ,
          <source>2010 IEEE International Symposium on</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . IEEE,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Sanjeevi</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Viswanathan</surname>
          </string-name>
          .
          <article-title>"A green energy optimized scheduling algorithm for cloud data centers." In Computing and Network Communications (CoCoNet</article-title>
          ), 2015 International Conference on, pp.
          <fpage>941</fpage>
          -
          <lpage>945</lpage>
          . IEEE,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Shye</surname>
            , Alex,
            <given-names>Benjamin</given-names>
          </string-name>
          <string-name>
            <surname>Scholbrock</surname>
            , and
            <given-names>Gokhan</given-names>
          </string-name>
          <string-name>
            <surname>Memik</surname>
          </string-name>
          .
          <article-title>"Into the wild: studying real user activity patterns to guide power optimizations for mobile architectures."</article-title>
          <source>In Microarchitecture</source>
          ,
          <year>2009</year>
          . MICRO-
          <volume>42</volume>
          . 42nd Annual IEEE/ACM International Symposium on, pp.
          <fpage>168</fpage>
          -
          <lpage>178</lpage>
          . IEEE,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>10. AccuBattery Application downloaded from https://play.google.com/store/apps/details?id=com.digibites.accubattery&amp;hl=en</mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>11. GSamBattery Application downloaded from https://play.google.com/store/apps/details?id=com.gsamlabs.bbm&amp;hl=en</mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>12. TrepnProfiler Application downloaded from https://play.google.com/store/apps/details?id=com.quicinc.trepn&amp;hl=en</mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>