Open Access

ARTICLE

Database Recovery Technique for Mobile Computing: A Game Theory Approach

Magda M. Madbouly1, Yasser F. Mokhtar2, Saad M. Darwish1,*
1 Institute of Graduate Studies and Research, Alexandria University, Alexandria, Egypt
2 Assistant General Manager, IT Department, Egyptian Petrochemicals Co., Alexandria, Egypt
* Corresponding Author: Saad M. Darwish. Email:

Computers, Materials & Continua 2022, 70(2), 3205-3219. https://doi.org/10.32604/cmc.2022.019440

Received 13 April 2021; Accepted 27 June 2021; Issue published 27 September 2021

Abstract

Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system’s consistency. However, error tolerance technicality allows devices to continue performing their functions in the event of a failure. The aim of this paper is to identify the optimal recovery approach from among the available state-of-the-art techniques in MDS by employing game theory. Several of the presented recovery protocols are chosen and evaluated in order to determine the most critical factors affecting the recovery mechanism, such as the number of processes, the time required to deliver messages, and the number of messages logged-in time. Then, using the suggested payout matrix, the game theory strategy is adapted to choose the optimum recovery technique for the specified environmental variables. The NS2 simulator was used to carry out the tests and apply the chosen recovery protocols. The experiments validate the proposed model’s usefulness in comparison to other methods.

Keywords

Mobile computing; game theory; decision making; mobile database recovery

Cite This Article

M. M. Madbouly, Y. F. Mokhtar and S. M. Darwish, "Database recovery technique for mobile computing: a game theory approach," Computers, Materials & Continua, vol. 70, no.2, pp. 3205–3219, 2022.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 712

    View

  • 580

    Download

  • 0

    Like

Share Link

WeChat scan