public class EAPCount {

	static int paperNo = 0;
	public static void main(String[] args) {
		Paper paper1 = new Paper();
		Paper paper2 = new Paper();
		Paper paper3 = new Paper();
		Paper paper4 = new Paper();
		Paper paper5 = new Paper();
		Paper paper6 = new Paper();
		Paper paper7 = new Paper();
		Paper paper8 = new Paper();
		Paper paper9 = new Paper();
		Paper paper10 = new Paper();
		String a1, b1, s2, a3, b3, c3, d3, e3;
		paper1.title = "Potential of Cloud Computing Architecture";
		paper1.a1 = "The cloud computing has amazed the vendors with the idea of pay-as-you-go payment of cloud architecture and grouping of allocation of resources on demand. Companies subscribes to cloud provides and use their services with payment as per use. It is cost effective for them to just pay and use service rather than maintain their own servers. Although considerable R&D reserves, the majority of vendor’s assistance fall far little of these standards. As enterprises have been testing with public cloud services and are practicing private cloud initiative within IT’s boundaries. Service suppliers are come across for ways to distribute differentiated cloud computing services to their clients very speedily.";
		paper1.b1 = "Grid computing seems to be a famous trend for few basic reasons that first it’s allow to use computer recourse more cost effectively, secondly the computing power of grid. Many problems that are not solved with traditional architecture of computer grouping, grid provides solution to those issues. Third its suggests that the many computer recourse can be agreeably and perchance synergistically connect and deal with as a cooperation toward a ordinary goal. Grid and cloud some time get mixed with each other, grid computing allows a numbers of computers to work jointly like a system whether cloud is a single computer that doing use computing and other task as cloud computing architecture. Classification focus on the architecture, virtualization management, services by cloud, fault tolerance, security and few other issues like load balancing, interoperability, and scalable data storage.As for support of virtualization, vSaaS solution has recommended. It allows for the software as a service architecture for cloud computing.";
		paper1.s2 = "";
		paper1.a3 = "This study goal is focusing to find out the potential and prospective of cloud computing architecture.";
		paper1.b3 = "";
		paper1.c3 = "";
		paper1.d3 = "";
		paper1.e3 = "The rest of this paper is organized as. Section II presents the related work. Section III details and Section IV concludes this paper.";

		paper2.title = "Design of cloud computing architecture for power system analysis";
		paper2.a1 = "With the scale of the power system expanding and its structure growing more and more complex, it becomes increasingly difficult to achieve security assessment, stability control as well as economic operation in the grid. Meanwhile, the explosive growth of network data brought about by increasing grid interconnection, and coordination of the network information conducted by distributed renewable energy, have created a greater challenge to the traditional power system analysis platform.";
		paper2.b1 = "";
		paper2.s2 = "Currently the power system analysis is based on the local fixed cluster or grid of computers, which has limited computing power, poor scalability, high upgrade costs, and low network resource utilization. These drawbacks are yet not very prominent, as the existing SCADA system of the grid is restrained in the substation level when collecting data, where the data sampling frequency is low, and the requirements of the system data is still not high enough [1]. But with the data explosion brought about by the trend of intelligence, the above-mentioned drawbacks would seriously affect the development of the grid.";
		paper2.a3 = "In this paper, combined with the advantages and core technology of cloud computing, the possible applications in power system analysis are explored, the architecture of power system analysis cloud platform is put forward, and a local private cloud platform Eucalyptus has been built, combined with the power system reliability evaluation on this platform, the advantages of which is verified.";
		paper2.b3 = "";
		paper2.c3 = "";
		paper2.d3 = "Cloud computing has emerged as a new paradigm for providing programmatic access to scalable Internet service venues [2]. It brings new opportunities to solve the problems of insufficient processing power and low resource utilization of power system analysis.";
		paper2.e3 = "";

		paper3.title = "Use of Cryptography in Cloud Computing";
		paper3.a1 = "";
		paper3.b1 = "Depend about it, and the terminology and concepts associated with it provide significant insight. Literature on cloud computing has blurred the real meaning of cloud computing. However, several companies make their service needs at the term “cloud computing” originates from network topology. A conventional cloud is shown in Fig. 1. Cloud computing refers to the conduct of practical applications or services in an Internet [1]. Cloud computing did not rapidly emerge; it may be traced back in some form to when computing systems had computing resources ,and practical applications that were remotely time-shared. Concerns have been raised regarding the different varieties of applications and their services fetched by clouds. In numerous cases, the devices and applications used in these services involve no extraordinary function. Many companies avail of services from the cloud. As in 2010, an instance of companies availing of cloud computing services produced the following: Microsoft has the Microsoft® SharePoint® online service, which allows content and business enterprise intelligence tools to be uploaded into the cloud and makes office practical applications available in the cloud. Google cloud storage delivering many services for formal users, and large infrastructure I.T companies [2]. In addition, Salesforce.com made their own cloud services for its customers [3]. Further, Vmforce, and other paid services aloes grown-up in cloud services nowadays [4]";
		paper3.s2 = "However, maybe till yet the cloud clue not clear, and a question may be given what, and why cloud computing exactly? Whose care has cloud platform, and what about the security, and encryption";
		paper3.a3 = "The following sections try to give a clear idea about service models z, characteristics, deployment models, advantages, and cryptography features with cloud computing.";
		paper3.b3 = "";
		paper3.c3 = "";
		paper3.d3 = "";
		paper3.e3 = "";

		paper4.title = "Elastic Framework for Augmenting the Performance of Mobile Applications Using Cloud Computing";
		paper4.a1 = "Smart phones, Mobile devices and mobile applications have enjoyed rapid development in recent years [1], [2]. Compared with current PC, mobile devices still cannot run data intensive applications, such as search, large-scale data management and mining, etc., and have limitations in battery power, scream size, wireless communication etc. [3],[4] The most attractive features of cloud computing lie on the capability in powerful computing capability and massive data storage as well as a new business model, which deliveries the computing resources as a utility.";
		paper4.b1 = "Mobile cloud computing is defined as an extension of cloud computing in which foundation hardware consists at least partly of mobile devices. This definition recognizes the opportunity to harness collective sensing, computational capabilities of multiple networked wireless devices to create a distributed infrastructure that supports a wealth of new applications.";
		paper4.s2 = "It is a complex issue that mobile applications move computing power and data storage away from mobile phones into the cloud. First, it will face to the partition problem. With the changes of the mobile environment, partition algorithm should achieve elastic partition in according to contextawareness. A variety of contextual information could impact the elastic partition results, such as battery level, connection quality, device loads, etc.";
		paper4.a3 = "we proposed elastic application model, a new application model supporting applications partitioned into multiple components, each of which can run autonomously from others. We proposed the elastic partition algorithm and the partition cost module.";
		paper4.b3 = "";
		paper4.c3 = "";
		paper4.d3 = "";
		paper4.e3 = "The rest of the paper is organized as follows. Section 2 is the discussion of related work of mobile cloud computing. Following that, respectively in the next two sections present cloud computing definitions and basic terminology of mobile cloud computing and its architectures then in section 5 present elastic partition algorithms, following that, respectively in the next two sections, would be the description of partition cost module and the evaluation. Fundamentally the conclusion lies in the last section.";

		paper5.title = "On Current Trends in Security and Privacy of Cloud Computing";
		paper5.a1 = "";
		paper5.b1 = "Cloud computing may have different meaning for different participants of the cloud. But, the common characteristics are on-demand scalability of highly available and reliable pooled computing resources, secure access to metered services from nearly anywhere and, displacement of data and services from inside to outside the organization. While aspects of these characteristics have been realized to a certain extent, cloud computing remains a work in progress.";
		paper5.s2 = "But, the security and privacy challenges persistent for the cloud computing and organizations or persons should take when outsourcing data, applications, and infrastructure to a cloud environment. To analyze the security and privacy issues, first the architecture and security risks should be defined hence well known.";
		paper5.a3 = "Therefore the article will start to provide some main concepts and architectural definitions of cloud computing in section 2.Then the article will continue by analyzing the security and privacy requirement in section 3. The section 4 includes the description of existent and new cryptographic tool to satisfy the specifically defined privacy requirements. Conclusion is presented as section 5.";
		paper5.b3 = "";
		paper5.c3 = "";
		paper5.d3 = "";
		paper5.e3 = "Therefore the article will start to provide some main concepts and architectural definitions of cloud computing in section 2.Then the article will continue by analyzing the security and privacy requirement in section 3. The section 4 includes the description of existent and new cryptographic tool to satisfy the specifically defined privacy requirements. Conclusion is presented as section 5.";

		paper6.title = "A QoS-AWARE SYSTEM FOR MOBILE CLOUD COMPUTING";
		paper6.a1 = "In recent years, cloud computing has been paid wide attention by both industry and academia. Cloud computing offers a number of advantages such as scalability, agility and economy efficiency, in comparison of traditional IT infrastructure [1]. It virtualizes physical and software resources and provides generic services, e.g., Infrastructure as a Service (IaaS), Software as a Service (SaaS), etc. Thus, providing QoS assurance for mobile cloud services requires a more advanced infrastructure and more effective mechanisms than traditional cloud services, e.g., based on Internet and personal computers.";
		paper6.b1 = "So, it is regarded as a new paradigm and it is dramatically changing the landscape of information technologies. Meanwhile, contributed by the rapid deployment of broadband wireless networks and fast growth of smart phones, more and more users are using mobile phones to access Internet services. Cloud computing is seen as the future of mobile [2]. There are some existing works on QoS assurance for cloud computing, e.g., QoS framework and various QoS mechanisms [4-9].";
		paper6.s2 = "However, cloud computing still faces a number of challenges, one of which is Quality of Service (QoS), i.e., how a service provider can ensure QoS for its cloud services [3]. Herein, QoS refers to a set of properties including objective ones (e.g., transmission rate, delay variance, packet loss, cost and reputation) and subjective ones (user experience, trust, privacy concern and satisfaction degree). Especially, there still lacks a comprehensive study on QoS for mobile cloud services. Notably, mobile cloud services are often affected by many specific factors, e.g., hardware and software limitations of mobile devices, signal strength of mobile networks, mobility of mobile users, etc.";
		paper6.a3 = "This paper presents a QoS aware system for mobile cloud services. The system provides a QoS framework to monitor the status of QoS in each mobile cloud service terminal. In particular, the system uses a number of QoS properties as key parameters to evaluate QoS. Based on the evaluation result, it adopts a suitable QoS mode to ensure the service quality at service provision and execution time. The system also considers other factors’ influence on different cloud service modes with regard to QoS, e.g., availability, stability, etc. This is generally neglected in the past work.";
		paper6.b3 = "";
		paper6.c3 = "";
		paper6.d3 = "The system also considers other factors’ influence on different cloud service modes with regard to QoS, e.g., availability, stability, etc.";
		paper6.e3 = "The rest of the paper is organized as follows. Section 2 briefly reviews related work. Section 3 proposes a QoS framework and algorithms for mobile cloud service, followed by simulation evaluation in Section 4. Conclusions and future work are presented in the last section.";

		paper7.title = "Virtualization-Level Security in Cloud Computing";
		paper7.a1 = "";
		paper7.b1 = "Cloud computing is a network-based environment that focuses on sharing computations and resources. Basically, clouds are Internet-based and try to disguise complexity for clients. Cloud providers use virtualization technologies combined with self-service abilities for computing resources via network infrastructure especially the Internet. In cloud environments multiple VMs (VM) hosted on the same physical server as infrastructure. In cloud, customers only have to pay for what they use. Cloud computing refers to both the applications delivered as services over the Internet and the hardware and systems software in the data centers that provide those services.";
		paper7.s2 = "";
		paper7.a3 = "";
		paper7.b3 = "";
		paper7.c3 = "";
		paper7.d3 = "";
		paper7.e3 = "";

		paper8.title = "An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing ";
		paper8.a1 = "With the rapidly development of mobile devices, people can easily use electronic service any time everywhere. Remote user authentication becomes a very important ingredient procedure for the cloud computing to verify whether a remote user is legal through any insecure channel.";
		paper8.b1 = "Several studies have provides some schemes for remote authentication. For instance, Rivest et al. [1] propo sed a public-key cryptosystems (PKC) to authenticate remote us er in 1978. However, their scheme needs to compute the modular exponentiation time cost for a public-key cryptosystems. Later, Lamport [2] proposed a password based remote user authentication scheme for servers to verify users’ identifications, which is a good idea for establishing efficient applications of Internet-based systems. Later, many studies provided similar approaches [3-9] to enhance Lamport’s method which can certify remote users by hash function and verifier table. For instance, Hwang’s [9] scheme can authenticate pa sswords without accessing passwords tables, which is able to avoid the attack of stealing verifier table from servers by th e smart cards. Furthermore, to solve the heavy computation cost of public-key cryptosystems, Miller(1986) [10] and Koblitz (1987) [11] proposed an Elliptic Curve Cryptosystem (ECC) based mechanism to solve the heavy computation cost of KPC. Later, many studies provided  different analyses and applications using ECC [12-18]. In 2005, Tian et al. [19] proposed an analysis and improvement of ECC-based authenticated key exch ange protocol. Their scheme generates a share session key via Certificate authority (CA) center. In 2009, Yang and Chang [20] found that Tian et al.’s scheme needs a large storage sp ace to keep all users’ public keys and certifies, which is inefficient, and proposed an ID-based remote mutual auth entication with key agreement scheme on elliptic curve cryptosystem for remote devices.  Yang and Chang’s scheme performs more efficient than Tian et al.’s";
		paper8.s2 = "However, in this paper, we find that Yang and Chang’s scheme performs authentication without password-protection, which results in the risks of insider attack and impersonation attack.";
		paper8.a3 = "In this paper, we offer a more secured mutual authentication mechanism to resist the insecure risks.";
		paper8.b3 = "";
		paper8.c3 = "";
		paper8.d3 = "";
		paper8.e3 = "The remainder of this paper is organized as follows. Section 2 reviews the related works. Section 3 presents a cryptanalysis of Yang and Chang’s authentication mechanism. Section 4 presents an enhancement user authentication scheme for cloud computing. The security and performance analysis are in Section 5. Finally, the conclusion is made in Section 6. ";

		paper9.title = "Towards a Model-Driven Solution to the Vendor Lock-in Problem in Cloud Computing";
		paper9.a1 = "The benefits provided by cloud computing, such as ondemand resource provisioning, elasticity, and flexible pricing models, have attracted large companies [1], [2]. However, cloud computing is yet to deliver on its potential. Ideally, cloud users would be able to easily switch provider (i.e., portability [3]) to take advantage of better service, or price. Private and public clouds could integrate their services seamlessly to enable load balancing (i.e., interoperability [4]). Cloud providers could work together to create cloud federations to offer more reliable and powerful services [5].";
		paper9.b1 = "However, the reality of cloud computing today is somewhat different to this outlook. In particular, vendor lock-in is a significant barrier that must be overcome. Vendor lock-in refers to the dependency created between the cloud user and cloud provider since the cloud user deploys their software on the provider’s cloud platform [6]. This dependency is created due to the heterogeneity of the services offered by different cloud providers. Three types of solutions have been suggested to mitigate vendor lock-in for the cloud, namely: (i) standards [4]; (ii) abstraction layers and adapters [3]; and (iii) reducing accidental complexity, by adopting semantics and model-based solutions [7]. If cloud providers were to use common standards, both seamless integration amongst providers and portability become straightforward.";
		paper9.s2 = "However, standardization is not be an appealing solution for some cloud providers [3]. In addition, unless there is a well-accepted and widely used standard, it is a questionable solution [5]. The use of abstraction layers and adapters has been widely adopted by brokers, APIs, and platforms aiming to enable cloud portability and interoperability. An abstraction layer hides the differences between providers and exposes a uniform semantics and syntax. Limitations of abstraction layers include maintenance in response to changes made by a cloud provider, and the limited coverage of provider functionalities. Finally, a solution that has not yet been thoroughly explored is to reducing accidental complexity, which consists of abstracting the technical differences using some technique, such as Model- Driven Engineering (MDE). MDE is a principled approach to software engineering [8] that has sometimes been applied to achieve greater portability of software [9]. In addition to traditional development artefacts, MDE advocates the use of models and model management operations (such as model transformations). MDE models describe the design of the software being developed (e.g., by using UML notation), or other concepts in a domain of interest (e.g., the capabilities of a cloud platform). Model management operations generalise and automate recurring tasks, such as transforming or generating code from a model, and performing simulation and analysis on a model.";
		paper9.a3 = "The main contributions of the work carried out to address this research question will include: 1) Supporting technical and socio-technical aspects of cloud portability using MDE modelling and model management; 2) Decreasing the cost of the reengineering process through automated model transformations; and, 3) Providing models, tools and theories to enable the medium-term evaluation of the impact of switching cloud provider with respect to application, business and technology.";
		paper9.b3 = "As cloud portability is central to overcoming vendor lockin [10], and MDE has been used to address portability concerns in the past [9], we have proposed the following initial research question: To what extent can MDE be applied to support projects that seek to migrate applications across cloud providers (i.e. to achieve cloud portability)?";
		paper9.c3 = "";
		paper9.d3 = "";
		paper9.e3 = "";

		paper10.title = "Cloud Computing: The Fifth generation of Computing";
		paper10.a1 = "Internet is the connection from computer to computer all over the world. Domain of users has different taste to use Internet. People heavily depend on Internet because it is used for resource sharing, mailing, chatting and searching for information etc. Trend of using Internet is changing everyday.";
		paper10.b1 = "In the inception of the Internet, limited services were available but as soon as time fleeting, the services are increasing and the researchers are focusing to provide everything on Internet as service";
		paper10.s2 = "Another important aspect is our desktops having limited storage, memory, computing power and software etc. If user wants to store images, videos, documents in limited storage and suppose you want to install heavy software but if computer has limited hard disk and memory configuration, then computer doesn’t support these tasks. Data mining [2] applications can be a good example because some data mining applications process huge data  to find out useful pattern of information. So it may require more resources to process huge data as fast as possible. In that case you are required to increase your computing power, storage capacity and also the memory size. Sometimes we need to purchase licensed software to use them. So the users are restricted because of limited hardware and software configuration";
		paper10.a3 = "";
		paper10.b3 = "";
		paper10.c3 = "";
		paper10.d3 = "Cloud computing can break all these barriers. It is an extend of grid computing, distributed computing, and parallel computing where everything will be serve as service.";
		paper10.e3 = "";
		printWordCount(paper1);
		printWordCount(paper2);
		printWordCount(paper3);
		printWordCount(paper4);
		printWordCount(paper5);
		printWordCount(paper6);
		printWordCount(paper7);
		printWordCount(paper8);
		printWordCount(paper9);
		printWordCount(paper10);
	}

	public static void printWordCount(Paper paper) {
		paperNo++;
		System.out.println("Paper" + paperNo + ".1a=" + count(paper.a1));
		System.out.println("Paper" + paperNo + ".1b=" + count(paper.b1));
		System.out.println("Paper" + paperNo + ".2=" + count(paper.s2));
		System.out.println("Paper" + paperNo + ".3a=" + count(paper.a3));
		System.out.println("Paper" + paperNo + ".3b=" + count(paper.b3));
		System.out.println("Paper" + paperNo + ".3c=" + count(paper.c3));
		System.out.println("Paper" + paperNo + ".3d=" + count(paper.d3));
		System.out.println("Paper" + paperNo + ".3e=" + count(paper.e3));
		System.out.println();
	}

	public static int count(String s) {
		int sum = 0;
		for (int i = 0; i < s.length(); i++) {
			if (s.charAt(i) == ' ') {
				sum++;
			}
		}
		return sum;
	}
}

class Paper {
	String a1, b1, s2, a3, b3, c3, d3, e3;
	String title;
}