Comparison of RAM and CPU Usage Efficiency on Brave Browser and Microsoft Edge

Main Article Content

Armondha Ayesha Shakila
Emilda Amanda
Fasha Taffana Zahrie
Amarillis Annisa Octaviana

Abstract

The role of web browsers in today's digital age has become an integral part of daily life for internet users, with a variety of options available. Brave and Microsoft Edge are two popular browsers, each with its unique advantages, particularly in terms of performance and system resource efficiency. This study aims to compare the memory (RAM) and processor (CPU) efficiency of Brave and Microsoft Edge. The testing was conducted under two conditions: when the browser was idle and when it was actively used by the user, as well as in two scenarios with different numbers of tabs, namely 5 tabs and 10 tabs. The method used was a direct experiment using a laptop with mid-range specifications. Resource usage monitoring was conducted via the built-in Windows Task Manager. The results? Brave consistently showed more efficient RAM usage compared to Edge in all scenarios. Brave's CPU usage was also more efficient, especially when the browser was actively used. On the other hand, Microsoft Edge tended to use more resources, likely due to its strong integration with the Windows operating system and various background services running automatically, such as account synchronization and content updates. This finding could serve as a reference for users looking to choose a lighter browser, especially those using devices with limited specifications. 

Article Details

Section
Articles

References

[1] J. Ariza, M. Jimeno, R. Villanueva-Polanco, and J. Capacho, “Provisioning Computational Resources for Cloud-Based e-Learning Platforms Using Deep Learning Techniques,” IEEE Access, vol. 9, pp. 89798–89811, 2021, doi: 10.1109/ACCESS.2021.3090366.

[2] A. M. Mohamed, N. Mubark, and S. Zagloul, “Performance aware shared memory hierarchy model for multicore processors,” Sci Rep, vol. 13, no. 1, pp. 1–11, Dec. 2023, doi: 10.1038/S41598-023-34297-3;SUBJMETA.

[3] T. Ciesielczyk et al., “An approach to reduce energy consumption and performance losses on heterogeneous servers using power capping,” Journal of Scheduling, vol. 24, no. 5, pp. 489–505, Oct. 2021, doi: 10.1007/S10951-020-00649-4/FIGURES/7.

[4] Y. Wang, W. Zhang, M. Hao, and Z. Wang, “Online Power Management for Multi-Cores: A Reinforcement Learning Based Ap-proach,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 4, pp. 751–764, Apr. 2022, doi: 10.1109/TPDS.2021.3092270.

[5] D. Caputo, F. Pagano, G. Bottino, L. Verderame, and A. Merlo, “You Can’t Always Get What You Want: Towards User-Controlled Privacy on Android,” IEEE Trans Dependable Secure Comput, vol. 20, no. 2, pp. 975–987, Mar. 2023, doi: 10.1109/TDSC.2022.3146020.

[6] C. Troncoso et al., “Deploying decentralized, privacy-preserving proximity tracing,” Commun ACM, vol. 65, no. 9, pp. 48–57, Aug. 2022, doi: 10.1145/3524107.

[7] A. J. Harris, N. M. Foley, T. L. Williams, and W. J. Murphy, “Tree House Explorer: A Novel Genome Browser for Phylo-genomics,” Mol Biol Evol, vol. 39, no. 6, Jun. 2022, doi: 10.1093/MOLBEV/MSAC130.

[8] D. G. Ayele, Z. B. Tezera, N. G. Demissie, and A. W. Woretaw, “Correction to: Compliance with standard precautions and asso-ciated factors among undergraduate nursing students at governmental universities of Amhara region, Northwest Ethiopia (BMC Nursing, (2022), 21, 1, (375), 10.1186/s12912-022-01165-w),” BMC Nurs, vol. 22, no. 1, pp. 1–1, Dec. 2023, doi: 10.1186/S12912-023-01221-Z/METRICS.

[9] M. Yahuza et al., “Systematic review on security and privacy requirements in edge computing: State of the art and future research opportunities,” IEEE Access, vol. 8, pp. 76541–76567, 2020, doi: 10.1109/ACCESS.2020.2989456.

[10] V. Pini, V. Orso, P. Pluchino, and L. Gamberini, “Augmented grocery shopping: fostering healthier food purchases through AR,” Virtual Real, vol. 27, no. 3, pp. 2117–2128, Sep. 2023, doi: 10.1007/S10055-023-00792-1/FIGURES/4.

[11] D. Firmenich, S. Firmenich, G. Rossi, M. Wimmer, I. Garrigós, and C. González-Mora, “Engineering Web Augmentation soft-ware: A development method for enabling end-user maintenance,” Inf Softw Technol, vol. 141, p. 106735, Jan. 2022, doi: 10.1016/J.INFSOF.2021.106735.

[12] T. N. Witte, “Phantom malware: Conceal malicious actions from malware detection techniques by imitating user activity,” IEEE Access, vol. 8, pp. 164428–164452, 2020, doi: 10.1109/ACCESS.2020.3021743.

[13] C. Tomita, M. Takita, K. Fukushima, Y. Nakano, Y. Shiraishi, and M. Morii, “Extracting the Secrets of OpenSSL with RAM-Bleed,” Sensors 2022, Vol. 22, Page 3586, vol. 22, no. 9, p. 3586, May 2022, doi: 10.3390/S22093586.

[14] S. Zhuo, L. Sherlock, G. Dobbie, Y. S. Koh, G. Russello, and D. Lottridge, “Real-time Smartphone Activity Classification Using Inertial Sensors—Recognition of Scrolling, Typing, and Watching Videos While Sitting or Walking,” Sensors 2020, Vol. 20, Page 655, vol. 20, no. 3, p. 655, Jan. 2020, doi: 10.3390/S20030655.

[15] C. L. Caldiroli et al., “Comparing online cognitive load on mobile versus PC-based devices,” Pers Ubiquitous Comput, vol. 27, no. 2, pp. 495–505, Apr. 2023, doi: 10.1007/S00779-022-01707-8/METRICS.