ADAPTIVE COOPERATION OF MULTIPLE DEVICES IN MODEL DRIVEN DEVELOPMENT PATTERNS IN CLOUD
Journal Title: Elysium Journal of Engineering Research and Management - Year 2016, Vol 4, Issue 6
Abstract
Cloud computing is an internet based computing which store and access the data instead of the computer hard drive. The combination of cloud computing, mobile computing and wireless networks are called as mobile cloud computing. It provides rich computational resources to the mobile users, cloud providers and network operators. The endeavor of this development is to smooth the progress of mobile end user to make specially their mobile application which requirements based on replica ambitious blueprint and the obscure of possessions. The Mobile Users can able to generate their MicroApp based on their CoT pattern. The users can customize services for their own MicroApp, and then name the MicroApp and configure the same. The combination of the services are validated and checked for its feasibility and dependencies are added for the MicroApp. The key store password will sent to your registered mobile number. The MicroApp will be generated based on user requirements in server side using Ant build and after your successive login; user can generate Qrcode to access the Microapp from your Android device. Mobile End-Users can graphically customize their own applications directly on their mobile phone based on their cloud of things, mainly integrating the functionalities and services available on the device with the help of ant build and downloaded using Qrcode in the system.
Authors and Affiliations
Dhana Shree Liviya S, Ashly Angel P
AN INTEGRATED FRAMEWORK FOR PARALLEL TRAINING AND CLASSIFICATION OF ECG SIGNAL
Recently, various techniques are developed to analyze and classify the Electrocardiograph (ECG) signal to know the threaten results. Many real time development tools such as VLSI, DSP, etc., are availabl...
A Model for Trusted Cloud Computing with Remote Attestation
Enforcing an interactive pattern in any association will force it to behave in the predictable way thorough which it can be secured against any unauthorized access leading to a trusted atmosphere. Security declaration in...
IMPROVING SECURITY AND DEDUPLICATION FOR OUTSOURCED DATABASE IN CLOUD COMPUTING
To improve the security of data by using Elliptic Curve Cryptography (ECC) Algorithm. The duplicated data will be detected and avoid with a Secure Hash Algorithm (SHA). In many case when the dishonest Cloud Service Provi...
A SECURE AND RELIABLE WIRELESS DATA COMMUNICATION FOR SMART GRID
Power system incorporating an information network, is the key to realizing the smart grid vision, but also introduced a number of security issues. Lower the high cost of wireless protocol to communicate...
AN EFFICIENT AND SECURE POLICY UPDATE OUTSOURCING SCHEME FOR BIG DATA STORAGE IN CLOUD
Store the big data in cloud is a best and an effective option due to its high volume and velocity. Generally, the cloud has the capability to store the big data and to process the high volume of user access requests. In...