Cloud-Based Impact for Mobile and Pervasive Environments: A Survey
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 4
Abstract
Mobile Cloud Computing (MCC) which combines mobile computing and cloud computing, has become one of the industry buzz words and a major discussion thread in the IT world since 2009. Despite increasing usage of mobile computing, exploiting its full potential is difficult due to its inherent problems such as resource scarcity, frequent disconnections, and mobility. MCC integrates the cloud computing into the mobile environment and overcomes obstacles related to the performance (e.g., battery life,storage, and bandwidth), environment (e.g., heterogeneity, scalability, and availability), and security (e.g., reliability and privacy) discussed in mobile computing. As MCC is still at the early stage of development, it is necessary to grasp a thorough understanding of the technology in order to point out the direction of future research. With the latter aim, this paper presents a review on the background and principle of MCC, characteristics, recent research work, and future research trends.
Authors and Affiliations
Sam Mathews M
Automated system for deployment of websites and windows services to the production servers
Abstract: This paper is discussed on automated system for deployment of websites and windows services to the production servers. The aim of this paper is to develop and implement an automatic system for deployment...
Comparative Study of Clustering Algorithms Used in CounterTerrorism
Abstract: Data mining can be used to model crime detection problems, detect unusual patterns, terroristactivities and fraudulent behaviour. We will look at k-means clustering with some enhancements to aid in thepro...
Prevent and Isolate Black Hole Attack in Manet Using Alarm Packets
Abstract: A mobile ad hoc network can be described as a wireless network which is a collection of heterogeneous mobile devices and is self-organizing, self-configuring. The security in MANET is a highly preferred researc...
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
The Data Analysis of Tencent Micro-blog User
Abstract: Micro-blog has been an important social network platform in recent years. With the advances in information influence and propagation ability, the date of micro-blog has attracted the attention of scholars of al...