Mobile Cloud Computing: A Emerging Technology, Its Advantages and Issues
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 10
Abstract
In spite of great advances in the mobile devices as a computing platform, applications is still very limited due to the poor computing capability of mobile devices and limited battery life. In order to overcome these obstacles compute intensive task are offloaded to the cloud to accelerate the computation on the mobile devices and thus improve the performance of application and extend the battery life of Smartphone.
Authors and Affiliations
Rushi Anil Phutane, Tushar Rane, S. T. Patil
Real Time Traffic Density And Vehicle Count Using Image Processing Technique
Monitoring Indian trafic and calculation of peak hours and density count in a day helps to develop necessary travel and traffic volume estimates, required to satisfy the needs in the are of road planning, constructio...
Performance Enhancement of Sliding Mode Control Using Fuzzy Logic: An Application And Analysis
Sliding mode control (SMC) is an efficient tool in design of robust controller for nonlinear plants. The main advantage of sliding mode control is order reduction and making the system practically independent of vari...
Design Of A Rceat Architecture For Detecting Multi- Bit Error In RFID
Radio Frequency Identification (RFID) plays an important role in Warehouse Management, especially during the automatic identification of items. Unfortunately, a warehouse environment has electromagnetic interferences...
Implementation of Node to Node Communication System on ARM 7 using CAN Bus
This project aims in designing a system which helps in monitoring and controlling multisingle chip communication system using CAN (Controller Area Network) protocol using LPC 2129 ARM. This system helps to achieve co...
A Survey of Techniques for Intrusion Detection System
In this paper we will discuss the various kinds of anomalous and malicious activities, which can be a symptoms of Intrusion. The term Intrusion detection was coined in 1980. Since then many Frameworks for Intrusion D...