VIRTUAL PRIVATE NETWORKING MOBILE COMPUTING
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
In mobile communications systems, mobile units are free to move at a local, regional, national level, track international, while providing communication. With the increasing use, mobile users wish to increasingly access Internet services during their travels, the opportunities offered by these technologies has given rise to a new paradigm "«mobile computing » This paradigm underlying the concept of availability or presence "in any place and at any time" certainly such mobility involves Internet and wireless technologies in a process to provide advanced services to nomadic users, however in order to be able to offer these services with satisfactory quality, you must face many challenges in relation to the reliability of services infrastructure, energy efficiency of mobile devices.
Authors and Affiliations
Ammar Es-Said,
Image Fusion Approach with NOISE REDUCTION USING GENETIC ALGORITHM & Sure-let Algorithm
Fusing information contained in multiple images plays an increasingly important role for quality inspection in industrial processes as well as in situation assessment for autonomous systems and assistance systems....
KINETIC OF THE PHYSICAL QUALITY CHANGES DURING DEEP FAT FRYING OF SWEET POTATO CHIP
Investigation was carried out to study kinetics of moisture loss, oil uptake, lightness and textural changes during deep fat frying of sweet potato (Ipomoea batatas L.) chip. Sweet potato slides of 2mm thickness w...
Behaviour of Encased Cold-Formed Trapezoidally Corrugated Web Beam
Built-up I-sections have been extensively used whenever standard I-sections could not satisfy the moment carrying and shear capacities required. In these built up sections it has been common practice to use more steel i...
Alert Aggregation Agent
Intrusion detection technique is important subtask that aggregates alert. Alert aggregation goal is to identify & to cluster different alert belonging to a specific attack instance which has been initiated by...
Data Aggregation Using Genetic Algorithm in Wireless Sensor Network
A sensor network consists of one or more “sinks”. The sensors in the network act as “sources” which detect environmental events and push relevant data to the appropriate sinks. Sensors transmit information towards the s...