Revisions & Altercations in the Administration of Assets for Mobile Grid Computing
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 5
Abstract
This paper provides a discussion on the Mobile Grid concept, the revisions that this implies in the Grid technology and the altercations that have to be met in order to address the new computing paradigm, mainly focused on the aspect of resource administration, which is the heart of every Grid functionality. Grid computing has recently migrated from traditional high performance and distributed computing to pervasive and utility computing based on the advanced capabilities of the wireless networks and the lightweight, thin devices. This has as result the emergence of a new computing paradigm which is the Mobile Grid.
Authors and Affiliations
Aditya Vidyarthi , A. S. Saxena
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
Frequent pattern mining in databases plays a vital role in many data mining tasks like classification, sequential patters, clustering, association rules analysis etc. There are numerous mining algorithms for finding asso...
Hybrid Neuro-Fuzzy Systems for Software Development Effort Estimation
The major prevailing challenges for Software Projects are Software Estimations like cost estimation, effort estimation, quality estimation and risk analysis. Though there are several algorithmic cost estimation models in...
Devnagari Handwritten Numeral Recognition using Geometric Features and Statistical combination Classifier
This paper presents a Devnagari Numerical recognition method based on statistical discriminant functions. 17 geometric features based on pixel connectivity, lines, line directions, holes, image area, perimeter, eccentric...
Image Mining using Content Based Image Retrieval System
The image depends on the Human perception and is also based on the Machine Vision System. The Image Retrieval is based on the color Histogram, texture. The perception of the Human System of Image is based on the Human Ne...
Rapid and Proactive Approach on Exploration of Database Vulnerabilities
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...