Bandwith conservation framework for mobile cloud computing: challenges and solutions
Mobile devices are rapidly transforming the computing industry. It is emerging to be the super future computers. Challenges including network bandwidth limitation, availability and storage are among the limitations facing MCC as the number of mobile devices accessing the cloud services are rapidly...
| Main Authors: | Olanrewaju, Rashidah Funke, Egal, Abdallah, Khalifa, Othman Omran |
|---|---|
| Format: | Proceeding Paper |
| Language: | English English |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/39194/ http://irep.iium.edu.my/39194/1/39194_edited.pdf http://irep.iium.edu.my/39194/4/39194_conservation%20framework%20for%20mobile%20cloud%20computing_Scopus.pdf |
Similar Items
Development of heuristic task scheduling algorithm in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016)
by: Diallo, Laouratou, et al.
Published: (2016)
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
by: Khan, Burhan Ul Islam, et al.
Published: (2019)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Internet of things security vulnerabilities and recommended solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)
Critical challenges in access management schemes for smartphones: an appraisal
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
An adaptive and viable face identification for Android mobile devices
by: Mehraj, Tehseen, et al.
Published: (2019)
by: Mehraj, Tehseen, et al.
Published: (2019)
Cryptography as a Service (CaaS): Quantum cryptography for secure cloud computing
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2017)
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
by: Islam, Thouhedul, et al.
Published: (2017)
by: Islam, Thouhedul, et al.
Published: (2017)
Distortion-Free Digital Watermarking for Medical Images (Fundus) using Complex- Valued Neural Network
by: Khalifa, Othman Omran, et al.
Published: (2015)
by: Khalifa, Othman Omran, et al.
Published: (2015)
Cloud computing adoption model for universities to increase ICT proficiency
by: Okai , Safiya, et al.
Published: (2014)
by: Okai , Safiya, et al.
Published: (2014)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
The rise of internet of things and big data on the cloud: challenges and future trends
by: Laouratou, Diallo, et al.
Published: (2017)
by: Laouratou, Diallo, et al.
Published: (2017)
Measuring the road traffic intensity using neural network with computer vision
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
by: Hasan Gani, Muhammad Hamdan, et al.
Published: (2018)
QoS challenges in mobile environment
by: Mudathir, Muhammad Alfateh, et al.
Published: (2014)
by: Mudathir, Muhammad Alfateh, et al.
Published: (2014)
CDR analysis using big data technology
by: Elagib, Sara B., et al.
Published: (2016)
by: Elagib, Sara B., et al.
Published: (2016)
Design and implementation of a smart mobile phone jammer
by: Chebil, Jalel, et al.
Published: (2012)
by: Chebil, Jalel, et al.
Published: (2012)
Macro mobility scheme in NEMO to support seamless handoff
by: Islam, Shayla, et al.
Published: (2012)
by: Islam, Shayla, et al.
Published: (2012)
Secure annihilation of out-of-band authorization for
online transactions
by: Hussain, Sabahat, et al.
Published: (2018)
by: Hussain, Sabahat, et al.
Published: (2018)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Throughput analysis for the mobility of a consumer and an anchorless producer in NDN
by: Ahmed, muhammed Zaharadeen, et al.
Published: (2019)
by: Ahmed, muhammed Zaharadeen, et al.
Published: (2019)
Multicast support in network based mobility management: Current challenges and solutions
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
by: Mohd Aman, Azana Hafizah, et al.
Published: (2016)
Computational intelligence: It’s application in digital watermarking
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2013)
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Performance evaluation of best route and broadcast strategy for NDN producer’s mobility
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
Computational intelligence: application in digital watermarking
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Evaluating mobility management models for content forwarding in named data networking environments
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2019)
Medical image compression evaluation by JPEG and JPEG 2000
by: Haseeb, Shariq, et al.
Published: (2014)
by: Haseeb, Shariq, et al.
Published: (2014)
Real Time vehicle license plate recognition
by: Suleiman, Ahmad, et al.
Published: (2014)
by: Suleiman, Ahmad, et al.
Published: (2014)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
A critical insight into the effectiveness of research
methods evolved to secure IoT ecosystem
by: Khan, Burhan ul Islam, et al.
Published: (2018)
by: Khan, Burhan ul Islam, et al.
Published: (2018)
DFAM: A distributed feedback analysis mechanism for knowledge based educational big data
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2016)
Evaluating signalling and packet delivery cost for NDN producer’s mobility in smart & sustainable environment
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
by: Ahmed, Muhammed Zaharadeen, et al.
Published: (2020)
Performance analysis for cloud query encryption
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
by: Ali Raheem, Zainalabideen, et al.
Published: (2019)
Mobile cloud computing for emergency healthcare model:framework
by: Nirabi, Ali, et al.
Published: (2018)
by: Nirabi, Ali, et al.
Published: (2018)
Medical identity theft in telemedicine: solving the privacy and security issues
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2015)
Optical protection related in wavelength division multiplexing (WDM) technique
by: El Shebani, Mohamed, et al.
Published: (2014)
by: El Shebani, Mohamed, et al.
Published: (2014)
Isolated word speech recognition of the malay digits
by: Mohamad Nasir, Haidawati, et al.
Published: (2014)
by: Mohamad Nasir, Haidawati, et al.
Published: (2014)
Neural network classifier for hand motion detection from EMG signal
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2011)
Similar Items
-
Development of heuristic task scheduling algorithm in cloud computing
by: Diallo, Laouratou, et al.
Published: (2016) -
Internet of things: the concept, inherent security challenges
and recommended solutions
by: Khan, Burhan Ul Islam, et al.
Published: (2019) -
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014) -
Rehashing system security solutions in e-banking
by: Khan, Burhan ul Islam, et al.
Published: (2018) -
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
by: Olanrewaju, Rashidah Funke, et al.
Published: (2018)