Battery Efficiency of Mobile Devices through Computational Offloading: A Review
Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which hinders the steady meeting expectations yield of these devices. In addition, various sensors, high resolution LCDs, wireless interfaces, GPS and...
| Main Authors: | Ali, Mushtaq, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Gran, Badshah |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/11952/ http://umpir.ump.edu.my/id/eprint/11952/7/Battery%20Efficiency%20of%20Mobile%20Devices%20through%20Computational%20Offloading-%20A%20Review-abstract.pdf http://umpir.ump.edu.my/id/eprint/11952/1/Battery%20Efficiency%20of%20Mobile%20Devices%20through%20Computational%20Offloading-%20A%20Review.pdf |
Similar Items
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
A model for power efficiency of mobile devices through lightweight method level computational offloading
by: Ali, Mushtaq
Published: (2018)
by: Ali, Mushtaq
Published: (2018)
Computation offloading for smart internet devices
by: Muhammad Wasif, Nabeel, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel, et al.
Published: (2015)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
Performance assessment of mobile computation offloading
by: Seifaddini, Omid, et al.
Published: (2014)
by: Seifaddini, Omid, et al.
Published: (2014)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
Computation Offloading – an Effective Approach to Enhance Smartphone Capabilities
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
by: Muhammad Wasif, Nabeel Qureshi, et al.
Published: (2015)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
A lightweight process migration based computational offloading framework for mobile device augmentation / Abdullah
by: Abdullah, -
Published: (2017)
by: Abdullah, -
Published: (2017)
Energy-efficient and delay-aware offloading scheme using D2D-enabled mobile edge computing / Ramtin Ranji
by: Ramtin , Ranji
Published: (2019)
by: Ramtin , Ranji
Published: (2019)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Android Botnets: A Serious Threat to Android Devices
by: Shahid, Anwar, et al.
Published: (2018)
by: Shahid, Anwar, et al.
Published: (2018)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Integrated vector instruction translator and offloading framework for mobile cloud computing / Junaid Shuja
by: Junaid , Shuja
Published: (2017)
by: Junaid , Shuja
Published: (2017)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
by: Akhlaqi, Mohammad Yahya, et al.
Published: (2023)
by: Akhlaqi, Mohammad Yahya, et al.
Published: (2023)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Efficient feature selection analysis for accuracy malware classification
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
by: Rahiwan Nazar, Romli, et al.
Published: (2021)
Battery optimizer for android device
by: Noor Suzieana, Suhaimi
Published: (2019)
by: Noor Suzieana, Suhaimi
Published: (2019)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Design a Technique for Minimizing Unnecessary Handoff
in Mobile Wireless Networks
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Ergonomic Study On Input-Output Devices For Mobile Computing
by: balakrishnan, Vimala
Published: (2008)
by: balakrishnan, Vimala
Published: (2008)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
Android: S-Based Technique in Mobile Malware Detection
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Watermarking of single and multi frame ultrasound medical images
by: Gran, Badshah
Published: (2016)
by: Gran, Badshah
Published: (2016)
Multi-objectives firefly algorithm for task offloading in the edge-fog-cloud computing
by: A. Saif, Faten, et al.
Published: (2024)
by: A. Saif, Faten, et al.
Published: (2024)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
Response Option for Attacks Detected by Intrusion Detection System
by: Shahid, Anwar, et al.
Published: (2015)
by: Shahid, Anwar, et al.
Published: (2015)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
A support vector machine classification of
computational capabilities of 3D map on mobile
device for navigation aid
by: Abubakar, Adamu, et al.
Published: (2016)
by: Abubakar, Adamu, et al.
Published: (2016)
Similar Items
-
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015) -
Mobile cloud computing & mobile's battery efficiency approaches: A review
by: Ali, Mushtaq, et al.
Published: (2015) -
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014) -
A model for power efficiency of mobile devices through lightweight method level computational offloading
by: Ali, Mushtaq
Published: (2018) -
Computation offloading for smart internet devices
by: Muhammad Wasif, Nabeel, et al.
Published: (2015)