Mobile cloud computing & mobile's battery efficiency approaches: A review
Today, millions of users worldwide experience pervasive email and Web access through IPhones, Black Berries, Windows Mobile, and other mobile devices (Laptops, PDAs). After information at the fingertip, energy efficiency of these devices is paramount which makes the devices first choice of communica...
| Main Authors: | Ali, Mushtaq, Jasni, Mohamad Zain, Mohamad Fadli, Zolkipli, Badshah, Gran |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
JATIT
2015
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19963/ http://umpir.ump.edu.my/id/eprint/19963/1/17Vol79No1.pdf |
Similar Items
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014)
by: Ali, Mushtaq, et al.
Published: (2014)
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015)
by: Ali, Mushtaq, et al.
Published: (2015)
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018)
by: Ali, Mushtaq, et al.
Published: (2018)
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)
by: Shahid, Anwar, et al.
Published: (2014)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Use of Cryptography in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2013)
by: Jaber, Aws Naser, et al.
Published: (2013)
Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2015)
by: Jaber, Aws Naser, et al.
Published: (2015)
A review on mobile cloud computing and issues in it
by: Hakak, Saqib Iqbal, et al.
Published: (2013)
by: Hakak, Saqib Iqbal, et al.
Published: (2013)
Study of Security Layers Under Attack on Different Layers of Cloud Computing
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Cloud Computing Model for MyGRANTs Project
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2013)
Hypervisor IDPS: DDoS Prevention Tool for Cloud Computing
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2017)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
A model for power efficiency of mobile devices through lightweight method level computational offloading
by: Ali, Mushtaq
Published: (2018)
by: Ali, Mushtaq
Published: (2018)
A Study in Data Security in Cloud Computing
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Mobile cloud computing for emergency healthcare model:framework
by: Nirabi, Ali, et al.
Published: (2018)
by: Nirabi, Ali, et al.
Published: (2018)
Editorial: when the cloud computing becomes mobile!
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Application of mobile cloud computing in emergency health care
by: Hameed, Shihab A., et al.
Published: (2019)
by: Hameed, Shihab A., et al.
Published: (2019)
Methods for Preventing DDoS Attacks in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2017)
by: Jaber, Aws Naser, et al.
Published: (2017)
A lightweight mobile cloud computing framework for resource-intensive mobile application / Saeid Abolfazli Torghabeh
by: Torghabeh, Saeid Abolfazli
Published: (2014)
by: Torghabeh, Saeid Abolfazli
Published: (2014)
Process state synchronization for mobility support in mobile cloud computing / Ejaz Ahmed
by: Ejaz, Ahmed
Published: (2016)
by: Ejaz, Ahmed
Published: (2016)
SmartCrowd: novel approach to big crowd management using mobile cloud computing
by: Ali, Mohammed Fazil, et al.
Published: (2015)
by: Ali, Mohammed Fazil, et al.
Published: (2015)
Security Scheme for Protecting Cloud Computing Services Against Bursty DDoS Attacks
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
On protecting data storage in mobile cloud computing paradigm
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
by: Abdalla , Al-kindy Athman, et al.
Published: (2014)
Mobile Cloud Computing Solution for Visualization of Road Roughness
by: Lam, Chen Riang
Published: (2017)
by: Lam, Chen Riang
Published: (2017)
Performance enhancement framework for cloudlet in mobile cloud computing / Md Whaiduzzaman
by: Md Whaiduzzaman, Abdullah
Published: (2016)
by: Md Whaiduzzaman, Abdullah
Published: (2016)
Tamper Localization and Recovery Medical Image Watermarking: A Review
by: Badshah, Gran, et al.
Published: (2012)
by: Badshah, Gran, et al.
Published: (2012)
Host Based Intrusion Detection and Prevention Model Against DDoS Attack in Cloud Computing
by: Jaber, Aws Naser, et al.
Published: (2018)
by: Jaber, Aws Naser, et al.
Published: (2018)
Bandwith conservation framework for mobile cloud computing: challenges and solutions
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
A lightweight framework for intensive mobile application processing in mobile cloud computing / Muhammad Shiraz
by: Muhammad , Shiraz
Published: (2013)
by: Muhammad , Shiraz
Published: (2013)
Watermarking of single and multi frame ultrasound medical images
by: Gran, Badshah
Published: (2016)
by: Gran, Badshah
Published: (2016)
A Study On AI-Driven Solutions for Cloud Security Platform
by: Menaga, Segar, et al.
Published: (2024)
by: Menaga, Segar, et al.
Published: (2024)
A lightweight heterogeneous hybrid mobile cloud computing framework for compute-intensive mobile applications / Zohreh Sanaei Moghaddam
by: Moghaddam, Zohreh Sanaei
Published: (2014)
by: Moghaddam, Zohreh Sanaei
Published: (2014)
Similar Items
-
Mobile Cloud Computing & Mobile Battery Augmentation Techniques: A Survey
by: Ali, Mushtaq, et al.
Published: (2014) -
Battery Efficiency of Mobile Devices through Computational Offloading: A Review
by: Ali, Mushtaq, et al.
Published: (2015) -
Taxonomy of Computational Offloading in Mobile Devices
by: Ali, Mushtaq, et al.
Published: (2015) -
Mobile Cloud Computing with SOAP and REST Web Services
by: Ali, Mushtaq, et al.
Published: (2018) -
A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing
by: Shahid, Anwar, et al.
Published: (2014)