A Novel Technique for Cost Reduction among Sender And Receiver In Cloud
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
We present PACK (Predictive ACKs), a novel endto-end activity repetition disposal (TRE) framework, intended for cloud computing clients. Cloud-based TRE needs to apply a sensible utilization of cloud assets so that the transmission capacity cost decrease joined with the extra cost of TRE calculation and capacity would be enhanced. PACK's fundamental favorable position is its ability of offloading the cloud-server TRE push to end customers, in this way minimizing the preparing expenses affected by the TRE algorithm.
Authors and Affiliations
P. Subrahmanyeswari, Beebi Sufia Sheik
Design of Mobile Ad hoc Network with AODV Routing Protocol
A mobile ad hoc network [MANET] is a selfconfiguring infrastructureless network of mobile devices connected by wireless. Each device in a MANET is free to move independently in any direction, and will therefore change...
An Efficient Solution for Mobile Users To Enforce Privacy And Enhance User Participation
The propagation of mobile phones along with their enveloping connectivity has drive the amount of digital data shaped and processed every day. Today many different sensors are by now deployed in our mobile phones and...
Implementation of VOIP Communication on Embedded Systems
In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of m...
A Unified System to Ensure Data Security In Cloud Computing
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapi...
Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses...