Joint Task Migration and Power Management in Wireless Computing
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 108 | Monthly Hits: ⮙6

Informative Article | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016

Joint Task Migration and Power Management in Wireless Computing

Dayanand G Savakar, Anand S Ghuli

An application is to secure the all files from different users. It is concerned with encrypting the information in most secure and robust manner. It also includes the algorithm that convert the given text data into different form. This project also includes the good key generation that secure the given file from malicious users. This project allows the users to encrypt there important files from various other users. It gives immense security from the harmful users. File Encryption includes Audio Encryption, Video Encryption, Image Encryption and Text File Encryption. Information Hiding of this project includes Watermarking And Steganography to hide the information in the image. Watermarking include key generation to secure the text from other users.Steganography includes the mechanism to convert the data into another based on some Algorithm.

Keywords: Network, Task, Security, Multi-tasking, Wireless computing

Edition: Volume 5 Issue 8, August 2016

Pages: 1548 - 1550

Share this Article

How to Cite this Article?

Dayanand G Savakar, Anand S Ghuli, "Joint Task Migration and Power Management in Wireless Computing", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20161198, Volume 5 Issue 8, August 2016, 1548 - 1550

Enter Your Registered Email Address





Similar Articles with Keyword 'Network'

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 83 | Weekly Hits: ⮙1 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1626 - 1628

Image Noise Reduction with Autoencoder using Tensor Flow

Jai Sehgal, Dr Yojna Arora

Share this Article

Downloads: 152 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 179 | Weekly Hits: ⮙1 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018

Pages: 81 - 84

Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey

Priyanka H, Dr. Mary Cherian

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'Task'

Downloads: 172 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016

Pages: 1523 - 1527

Multifunctional Remote Controlled Robot Using Android Application

T. A. Mithu, T. S. Reddy

Share this Article

Downloads: 1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 2 | Monthly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 965 - 966

University Event Management System

V. Balu, P. Vagish Krishnan, Varadarajan .M

Share this Article

Downloads: 36 | Monthly Hits: ⮙5

Student Project, Computer Science & Engineering, India, Volume 10 Issue 3, March 2021

Pages: 1677 - 1680

Detecting Pneumonia from X-Ray Images using Deep Learning

Deep Piyushkumar Patel

Share this Article

Downloads: 38 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 37 | Monthly Hits: ⮙18

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article



Top