Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Is Internet becoming a Major Contributor for Global warming - The Online Carbon Footprint
Volume-2 | Issue-4
Augmented Reality in Education
Volume-2 | Issue-4
A Study on Various Task-Work Allocation Algorithms in Swarm Robotics
Volume-2 | Issue-2
IoT based Biotelemetry for Smart Health Care Monitoring System
Volume-2 | Issue-3
Tungsten DiSulphide FBG Sensor for Temperature Monitoring in Float Glass Manufacturing
Volume-2 | Issue-4
GUI based Industrial Monitoring and Control System
Volume-3 | Issue-2
AUTOMATION USING IOT IN GREENHOUSE ENVIRONMENT
Volume-1 | Issue-1
Principle of 6G Wireless Networks: Vision, Challenges and Applications
Volume-3 | Issue-4
Classification of Remote Sensing Image Scenes Using Double Feature Extraction Hybrid Deep Learning Approach
Volume-3 | Issue-2
Light Weight CNN based Robust Image Watermarking Scheme for Security
Volume-3 | Issue-2
VIRTUAL REALITY GAMING TECHNOLOGY FOR MENTAL STIMULATION AND THERAPY
Volume-1 | Issue-1
Design of Digital Image Watermarking Technique with Two Stage Vector Extraction in Transform Domain
Volume-3 | Issue-3
Analysis of Natural Language Processing in the FinTech Models of Mid-21st Century
Volume-4 | Issue-3
PROGRESS AND PRECLUSION OF KNEE OSTEOARTHRITIS: A STUDY
Volume-3 | Issue-3
Image Augmentation based on GAN deep learning approach with Textual Content Descriptors
Volume-3 | Issue-3
Comparative Analysis for Personality Prediction by Digital Footprints in Social Media
Volume-3 | Issue-2
Volume - 1 | Issue - 1 | september 2019
Published
September, 2019
The offloading techniques have become more prominent among the mobile computing due to the increased number of users and enormous amount of information flowing through the internet. The offloading techniques enhance the competence of the mobile computing by reducing the congestion in the network caused by increased number of users and the enormous data traffic experienced. However in many cases the authentication becomes very essential for the connection establishment. So the paper proposes a secure and cost efficient data offloading technique for the mobile computing to make it safe, secure with an effective management of network traffic. The performance analysis of the security measures proffered in the paper for authentication of the offloading techniques in terms of the security, cost and the delay in the offloading ensures that the proposed method is superior to the existing methods.
KeywordsMobile Computing Off-Loading Technique Secure Cost Efficient Effective Network Management
Full Article PDF