Remote Admittance & Demonstrate For Client Control Mobile Computing
Remote Admittance & Demonstrate For Client Control Mobile Computing
Remote Admittance & Demonstrate For Client Control Mobile Computing
1 pp : 13-16
Dept of EEE, Muthayammal College of Engg, Rasipuram Dept of EEE, PGP College of Engg & Tech, Namakkal
1
[email protected], [email protected], Fourthly, we then have tablet computers -- such as the Apple iPod -- which are like a laptop or net book computer but without the keyboard and operated via touch screen. While some tablets run traditional desktop operating systems such as Windows 7, the vast majority are loaded with sleeker embedded operating system like Apple's iOS, or Google's Android. E-book readers are then a fifth category of mobile computer, and are effectively tablets dedicated to the presentation of electronic documents. Decreasing in size, the sixth mobile computing category is smart phones -- which are mobile phones with Internet connectivity. Also of pocket able size we then have media players and mobile games consoles. Finally under mobile computing we may also include ambient computing devices that attempt to embed digital data into mobile computer hardware that operates at the edges of our perception. A full discussion of every kind of device that could be considered a mobile computer is not just beyond the scope of this website, but would arguably serve little purpose. What follows is therefore a summary -- including specific, key product examples as appropriate -- of the aforementioned device categories and how they are likely to develop. Other good sources of information on mobile computing include suppliers Fused Mobility and Clove Technology. Indeed, quick surf around these two websites can provide you with a very good idea of the vast range of mainstream mobile computing devices now available.
Abstract:
This project represents how one PC can be controlled from remote place with one smart-phone device with the help of Internet. It means the monitor of PC will be seen in mobile. It turns your phone into a wireless keyboard and mouse with touchpad, using your own wireless network. This application can be performed on android based mobile. It requires server application for your computer. It requires device running on the Android operating system with some sort of wireless connection between them. By getting IP address from the PC and directly browse it on mobile phone. The PC screen will be access on the mobile. It Supports web applications with database for storing the web pages. On Mobile applications retrieves the required data information in certain time interval by connecting with the web server. Able to view your phones screen on your computer monitor which is great for: putting your Android notifications right along the side other notification boxes on your monitor, using it like an on-monitor caller ID, and taking screenshots and screen casts. Remote keyboard/mouse control is great for inputting data on the tiny screen without needing to peck at the onscreen keyboard.
Key Words:
Android operating system, Googles Android, Interactive live streaming,
I. Introduction
IJER@2014
Page 13
International Journal of Scientific Engineering and Technology Volume No.3, Issue No.1 pp : 13-16
III.
Drawback
V.
A. Authenticated Login
Technology
More fundamental challenges for mobile cloud computing lie in the short battery lifetime of mobile devices, the limited and varying bandwidth on wireless links, and the interaction latency between user input and display updates.
Authentication is the process of identifying an individual. It is usually based on a username and password combination. This process verifies the identity of the individual, ensuring that the person really is who he or she claims to be. In order to set up fingerprint verification for a particular user, that user needs to swipe his or her finger up to three times. This serves as the initial identification process. After this process is complete, the user needs to link the stored fingerprint to his or her personal account. The setup is now complete and the user can use his or her fingerprint to log on to the system.
C. Encoding Videos
Video codec seek to represent a fundamentally analog data set in a digital format. Because of the design of analog video signals, a common first step in image compression in codec design is to represent and store the image in a Cyber color space. This kind of graphics can be more efficiently encoded using a video codec, such as H.264 or MPEG-4. Using video codec for remote display purposes is because the graphics are mainly the result of user interaction.
A. Advantages
The highest bandwidth reductions are achieved for interactive applications with frequent user events and lower round-trip times. Sleep mode consumes three to five times less energy than idle mode because the radio interface is turned off.
B. Dataflow Diagram
E. Evaluation
It provides the client and clientless access for a broad spectrum of desktop and mobile platforms on a single appliance. Delivers ubiquitous clientless access to authenticated users on both managed and unmanaged endpoints, helping to increase productivity by providing anytime access to the right
IJER@2014
Page 14
International Journal of Scientific Engineering and Technology Volume No.3, Issue No.1 pp : 13-16
corporate resources and empowers secure deployments with scalable always-on user protection.
L. Performance Evaluation:
It provides the client and clientless access for a broad spectrum of desktop and mobile platforms on a single appliance. Delivers ubiquitous clientless access to authenticated users on both managed and unmanaged endpoints, helping to increase productivity by providing anytime access to the right corporate resources and empowers secure deployments with scalable always-on user protection. message to the user. This message consists of name of the file, accessed time
G. Child Prediction
In this system, parents can monitor their children by means of tracking system. This system is really very helpful for the parents to monitor the children through mobile phones. By using this system, the parents can avoid the unnecessary things happened for the children those who are having mobile phones by monitoring the mobile phone usage and also by tracking the childrens current location through the GPS.
J. System Architecture
K. Security Alert:
When someone accesses the users confidential file without his permission then this system provides the automatic alert
VI. Conclusion
Future research should therefore focus on the design of a comprehensive framework that integrates the existing solutions and activates the most appropriate one depending on the current device, Network, and cloud server status. Because of user mobility, the wide diversity of applications, and the varying wireless channel status, the mobile cloud computing context is highly dynamic. Decreasing in size, the sixth mobile computing category is smart phones -- which are mobile phones with Internet connectivity. Also of pocket able size we then have media players and mobile games consoles.
IJER@2014
Page 15
International Journal of Scientific Engineering and Technology Volume No.3, Issue No.1 pp : 13-16
References
i. C. Albanesius, Smartphone Shipments Surpass PC Shipments for First Time. Whats Next? PC Magazine, 8 Feb. 2011; www.pcmag.com/article 2/0,2817,2379665,00.asp. ii. V.S. Pendyala and S.S.Y. Shim, The Web as the Ubiquitous Computer, Computer, Sept. 2009, pp. 90-92. iii. F. Lamberti and A. Sanna, A Streaming-Based Solution for Remote Visualization of 3D Graphics on Mobile Devices, IEEE Trans. Visualization and Computer Graphics, Mar./Apr. 2007, pp. 247-260. iv. H. Kawashima et al., Virtual PC-Type Thin Client System, NEC Technical J., Sept. 2007, pp. 42-47. v. K. Pentikousis, In Search of Energy-Efficient Mobile Networking, IEEE Comm. Magazine, Jan. 2010, pp. 95-103. vi. K. Kumar and Y.-H. Lu, Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? Computer, Apr. 2010, pp. 51-56.
vii. T. Kim et al., An Energy-Aware Transmission Mechanism for WiFi-Based Mobile Devices Handling Upload TCP Traffic, Intl J. Comm. Systems, May 2009, pp. 625-640. viii. P. Simoens et al., Cross-Layer Optimization of Radio Sleep Intervals to Increase Thin Client Energy Efficiency, IEEE Comm. Letters, Dec. 2010, pp. 1095-1097. ix. K. Balachandran et al., Performance Assessment of Next Generation Wireless Mobile Systems, Bell Labs Technical J., Feb. 2009, pp. 35-58. x. C.C. Miller and B. Stone, App Makers Worry as Data Plans Are Capped, The New York Times, 6 June 2010; www.nytimes.com/2010/06/07/technology/07data.html. xi. I. Nave et al., Games@Large Graphics Streaming Architecture, Proc. IEEE Intl Symp. Consumer Electronics (ICSE 08), IEEE Press, 2008, pp. 205-208. xii. K.-J. Tan et al., A Remote Thin Client System for Real-Time Multimedia Streaming over VNC, Proc. IEEE Intl Conf. Multimedia and Expo (ICME 10), IEEE Press, 2010, pp. 992-997.
IJER@2014
Page 16