reducing massive power for mobile devices using instant messaging

R.JAYA SHREE,M.S.THARA DEVI,M.RAMESH KUMAR

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:3         Issue:3         Year: 09 October,2014         Pages:375-388

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Instant messaging (IM) is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. Instant messaging basically offers real-time direct written language-based online chat. This chat can be performed by using personal computers or other mobile devices like smart phones. The user's text is conveyed over a network, such as the Internet. In, our analysis shows that the frequency exchange of presence information incurs massive power consumption to mobile devices. This power consumption in mobile devices can occurs due to the presence information exchange between the users. In this paper, we find several solutions to lower the power consumption problem in mobile devices using IM. By reducing the network access and keeping mobile devices in the sleep mode as much as possible

Kewords

Mobile computing, Instant messaging, power consumption.

Reference

[1] A. C. Weaver and M. W. Condry, “Distributing Internet services to the network’s edge,” IEEE Trans. Ind. Electron., vol. 50, no. 3, pp. 404–411, Jun. 2003. [2] K. Bouyoucef and K. Khorasani, “A robust distributed congestion-control strategy for differentiated-services network,” IEEE Trans. Ind. Electron., vol. 56, no. 3, pp. 608–617, Mar. 2009. [3] A. G. Vicente, I. B. Munoz, J. L. L. Galilea, and P. A. R. del Toro, “Remote automation laboratory using a cluster of virtual machines,” IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3276–3283, Oct. 2010. [4] L. Barolli and F. Xhafa, “JXTA-OVERLAY: A P2P platform for distributed, collaborative and ubiquitous computing,” IEEE Trans. Ind. Electron., vol. 58, no. 6, pp. 2163–2172, Oct. 2010. [5] L. Lamport, “Password authentication with insecure communication,” Commun. ACM, vol. 24, no. 11, pp. 770–772, Nov. 1981. [6] C. C. Lee, M. S. Hwang, and I. E. Liao, “Security enhancement on a new authentication scheme with anonymity for wireless environments,” IEEE Trans. Ind. Electron., vol. 53, no. 5, pp. 1683–1687, Oct. 2006. [7] M. S. Hwang and L.-H. Li, “A new remote user authentication scheme using smart cards,” IEEE Trans. Consum. Electron., vol. 46, no. 1, pp. 28–30, Feb. 2000. [8] W. C. Ku and S. M. Chen, “Weaknesses and improvements of an efficient password based remote user authentication scheme using smart cards,” IEEE Trans. Consum. Electron., vol. 50, no. 1, pp. 204–207, Feb. 2004. [9] K. Saeed and M. Nammous, “A speech-and-speaker identification system: Feature extraction, description, and classification of speech-signal image,” IEEE Trans. Ind. Electron., vol. 54, no. 2, pp. 887–897, Apr. 2007. [10] W. S. Juang, S. T. Chen, and H. T. Liaw, “Robust and efficient password authenticated key agreement using smart cards,” IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2551–2556, Jun. 2008.