i-manager's Journal on Communication Engineering and Systems (JCS)


Volume 11 Issue 1 January - June 2022

Research Paper

Work Simplification for Home through Technology

N. K. Kaphungkui* , Somishon Keishing**
* Department of Electronics and Communication Engineering, Dibrugarh University, Assam, India.
** Department of Home Science, G P Womens College, Imphal, India.
Kaphungkui, N. K. and Keishing, S. (2022). Work Simplification for Home through Technology. i-manager’s Journal on Communication Engineering and Systems, 11(1), 1-5. https://doi.org/10.26634/jcs.11.1.18870

Abstract

This work will present one of the applications of infra-red technology for home automation. The objective of this paper is to control independent home electrical appliances through Infrared (IR) based remote control system. The controlling circuit is built around NodeMCU-ESP32, a compact relay module and an IR sensor. Any four General Purpose Input/Output (GPIO) pins are selected from the NodeMCU to control four specific applications such as room lighting, automated door locking system, running the water pump and fan. Women specially have a hectic and busy schedule for maintaining all the domestic household activities and they want almost all activities at the click of a button. If they could control those appliances with remote control button from a remote place, life would be at ease and simpler. With the above facts in mind, the present work is carried out to develop a device to simplify the operations of selected household activities to save time, energy and stress free life.

Research Paper

Solar Outdoor Air Purifier with Air Quality Monitor

Ganesh P. K.* , Santosh R.**, Srimannarayana N. K.***, Sriramsrinivasan N. K.****, Manu D. K.*****
*-***** Department of Electronics and Communication Engineering, K S School of Engineering and Management, Bangalore, India.
Ganesh, P. K., Santosh, R., Srimannarayana, N. K., Sriramsrinivasan, N. K., and Manu, D. K. (2022). Solar Outdoor Air Purifier with Air Quality Monitor. i-manager’s Journal on Communication Engineering and Systems, 11(1), 6-12. https://doi.org/10.26634/jcs.11.1.18879

Abstract

Pollution is increasing very effectively in the world. It must be reduced the present pollution levels by the deadline even though the long-term solution to the pollution problem is to identify and reduce pollution sources. The use of air purifiers is the most effective method of reducing pollution. Regular interior air purifiers, however, are little, low-power gadgets that lack the necessary filtering capacity for outdoor environments. Additionally, there is a problem with outdoor machines' power supplies. Therefore, it has created a solar outdoor air purifier that is energy independent and built for outside filtration. It is powered by solar panels. A powerful suction fan at the bottom of our solar air purifier draws air up through a layer of pre-filters, High-Efficiency Particulate Absorbing (HEPA) filters, carbon filters, and Ultraviolet (UV) lights to remove gases and (Particulate Matter) PM 10 and PM 2.5 pollutants. Prefilter, HEPA layer, Active Carbon Filter, and UV light make up the first of the purifier's four purification layers. The combination of these four filters results in the best filtration, sucking in a lot of air and clearing it of dust particles utilizing centrifugal air force.

Research Paper

Comparison of On-Demand Routing Protocol for MANET using Simulation

K. Thamizhmaran* , A. Charles**
* Department of Electronics and Communication Engineering, Annamalai University, Chidambaram, Tamil Nadu, India.
** Department of Electronics and Communication Engineering, Government College of Engineering, Bargur, Tamil Nadu, India.
Thamizhmaran, K., and Charles, A. (2022). Comparison of On-Demand Routing Protocol for MANET using Simulation. i-manager’s Journal on Communication Engineering and Systems, 11(1), 13-18. https://doi.org/10.26634/jcs.11.1.18659

Abstract

In the test lab, the study includes the behavior of the network and many services and applications it supports; other aspects of the environment can also be modified in a controlled manner to evaluate how the network will perform under different circumstances. Network designers can test completely new network protocols or make changes to existing one using network simulators in a controlled and reproducible manner. This paper discussed the Dynamic Source Routing (DSR) reactive routing protocol, which was modeled using eight different types of network simulators and an active node count of 80 without any malicious nodes. Based on the analysis of the results of the simulators, Network Simulator 2 (NS2) demonstrated the highest packet delivery rate compared to other simulators.

Review Paper

Information Security with Cryptography Symmetric Key Encryption Algorithms: A Survey

Anant Shankar Ellapalli* , S. Varadarajan**
*-** Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, Andhra Pradesh, India.
Ellapalli, A. S., and Varadarajan, S. (2022). Information Security with Cryptography Symmetric Key Encryption Algorithms: A Survey. i-manager’s Journal on Communication Engineering and Systems, 11(1), 19-26. https://doi.org/10.26634/jcs.11.1.18913

Abstract

In cryptography, data encryption turns ordinary information into an obfuscated code, and the information cannot be viewed without being decrypted. Thus, cryptography remains the main element of data protection. There are two kinds of cryptography, such as symmetric and asymmetric. There are many existing symmetric algorithms that are used to encrypt data, such as the Data Encryption Standard (DES), Triple Data Encryption Algorithm (TDEA), Enigmatic Diagonal Encryption Standard (EDES), Advanced Encryption Standard (AES), BLOWFISH, TWOFISH, Rivest Cipher 4 (RC4), Rivest Cipher 6 (RC6), which have been reviewed in this paper. It compares and tracks a summary of productive encryption calculations. The performance is compared with key size, space, time, security, and features of encryption methods.

Review Paper

Cyber Malwares and Attack Workflow

Sulakshana B. Mane* , M. Z. Shaikh**
* Bharati Vidyapeeth College of Engineering, Navi, Mumbai. Maharashtra, India.
** Shri Bhagubhai Mafatlal Polytechnic, Irla, N.R.G Marg, Mumbai, Maharashtra, India.
Mane, S. B., and Shaikh, M. Z. (2022). Cyber Malwares and Attack Workflow. i-manager’s Journal on Communication Engineering and Systems, 11(1), 27-32. https://doi.org/10.26634/jcs.11.1.18665

Abstract

Security plays an extremely important role for users in terms of digital India, the Internet, and the IoT era. Every user is now getting access to data and moving towards digitization in today's world. Due to the transfer of information everywhere in the organization due to processing vast amounts of knowledge, it faces numerous cyber-malware problems. Various sectors are adopting more technology to improve communications and infrastructure, and the cyber threat to these networks is growing in parallel. Cyber-malware and its class is ransomware. When it spreads, it locks the machine and encrypts it. Its impact performs various functions, such as confidential data theft, data misuse, and unauthorized access. The goal of this paper is to explore methods to counter ransomware attacks. This paper provides an understanding of cyber malware, why cyber malware is chosen as ransomware, and the attack process of cyber malware.