Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network
Mental Health Support App with Mood Tracking and Resources
Centralized E-Warranty System with Blockchain Security
Development of Mobile-Based Application of Crime Reporting and Handling in Malawi Police Service
Rural Well Water Management and Monitoring System
Exploring the Adoption of Blockchain Technology in Africa: Insights from Direct Observation and Literature Review
Development of Mobile App for the Soil Classification
Emerging Technologies in Interaction with Mobile Computing Devices – A Technology Forecast
Using the Arduino Platform for Controlling AC Appliances with GSM Module and Relay
Applications of Wearable Technology in Elite Sports
Evaluation of Mobile Banking Services Usage in Minna, Niger State
Smartphone Applications–A Comparative Study BetweenOlder And Younger Users
Technological Diffusion of Near Field Communication (NFC)
Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users
A Review on Routing Protocols for Mobile Adhoc Networks
Applications of Wearable Technology in Elite Sports
The term "MANET," which stands for "Mobile Adhoc Network," refers to an ad hoc wireless network incorporating routing mechanism atop an ad hoc link layer network. These networks consist of wirelessly linked mobile nodes that selfconfigure and self-heal. Due to frequent changes in network architecture, MANET nodes have the freedom to move. Each node in the network serves as a router, forwarding traffic to specified nodes. Broadcast algorithms in wireless ad hoc networks typically follow two main approaches: static and dynamic. In the static approach, local algorithms proactively determine each node's status based on local topology information and a globally known priority function. This paper reveals that existing local broadcast algorithms based on the static approach fail to achieve a satisfactory approximation factor for the optimum solution to an NP-hard problem. However, it is demonstrated that a constant approximation factor is attainable when relative position information is available. The hybrid broadcast method dynamically determines each node's state "on-the-fly," ensuring complete delivery and maintaining a consistent value approaching the ideal outcome as closely as possible.
Child safety and tracking are of utmost importance, as children are the most vulnerable. With increasing crime rates, such as child kidnapping and child trafficking, the need for a smart security app has become a necessity. With this motivation, a self-alerting “Intelligent Child Monitoring Safety System” is developed to aid parents in monitoring and tracking their children in real time as an alternative to staying beside them. This system is intended as an everyday wearable device for the child, in the form of a wrist band, hand glove, arm band, belt, or even a smart phone. The app is designed to continuously monitor the location of children. The app uses GSM and GPS modules. The location of the victim is traced using the GPS module and sent to the registered contact numbers as a text message using a GSM module.
Wireless Mobile Ad Hoc Networks (MANETs) present topologies where nodes act as both hosts and routes, necessitating efficient routing protocols to handle frequent route updates and transmission congestion. This paper proposes a novel routing algorithm, Fuzzy Controller Ad hoc On-demand Distance Vector (FC-AODV), to address these challenges. The FCAODV algorithm is designed to improve packet delivery ratio, throughput, end-to-end delay, packet loss, remaining energy, and routing overhead compared to the traditional AODV protocol. Through extensive simulations using NS 2, the proposed algorithm demonstrates superior performance across varying network scenarios. Results indicate an average increase of 12.4% in packet delivery ratio, 10.27% in throughput, and a decrease of 5.37% in end-to-end delay compared to AODV. Additionally, FC-AODV reduces packet loss by 5.57%, increases remaining energy by 6.4%, and decreases routing overhead by 6.37%. Future research directions include applying the FC-AODV concept to satellite networks, exploring the integration of shortest path algorithms, and evaluating FC-AODV in real-time network environments.
Mobile Ad Hoc Networks (MANETs) are decentralized networks where mobile nodes communicate through radio waves without fixed infrastructure. However, they are susceptible to security attacks like the black hole attack, where malicious nodes claim optimal routes to intercept packets. This paper focuses on detecting black hole attacks within MANETs using a hybrid routing protocol. Specifically, the Modified-Zone-Based Hierarchical Link State (M-ZHLS) routing protocol is proposed and evaluated against existing protocols using simulations in NS2. The proposed method employs on-demand topology information transmission and utilizes techniques like expanding ring flooding for route discovery. Simulation results demonstrate that M-ZHLS outperforms existing protocols by reducing average delay by 5%, lowering routing overhead by 4%, and increasing delivery ratio by 4.5%. Future work aims to further enhance network performance in real-time environments.
This paper presents an in-depth exploration of the evolution and performance analysis of Bluetooth Low Energy (BLE) 5.0 technology. Bluetooth has revolutionized wireless communication, and BLE 5.0 represents a significant advancement, promising enhanced performance, extended range, and improved interoperability. The evolution of Bluetooth from its early versions to BLE 5.0 is examined, highlighting key features and improvements in each. The architecture of BLE 5.0, including its hierarchical structure and layers, is discussed to provide insight into its design and functionality. Performance evaluations, including data transfer speeds, range capabilities, and power consumption, are conducted to assess the effectiveness of BLE 5.0 in various scenarios. Challenges such as compatibility issues with older devices and potential interference from other wireless technologies are identified, suggesting areas for further refinement and optimization. Future directions and challenges in Bluetooth technology, including advancements in data transfer speeds, range capabilities, security protocols, and energy efficiency, are also discussed.