Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network
Mental Health Support App with Mood Tracking and Resources
Centralized E-Warranty System with Blockchain Security
Development of Mobile-Based Application of Crime Reporting and Handling in Malawi Police Service
Rural Well Water Management and Monitoring System
Exploring the Adoption of Blockchain Technology in Africa: Insights from Direct Observation and Literature Review
Development of Mobile App for the Soil Classification
Using the Arduino Platform for Controlling AC Appliances with GSM Module and Relay
Evaluation of Mobile Banking Services Usage in Minna, Niger State
Emerging Technologies in Interaction with Mobile Computing Devices – A Technology Forecast
Development of an Android Based Mobile Application for the Design and Detailing of Isolated Pad Foundations According to Eurocode 2
Smartphone Applications–A Comparative Study BetweenOlder And Younger Users
Technological Diffusion of Near Field Communication (NFC)
Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users
A Review on Routing Protocols for Mobile Adhoc Networks
Applications of Wearable Technology in Elite Sports
Recently, as Smart Phone is popularized and IT (Information Technology) is developed, there has been a variety of technologies and areas in which IT is applied. The aim of the research is to construct and materialize a voice-based navigation application for visually impaired people, using Android based Smart Phone. The navigation system uses TTS (Text-to-Speech) for blindness in order to provide a navigation service through voice. Also, it uses image processing recognition system to segment the objects in front of the visually impaired people by accessing camera. This application tested its performance through mobiles based on Android version 2.2. As the result shows, the voice support about segmented information has progressed favorably. This research work proposes a Principal Component Analysis (PCA) algorithm to recognize the object. To support real-time scanning of objects, a key frame extraction was developed which automatically retrieves high-quality frames from continuous camera video stream of mobile phones. The sequence is approximately capturing 3 frames per second.
An ad hoc routing protocol is a pattern or standard that controls routepackets between mobile devices in a Mobile Ad hoc Network. A new node announces its presence and listens for announcements broadcasted by its neighbours. To communicate one node to another one, each node can act as both host as well as router at the same time and perform all the routing and state maintenance operations. Source routing allows a sender of a packet to partially or completely specify the route the packet takes through the network. Source routing allows easier troubleshooting, improved traceroute, and enables a node to discover all the possible routes to a host. Opportunistic data forwarding has not been widely utilized in MANETs, because of the lack of an efficient lightweight proactive source routing capability. In the proposed scheme, a lightweight Table Driven Source Routing (TDSR) protocol can maintain more network topology information than Distance Vector (DV). To facilitate source routing and also smaller overhead than DV-based protocols, Link State (LS) and Reactive source routing protocols are used. The proposed protocol will enhance the performance of QoS in MANETs like delay, throughput, and Packet Delivery Ratio.
The hegira to wireless network from wired network has been a worldwide trend in the past few years. The mobility and scalability brought by a wireless network made it possible in many applications. Mobile Ad Hoc Network (MANET) is one of the most predominant and idiosyncratic applications. On the contrary to accustomed network architecture, MANET does not require a fixed network infrastructure, every single node works as Transceiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they reckon on their neighbors to relay messages. The Self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET impuissant to rancorous attackers. In this case, it is pivotal to develop efficient encroachment-detection mechanisms to protect MANET from attacks. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, the authors have proposed and implemented a new encroachment-detection system named Enhanced Double Acknowledgment (EDACK) specially designed for MANET. Compared to various approaches, EDACK demonstrates higher rancorous behavior-detection rates in certain circumstances, while does not greatly affect the network performances.
MANETs use various anonymous routing protocols for hiding node identities and/or route identities from the outside observers in order to provide anonymity protection. Perhaps, existing anonymous routing protocols generate high cost or cannot offer complete anonymity protection to sources, destination and routes. To suggest high anonymity protection at a low cost, one of the proposed system is ALERT. ALERT energetically partitions the network field into zones and arbitrarily chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. This partition process is called as hierarchical zone partition. In addition, ALERT hides the data initiator or receiver among many initiators or receiver to reinforce the source as well as destination anonymity protection. Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively encounter the intersection and timing attacks. Experimental results display stability with the theoretical analysis, and show that ALERT achieves better route anonymity protection in a low cost which is compared with the other anonymous routing protocols.
The secure roaming service, the foreign server must authenticate the roaming User, who originally subscribed to the home server. Hence, an authentication mechanism is currently important in the requirement for providing secure roaming services and protect the location privacy of users on anonymous authentication. The anonymous authentication process is without participating the home server on efficiency communication for existing work. The process of authentication causes high computation costs and huge revocation lists. So the authors proposed a novel three-round anonymous roaming protocol. The proposed protocol uses a pseudo-identity-based signcryption scheme and using CK-model to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the storage in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols.