i-manager's Journal on Mobile Applications and Technologies (JMT)


Volume 1 Issue 2 May - July 2014

Research Paper

Design and Implementation of a Smart Phone Navigation and Application for Visually Impaired People

K. Preme* , R. Thirumalaiselvi**
* Research Scholar, Department of Computer Science, Govt. Arts College, Nandanam, Chennai, India.
** Assistant Professor, Department of Computer Science, Govt. Arts College, Nandanam, Chennai, India.
Preme, K., and Selvi, R.T. (2014). Design and Implementation of a Smart Phone Navigation and Application for Visually Impaired People. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 1-5. https://doi.org/10.26634/jmt.1.2.3168

Abstract

Recently, as Smart Phone is popularized and IT (Information Technology) is developed, there has been a variety of technologies and areas in which IT is applied. The aim of the research is to construct and materialize a voice-based navigation application for visually impaired people, using Android based Smart Phone. The navigation system uses TTS (Text-to-Speech) for blindness in order to provide a navigation service through voice. Also, it uses image processing recognition system to segment the objects in front of the visually impaired people by accessing camera. This application tested its performance through mobiles based on Android version 2.2. As the result shows, the voice support about segmented information has progressed favorably. This research work proposes a Principal Component Analysis (PCA) algorithm to recognize the object. To support real-time scanning of objects, a key frame extraction was developed which automatically retrieves high-quality frames from continuous camera video stream of mobile phones. The sequence is approximately capturing 3 frames per second.

Research Paper

Efficient Routing Protocol For Mobile Ad Hoc Networks

N. Jegan* , R. Deenadhayalan**, S. Anandamurugan***
* PG Student, Kongu Engineering College, Perundurai, India.
**-*** Assistant Professor, Kongu Engineering College, Perundurai, India.
Jegan, N., Deenadhayalan, R., and Anandamurugan, S. (2014). Efficient Routing Protocol For Mobile Ad Hoc Networks. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 6-12. https://doi.org/10.26634/jmt.1.2.3169

Abstract

An ad hoc routing protocol is a pattern or standard that controls routepackets between mobile devices in a Mobile Ad hoc Network. A new node announces its presence and listens for announcements broadcasted by its neighbours. To communicate one node to another one, each node can act as both host as well as router at the same time and perform all the routing and state maintenance operations. Source routing allows a sender of a packet to partially or completely specify the route the packet takes through the network. Source routing allows easier troubleshooting, improved traceroute, and enables a node to discover all the possible routes to a host. Opportunistic data forwarding has not been widely utilized in MANETs, because of the lack of an efficient lightweight proactive source routing capability. In the proposed scheme, a lightweight Table Driven Source Routing (TDSR) protocol can maintain more network topology information than Distance Vector (DV). To facilitate source routing and also smaller overhead than DV-based protocols, Link State (LS) and Reactive source routing protocols are used. The proposed protocol will enhance the performance of QoS in MANETs like delay, throughput, and Packet Delivery Ratio.

Research Paper

An Effective Double Acknowledgement Scheme For Intrusion Detection In Mobile Ad hoc Networks

S. Kiruthika* , S. Vadivel**
* Assistant Professor, Electronics and Communication Engineering, KPR Institute of Engineering and Technology, Coimbatore, India.
** Assistant Professor, Electronics and Communication Department, KPR Institute of Engineering & Technology, Erode, India.
Kiruthika, S., and Vadivel, S. (2014). An Effective Double Acknowledgement Scheme For Intrusion Detection In Mobile Adhoc Networks. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 13-19. https://doi.org/10.26634/jmt.1.2.3170

Abstract

The hegira to wireless network from wired network has been a worldwide trend in the past few years. The mobility and scalability brought by a wireless network made it possible in many applications. Mobile Ad Hoc Network (MANET) is one of the most predominant and idiosyncratic applications. On the contrary to accustomed network architecture, MANET does not require a fixed network infrastructure, every single node works as Transceiver. Nodes communicate directly with each other when they are both within the same communication range. Otherwise, they reckon on their neighbors to relay messages. The Self-configuring ability of nodes in MANET made it popular among critical mission applications like military use or emergency recovery. However, the open medium and wide distribution of nodes make MANET impuissant to rancorous attackers. In this case, it is pivotal to develop efficient encroachment-detection mechanisms to protect MANET from attacks. To adjust to such trend, we strongly believe that it is vital to address its potential security issues. In this paper, the authors have proposed and implemented a new encroachment-detection system named Enhanced Double Acknowledgment (EDACK) specially designed for MANET. Compared to various approaches, EDACK demonstrates higher rancorous behavior-detection rates in certain circumstances, while does not greatly affect the network performances.

Research Paper

Securing Node Identities and Route Identities Using Alert in MANETs

S. Gowri Shankari* , K. Logeswaran**
* PG.Scholar, Department of Information Technology, Kongu Engineering College, Perundurai, India.
** Assistant professor, Department of Information Technology, Kongu Engineering College, Perundurai, India.
Shankari, S.G., and Logeswaran, K. (2014). Securing Node Identities and Route Identities Using Alert In MANETs. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 20-25. https://doi.org/10.26634/jmt.1.2.3171

Abstract

MANETs use various anonymous routing protocols for hiding node identities and/or route identities from the outside observers in order to provide anonymity protection. Perhaps, existing anonymous routing protocols generate high cost or cannot offer complete anonymity protection to sources, destination and routes. To suggest high anonymity protection at a low cost, one of the proposed system is ALERT. ALERT energetically partitions the network field into zones and arbitrarily chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. This partition process is called as hierarchical zone partition. In addition, ALERT hides the data initiator or receiver among many initiators or receiver to reinforce the source as well as destination anonymity protection. Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively encounter the intersection and timing attacks. Experimental results display stability with the theoretical analysis, and show that ALERT achieves better route anonymity protection in a low cost which is compared with the other anonymous routing protocols.

Research Paper

Privacy Preserving Authentication Using AnonymousRoaming Protocol

V. Padmavathi* , S. Kavitha**, A. Arthi***, R. Gayathri****, A. Deepika*****
* Assistant Professor, Department of Information Technology, A.V.C College of Engineering, Mayiladuthurai, Tamilnadu, India.
**-***** Final Year B.Tech, Department of Information Technology, A.V.C College of Engineering, Mayiladuthurai, Tamilnadu, India.
Padmavathi, V., Kavitha, S., Arthi, A., Gayathri, R., and Deepika, A. (2014). Privacy Preserving Authentication Using Anonymous Roaming Protocol. i-manager’s Journal on Mobile Applications and Technologies, 1(2), 26-34. https://doi.org/10.26634/jmt.1.2.3172

Abstract

The secure roaming service, the foreign server must authenticate the roaming User, who originally subscribed to the home server. Hence, an authentication mechanism is currently important in the requirement for providing secure roaming services and protect the location privacy of users on anonymous authentication. The anonymous authentication process is without participating the home server on efficiency communication for existing work. The process of authentication causes high computation costs and huge revocation lists. So the authors proposed a novel three-round anonymous roaming protocol. The proposed protocol uses a pseudo-identity-based signcryption scheme and using CK-model to perform efficient revocation with a short revocation list and efficient authentication. The use of a signcryption algorithm minimizes the storage in a Subscriber Identification Module (SIM) card with limited storage capacity. The authentication efficiency is also higher than that of existing protocols.