Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network
Mental Health Support App with Mood Tracking and Resources
Centralized E-Warranty System with Blockchain Security
Development of Mobile-Based Application of Crime Reporting and Handling in Malawi Police Service
Rural Well Water Management and Monitoring System
Exploring the Adoption of Blockchain Technology in Africa: Insights from Direct Observation and Literature Review
Development of Mobile App for the Soil Classification
Emerging Technologies in Interaction with Mobile Computing Devices – A Technology Forecast
Using the Arduino Platform for Controlling AC Appliances with GSM Module and Relay
Applications of Wearable Technology in Elite Sports
Evaluation of Mobile Banking Services Usage in Minna, Niger State
Smartphone Applications–A Comparative Study BetweenOlder And Younger Users
Technological Diffusion of Near Field Communication (NFC)
Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users
A Review on Routing Protocols for Mobile Adhoc Networks
Applications of Wearable Technology in Elite Sports
The fourth generation wireless communication systems have been deployed or are soon to be deployed in many countries. Wireless system designers have been facing the continually increasing demand for high data rates and mobility required by new wireless applications and therefore have started research on fifth generation wireless systems that are expected to be deployed beyond 2020. In next-generation wireless data networks, Massive Multiple Input Multiple Output (MIMO) is an exciting area of 5G wireless research. It promises significant gains that offer the ability to accommodate more users at higher data rates with better reliability while consuming less power. Massive MIMO has been identified as one of the promising disruptive air interface technologies to address the massive capacity requirement demanded by 5G wireless communications. Massive MIMO, also called Large-Scale Antenna Systems, is a promising candidate technology for meeting this demand. In this paper, the authors have discussed various promising technologies for 5G wireless communication systems, such as massive MIMO, energy-efficient communication techniques, and the key challenges and potential technologies for smart mobiles.
This research considers whether smartphones satisfy the needs of all generations. The research methods used a user questionnaire, (n=60) divided equally between young and old consumers and an interview conducted with six smartphone users. The main findings were that, both groups require efficient functionality with regards to basic smartphone activities such as making phone calls and sending text messages, but that the difference lies in how much the two sets of consumers viewed social media access as an important feature. While older users showed little concern for socially orientated applications, the young consumer group showed a dependence upon it as an aid to their daily lifestyle. The study concluded that whilst basic functionality is a standard requirement for any user, the exponential growth of technology and increasing demand for social communication has caused a divide between the young and old consumers. The market is now dominated by the younger generation and so the older users' needs and requirements are shown to be overshadowed in current smartphone design.
Mobile Ad Hoc Networks (MANETs) are infrastructure less networks that are very dynamic in nature. The main problem with such networks is mobility of the nodes, the nodes are free to roam arbitrarily, thus the topology changes from time to time, and the route acquisition in such a network is always a tedious task. In this paper, the authors describe an algorithm implemented based on a firefly algorithm (an implementation of swarm intelligence). Firefly algorithm capture the nature of fireflies i.e. how they do the task individually and how they coordinate with each other to create a system. This algorithm is compared with the state-of-the art routing algorithm and it thus improves MANETs routing performance in terms of the packet delivery ratio, packet loss, throughput and delay.
The aim of this paper is to study the symmetric algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. and to analyse their performance, mainly their beats and end memory requirements are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. All the above algorithms will be first implemented in C, C++ or JAVA and their performances will be analysed. The suitable algorithm will be ported onto the mobile phones using Android. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving even a single digit. The message will be decrypted only after the full key version has matched with the given symmetry of the key. This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.
Smart Phone is a single device that can be used in different environments, where corporate data and applications in it, are separated from the personal data and applications. Data and applications are stored in different compartments. Security profiles are created and applications are assigned to it. In general, access to data and applications will be implemented by a set of regulatory principles. In the case a Smartphone gets stolen and a third person tries to steal sensitive information it is currently prove to breach of the security system. To overcome this problem a new system is proposed. The user can protect their sensitive data and applications from hackers with the help of the security profiles they created and the profiles will be enabled automatically based on the location. If a third person tries to change the profile manually, the system may ask for security code. If he gives wrong code more than five times then the data will be deleted from the internal memory of the Smartphone. Hence data is secured and protected by means of the security profile.