i-manager's Journal on Mobile Applications and Technologies (JMT)


Volume 1 Issue 4 November - January 2015

Article

Challenges And Energy Efficient Techniques For High Performance Wireless Communications

Chidadala Janardhan* , Bhagath Pyda**, J. Manohar***, K. V. Ramanaiah****
* Assistant Professor, Department of ECE, Priyadarshini College Of Engineering and Technology, Nellore, A.P
** Assistant Professor, Department of ECE, Priyadarshini College Of Engineering and Technology, Nellore, A.P
*** Associate Professor, Department of ECE, Jagan's College of Engineering and Technology, Nellore, A.P
**** Professor, Department of ECE, YSR Engineering College of YV University, kadapa, A.P
Janardhan, C., Pyda, B., Manohar, J., and Ramanaiah, K. V. (2015). Challenges And Energy Efficient Techniques For High Performance Wireless Communications. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 1-12. https://doi.org/10.26634/jmt.1.4.3516

Abstract

The fourth generation wireless communication systems have been deployed or are soon to be deployed in many countries. Wireless system designers have been facing the continually increasing demand for high data rates and mobility required by new wireless applications and therefore have started research on fifth generation wireless systems that are expected to be deployed beyond 2020. In next-generation wireless data networks, Massive Multiple Input Multiple Output (MIMO) is an exciting area of 5G wireless research. It promises significant gains that offer the ability to accommodate more users at higher data rates with better reliability while consuming less power. Massive MIMO has been identified as one of the promising disruptive air interface technologies to address the massive capacity requirement demanded by 5G wireless communications. Massive MIMO, also called Large-Scale Antenna Systems, is a promising candidate technology for meeting this demand. In this paper, the authors have discussed various promising technologies for 5G wireless communication systems, such as massive MIMO, energy-efficient communication techniques, and the key challenges and potential technologies for smart mobiles.

Research Paper

Smartphone Applications–A Comparative Study BetweenOlder And Younger Users

Tom Page*
Senior Lecturer, Electronic Product Design, Loughborough Design School, Loughborough University, UK.
Page, T. (2015). Smartphone Applications–A Comparative Study Between Older And Younger Users. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 13-24. https://doi.org/10.26634/jmt.1.4.3517

Abstract

This research considers whether smartphones satisfy the needs of all generations. The research methods used a user questionnaire, (n=60) divided equally between young and old consumers and an interview conducted with six smartphone users. The main findings were that, both groups require efficient functionality with regards to basic smartphone activities such as making phone calls and sending text messages, but that the difference lies in how much the two sets of consumers viewed social media access as an important feature. While older users showed little concern for socially orientated applications, the young consumer group showed a dependence upon it as an aid to their daily lifestyle. The study concluded that whilst basic functionality is a standard requirement for any user, the exponential growth of technology and increasing demand for social communication has caused a divide between the young and old consumers. The market is now dominated by the younger generation and so the older users' needs and requirements are shown to be overshadowed in current smartphone design.

Research Paper

Firefly Based Routing For Optimized Transmission Over MANETs

Rahul Gupta* , Rajesh Kumar**
* M.Tech, Department of Computer Science and Applications, Thapar University, Patiala.
** Associate Professor, Department of Computer Science and Engineering, Thapar University, Patiala.
Gupta, R., and Kumar, R. (2015). Firefly Based Routing For Optimized Transmission Over MANETs. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 25-32. https://doi.org/10.26634/jmt.1.4.3518

Abstract

Mobile Ad Hoc Networks (MANETs) are infrastructure less networks that are very dynamic in nature. The main problem with such networks is mobility of the nodes, the nodes are free to roam arbitrarily, thus the topology changes from time to time, and the route acquisition in such a network is always a tedious task. In this paper, the authors describe an algorithm implemented based on a firefly algorithm (an implementation of swarm intelligence). Firefly algorithm capture the nature of fireflies i.e. how they do the task individually and how they coordinate with each other to create a system. This algorithm is compared with the state-of-the art routing algorithm and it thus improves MANETs routing performance in terms of the packet delivery ratio, packet loss, throughput and delay.

Research Paper

Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones

P. Padmanabham* , Shahebaz Ahmed Khan**
* Professor, Department of Computer Science and Engineering, Bharat Institute of Engineering and Technology, Telangana, India.
** P.G Scholar, Department of Computer Science and Engineering, Bharat Institute of Engineering and Technology, Telangana, India.
Padmanabham, P., and Khan, S.A. (2015). Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 33-38. https://doi.org/10.26634/jmt.1.4.3519

Abstract

The aim of this paper is to study the symmetric algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. and to analyse their performance, mainly their beats and end memory requirements are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. All the above algorithms will be first implemented in C, C++ or JAVA and their performances will be analysed. The suitable algorithm will be ported onto the mobile phones using Android. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving even a single digit. The message will be decrypted only after the full key version has matched with the given symmetry of the key. This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.

Research Paper

Security Profiles With Fine-Grained Policies On Smartphone

A. Malathy* , T.A. Vijayalakshmi**, V. Kumar***, I. Rajesh****, M. Banuchitra*****
* Network Engineer, Mgauge, Chennai.
**, ***** Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
*** HOD, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
**** Associate Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem.
Malathy, A., Vijayalakshmi, T. A., Kumar, V., Rajesh, I., and Banuchitra, M. (2015). Security Profiles With Fine-Grained Policies On Smartphone. i-manager’s Journal on Mobile Applications and Technologies, 1(4), 39-43. https://doi.org/10.26634/jmt.1.4.3520

Abstract

Smart Phone is a single device that can be used in different environments, where corporate data and applications in it, are separated from the personal data and applications. Data and applications are stored in different compartments. Security profiles are created and applications are assigned to it. In general, access to data and applications will be implemented by a set of regulatory principles. In the case a Smartphone gets stolen and a third person tries to steal sensitive information it is currently prove to breach of the security system. To overcome this problem a new system is proposed. The user can protect their sensitive data and applications from hackers with the help of the security profiles they created and the profiles will be enabled automatically based on the location. If a third person tries to change the profile manually, the system may ask for security code. If he gives wrong code more than five times then the data will be deleted from the internal memory of the Smartphone. Hence data is secured and protected by means of the security profile.