i-manager's Journal on Mobile Applications and Technologies (JMT)


Volume 2 Issue 2 May - July 2015

Research Paper

Affective Computing in the Design of Interactive Systems

Tom Page*
Senior Lecturer, Electronic Product Design, Loughborough Design School, Loughborough University, UK.
Page, T. (2015). Affective Computing in the Design of Interactive Systems. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 1-18. https://doi.org/10.26634/jmt.2.2.4871

Abstract

This research explores how such familiar notions can successfully translate onto interactive systems; providing profound and emotional design experiences without the necessity for a physical chassis. An online survey facilitated the acquisition of a consumer voice regarding levels of engagement with various interactive devices. It also explores consumer understandings of privacy and data collection. A series of interviews was conducted with professionals in the UX industry, adding context to affective implementation within commercial environments. Furthermore, these discussions address the benefits of implementing emotional design experiences interactively and the privacy concerns this surface. The research concludes with an overview of how affective computing methodology - in conjunction with consumer engagement - can be used in the creation of profound experiences whilst using interactive systems. It also explores the issues which arise with its implementation; specifically privacy and implicit data collection. Recommendations for further study in this field are provided based on the research discussion and findings.

Research Paper

Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs

S.B.Ninu* , S. Behin Sam**
* Research Scholar, Department of Computer Science, Bharathiar University, Coimbatore, India.
** Assistant Professor, Department of Computer Science, R.V. Government Arts College, Chengalpattu, India.
Ninu, S.B., and Sam, S.B. (2015). Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 19-26. https://doi.org/10.26634/jmt.2.2.4872

Abstract

Mobile Adhoc Network (MANET) is one of the most important and unique applications. When compared to traditional network architecture, MANET does not require a fixed network infrastructure instead dynamic and distributed in nature; every single node act as both a transmitter and a receiver. In same communication range, the nodes communicate directly with each other. For outer range, they rely on their trust based neighbors to relay messages. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, the authors propose and implement a new intrusion detection system named Hybrid Enhanced Adaptive Acknowledgment (HEAACK) specially designed for MANETs. They extend their work with the introduction of Hybrid Crypto systems to prevent the attacker from forging acknowledgment packets and reduce the network overhead which is caused by Digital Signature. In order to obtain the optimal AESs in MANETs, the authors have implemented DSA, RSA and AES schemes in the simulation. Eventually, they arose to a conclusion that the AES scheme is more suitable to be implemented in the MANETs. Simulation results show that the proposed Hybrid cryptosystem method is a more desirable scheme under MANETs.

Research Paper

Mobile Data Collection with Secure Multihop Routing Protocol using Dual Data Upload Clustering in Wireless Sensor Networks

K. Papithasri* , M. Babu**
* PG Scholar, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem, India.
** Assistant Professor, Department of Computer Science and Engineering, Knowledge Institute of Technology, Salem, India.
Papithasri, K., and Babu, M. (2015). Mobile Data Collection with Secure Multihop Routing Protocol using Dual Data Upload Clustering in Wireless Sensor Networks. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 27-36. https://doi.org/10.26634/jmt.2.2.4873

Abstract

Wireless Sensor Networks have begun as an effective solution for a wide range of applications. Mobile data gathering is an important operation in sensor network. Most of the traditional sensor network architectures consist of static nodes that are deployed over a sensing area. However, a location service is considered, where each sensor essentials to maintain its location information by normally updating its location information within its neighboring set of polling points in the network. There is a moving path planning with multihop relay networks. The source node and the sink node communicate with each other either in single hop or multi-hop network. The existing approaches fail to deliver a guaranteed reliable network in terms of traffic, end-to-end connection and mobility. To overcome the problem of these failures, a Delay Aware Secure Multihop Routing (DASMR) protocol is proposed. In this protocol, sensor networks are first defined with mobile sink and then an overview of the data gathering process is presented in such a scenario based on the role of a mobile sink. Data can be gathered by its own or neighboring node by visiting each polling point through the cluster heads. Here, mobile data gathering is mainly focused on path selection problem. The node is travelled through the path, which is dynamically gathering the information at each cluster head. This DASMR scheme achieves over 70 percent of energy saving per node and 80 percent of energy saving on cluster heads comparing with previous works. Although, the number of polling points are also minimized by visiting the new polling points, which also extends the network lifetime. DASMR reduces the overall energy consumption and optimize the data collection tour to minimize the delay by the sink. Simulation experiments based on GloMoSim is shown to validate the high efficiency of the presented formulations and algorithms.

Research Paper

Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET

M. Dhivyaa* , K.R. Deepak**
* PG Scholar, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Erode, India.
** Assistant Professor, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Erode, India.
Dhivyaa, M., and Deepak, K.R. (2015). Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 37-42. https://doi.org/10.26634/jmt.2.2.4874

Abstract

Mobile Ad-hoc Network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other. MANETs are infrastructure-less, lack of centralized monitoring and dynamic changing network topology. So, this network is highly vulnerable to attacks due to the open medium. Wormhole attack is difficult to detect because they do not create any separate packets. In this paper, performance of wormhole attack is analyzed using DYMO and FSR routing protocol. The result analysis shows the impact of wormhole attack on MANETs in terms of throughput, average end-to-end delay, average jitter and packet delivery ratio.

Research Paper

Implementation of All-In-One Instant Messaging Application

Dipti Pawade* , Ajay Mohandas**, Vijay Yadav***, Rajankumar Bhimprasad****, Pradeep Bagrao*****
* Assistant Professor, Department of Information Technology, K.J. Somaiya College of Engineering, Vidyavihar, Mumbai, India.
**-***** UG Student, Department of Information Technology, K.J. Somaiya College of Engineering, Vidyavihar, Mumbai, India.
Pawade, D., Mohandas, A., Yadav, V., Bhimprasad, R., and Bagrao, P. (2015). Implementation of All-In-One Instant Messaging Application. i-manager’s Journal on Mobile Applications and Technologies, 2(2), 43-50. https://doi.org/10.26634/jmt.2.2.4875

Abstract

In today's world, Instant Messaging applications like Whats App, Line, Viber have increased the social interaction among people. The purpose of such application is to keep friends and families connected no matter how far they are. Now we can chat with our near and dear ones easily and can see them even if they are a million miles away. Some of the applications gives us the provision for sending images and videos to others or call them and this is all possible just by a single click on our handset. This type of applications are cheaper to use and also user friendly. In spite of advent of such applications, people are demanding for those applications that are efficient and can ease their work. Thus, the authors have planned to create an instant messaging application similar to WhatsApp along with some added features. Some of the features added are built-in AppLock, reminder notification, offline messaging, etc. The other notable features added are Integration of the application with other applications, and secure communication. The main goal of the paper is to develop an application which is user friendly and efficient to use.