Wireless Communication using Shortest Job First Scheduling Algorithm for Temporary Network
Mental Health Support App with Mood Tracking and Resources
Centralized E-Warranty System with Blockchain Security
Development of Mobile-Based Application of Crime Reporting and Handling in Malawi Police Service
Rural Well Water Management and Monitoring System
Exploring the Adoption of Blockchain Technology in Africa: Insights from Direct Observation and Literature Review
Development of Mobile App for the Soil Classification
Using the Arduino Platform for Controlling AC Appliances with GSM Module and Relay
Evaluation of Mobile Banking Services Usage in Minna, Niger State
Emerging Technologies in Interaction with Mobile Computing Devices – A Technology Forecast
Development of an Android Based Mobile Application for the Design and Detailing of Isolated Pad Foundations According to Eurocode 2
Smartphone Applications–A Comparative Study BetweenOlder And Younger Users
Technological Diffusion of Near Field Communication (NFC)
Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users
A Review on Routing Protocols for Mobile Adhoc Networks
Applications of Wearable Technology in Elite Sports
This research explores how such familiar notions can successfully translate onto interactive systems; providing profound and emotional design experiences without the necessity for a physical chassis. An online survey facilitated the acquisition of a consumer voice regarding levels of engagement with various interactive devices. It also explores consumer understandings of privacy and data collection. A series of interviews was conducted with professionals in the UX industry, adding context to affective implementation within commercial environments. Furthermore, these discussions address the benefits of implementing emotional design experiences interactively and the privacy concerns this surface. The research concludes with an overview of how affective computing methodology - in conjunction with consumer engagement - can be used in the creation of profound experiences whilst using interactive systems. It also explores the issues which arise with its implementation; specifically privacy and implicit data collection. Recommendations for further study in this field are provided based on the research discussion and findings.
Mobile Adhoc Network (MANET) is one of the most important and unique applications. When compared to traditional network architecture, MANET does not require a fixed network infrastructure instead dynamic and distributed in nature; every single node act as both a transmitter and a receiver. In same communication range, the nodes communicate directly with each other. For outer range, they rely on their trust based neighbors to relay messages. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, the authors propose and implement a new intrusion detection system named Hybrid Enhanced Adaptive Acknowledgment (HEAACK) specially designed for MANETs. They extend their work with the introduction of Hybrid Crypto systems to prevent the attacker from forging acknowledgment packets and reduce the network overhead which is caused by Digital Signature. In order to obtain the optimal AESs in MANETs, the authors have implemented DSA, RSA and AES schemes in the simulation. Eventually, they arose to a conclusion that the AES scheme is more suitable to be implemented in the MANETs. Simulation results show that the proposed Hybrid cryptosystem method is a more desirable scheme under MANETs.
Wireless Sensor Networks have begun as an effective solution for a wide range of applications. Mobile data gathering is an important operation in sensor network. Most of the traditional sensor network architectures consist of static nodes that are deployed over a sensing area. However, a location service is considered, where each sensor essentials to maintain its location information by normally updating its location information within its neighboring set of polling points in the network. There is a moving path planning with multihop relay networks. The source node and the sink node communicate with each other either in single hop or multi-hop network. The existing approaches fail to deliver a guaranteed reliable network in terms of traffic, end-to-end connection and mobility. To overcome the problem of these failures, a Delay Aware Secure Multihop Routing (DASMR) protocol is proposed. In this protocol, sensor networks are first defined with mobile sink and then an overview of the data gathering process is presented in such a scenario based on the role of a mobile sink. Data can be gathered by its own or neighboring node by visiting each polling point through the cluster heads. Here, mobile data gathering is mainly focused on path selection problem. The node is travelled through the path, which is dynamically gathering the information at each cluster head. This DASMR scheme achieves over 70 percent of energy saving per node and 80 percent of energy saving on cluster heads comparing with previous works. Although, the number of polling points are also minimized by visiting the new polling points, which also extends the network lifetime. DASMR reduces the overall energy consumption and optimize the data collection tour to minimize the delay by the sink. Simulation experiments based on GloMoSim is shown to validate the high efficiency of the presented formulations and algorithms.
Mobile Ad-hoc Network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other. MANETs are infrastructure-less, lack of centralized monitoring and dynamic changing network topology. So, this network is highly vulnerable to attacks due to the open medium. Wormhole attack is difficult to detect because they do not create any separate packets. In this paper, performance of wormhole attack is analyzed using DYMO and FSR routing protocol. The result analysis shows the impact of wormhole attack on MANETs in terms of throughput, average end-to-end delay, average jitter and packet delivery ratio.
In today's world, Instant Messaging applications like Whats App, Line, Viber have increased the social interaction among people. The purpose of such application is to keep friends and families connected no matter how far they are. Now we can chat with our near and dear ones easily and can see them even if they are a million miles away. Some of the applications gives us the provision for sending images and videos to others or call them and this is all possible just by a single click on our handset. This type of applications are cheaper to use and also user friendly. In spite of advent of such applications, people are demanding for those applications that are efficient and can ease their work. Thus, the authors have planned to create an instant messaging application similar to WhatsApp along with some added features. Some of the features added are built-in AppLock, reminder notification, offline messaging, etc. The other notable features added are Integration of the application with other applications, and secure communication. The main goal of the paper is to develop an application which is user friendly and efficient to use.