Saturday, 7 January 2017

A Review on Routing Protocols for Mobile Adhoc Networks

Vol. 3  Issue 1
Year: 2016
Issue:Feb-Apr 
Title:A Review on Routing Protocols for Mobile Adhoc Networks
Author Name:S. Rajasekar and A. Subramani
Synopsis:
Wireless Networking is an emerging technology that allows users to access information and services anywhere, regardless of their geographic areas over the past few years with the trend of mobile computing. Mobile Adhoc Network (MANET) has become one of the most important wireless communication mechanisms among all, unlike traditional network. MANET represents complex distributed systems that comprise wireless mobile nodes that can freely and dynamically self-organize temporarily. MANET is an autonomously self-organized networks without infrastructure support. In MANET, nodes can move arbitrarily. Therefore the network may experience rapid and unpredictable topology changes, because nodes in a MANET normally have limited transmission ranges, some nodes cannot communicate directly with each other. Routing in MANET potentially contains multiple hops, and every node in mobile ad hoc networks has the responsibility to act as a router. In MANET, network topology can dynamically be changed in an unpredictable manner since the nodes are free to move. Every single node in the MANET works as both receiver and transmitter. Each node directly communicates with others, when they are both within their communication ranges. All nodes work as routers and take path in discovery and maintenance of routes to other nodes in the network. In this paper, a review on the routing protocols for mobile adhoc networks, challenges, issues, and applications were presented. The objective of this study is the comparative analysis of various routing protocols for MANET in different manner.

RAY: An App for Determining Decision-Making Power of a Person

Vol. 3  Issue 1
Year: 2016
Issue:Feb-Apr 
Title:RAY: An App for Determining Decision-Making Power of a Person
Author Name:Dipti Pawade, Yogesh R. Pawade, Abhishek Velankar, Ritesh Kumar Patel and Yash Mantri 
Synopsis:
Currently, different web tools are available for determining the decision-making power of an individual. The tools determine the decision-making capacity based on certain questionnaire. The authors have developed a multi-level android application called 'RAY' which helps to determine the decision-making power of the user. The software uses the user's textual response as an input. At the initial stage, the user goes through several questions based on the decision making and responses are recorded accordingly. In the next stage, the user is challenged with a multi-level game. Then, for a particular scenario, the user is asked to rate himself on 1 to 10 scale. The App records the user input at each stage. Based on the responses, it determines the decision-making capacity of the user whether it is strong, moderate or weak.

Optimization of Load Balancing using Macro Layer Approach for MANETs

Vol. 3  Issue 1
Year: 2016
Issue:Feb-Apr 
Title:Optimization of Load Balancing using Macro Layer Approach for MANETs
Author Name:S. Karyavardhi and S. Bavaji 
Synopsis:
Mobile Ad-hoc Networks (MANETs) are continuously self-configuring infrastructure-less networks of mobile devices connected without wires. In various locations Carrier Sense Multiple Access allows the radio resources that are similar in nature that leads to the bandwidth effectiveness, which results at the cost of the crashes possible due to the hidden terminal problems in the multi-hop wireless networks. The progress of the applications of MANETs are increasing, which increases the efficiency of bandwidth importance. For extremely loaded MANETs, load balance distribution protocols are used which leads to uniformity. These protocols which are non-uniform are not suitable for load distributions and as on-demand dynamic channel allocation is high, CDCA-TRACE is used for cooperative load balancing. A research work has been here to overcome the packet delay problem, while packet transmission from one node to another node based on the energy in the cluster. The sender node sends the packets to the receiver node which has high energy using the Data-Cluster Head Algorithm (D-CH) to reduce the packet delay variation, energy consumption and throughput increase.

Development of Android Applications for Design and Quality Control of Flexible Pavements

Vol. 3  Issue 1
Year: 2016
Issue:Feb-Apr 
Title:Development of Android Applications for Design and Quality Control of Flexible Pavements
Author Name:Basavaraj Akki and G. Kavitha 
Synopsis:
In highway construction, design aspects and quality aspects are of utmost importance since they affect the whole highway project in terms of cost, time and satisfaction of client and durability of constructed highway. In the present study, an attempt is made to develop an Android Application for design and quality control of highway construction. Before developing the application, a questionnaire was conducted to freeze the important quality control checks at site that have to be included in the application. The data collected from this questionnaire was then analyzed. This questionnaire analysis report acts like a backbone for developing the application. The android application was developed using Eclipse software. During testing, the apps on physical devices (smartphones), manual calculations and report making were simultaneously carried out to compare, time between manual way and application. From the th studies, it was found that the applications developed reduces the manual calculations and 1/10 of time on an average and helps a highway engineer on the site.

Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users

Vol. 3  Issue 1
Year: 2016
Issue:Feb-Apr 
Title:Touchscreen and Perceived Usability: A Comparison of Attitudes between Older and Younger Mobile Device Users
Author Name:Tom Page
Synopsis:
With increasing popularity of touchscreen phones, there is a corresponding increasing emphasis on ergonomics considerations with a focus on use and interaction style between older and younger users. The purpose of this research was to evaluate the use of touchscreen phone interfaces to discover if they are designed to be inclusive and consider ergonomics. The research methods comprised interviews and focus groups in order to gain qualitative data on the use and satisfaction of touchscreen phones in relationship to age. Results have demonstrated a variety of opinions among the age groups, with users in the 18-25 age-range promoting a positive attitude towards brands, but blaming technology for errors, in contrast to users in the 60-70 age range who blamed themselves for errors and were more focused on function than brand. The study has gone some way towards enhancing our understanding of the attitudes surrounding inclusive design in relation to touchscreen phones.

Multi-Hop Cellular Networks for Mobility Load Balancing and Inter-Cell Interference Coordination using OFDMA with Improved Cell-Edge Spectral Efficiency.

Vol. 2  Issue 4
Year: 2016
Issue:Nov-Jan
Title:Multi-Hop Cellular Networks for Mobility Load Balancing and Inter-Cell Interference Coordination using OFDMA with Improved Cell-Edge Spectral Efficiency.
Author Name:P.S. Lakshmikanth, D. Leela Rani and P. Geetha
Synopsis:
Multi-hop Cellular Networks (MCNs) use different multiple low power transmitters for high throughput and coverage of large area in a cellular network. A quantitative study on resource allocation schemes by jointly considering Interference Coordination (IC) and Load Balancing (LB) in MCNs improves throughput and large coverage. But still it suffers from load unbalance and Inter-Cell Interference (ICI) problems. In this paper, these problems are tackled by jointly considering a novel Mobility Load Balancing (MLB) and Inter-cell Interference Coordination (ICIC) algorithm in MCNs. This algorithm is simulated under fractional Frequency Reuse (FFR), Soft Frequency Reuse (SFR), Reuse-1 and Reuse-3 frequency planning schemes. The simulation is performed with Round-robin, Proportional fair and Best-channel quality indicator (CQI) schedulers. This shows that the proposed algorithm provides significant improvements in the Quality of Service (QoS) provision, cell-edge spectral efficiency and the number of unsatisfied users. The main objective of this paper is to provide higher data rates, improvement in cell-edge spectral efficiency, and reduce the unsatisfied users' in the future wireless cellular networks.

Quality of Experience in terms of Bandwidth for Efficient Video Streaming over MANETs

Vol. 2  Issue 4
Year: 2016
Issue:Nov-Jan
Title:Quality of Experience in terms of Bandwidth for Efficient Video Streaming over MANETs
Author Name:M. Santhi and K. Jeevan Pradeep
Synopsis:
Many QoS provisioning solutions were described in the past, but none of them are tested on video traffic and also the effects of mobility and dissimilarity in link quality are not labeled properly. The proposed efficient QoS-Aware Routing Protocol (QARP) that uses Cross-Layer Communication (CLC) and Session Admission Control (SAC) methods to provide QoS is guaranteed in terms of network bandwidth. The QARP performs QoS-aware route discovery by considering the effects of both inter-contention, and intra-contention in the route discovery phase. Only data sessions are considered for which a route with needed bandwidth is found that is admitted into the network by SAC process [14]. The highly varying characteristics of transmitting video data checks the SAC process less reliable due to the unavailability of accurate session bandwidth consumption information. The increase is possibility of wrong admission not only degrades the video quality of admission flows but also affects the quality existing data sessions. In future the service experience of an end user can be used for adoption streaming procedure and presentation assessment of the developing approach in terms of Quality of Experience.

Mitigation for Jelly Fish Attack on MANET

Vol. 2  Issue 4
Year: 2016
Issue:Nov-Jan
Title:Mitigation for Jelly Fish Attack on MANET
Author Name:Shweta Shah, Madhu Sharma and Ashish Jain
Synopsis:
Mobile Adhoc Networks have become a part and parcel of technology advancements due to its extraordinary technique. Open communication feature make it prone for various security threats. Subsequently, there are many security threats like DDOS, Wormhole, Black hole etc., which not only affect the network performance but also responsible for the leakage of sensitivity of information. Jelly-Fish attack is one of the routing disruption attack which lies in the series of wormhole and black hole attack at network layer. It attempts to compromise the network packet and store them for a period of time. It may try to introduce delay or partial capturing of packets during communication. Due to big impact of jellyfish attack, it has gained a big name in recently and most wide area for researchers. Jellyfish Attack exploits the end-to-end communication and creates congestion in transmission protocols. Arbitrary network failure or node failure is the natural phenomena and may vary as per real life deployment, but intentional failure or compromising network may lead to information leakage. Security in mobile networks is a challenging task. The complete study observes that the security threats not only capture the packets but also degrades the network performance. To overcome vulnerability problems, this work considers jellyfish attack as the study target and will derive a mechanism to identify and prevent mobile networks from security threats.

Smart Antennas for Interference Rejection in Mobile Communications

Vol. 2  Issue 4
Year: 2016
Issue:Nov-Jan
Title:Smart Antennas for Interference Rejection in Mobile Communications
Author Name:Veerendra, Md. Bakhar and Vani R.M.  
Synopsis:
In this paper, the authors have devised a new robust beam forming algorithm called Variable Step Size Normalized Least Mean Square (VSSNLMS) for smart antenna systems. Firstly, the performance of Least Mean Square (LMS) and Normalized Least Mean Square (NLMS) algorithms are analyzed with respect to the convergence speed and interference suppression capability. It is found that, both the methods use fixed step size. As a result of this, they show low convergence rate. Hence these algorithms cannot track the desired signal properly in an environment, where the signal characteristics are changing rapidly. The proposed VSSNLMS algorithm uses a variable step size. This improves the convergence rate and produces deep nulls in the direction of interferences which improves the interference suppression. Hence the proposed method is robust and better than the normal LMS and NLMS algorithms and can be used effectively in advanced mobile communication applications.

Improving Routing Mechanism in MANETs using Discovery Routing Protocols

Vol. 2  Issue 4
Year: 2016
Issue:Nov-Jan
Title:Improving Routing Mechanism in MANETs using Discovery Routing Protocols
Author Name:D. Ganesh and K. Arunachalam 
Synopsis:
Nowadays MANETs have obtained a sensible interest due to the growing number of wireless device users. Hence, Mobile Ad-Hoc Networks are used in real time applications, and these real time programs need QoS assurance in terms of throughput and delay. Hence, it assets the QoS in MANETs. The main problem is the communication which is more a shared standard in a particular channel. In this work, the authors suggest an Achievable Throughput based Admission Control Protocol (ATACP) for controlling a channel from becoming overloaded, thereby making sure an assured throughput for real time traffic. Achievable Throughput based Admission Control Protocol works on a cross layer structural design that encompass the network and the MAC Layer and the admission control is carried in each node during the path discovery. The node broadcasts the route request to its neighbors providing its achievable throughput that satisfies the desired throughput considering the contention count. The performance of the ACP maintains the ineffective overhead throughput and End-to-End Delay MANETs. This work proposes the improving routing mechanism in MANETs using discovery routing protocols to achieve the effectiveness of throughput and less end-to-end delay over Mobile Ad-hoc Network.

A Routing Algorithm in MANET - A Survey

Vol. 2  Issue 3
Year: 2015
Issue:Aug-Oct
Title:A Routing Algorithm in MANET - A Survey
Author Name:R. Madhumitha and A. Subramani
Synopsis:
Mobile Ad-hoc Network (MANET) is most often a cluster of wireless mobile nodes dynamically establishing a brief live network without the use of network infrastructure. MANET is associated with the rising space of analysis in the communication network world. The change in network topology due to node movement associated with the link failure and creation, source in radio resources and bandwidth, limited battery power and computing capability pose challenges in packet routing in MANET. Energy efficiency is the most important design consideration in MANETs, due to the limited battery life of mobile terminals. The network lifetime will improve suitability, reducing the requirement power of connections. A number of Routing protocols have been proposed in the recent scenario. There are many advantages and disadvantages in those algorithms. This paper is a survey of the new and improved energy based routing methods in Mobile Adhoc Networks.

Providing Security to the Neighbouring Nodes in the Data Link Layer using Pseudo Random with RSA Algorithm

Vol. 2  Issue 3
Year: 2015
Issue:Aug-Oct
Title:Providing Security to the Neighbouring Nodes in the Data Link Layer using Pseudo Random with RSA Algorithm
Author Name:N. Poornima and M. Ganesh Karthik
Synopsis:
Mobile adhoc networks are a gathering of mobile nodes that communicate through a wireless channel without any unchanging infrastructure such as an access point or a mobile base station. In this network, every node transmits data from the forwarding packets to its neighboring nodes. Some nodes may not participate in forwarding the packets for the reduction in its resources. The presence of selfish behavior among the nodes may lead to network partition and makes a major harmful impact in the network operation. To avoid such conditions, selfish node inference is essential. To overcome this problem some techniques like, a credit based technique, reputation based technique, Record and Trust Based Detection techniques (RTBD) and so on, have been used. The proposed model provides security to the neighbor nodes by using pseudo random number generation using RSA algorithm, to avoid the neighboring node from being compromised by the selfish node. It significantly improves the performance metrics such as, packet delivery ratio, energy, and routing overhead.

An Improved Ad-Hoc Routing Protocol for MANETs using Swarm Intelligence Technique

Vol. 2  Issue 3
Year: 2015
Issue:Aug-Oct
Title:An Improved Ad-Hoc Routing Protocol for MANETs using Swarm Intelligence Technique
Author Name:P. Sarika and V. V. Rama Prasad 
Synopsis:
Mobile ad-hoc networks (MANET) are formed by a group of mobile nodes and does not have any fixed infrastructure. Due to the node mobility nature in MANETs, different routing challenges such as, power constraints, link failures, and path breakages occur. Many routing protocols both proactive and reactive have been implemented to solve the routing challenges, but these protocols cannot defeat these issues in a complete manner. Researchers made an attempt to research on swarm intelligence based nature inspired algorithms to defeat the routing problems faced by the mobile ad-hoc networks. In the existing approach, BAT optimization which is a swarm intelligence technique was used to find the best path for Ad-hoc On-demand Multipath Distance Vector (AOMDV) protocol based on link availability and neighbour node queuing delay. But, this approach does not maintain a balanced control packet overhead. So, in this paper Bee Inspired routing Protocol (BeeIP) is proposed to provide multipath routing for mobile ad-hoc networks. BeeIP is a swarm intelligence based routing technique, which uses the honey bee forager behavior. Simulation results show that, the proposed approach BeeIP outperforms the BAT-AOMDV in terms of network performance metrics such as, packet delivery ratio, control overhead, average end to end delay.

Dynamic Mobility Management Scheme for Inter Handoff in Hybrid Wireless Mesh Networks

Vol. 2  Issue 3
Year: 2015
Issue:Aug-Oct
Title:Dynamic Mobility Management Scheme for Inter Handoff in Hybrid Wireless Mesh Networks
Author Name:Narayana Rao, Subba Rao CH.D.V.
Synopsis:
This paper has been withdrawn by the author

Drivers and Barriers to the Internet of Things

Vol. 2  Issue 3
Year: 2015
Issue:Aug-Oct
Title:Drivers and Barriers to the Internet of Things
Author Name:Thomas Page
Synopsis:
The aim of this research is to investigate the development and implications for applications and future directions of the Internet of Things (IoT). The current understanding of the Internet of Things is explored and discussed to understand, what is currently understood because IoT has been often considered a vague and relatively little understood concept. A range of users were asked to describe their understanding of the IoT and how they use IoT devices. A significant finding showed that although the term Internet of Things has been known for several years and is becoming increasingly more widespread. However, there are privacy concerns with regards to the large amounts of personal data, transferred between IoT devices.

Implementation of All-In-One Instant Messaging Application

Vol. 2  Issue 2
Year: 2015
Issue:May-Jul
Title:Implementation of All-In-One Instant Messaging Application
Author Name:Dipti Pawade, Ajay Mohandas, Vijay Yadav, Rajankumar Bhimprasad and Pradeep Bagrao
Synopsis:
In today's world, Instant Messaging applications like Whats App, Line, Viber have increased the social interaction among people. The purpose of such application is to keep friends and families connected no matter how far they are. Now we can chat with our near and dear ones easily and can see them even if they are a million miles away. Some of the applications gives us the provision for sending images and videos to others or call them and this is all possible just by a single click on our handset. This type of applications are cheaper to use and also user friendly. In spite of advent of such applications, people are demanding for those applications that are efficient and can ease their work. Thus, the authors have planned to create an instant messaging application similar to WhatsApp along with some added features. Some of the features added are built-in AppLock, reminder notification, offline messaging, etc. The other notable features added are Integration of the application with other applications, and secure communication. The main goal of the paper is to develop an application which is user friendly and efficient to use.

Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET

Vol. 2  Issue 2
Year: 2015
Issue:May-Jul
Title:Performance Evaluation of DYMO and FSR in the Presence of Wormhole Attack over MANET
Author Name:M. Dhivyaa and K.R. Deepak
Synopsis:
Mobile Ad-hoc Network (MANET) consists of a collection of wireless mobile nodes that are capable of communicating with each other. MANETs are infrastructure-less, lack of centralized monitoring and dynamic changing network topology. So, this network is highly vulnerable to attacks due to the open medium. Wormhole attack is difficult to detect because they do not create any separate packets. In this paper, performance of wormhole attack is analyzed using DYMO and FSR routing protocol. The result analysis shows the impact of wormhole attack on MANETs in terms of throughput, average end-to-end delay, average jitter and packet delivery ratio.

Mobile Data Collection with Secure Multihop Routing Protocol using Dual Data Upload Clustering in Wireless Sensor Networks

Vol. 2  Issue 2
Year: 2015
Issue:May-Jul
Title:Mobile Data Collection with Secure Multihop Routing Protocol using Dual Data Upload Clustering in Wireless Sensor Networks
Author Name:K. Papithasri and M. Babu
Synopsis:
Wireless Sensor Networks have begun as an effective solution for a wide range of applications. Mobile data gathering is an important operation in sensor network. Most of the traditional sensor network architectures consist of static nodes that are deployed over a sensing area. However, a location service is considered, where each sensor essentials to maintain its location information by normally updating its location information within its neighboring set of polling points in the network. There is a moving path planning with multihop relay networks. The source node and the sink node communicate with each other either in single hop or multi-hop network. The existing approaches fail to deliver a guaranteed reliable network in terms of traffic, end-to-end connection and mobility. To overcome the problem of these failures, a Delay Aware Secure Multihop Routing (DASMR) protocol is proposed. In this protocol, sensor networks are first defined with mobile sink and then an overview of the data gathering process is presented in such a scenario based on the role of a mobile sink. Data can be gathered by its own or neighboring node by visiting each polling point through the cluster heads. Here, mobile data gathering is mainly focused on path selection problem. The node is travelled through the path, which is dynamically gathering the information at each cluster head. This DASMR scheme achieves over 70 percent of energy saving per node and 80 percent of energy saving on cluster heads comparing with previous works. Although, the number of polling points are also minimized by visiting the new polling points, which also extends the network lifetime. DASMR reduces the overall energy consumption and optimize the data collection tour to minimize the delay by the sink. Simulation experiments based on GloMoSim is shown to validate the high efficiency of the presented formulations and algorithms.

Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs

Vol. 2  Issue 2
Year: 2015
Issue:May-Jul
Title:Hybrid Enhanced Adaptive ACK IDS Scheme for MANETs
Author Name:S.B. Ninu and S. Behin Sam
Synopsis:
Mobile Adhoc Network (MANET) is one of the most important and unique applications. When compared to traditional network architecture, MANET does not require a fixed network infrastructure instead dynamic and distributed in nature; every single node act as both a transmitter and a receiver. In same communication range, the nodes communicate directly with each other. For outer range, they rely on their trust based neighbors to relay messages. In this case, it is crucial to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, the authors propose and implement a new intrusion detection system named Hybrid Enhanced Adaptive Acknowledgment (HEAACK) specially designed for MANETs. They extend their work with the introduction of Hybrid Crypto systems to prevent the attacker from forging acknowledgment packets and reduce the network overhead which is caused by Digital Signature. In order to obtain the optimal AESs in MANETs, the authors have implemented DSA, RSA and AES schemes in the simulation. Eventually, they arose to a conclusion that the AES scheme is more suitable to be implemented in the MANETs. Simulation results show that the proposed Hybrid cryptosystem method is a more desirable scheme under MANETs.

Affective Computing in the Design of Interactive Systems

Vol. 2  Issue 2
Year: 2015
Issue:May-Jul
Title:Affective Computing in the Design of Interactive Systems
Author Name:Tom Page
Synopsis:
This research explores how such familiar notions can successfully translate onto interactive systems; providing profound and emotional design experiences without the necessity for a physical chassis. An online survey facilitated the acquisition of a consumer voice regarding levels of engagement with various interactive devices. It also explores consumer understandings of privacy and data collection. A series of interviews was conducted with professionals in the UX industry, adding context to affective implementation within commercial environments. Furthermore, these discussions address the benefits of implementing emotional design experiences interactively and the privacy concerns this surface. The research concludes with an overview of how affective computing methodology - in conjunction with consumer engagement - can be used in the creation of profound experiences whilst using interactive systems. It also explores the issues which arise with its implementation; specifically privacy and implicit data collection. Recommendations for further study in this field are provided based on the research discussion and findings.

Remote Virtual Assistant Using Whatsapp

Vol. 2  Issue 1
Year: 2015
Issue:Feb-Apr 
Title:Remote Virtual Assistant Using Whatsapp
Author Name:Nilesh S. Hinge, Sajan M. Talekar, Pooja P. Hande, Ashwini S. Thorbole and Shubhangi P. Edake
Synopsis:
These days in a world of instant services and faster internet, we require everything very fast. In the world of instant messaging, there is a service called WhatsApp, which is the most popular messaging app. Using WhatsApp API, the authors are trying to develop a Remote virtual assistant (Virtual robot) which will provide various services to WhatsApp users. A Remote Virtual Assistant, can fastly access multiple services such as finding Railway PNR Status, Checking Result of Students, Checking rating for particular movie, sending Instant SMS message to non WhatsApp users, and so on. Also, they have added a feature into this Assistant using which, WhatsApp can be used as a command interpreter of server, and so one can access any server remotely just using WhatsApp. This Assistant can chat like a friend, and by added integration of a CLEVER chatting bot with this project, we can make this assistant one of your friend.

Android Application for E-Card Transaction Using NFC

Vol. 2  Issue 1
Year: 2015
Issue:Feb-Apr 
Title:Android Application for E-Card Transaction Using NFC
Author Name:A. Saranya, S. Vishnupriya, S. Sathyapriya, B. Pradeepa and N. Rajganesh
Synopsis:
People continuously try to improve their quality of life with respect to modern trends. Payment method using physical credit card is usual and it is not comfortable to undertake all the time. Modern technology computerizes everything and reduces the usage cost with the maximum user satisfaction. For the sophisticated use of credit card, there is a need to computerize it in our smartphones using Near Field Communication (NFC). The NFC is a new secure short-range wireless connectivity technology, which can play an important role on this kind of issue. It uses a secure element, and hence it stores the data in a secure manner. NFC technology can store multiple virtual credit cards in the secure element, and prevents skimming, and loss of credit card. In this paper, an android application which performs credit card transaction between the NFC enabled devices [Mobile–credit card machine] have been demonstrated. It enable the users to securely store their multiple virtual credit card and allows to perform transaction with NFC enabled POS terminal.

Energy Efficient Clustering with Mobile Data Collection in Wireless Sensor Networks

Vol. 2  Issue 1
Year: 2015
Issue:Feb-Apr 
Title:Energy Efficient Clustering with Mobile Data Collection in Wireless Sensor Networks
Author Name:S. Kalaivani, C. Gomathi and N. Santhiyakumari
Synopsis:
The Wireless Sensor Networks consist of static sensors, which can be deployed in a wide environment for monitoring applications. While transmitting the data from source to static sink, the amount of energy consumption of the sensor node is high. This results in improved lifetime of the network. Some of the WSN architectures have been proposed based on mobile elements such as three-layer framework is for mobile data collection, which includes the sensor layer, cluster head layer, and mobile collector layer (called SenCar layer). This framework employs Distributed Load Balanced Clustering and Dual Data Uploading, it is referred to as LBC-DDU. In the sensor layer, a distributed Load Balanced Clustering (LBC) algorithm is used for sensors to self-organize themselves into clusters. The cluster head layer use inter- Cluster transmission range which is carefully chosen to guarantee the connectivity among the clusters. Multiple cluster heads within a cluster, cooperate with each other to perform energy-saving in the inter-cluster communications. Through this transmissions, cluster head information is send to the SenCar for its moving trajectory planning. This is done by utilizing Multi-User Multiple-Input and Multiple-Output (MU-MIMO) technique. Then the results show each cluster has at most two cluster heads. LBC-DDU achieves over 50% energy saving per node. The 60% energy saving on cluster heads comparing with data collection through multi-hop relay to the static data sink. The 20% shorter data collection time compared to traditional mobile data gathering.

Friendbook: A Semantic Based Friend Recommendation System

Vol. 2  Issue 1
Year: 2015
Issue:Feb-Apr 
Title:Friendbook: A Semantic Based Friend Recommendation System
Author Name:Yashaswini S.
Synopsis:
Existing social networking services recommend friends to the users based on their social graphs, which may not be the most appropriate to reflect a user's preferences on a friend selection in their real life. Friendbook is a novel semanticbased friend recommendation system, which recommends friends to the users based on their lifestyles instead of social graphs. By taking advantage of sensor-rich smartphones, Friendbook discovers life styles of users from user-centric sensor data, measures the similarity of lifestyles between users, and recommends friends to the users if their life styles have high similarity. User's daily life is recorded as life activities, from which his/her life styles are extracted and further get stored in the cloud. Similarity metric is used to measure the similarity of life styles between users, and calculate users' impact in terms of life styles. When entering the friend recommendation system, Friendbook returns a list of people with highest recommendation scores to the query user. Finally, Friendbook integrates a feedback mechanism to further improve the recommendation accuracy. The idea is to implement Friendbook on the Android-based smart phones, and evaluate its performance on both small-scale simulations.

Applications of Wearable Technology in Elite Sports

Vol. 2  Issue 1
Year: 2015
Issue:Feb-Apr 
Title:Applications of Wearable Technology in Elite Sports
Author Name:Thomas Page 
Synopsis:
Wearable technology and biometrical data analysis have been around for a number of years within the Elite sports sector. In the last decade, significant progress has been made in the professional sports market; to the extent that many of the biometrics used by athletes are now available for consumers. The paper will focus primarily on four topics; the extent to which data from the wearable devices can be of benefit to the coaches and athletes; to what extent wearable devices can optimise training; the extent to which wearable technology could prevent injury; and also take a look at what the future holds for elite level wearable technology. Insights gathered include how the data provided by the wearable devices could benefit the health and well-being of an athlete. The data fed back to the coaches and medical staff could enable early detection of an injury and hence training could be adjusted accordingly. Furthermore, the data enables the athlete to monitor themselves and therefore, benchmark themselves against others and identify areas for improvement.

Security Profiles With Fine-Grained Policies On Smartphone

Vol. 1  Issue 4
Year: 2015
Issue:Nov-Jan
Title:Security Profiles With Fine-Grained Policies On Smartphone
Author Name:A. Malathy, T. A. Vijayalakshmi, V. Kumar, I. Rajesh and M. Banuchitra 
Synopsis:
Smart Phone is a single device that can be used in different environments, where corporate data and applications in it, are separated from the personal data and applications. Data and applications are stored in different compartments. Security profiles are created and applications are assigned to it. In general, access to data and applications will be implemented by a set of regulatory principles. In the case a Smartphone gets stolen and a third person tries to steal sensitive information it is currently prove to breach of the security system. To overcome this problem a new system is proposed. The user can protect their sensitive data and applications from hackers with the help of the security profiles they created and the profiles will be enabled automatically based on the location. If a third person tries to change the profile manually, the system may ask for security code. If he gives wrong code more than five times then the data will be deleted from the internal memory of the Smartphone. Hence data is secured and protected by means of the security profile.

Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones

Vol. 1  Issue 4
Year: 2015
Issue:Nov-Jan
Title:Performance And Analysis Of Suitable Algorithms For Symmetric Encryption Of Messages In Mobile Phones
Author Name:P. Padmanabham and Shahebaz Ahmed Khan
Synopsis:
The aim of this paper is to study the symmetric algorithms like DES, RC5, AES, Triple DES, BLOWFISH etc. and to analyse their performance, mainly their beats and end memory requirements are studied to pick suitable algorithms to be implemented on the mobile and handheld devices. All the above algorithms will be first implemented in C, C++ or JAVA and their performances will be analysed. The suitable algorithm will be ported onto the mobile phones using Android. The proposal extends as when an encrypted message is sent from one mobile phone to the other, a standard and essential key is provided which is symmetric in nature. If any of the two or more parties want to open the message that is sent to them, they have to utilize the secret code in the provided key without leaving even a single digit. The message will be decrypted only after the full key version has matched with the given symmetry of the key. This makes the data or any information more secure even in the mobile devices for the common users by non-repudiation. This ensures the use of cryptography and its advantages by the end users of mobile phones for confidentiality.

Firefly Based Routing For Optimized Transmission Over MANETs

Vol. 1  Issue 4
Year: 2015
Issue:Nov-Jan
Title:Firefly Based Routing For Optimized Transmission Over MANETs
Author Name:Rahul Gupta and Rajesh Kumar
Synopsis:
Mobile Ad Hoc Networks (MANETs) are infrastructure less networks that are very dynamic in nature. The main problem with such networks is mobility of the nodes, the nodes are free to roam arbitrarily, thus the topology changes from time to time, and the route acquisition in such a network is always a tedious task. In this paper, the authors describe an algorithm implemented based on a firefly algorithm (an implementation of swarm intelligence). Firefly algorithm capture the nature of fireflies i.e. how they do the task individually and how they coordinate with each other to create a system. This algorithm is compared with the state-of-the art routing algorithm and it thus improves MANETs routing performance in terms of the packet delivery ratio, packet loss, throughput and delay.