A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Babu, Dr. B. R. Prasad
- A Study of Mobile Application Based on ARCS Design Strategy & Networking Principles for Interactive Learning
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 6 (2014), Pagination:Abstract
Development of an interactive application with User Interface Design (UID) principles and requirements by utilizing mobile device as an instrument for Mobile learning purpose. Thus, methods for designing and developing an application for mobile devices that are compatible with small screen interfaces and limited capabilities of mobile devices are planned to ensure the learners are able to grasp the concepts .ARCS learning design strategy has been used which is appropriate for a mobile-based learning application and networking principles like network coding has been used to provide effective delivery of services. The interactive learning application has been developed on touch-screen iPad, operated on iPhone Operating System (iOS). UID principles and guidelines are used for designing and developing the application. Finally, Efficiency of UID has to be evaluated to test the usability of the developed application with six factors like Consistency, Flexibility, Learnability, Minimal action, Minimal memory load, User guidance.
Keywords
ARCS design strategy, User interface design, Network Coding- Secure and Efficient File Access Using Location Proof Updating System
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 6 (2014), Pagination:Abstract
Wireless networks have allowed organizations to become more mobile therefore organizations are now widely using wireless networks. Network security is a big concern for individuals and organizations because, all vital information is stored on the network and most critical process of the business are done through the network. If a network fails or security is compromised an organization could be completely crippled, this will be a big challenge in user centric location based services. In this proposed system, I am going to address this problem using location proof updating system. The system consists of Server, Prover, and client. Server contains sensitive files, clients always trying to download these files from server. The challenge here is client is allowed to download the files from server when they are in restricted location range, to achieve the downloading process location proof updating system produces a Prover application which will key monitor client location details and send this details in periodical intervals of time to the verifier service in server.
Keywords
security, location proof, location privacy, pseudonym, secure- A Study and Understanding of Mobile Presence Service with Enhanced Scalability in Social Network Application
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 5 (2014), Pagination:Abstract
Mobile presence service is a vital component of a social network applications due to mobile user’s presence details such as global positioning system location, network address, and online/offline status are continuously apprise to user’s online buddies. If persistent updates occur about presence information and also when servers disperse expansive number of messages scalability problem arises in large scale mobile presence service. In this paper a presence cloud which is scalable server architecture is proposed which support large scale social network application where it searches for the presence of his/her buddies and reveals them about his/her arrival. The performance results in achievement of small constant search latency by using direct search algorithm and one hop caching approach.
Keywords
Presence, cloud, Prevalence, Friend list, Social network service- Improving Packet Delivery Ratio in Vehicular Network Using Cooperative MAC Methods
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 5 (2014), Pagination:Abstract
Recent advances in wireless communication technologies and the emergence of computationally rich vehicles are pushing VANETS. VANETS is an approach to provide road safety vehicle traffic management. Cooperative communication links in VANETS is mitigating wireless channel because of user mobility. In this paper we present medium access control for Adhoc in cooperation scheme known as cooperative Adhoc Mac. In CAH-MAC the cooperative nodes are supported for retransmission the packets from source to destination. The helper node is used when the retransmission of packets is failed to reach the destination. So through analytical results we show the throughput is increasing in CAH-MAC and packets are successfully reach the destination.
Keywords
hops, VANETS, MAC, Cooperative Mac, TDMA- Baandhav: Smart Mobile Application for the Safety of Women and Elderly Population
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 5 (2014), Pagination:Abstract
The subject of women's security is one of major concern areas in India and around the world. This is apparent from the recent incidents which have been reported in media, where a criminal attempt has been made to denigrate women's social dignity. Although there has been many suggestions to improve upon the safety of women such as enforcing stricter laws, 24x7 helpline etc. The use of technology presents a major stepping stone. In addition to women, elderly population represents another set of population segment requiring the use of technology to provide safe monitoring. Injuries due to falls are among the leading causes of hospitalization in elderly people, often resulting in a rapid decline in functionality and death. Constant monitoring of individuals at risk for falls is one of the practical way that mobile devices could be used to improve persons’ health. Although there are numerous applications in the market catering to safety of either population, none of them cater to both population needs. The paper represents an alert system for fall detection as well as scream detection using common commercially available electronic devices to detect both the fall or scream and alert concerned people. The proposed system provides a reliable and cost effective solution to fall detection and scream detection. The Android platform is chosen for writing this application as it has biggest market presence in the world i.e. close to 80% of mobile world market and also its an open source, having very good developer community.
- Mobile Offloading for Maximum Utility at Minimum Cost
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 5 (2014), Pagination:Abstract
The new generation mobile devices appear along with an increase in cellular traffic speed. Nowadays cellular network operator’s aim is to offload cellular traffic by using Wi-Fi networks. Due to the poor coverage of the present Wi-Fi networks it is difficult to satisfy both operators and mobile users. Thus to solve the poor coverage problem and also for a successful mobile data offloading Wi-Fi tethering has been introduced ,it is a way of providing Wi-Fi networks .This paper suggests a mobile tethering based cooperative network .Using this technology different users can gain certain profits after their participation in tethering activity. In the first step of our system ,each user’s cellular traffic demand is allocated to other users .In order to minimize the total cellular traffic cost, which is an optimal resource allocation method, by this method tethering price can be determined to maximize the total utility of all the participated users. In simulation result we can observe the reduction of total cellular traffic cost and found various optimal tethering prices versus different traffic demands.
Keywords
Mobile Data offloading, Wi-Fi tethering, Cooperative network- A Novel Geo-Routing Protocol for Enhancing Routing Perfrormance in Tactical Ad Hoc Networks
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 5 (2014), Pagination:Abstract
TMMR uses Tactical adhoc network consisting of multiple radio nodes for communication facilities in network centric warfare. In this paper a novel geo routing protocol is proposed for such tactical adhoc networks that considers multiple routing metrics for transmitting data successfully and efficiently. The main goal of this protocol is to select the right metric and radio to meet the QoS requirement. Simulation results show that this system improves the performance of routing in terms of delay, throughput and bit error rate.
Keywords
Tactical adhoc networks, geo routing- A Novel Concept of MANET Architecture for Location Based Service Using Circular Data Aggregation Technique
Authors
Source
International Journal of Innovative Research and Development, Vol 3, No 1 (2014), Pagination:Abstract
MANET is an autonomous system of mobile nodes connected by wireless links. Localization in MANET refers to the problem of finding the locations of non-GPS enabled nodes based on limited information like locations of some known beacons and measurements such as ranges or angles among the neighbors. In this paper a circular system model is proposed and it decreases location management overhead in the network. The simulation results show that under a specific environment the protocol delivers packets efficiently and also the proposed routing scheme scales well with large network area.