Journal of Mobile Computing, Communications & Mobile Networks
https://computers.stmjournals.com/index.php?journal=JoMCCMN
<p align="center"><strong>Journal of Mobile Computing, Communications & Mobile Networks (JoMCCMN)</strong></p><p align="center"><strong> </strong></p><p align="center"><strong>ISSN: 2349-901X</strong></p><p align="center"><strong> </strong></p><p align="center">Click <strong><a href="/index.php?journal=JoMCCMN&page=about&op=editorialTeam">here</a> </strong>for complete Editorial Board</p><p align="center"> </p><p align="center"><strong> </strong></p><p align="center"><strong>Scientific Journal Impact Factor (SJIF):</strong> 4.925</p><p align="center"><strong><span style="text-decoration: underline;"> </span></strong></p><p><strong>Journal of Mobile Computing, Communications & Mobile Networks (JoMCCMN) </strong>is a journal focused towards the rapid publication of fundamental research papers on all areas of Mobile Computing, Communications and Mobile Network. It's a triannual journal, started in 2014.</p><p><strong> </strong></p><p><strong>Journal DOI no</strong>.: 10.37591/ JoMCCMN</p><p><strong> </strong></p><p><strong>Focus and Scope Cover</strong></p><ul><li>Cellular Networks</li><li>Channel allocation, multiple access, Location management , Handoffs</li><li>Wireless Transmission Basics</li><li>MAC Protocols, Routing, Transport, Ad-hoc Networking</li><li>GSM, HSCSD, GPRS</li><li>Satellite and Broadcast Systems</li><li>Mobile Internet Protocols</li><li>Mobile Business Apps using the Sybase Unwired Platform</li><li>Security, scalability, and reliability issues</li><li>Mobile ad hoc and sensor networks</li><li>Power management and control algorithms</li><li>Wearable computing and networking</li></ul><p><strong> </strong></p><p><strong>Readership:</strong> Graduate, Postgraduate, Research Scholar, Faculties, Institutions, and in IT Companies.</p><p><strong> </strong></p><p><strong>Indexing: </strong>The Journal is index in DRJI, Google Scholar</p><p> </p><p> </p><p> </p><p><strong>Submission of Paper: </strong></p><p>All contributions to the journal are rigorously refereed and are selected on the basis of quality and originality of the work. The journal publishes the most significant new research papers or any other original contribution in the form of reviews and reports on new concepts in all areas pertaining to its scope and research being done in the world, thus ensuring its scientific priority and significance.</p><p> </p><p>Manuscripts are invited from academicians, students, research scholars and faculties for publication consideration.</p><p> </p><p>Papers are accepted for editorial consideration through email info@stmjournals.com or nikita@stmjournals.com</p><p><strong> </strong></p><p><br /> <strong>Abbreviation: <strong>JoMCCMN</strong></strong><em></em></p><p><em><br /> <br /> </em><strong></strong></p><p><strong> </strong></p><p><strong>Frequency</strong>: Three issues per year</p><p> </p><p><strong> </strong></p><p><strong><a href="/index.php?journal=JoMCCMN&page=about&op=editorialPolicies#peerReviewProcess">Peer Reviewed Policy</a></strong></p><p> </p><p><strong><span style="text-decoration: underline;"><br /></span></strong></p><p><strong><span style="text-decoration: underline;"><a href="/index.php?journal=JoMCCMN&page=about&op=editorialTeam">Editorial Board</a></span></strong><strong></strong></p><p> </p><p> </p><p><strong><a href="http://stmjournals.com/pdf/Author-Guidelines-stmjournals.pdf">Instructions to Authors</a></strong></p><p><strong>Publisher:</strong> STM Journals A division of: Consortium eLearning Network Private Ltd</p><p><strong><br /></strong></p><p><strong>Address:</strong> A-118, 1<sup>st</sup> Floor, Sector-63, Noida, Uttar Pradesh-201301, India</p><p><strong><br /></strong></p><p><strong>Phone no.:</strong> 0120-4746-214/ Email: nikita@stmjournals.com</p><p> </p><p> </p>en-USJournal of Mobile Computing, Communications & Mobile Networks2349-901X<p align="center"><strong>Declaration and Copyright Transfer Form</strong></p><p align="center">(to be completed by authors)</p><p>I/ We, the undersigned author(s) of the submitted manuscript, hereby declare, that the above manuscript which is submitted for publication in the STM Journals(s), is <span>not</span> published already in part or whole (except in the form of abstract) in any journal or magazine for private or public circulation, and, is <strong><span>not</span></strong> under consideration of publication elsewhere.</p><ul><li>I/We will not withdraw the manuscript after 1 week of submission as I have read the Author Guidelines and will adhere to the guidelines.</li><li>I/We Author(s ) have niether given nor will give this manuscript elsewhere for publishing after submitting in STM Journal(s).</li><li>I/ We have read the original version of the manuscript and am/ are responsible for the thought contents embodied in it. The work dealt in the manuscript is my/ our own, and my/ our individual contribution to this work is significant enough to qualify for authorship.</li><li> I/We also agree to the authorship of the article in the following order:</li></ul><p>Author’s name </p><p> </p><p>1. ________________</p><p>2. ________________</p><p>3. ________________</p><p>4. ________________</p><table width="100%" border="0" cellpadding="0"><tbody><tr><td valign="top" width="5%"><p align="center"> </p></td><td valign="top" width="95%"><p>We Author(s) tick this box and would request you to consider it as our signature as we agree to the terms of this Copyright Notice, which will apply to this submission if and when it is published by this journal.</p></td></tr></tbody></table>Satark India Application
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2678
<p class="Abstract" align="center"><em>Abstract</em></p><p class="Abstract"><em>We face many problems and see a lot of issues happening in our surroundings but we ignore those because of the tedious path of government to follow up and investigate the issue. Mobiles play a major role in delivering solutions to our everyday problems. We have designed the android phone application “Satark India Application” that focuses on delivering a clean society. This app gives people the platform where the issue can be raised and transferred to the respective officer or NGO's directly at that instance using AI and ML. The application makes it easier for people to put forth their issues and gives the government a well-organized and more advanced way of communication with the people. The app provides the feature to form various self-volunteer people in their regions. They all will also help people to solve local issues at their level and ease the workload of the government. Details of request owners are secured, encrypted, and not shared with anybody so people can freely raise the request for any problem self-issue or rule violation report. Users can track the progress of requests raised. The data analysis part will give all the graphical representation which provides benefit to the government for the study of the whole nation on a single interface. Our app provides real-time location tracking and one-click emergency help toggle for women's security purposes. ‘Be Indian Buy Indian’ module provides a total guide for people to buy Indian products. Since the whole application serves as the best intermediate between the government authorities, NGO's and people which helps to form a better nation and a responsible society we have named it "Satark India Application"</em></p>Babita BhagatSanket Santosh ManoharNamrata Bharat ChavanPraveen Subhash Jagtap2021-06-122021-06-128Implementation of Cloud Computing in Virtual Learning System for Effective Utilization of ICT Based Computing Resources in Academic Environment
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2676
<p><strong>Abstract: </strong></p><p><strong></strong>Now a day's increase in use of digital media influences academic system to adopt ICT based learning tools to improve the accessibility and reliability of learning resources. Information and communication technology (ICT) has significantly affected the process of admission in higher educational institutions. ICT also improves the interaction between the students and the institution as well as academician too. As of late, cloud computing as another sort of trend setting innovation speeds up the development for the computer industry. Cloud computing is turning into an appealing innovation because of its dynamic versatility and powerful utilization of the assets; it tends to be used under conditions where the accessibility of assets is restricted. Cloud computing can be used in the field of education, and integration of network and e-learning. In order to give a full play for the advantages of cloud computing with ICT based education in educational institution, we tried to attach cloud computing to e-learning, build an e-learning cloud, and made an active research and exploration for it, so the implementation of ICT based tools used with cloud computing become more familiar.</p>Amit SahuDr. Vaibhav Sharma2021-06-122021-06-128Heart Rate Measuring using Android
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2700
<p><em>Presently, the technique to screen the patients in clinics and hospitals is with the end goal that it keeps the patients attached to their beds, and observing by this strategy is uncomfortable for patients. The cell phones with numerous inbuilt sensors can be utilized to plan and create applications to fetch various biomedical signs. Building a remote Heart rate monitoring system [1] that will permit patients to be convenient in the general climate is the point of this method. What's more, the quick ascent of cell phone technology and on-board sensors has empowered non-invasive physiological estimations, which can improve self and remote computations. This holds colossal potential in productive conveyance of medical services. This examination researches the practicality of removing crucial cardiovascular parameters of heart rate (HR), breathing rate (RR), oxygen saturation (SpO2) and blood pressure (BP) utilizing a phone's camera during a non-invasive way, without the requirement of external sensors. This is accomplished by utilizing the phone's capacity to record and distinguish varieties in color signals in a fingertip set in contact with its optical sensor, for example camera.</em></p>Pratik G. MirajkarOjaswi D. DhoneMayuri N. PatilRina Bora2021-06-122021-06-128Disease Prediction Android Application using Machine Learning
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2753
<p><em>The rapid proliferation of internet technology and handled devices has opened up new avenues for an online healthcare system. There are instances where online medical help or healthcare advice is easier and faster to grasp than real world help. People often feel reluctant to go to hospital or visit doctors for minor symptoms. However, in many cases, these minor symptoms may trigger into a major health hazard. As online wellbeing counsel is effectively reachable, it very well may be an extraordinary head start for clients. Besides, existing on the web medical services frameworks experience, the ill effects of an absence of unwavering quality and precision. An android application is developed for users for easy portability, configuring and being able to access remotely where doctors cannot reach easily. This application analyzes the symptoms provided by the user as input and gives the most accurate probable disease output to user. This application also looks forward by providing information like description about predicted disease and measures to be taken by users of a particular predicted disease. Expectation is finished by carrying out the Naive Bayes Classifier.</em></p>Sneha Rajendra BedseMenika Mahendra PrasadVrushali Pankaj Thakur2021-06-122021-06-128Fake News Detection Using N-Gram Analysis and Machine Learning Algorithms
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2736
<p>Fake news is untrue information presented as news. Fake news easily spread than real news amongst social networking sites. Detection of fake news is an important emerging research area which is gaining popularity. The main challenge in fake news detection is limited availability of resources (datasets). This project work detects fake news using n-gram analysis and machine learning algorithms. Evaluation and comparison between two feature extraction technique namely Term Frequency (TF)and Term Frequency-Inverted Document Frequency (TF-IDF) and six machine learning algorithms namely like Support Vector Machines (SVM), Linear Support Vector Machines (LSVM), K-Nearest Neighbor (KNN), Stochastic Gradient Descent (SGD), Decision Trees (DT), Logistic Regression (LR) are performed. The evaluation yields best performance exploiting feature extraction technique as Term Frequency-Inverted Document Frequency (TF-IDF) as and Linear SVM and SGD (Stochastic Gradient Descent) as machine learning algorithm with an accuracy of 93.5%. In SGD Performance tuning is applied to increase the accuracy. Comparing Grid Search CV and Random Search CV, the later gives better accuracy of 94.2%.</p>Asha JohnMeenakowshalya A2021-05-292021-05-298Implementation of Loss Discrimination Algorithm Using Machine Learning Approach for Wireless TCP Enhancement
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2574
<p align="center"><strong><em>Abstract</em></strong></p><p class="IEEEAbtract"><em>In wired network packet losses are due to network congestion whereas in wireless network, it can be due to variable bandwidth, network topology, host mobility, network error etc. Transmission Control Protocol (TCP) is used to handle wired and wireless network. This conventional TCP consider any loss as congestion loss whatever may be the reason behind loss and to control the loss it simply reduces the congestion window size (Cw) which leads to deteriorate the network performance due to low utilization of bandwidth. Thus to improve the performance of wireless TCP, we are introducing loss discrimination algorithm (LDA) based on machine learning (MC) which will classify the losses in to two categories as congestion loss and random error (viz. high bit error rate, link problem etc.) packet loss. Further based on the type of loss the corrective action is taken. This avoids the unnecessary reducing the congestion window size in turn improves the network performance. Proposed system (ML-LDA) is an extension of TCP Reno which was developed to improve the performance of conventional TCP and we are getting better performance than TCP Reno.</em></p>Pallavi BhomleS.V. Sonekar2021-02-102021-02-108An Energy Efficient and Secure IoT-based WSN Framework: An Application to Smart Building
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2640
<p align="center"><strong><em>Abstract</em></strong><em></em></p><p><em>The emergence of smart cities is expanding gradually. This research focus on developing efficient energy utilization models and answers for home and places of business based on current sensing and wireless networking technologies. Accessibility of minimal effort sensing and processing modules just as of late created effective wireless correspondence conventions for building robotization applications give the essential enabling instruments to the application domain of smart buildings. Energy utilization mechanization is a compelling use of sensor technology because of the all-inclusive requirement for energy use enhancement in homes and places of business. To build up an energy utilization models and optimization algorithms to minimize energy use gave by the networked sensors, client orders, and framework settings, on going pricing information when accessible, and input information accessible from the network. This research paper implements the best optimization model for WSN in smart buildings for smart cities.</em></p>R. KaliyappanDr. A. Finny BelwinDr.A. Linda SherinDr. Antony Selvadoss Thanamani2021-02-102021-02-108A Depth Look of Vehicular Technology for Sustainable Development through DTN in India
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2639
<p align="center"><strong><em>Abstract</em></strong></p><p><em>This paper notes that education also results in technical development serving with the purpose that overall development of technology in term of living standards to up-lift. In its current state, technical education does not appear to serve the on top objectives. The paper presents a holistic read of technical education in Bharat. To confirm multidimensional sustainable development indicators (MSDI) for Bharat within the up to date correlated main element of sustainable development ‘Human Development Index (HDI). The paper finds technical education to be one in every of the core competencies that require to be developed. The paper observes that there looks to be no linkage between the ‘education’ being provides technological growth and specially focus on DTN (Delay Tolerance Network) and Vehicular Network to provide better, safe and time saving lifestyle of human being within the country. To supply a true academic resolution for blanket development of Bharat, the paper suggests that ‘what to do’ for real life problem of traffic at all over Bharat for technical education than simply ‘how to do’. The paper suggests some overview about current trends in traffic management as well as it propose technical diagram for emerging trends in Vehicular Network that may become change the human life in real sense of sustainable development. In future scope traffic applications for the state of traffic management and some emerging concept of Vehicular network with DTN as sustainable technological development for traffic management.</em></p>Megha BhattDr. Abhijeetsinh JadejaDr. Priyank Gokani2021-02-092021-02-098Complete Investigation about Different Factors that Affecting the Mobile Bank Applications
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2627
<p align="center"><strong><em>Abstract</em></strong></p><p><em>This study examines customer’s influencing factors to use mobile banking. To achieve the objectives of this study, four variables has been discussed that is on perceived usefulness, perceived ease to use, perceived enjoyment and perceived credibility. 400 questionnaires were distributed to Universiti Utara Malaysia (UUM) staff’s. The data of this study was analyzed using the computer peripherals Social Science Statistics Package (SPSS) version 23. Study found that all the variables are significant influencing customer’s usage of mobile banking except for perceived enjoyment.</em></p><p><em> </em></p><p><strong><em>Keywords:</em></strong><em> Perceived usefulness, perceived ease to use, perceived enjoyment, perceived credibility and mobile banking</em></p>Mohammad Hesamzadeh2021-01-072021-01-078Scientific Paper Reviews Identification by Sentiment Analysis in Data Mining
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2626
<p><strong><em>Abstract</em></strong></p><p><em>Sentiment analysis (SA) is one of the rapidly growing fields of research in computer science and makes it difficult to track all activities in the area. Analyzes of thoughts and/or perceptions are used for automating subjective information identification such as opinions, attitudes, emotions, and feelings. Hundreds of thousands are concerned about science and take a long time to select appropriate papers for their research. These opinions are numerous and SA can be used to mine the general sentiment or opinion polarity of all of them. It is nearly difficult to manually evaluate such a vast number of comments. The automatic solution of a computer, therefore, has a significant role to play in resolving this serious issue. The biggest problem in perception analytics and opinion mining (OM) is the recognition of emotions in these texts. In this paper we survey on opinion mining concerning their different techniques, tools applied, and also describe the overview of sentiment analysis regarding levels, approaches, challenges, and benefits as well as techniques of data mining. This survey is also done to study the opinion mining and sentiment analysis used to scientific paper review.</em></p><p><strong><em> </em></strong></p><p class="Keywords">Keywords: Data mining, opinion mining, sentiment analysis, scientific paper reviews, data mining techniques</p>Anand SinghSitaram PatelMegha Kamble2021-01-072021-01-078A Comprehensive Survey on Energy Efficient Protocols for WSN
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2556
<p>In recent years, there is a rise in the variety of applications supported by wireless network systems and their success applied to completely different areas remote environmental watching and pursuit tracing. The WSN unit spatially distributed sovereign sensors to watch fitness like temperature, sound and pressure, etc. and transmit their information through the network to the main location. Recent advancement in wireless communication and physics has also enabled the event of low price detector networks. The detector networks are used for varied application areas (e.g. Health, military, home). For varied application areas, their unit altogether entirely completely different technical problems that researchers unit presenting the resolution. This state of the art of sensing element networks is captured in this paper. This paper sketches pervasive security of the accessible settlement to justify WSN environmental monitoring application and to figurate recent challenges.</p><p>Keywords: Base Station, Cluster Head, LEACH, Detector Node, Wireless Detector Network</p><p>Cite this Article: Priti Dwivedi, Ashok Kumar Rai. A Comprehensive Survey on Energy Efficient Protocols for WSN. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(2):11–16p.</p>Priti DwivediAshok Kumar Rai2020-08-182020-08-188Water Quality Analysis using Arduino
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2558
<p>There is a dire need of effective water quality control system in the residential areas and the demand is very high due to urbanization, wide scale pollution and population growth. Scarcity of safe drinking water poses a great challenge to development. Necessary and immediate steps have to be taken to overcome it. At the very first, we have to assess water parameters like temperature pH, turbidity, conductivity etc., as the variations in these values can provide insights about the presence of pollutants. The monitoring of the water standard is a complex process as it has several laboratory testing methods which is very tedious and time consuming. To reduce the time, we need to look for automated system, a testing equipment that can be placed in the river or other water bodies especially in the rural areas where situation of clean and safe drinking water is very vulnerable. So we have proposed Arduino based water quality monitoring system that monitors the quality of water in real time. It consists of different sensors which measures pH, temperature and turbidity. The measured values from the sensors are processed by microcontroller and the processed values are transmitted using GSM to the concerned authority. The controller accesses the information which is monitored by the use of sensors. The accessed data are controlled by the usage of Arduino controller. By using an IoT, the information is collected and the water pollution can be enquired, by a strict mechanism.</p><p>Keywords: pH, Sensors, Temperature, SMS, technology</p><p>Cite this Article: Mamta Tholia, Srishti Gupta, Manuhar Swaroopa, Shreyas Piplani. Water Quality Analysis using Arduino. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(2):21–27p.</p>Srishti GuptaMamta TholiaManuhar SwaroopaShreyas Piplani2020-08-182020-08-188Energy Aware Routing for Enhancing Network Lifetime in Wireless Sensor Networks: A Survey
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2555
<p>In the modern era of communication, Wireless Sensor Networks (WSNs) are one of the very important areas of research. WSNs find applications in many areas including military, healthcare, habitat monitoring and many more. A few applications of WSNs require the deployment of sensors in hostile environment. As recharging and replacing of batteries is not possible in such environments the communication has to be energy efficient. Routing is one of the major issues in the design of a WSN. For energy critical applications of WSNs routing protocol proposed has to be energy efficient. This paper presents a survey on various energy efficient routing protocols proposed in the literature.</p><p>Keywords: Energy- Efficient technique to Handle Redundant Traffic, Heterogeneous Wireless Sensor Network, Distributed Energy-Efficient Clustering</p><p>Cite this Article: Darshan N. Energy Aware Routing for Enhancing Network Lifetime in Wireless Sensor Networks: A Survey. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(2):1–4p.</p>Darshan N.2020-08-182020-08-188Gesture to Speech Recognition for Deaf and Dumb People
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2557
<p>The main aim of this project is to extend the human right of communication to a larger audience. There are 70 million people who are deaf in the world, but many do not know how to communicate with this community. To overcome this real time issues, our smart gloves are very useful to translate sign language into text and audio.The smart glove is normal cloth driving glove that recognizes hand gestures that corresponds to text. The gloves make use of sign language which translated in text and audio. It uses hand gestures and orientation of the fingers which has flex sensors embedded to it to measure the movement and convey the message. This data is then sent to the PIC (16F877A) microcontroller. The input signal needs to stay constant for the defined period and if the gesture remains unchanged then it is valid and the translated text and audio is observed on the smart phone application. The transmission of signals is done with the help of Bluetooth HC-05 module.</p><p>Keywords: Gloves, binary file, sign language, PIC microcontroller, Bluetooth model.</p><p>Cite this Article: Mansi Rajaram Jadhav, Vaishnavi Manohar Rohekar, Pranali Vijay Vhadage, Praveen Sambhaji Shinde. Gesture to Speech Recognition for Deaf and Dumb People. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(2): 17–20p.</p>Mansi Rajaram JadhavVaishnavi Manohar RohekarPranali Vijay VhadagePraveen Sambhaji Shinde2020-08-062020-08-068Recruitment Chatbot using AI
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2559
<p>Seeking job can be a mentally frustrating and emotionally draining experience.The idea of building a chatbot came from a moment when understood that the recruiting process is filled with manual, redundant, and time and sequence-dependent tasks that can be automated with a recruitment chatbot. Adding a recruiting chatbot into your recruiting workflow can be very easy and very effective. Another major time-dependent task is interview scheduling. Simply calling candidates isn’t very effective anymore. Candidates aren’t answering calls from unrecognized phone numbers. Calling candidate in the middle of their current job is inconvenient, and playing the back and forth “what time works for you” is a miserable waste of time for everyone. Recruiting Chatbots are great atthis and making it easy for recruiters.Artificial IntelligenceMarkupLanguage(AIML) isused tobuild chatbot artificially intelligent. Inthispaper,wegiveabriefreview of chatbotwhich use AIML. Using Natural Language Processing (what happens when computers read language. NLP processes turn text into structured data), the machine converts this plain text request into codified commands for itself.</p><p>Keywords: AIML,Chatbot,Artificial Intelligence, technology, NLP</p><p>Cite this Article: Lokesh Katta, Balaji Katkar, Akshay Maske, Kirti Mhamunkar. Recruitment Chatbot using AI. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(2): 5–10p.</p>Lokesh KattaBalaji KatkarAkshay MaskeKirti Mhamunkar2020-08-062020-08-068Performance Analysis of BEEM using Fuzzy Logic in Wireless Sensor Network
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2396
<p>Advances in wireless sensor network technology provides the availability of small and low-cost sensor nodes which has capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. This sensing capability results in extremely large amount of application areas. However, the characteristics of wireless sensor networks require more effective method for data forwarding and processing. To upgrade the energy utilization, clustering is one of the prototypical approaches to split sensor nodes into a number of clusters where one node proceeds as a cluster head (CH). CH selection is one of the optimization techniques for enlarging stability and network lifespan. Balanced energy efficiency (BEE) clustering algorithm and its multihop version (BEEM) exceeds HEED and LEACH in two ways: 1) System operating time, 2) System operating quality. In BEEM, local density and residual power are used as CH selection conditions. BEEM can provide better network coverage and longer overall lifetime. Fuzzy logic technology is used to expand energy level of BEEM protocol by using Fuzzy inference system. This paper presents protocol BEEM using Fuzzy logic (BEEM-FL) CH by taking into account linguistic variables such as energy, concentration, centrality and distance to base station. Simulation result shows that our proposed method gives more effective result in term of a lifespan of network and stability as compared to the performance of other clustering protocols.</p><p>Keywords: Clustering, energy models, fuzzy logic, BEEM, wireless sensor network</p><p>Cite this Article: Neha Rana, Harjit Pal Singh, Vikas Khullar. Performance Analysis of BEEM using Fuzzy Logic in Wireless Sensor Network. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(1): 31–38p.</p>Neha RanaHarjit Pal SinghVikas Khullar2020-06-022020-06-028Online Content based Approach of Network Extraction for Finding Weight, Size and Features
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2440
<p>In an online community, moderating the content created by users is a great challenge. Nevertheless, this paper is very costly to man-made workers. To end this, an automatic machine can arouse great interest to identify breaches of user content. Some ways to solve this problem, but word filtering or regular expression matches are most often seen in practice. The key drawbacks are their insecurity and their context-insensitive existence deliberately concealed by the users. In addition, they are reliant on languages and may need the appropriate training service. In this paper, we suggest an automated harassment detection system that totally ignores the content of the post. We derive and describe a network of conversations from raw chat logs by means of topological steps. We then use this to train our harassment detection task as a classifier. On a data, thoroughly test our program, with a massive French multiplayer online gaming user feedback. Set the most suitable parameters for network extraction and speak about the discriminatory potential of our applications, both topologically and temporally. Our system hits 83.89 F-measurements, which improves existing methods with the full feature set.</p><p>Keywords: Allocation of weight, classification algorithms, detection of misuse, network extraction, word filtering</p><p>Cite this Article: Nalli Vinaya Kumari, T Aravind, M Vineeth, M Akshita. Online Content based Approach of Network Extraction for Finding Weight, Size and Features. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(1): 23–30p.</p>Nalli Vinaya KumariT. AravindM VineethM. Akshita2020-06-022020-06-028Human Behavior Monitoring, Characteristics and Prediction of Bipolar Disorder using Mobile Computation
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2439
<p>Generally, to Bipolar Qualification (BD), the recuperation moves have made intrigued within the concept of self-recovery. The reason of this ponder was to investigate the individual restoration in DB with a progressed demonstrate, which investigated how numerous stages were connected to different psychosocial and psychiatric profiles. There are increasing proves that engine movement is the finest pointer for bipolar clutter. Motor action comprises a number of areas, such as body development, reaction time, psychomotor movement level, and engine movement related to discourse. Engine action thinks about in bipolar clutters regularly utilize self-stated surveys with scientific scales, which finally are subjective and regularly have constrained viability. Motor work data can be utilized in bipolar patients to distinguish the scene sort, which is exceptionally vital, since extreme misery and insane side effects can grant rise to mortality. This paper proposes a system that can analyze the condition of bipolar patients utilizing cleverly smartphone data. Amid a 12-week period of real-existence sporting activities, we amassed sound, accelerometer and self-evaluation facts from five patients. We surveyed the productivity of a few classification frameworks, diverse sets of indications and the part of surveys in classifying scenes of bipolar clutter. We appeared in specific that the way of the scenes of sadness or repeat within the bipolar understanding can be recognized with tall certainty (~85 percent). As distant as our understanding is concerned, has centered to date on naturalistic translations in day by day phone calls to distinguish life with disabilities in individuals with bipolar clutter.</p><p>Keywords: Bipolar qualification, drug therapy, human behavior, mobile technology, serious mental ailment</p><p>Cite this Article: Nalli Vinaya Kumari, Shaik Sharmila, Md Sohail Abrar, Jatoth Chandana. Human Behavior Monitoring, Characteristics and Prediction of Bipolar Disorder using Mobile Computation. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(1): 16–22p</p>Nalli Vinaya KumariShaik SharmilaMd Sohail AbrarJatoth Chandana2020-06-022020-06-028Comparative Study on Optimal Frequency Control of Interconnected Hybrid Microgrid based mini VPP using PSO and SSA
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2397
<p>This work proposed the optimal load frequency control of an interconnected hybrid microgrid based mini virtual power plant (VPP) by comparing the responses using particle swarm optimization (PSO) and salp swarm algorithm (SSA). Initially, a hybrid microgrid is proposed with solar PV, wind and diesel based generators, supplying critical loads along with some controllable loads like heat pump and plug-in hybrid electric vehicles. Then it was interconnected to the main grid, which resembles a mini VPP and the system responses are studied using the MATLAB Simulink platform. Finally, PSO and SSA techniques are applied to tune the PID controller in order to control the system frequency and maintain the power balance in the proposed system. The results interpret the superior performances of SSA over PSO. The study reported system stability within accepted limits of system frequency during both the source and load variations.</p><p>Keywords: Hybrid microgrid, particle swarm optimization, plugged-in hybrid electric vehicle, salp swarm algorithm, virtual power plant</p><p>Cite this Article: Praveen Kumar, Amar Kumar Barik, Dulal Chandra Das. Comparative Study on Optimal Frequency Control of Interconnected Hybrid Microgrid based mini VPP using PSO and SSA. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(1): 7–15p.</p>Praveen KumarAmar Kumar BarikDulal Chandra Das2020-06-022020-06-028Advanced Dynamic Source Routing Protocol Based on Cuckoo Search Algorithm for Performance Enhancement in MANETs
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2393
<p>In this paper, a cuckoo search (CS) algorithm based advanced dynamic source routing (ADSR) protocol is proposed to identify and anticipate selective black hole attack or gray hole attack in MANETs. The nature inspired cuckoo search algorithm aids in finding new solutions that can be substituted for the existing ones if found superior. The simulation results show that the use of cuckoo search algorithm with ADSR protocol gray hole attack affected network improves the network performance which is studied using the performance metrics such as overhead, packet drop ratio, packet delivery fraction and end-to-end delay.</p><p>Keywords: ADSR, Cuckoo search algorithm, gray hole attack, MANET, routing</p><p>Cite this Article: Bindia Handa, Harmandar Kaur. Advanced Dynamic Source Routing Protocol Based on Cuckoo Search Algorithm for Performance Enhancement in MANETs. Journal of Mobile Computing, Communications & Mobile Networks. 2020; 7(1): 1–6.</p>Bindia HandaHarmandar Kaur2020-06-022020-06-028Vehicular Black Box for Indian Cars
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2360
<p>Abstract: This study shows that there is an increase in the interest and development of black box in vehicles. Black box is a device that can be used to mitigate road accidents and are also used in post-accident investigation in order to speed up the investigation and claim processing of insurance. Black box need to store the driving data of the vehicle such as speed, GPS coordinates, brake lights, video, etc. of that time at which an accident has taken place and should also be able to send an SOS message and the data to the authorities using minimum resources like circuits, camera, sensor, etc. using less network resources. Along with all these, black box must be cost efficient and user privacy should not be compromised. This study also shows the concerns that are not addressed and due to which it needs future development.</p><p>Keywords: Camera, GPS coordinates, sensor, SOS message, vehicle black box</p><p>Cite this Article: Sanskar Jain, Aman Negi. Vehicular Black Box for Indian Cars. Journal of Mobile Computing, Communications & Mobile Networks. 2019; 6(3): 18–22p.</p>Sanskar JainAman Negi2020-01-102020-01-108Implementation of Terahertz Communication Link
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2334
<p>Abstract: With the unending augmentation in the number of mobile-related devices and the prerequisite for higher data rates anywhere, at any point, higher frequency bands are being considered for communications. As wave technology moves from searching the business game plans, and induced by the confined bandwidth, the terahertz antenna (THz) band is envisioned as the other lines for communications. Concerning vehicular systems, communications are at much higher frequencies and, in this manner, with significantly higher data rates bring many opportunities and challenges. In this paper, a survey of the opportunities and challenges in THz correlation for vehicular systems is provided. Besides, this paper gives answers for a segment of these kinds of challenges.</p><p>Keywords: beyond the fifth generation (B5G), channel modelling, data rate terahertz (THz).0, UHD (ultra-high definition), Tera-bps (Tbps)</p><p>Cite this Article: Vijaya Laxmi Sisodiya. Implementation of Terahertz Communication Link. Journal of Mobile Computing, Communications & Mobile Networks. 2019; 6(3): 5–11p.</p>Vijaya Laxmi Sisodiya2019-11-282019-11-288Wireless Reliability: Invasion Matter and Explication
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2336
<p>Abstract: Network protection has become a gambol in our whole international, as each chunk of the enterprise international square measure going digital, as an outcome to bypass these items we tend to square measure adopting numerous methods. Network administrator should maintain track and should update with all recent advances in every software system program and hardware fields to keep at bay the person’s records. Currently, associate afternoon medical aid is gambling a very important position and integration of virtual technologies into our regular lifestyles. This paper precise varied method that square measure accustomed attack yet as numerous mechanisms to defense them.</p><p>Keywords: Cryptography, security attacks, security measures, security tools, WAN, security factors, Firewalls, gateways, intrusion detection</p><p>Cite this Article: Shubham Maheshwari, Kamal Kishor Choure. Wireless Reliability: Invasion Matter and Explication. Communications & Mobile Networks. 2019; 6(3): 23–27p.</p>Shubham MaheshwariKamal Kishor Choure2019-11-282019-11-288Camera-based Anti-theft Surveillance and Monitoring System
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2330
<p>Abstract: This paper presents a real-time smart door gadget for domestic safety. Most of the proposed clever home structures try to convey answers for this safety hassle, but lots of those structures use several sensor devices. With the increasing safety issues, it is important to apply new technology. The Internet of Things is one of the new technologies nowadays used in home automation system. Raspberry Pi is a strong and dependable embedded machine device for the complicated and hard responsibilities. Using these technologies within the proposed system will bring numerous benefits in providing safety, and safety in terms of visualizing and figuring out individuals who visit the home. One of the advanced module which in this project is the module is connected with another microcontroller node (MCU) which notifies the owner about someone who presses the bell and notifies that the person is at home or not, and using Google Assistance owner can give commands to display the availability at home or not and when. In the overall proposed system, there can be two one of a kind giant techniques to provide domestic security. Another function is to automate the equipment that are operated through smartphone and the use of numerous sensors, so which are linked to microcontroller to reveal the complete device. Mq2 fuel sensor presents the function to preserve the fire alert in case of emergency and offer SOS to given touch and mails. With the continuing improvement of radio frequency identification technology (RFID), RFID has been used increasingly extensively. The frame shape of the intelligent parking device is recommending in step with the traits of the management of the parking lot. The entire scheme and characteristic of the intelligent parking gadget are analysed in detailed. This technique realizes smart control of automated home.</p><p>Keywords: IoT (Internet of Things), home automation system, Google Assistance, RFID</p><p>Cite this Article: Parth Saxena, Sakshi Maheshwari, Abhijeet Vyas, Nikhil Periwal. Camera-based Anti-theft Surveillance and Monitoring System. Journal of Mobile Computing, Communications & Mobile Networks. 2019; 6(3):1–4p.</p>Parth SaxenaSakshi MaheshwariAbhijeet VyasNikhil Periwal2019-11-282019-11-288Performance Analysis of IEEE 802.22 Wireless Regional Area Network with Different Modulation Schemes and Code Rates: A Review
https://computers.stmjournals.com/index.php?journal=JoMCCMN&page=article&op=view&path%5B%5D=2354
<p>Abstract: The wireless regional area network (WRAN) is an IEEE 802.22 standard. It operates in the very high frequency and ultra-high frequency range. It works on the principle of cognitive radio. The basic objective of WRAN is to sense the available frequency spectrum and assign this sensed frequency to the secondary user. The performance of the network strongly depends on the wireless environment and different channel conditions. In this paper, we are analyzing the performance of the WRAN in terms of Bit error rate, signal to noise ratio and throughput. The WRAN is simulated in MATLAB for different parameters, different modulation methods and various channel conditions.</p><p>Keywords: BER (bit error rate), SNR (signal-to-noise ratio), WRAN, MATLAB, OFDM (orthogonal frequency-division multiplexing), QAM (quadrature amplitude modulation)</p><p>Cite this Article: Rahul Koshti, Manisha Singh. Performance Analysis of IEEE 802.22 Wireless Regional Area Network with Different Modulation Schemes and Code Rates: A Review. Journal of Mobile Computing, Communications & Mobile Networks. 2019; 6(3): 12–17p.</p>Rahul KoshtiManisha Singh2019-11-282019-11-288