i-manager's Journal on Mobile Applications and Technologies (JMT)


Volume 10 Issue 1 January - June 2023

Article

Mobile-Enabled Telemedicine System: A New Approach to Rural Healthcare

M. Theodore Kingslin*
Department of Electronics and Communication Engineering, R.M.K. College of Engineering & Technology, Thiruvallur, Tamil Nadu, India.
Kingslin, M. T. (2023). Mobile-Enabled Telemedicine System: A New Approach to Rural Healthcare. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 1-5. https://doi.org/10.26634/jmt.10.1.20088

Abstract

Access to quality healthcare services remains a significant challenge in rural areas of developing countries. The integration of telemedicine into a mobile-based system offers a potential solution to bridge the healthcare gap and improve access to diagnosis and treatment. This study focused on the integration of telemedicine in a mobile-based system for remote healthcare delivery in rural settings. The proposed system allows patients in rural areas to register and schedule appointments with healthcare providers using a mobile application. It also incorporates remote monitoring, enabling patients to input health related data from monitoring devices and to receive personalized treatment plans. This study evaluated the effectiveness of an integrated system in facilitating remote diagnoses and treatment. Key metrics, such as appointment scheduling rates, video consultation success rates, and patient satisfaction scores, were collected and analyzed to assess the impact of the system.

Research Paper

Exploring the Distribution of Mobile Data Packages among University Students - A Comparative Analysis of Gender Variances

Lawrence Luhanga*
Department of Computer Science, DMI – St. John the Baptist University (DMISJBU), Mangochi, Malawi.
Luhanga, L. (2023). Exploring the Distribution of Mobile Data Packages among University Students - A Comparative Analysis of Gender Variances. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 6-11. https://doi.org/10.26634/jmt.10.1.20059

Abstract

This paper presents a comprehensive analysis of data package distribution based on gender, mobile cellular providers, and universities among university students. Using data from six universities, the study explores the preferences of male and female university students regarding internet access and mobile data providers. The hypothesis suggests potential disparities that favor male students, contributing to the digital gender divide. Addressing these disparities is crucial for fostering equitable business development, as a pronounced digital gender divide can hinder female students' access to information, resources, and networking opportunities, impacting workforce diversity and entrepreneurial potential. This research offers valuable insights for businesses, policymakers, and educational institutions, emphasizing the significance of equitable digital access for sustainable and inclusive growth. The study underscores the urgent need for proactive measures to rectify gender disparities in internet access, shedding light on the importance of equal opportunities in the digital landscape for driving business success and cultivating a diverse and resilient workforce and emphasizes the need to address these imbalances. It stresses the importance of ensuring equal opportunities in the digital realm, promoting business success, and fostering a diverse and resilient workforce. This research contributes to the ongoing discourse on data package distribution patterns among university students based on gender, mobile cellular providers, and universities. It provides valuable insights into the preferences and patterns among male and female students, emphasizing the necessity for proactive measures to bridge the digital gender divide. The findings have significant implications for businesses, policymakers, and educational institutions, offering guidance for promoting equal access to digital resources and creating an inclusive and supportive environment for all students.

Research Paper

Secure Efficient Communication in Routing Protocol in MANETs using ECC-EA3ACKa

Thamizhmaran K.*
Department of Electronics and Communication Engineering, Government College of Engineering, Bodinayakkanur, Theni, Tamil Nadu, India.
Thamizhmaran, K. (2023). Secure Efficient Communication in Routing Protocol in MANETs using ECC-EA3ACKa. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 12-22. https://doi.org/10.26634/jmt.10.1.20125

Abstract

Mobile Ad Hoc Networks (MANETs) are dynamic, self-organizing networks that lack a fixed infrastructure, making them highly vulnerable to various security threats. One of the critical aspects in MANETs is the establishment of efficient and secure communication among mobile nodes. Routing protocols play a pivotal role in ensuring reliable data transmission in such environments. This paper presents a comprehensive overview of the challenges and solutions related to achieving secure and efficient communication within MANET routing protocols. The main objective of this paper is to define the path for security and to further improve throughput, routing overhead, end-to-end delay, packet delivery ratio, and at the same time to create an energy-enhanced way with excellent security. Implementation of cryptographic algorithms for the information is done in such a way that it is impossible for attackers to compromise the resources of information sent over the web. This paper proposes a new intrusion detection system called Enhanced Adaptive 3 Acknowledgement (ECC-EA3ACK), using EA3ACK with Elliptical Curve Cryptography (ECC) specially designed for MANETs. In this ECC, there is a two-key encryption technique based on elliptic curve theory that can be used to create faster, smaller, more energy-efficient cryptography. The above-developed on-demand routing protocol achieves better results than the existing model through one of the leading simulators called Network Simulator (NS2), which is used to implement and test the proposed system. The proposed cryptography provides secured transmission, reduces routing overhead, improves packet delivery ratio, throughput, and minimizes delay due to increased remaining energy and improved security.

Review Paper

Advancements in Mobile Security: A Comprehensive Study of SIM Card Swapping and Cloning - Trends, Challenges and Innovative Solutions

Murugalakshmi S.* , Doreen Hepzibah Miriam D.**, C. R. Rene Robin***
* Shrimathi Devkunvar Nanalal Bhatt Vaishnav College for Women, Chennai, India.
** Computational Intelligence Research Foundation (CIRF), Chennai, India.
*** Sri Sairam Engineering College, Chennai, India.
Murugalakshmi, S., Miriam, D. D. H., and Robin, C. R. R. (2023). Advancements in Mobile Security: A Comprehensive Study of SIM Card Swapping and Cloning - Trends, Challenges and Innovative Solutions. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 23-29. https://doi.org/10.26634/jmt.10.1.20103

Abstract

SIM card cloning is a cyber-attack that is increasing dramatically in number. The Subscriber Identity Module (SIM) holds the crucial user data required to establish a connection between several telecom companies. Concerns about user security and privacy are growing as the usage of smartphones and the Internet has increased worldwide in the technology industry. Therefore, it is imperative for all users to understand cybercrime and security. This study analyzed the emerging trends and challenges associated with these threats, highlighting real-world risks and repercussions through case studies. As mobile devices continue to play an integral role in our lives, they have become lucrative targets for cybercriminals seeking unauthorized access to personal and corporate data. Cybercrime that uses telecom technology to steal information and exploit victims, known as phishing is discussed. Innovative security solutions and best practices that aim to counteract SIM card vulnerabilities, protect user identities, and safeguard sensitive information are also discussed. By examining legal frameworks, preventive measures, and technological advancements, this study serves as a valuable resource for security professionals, policymakers, and individuals seeking to fortify mobile security defenses.

Concept paper

Enhancing Student Experience: A Vision for the DMI University Student App

Twareeq Hassan* , Paul Chisati**, G. Glorindal***
*-** Department of Computer Science, DMI-St. John the Baptist University, Lilongwe, Malawi.
*** Director of Research, DMI-St. John the Baptist University, Lilongwe, Malawi.
Hassan, T., Chisati, P., and Glorindal, G. (2023). Enhancing Student Experience: A Vision for the DMI University Student App. i-manager’s Journal on Mobile Applications & Technologies, 10(1), 30-36. https://doi.org/10.26634/jmt.10.1.20061

Abstract

The DMI University Student App will be a mobile-based software application designed to run on Android mobile phones. It will be used by potential students and students of DMI-St. John the Baptist University, as it will provide complete details of colleges, such as tuition and accommodation fees, eligibility criteria, campus placement opportunities, accommodation facilities, scholarship schemes, campus support services, rules, and regulations, etc. It will help students select various courses in engineering, social work, computer science, and business administration at DMI-St. John the Baptist University based on factors like qualifying exam details, technical expertise, and other details. The application will prepare the course list, which will be filtered based on parameters like institution ranking, department or field, fee limits, and chosen location. This application will help students find the most appropriate course in the field of their interest that corresponds to their location.