The document describes an Android application called Virtual Classroom that allows users to stream video lectures from a server over Wi-Fi. The application displays a list of video lectures stored on the server that users can select to view. It includes features like bookmarking videos to pause and resume from saved points, and subtitles to view lectures in different languages. The goal is to provide easy access to educational resources using modern mobile technologies to improve learning opportunities.
Wifi Direct Based Chat And File Transfer Android ApplicationNitin Bhasin
This App allows you to share any kind of file present in SD card to other mobile phone directly at speed of 5+MBps. It even allows to click images shoot videos and directly dend to other device.It also allows to send drawings by having drawing pad in it in various colours and various brush sizes. Web-View is also implemented in it.
Link Of App At Amazon Store: http://www.amazon.com/Wifi-Direct-Chat-Transfer-Application/dp/B00TKFFMZO/ref=sr_1_1?s=mobile-apps&ie=UTF8&qid=1424009545&sr=1-1&keywords=Wifi+Direct+Chat+and+File+Transfer+Application
Connected World in android - Local data sharing and service discoveryTalentica Software
With the boom of IOT, BLE (Bluetooth low energy) and other connected devices and protocols, android app development is no longer limited to basic client server interaction. Android app development now includes interaction with other devices (not necessarily android) in the vicinity, at its very core.
Transferring files with friends without internet, Bluetooth and WiFi; streaming media from your phone or tablet to dumb plain TV (without HDMI cables) and switching off bedroom light with phone have become part of our lives. Let's explore how it's done and where do we need to start to kick start such projects.
In this session we will explore:
• Communication between connected and non-connected android devices.
• BLE overview (Bluetooth Low Energy).
• BLE APIs you should know about.
• WiFi-Direct and P2P.
• WiFi-Direct service discovery.
• Network service discovery (NSD) and relevant demos
Wifi Direct Based Chat And File Transfer Android ApplicationNitin Bhasin
This App allows you to share any kind of file present in SD card to other mobile phone directly at speed of 5+MBps. It even allows to click images shoot videos and directly dend to other device.It also allows to send drawings by having drawing pad in it in various colours and various brush sizes. Web-View is also implemented in it.
Link Of App At Amazon Store: http://www.amazon.com/Wifi-Direct-Chat-Transfer-Application/dp/B00TKFFMZO/ref=sr_1_1?s=mobile-apps&ie=UTF8&qid=1424009545&sr=1-1&keywords=Wifi+Direct+Chat+and+File+Transfer+Application
Connected World in android - Local data sharing and service discoveryTalentica Software
With the boom of IOT, BLE (Bluetooth low energy) and other connected devices and protocols, android app development is no longer limited to basic client server interaction. Android app development now includes interaction with other devices (not necessarily android) in the vicinity, at its very core.
Transferring files with friends without internet, Bluetooth and WiFi; streaming media from your phone or tablet to dumb plain TV (without HDMI cables) and switching off bedroom light with phone have become part of our lives. Let's explore how it's done and where do we need to start to kick start such projects.
In this session we will explore:
• Communication between connected and non-connected android devices.
• BLE overview (Bluetooth Low Energy).
• BLE APIs you should know about.
• WiFi-Direct and P2P.
• WiFi-Direct service discovery.
• Network service discovery (NSD) and relevant demos
bccon-2014 dev04 domino_apps_reaching_up&outICS User Group
Domino applications deliver value in numerous ways. The comprehensive platform and tools continue to deliver an unmatched set of core functionality. New enhancements improve the ability for these applications to reach Out to mobile devices and social applications. Upcoming capabilities will allow one to run Domino applications in the cloud. Come hear about the latest and greatest so you can unleash the potential energy of Domino!
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Java Mobile Application Development Using J2ME (Java 2 Micro Edition) contains 12 Units and each unit contains 50 to 60 slides in it.
Contents…
• Identify the types of wireless technologies
• Identify the need for J2ME
• Identify the goals and characteristics of JTWI specification
• Identify the MIDlet development lifecycle
• Execute a MIDlet by using NetBeans
• Explain the profiles and configurations in J2ME technology
• Manage MIDlet suite and its packaging
• Develop, package, and run MIDlet suites by using NetBeans
• Describe MIDP User Interface components and their hierarchy
• Work with Screen and its elements
• Create UI using high-level UI APIs
• Create a mail application UI that implements high-level APIs
• Create User Interfaces (UIs) using low-level UI APIs
• Manage a wallpaper from a mobile device
• Implement persistent storage in MIDlets
• Develop a personal expense manager application
• Establish network connection by using the GCF
• Implement classes and interfaces in javax.microedition.io package
• Develop a new application that displayed on the mobile device as a ticker
• Implement MIDlet security
• Develop a banking application
• Identify MMAPI packages and its components
• Play sounds and videos by using the MMAPI package
• Develop a jukebox application
• Identify the basics of WMA
• Create, send, and receive SMS messages by using WMA
• Demonstrate the use of SMS in NetBeans
• Analyze and implement classes in the MIDP Game API
• Develop a Tic Tac Toe game by using the Game API
• Deploy MIDlets through the local machine and Web server
• Explore the push registry
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Foundry Management System Desktop Application Dharmendra Sid
Presentation of Industrial Project Final Semester Department of Computer Science, Shivaji University, Kolhapur in the year March-2012.
Designed & Developed at Kadam Software & Services
Use of Automation Codecs Streaming Video Applications Based on Cloud ComputingTELKOMNIKA JOURNAL
Streaming technology is currently experiencing a great progress. Faster internet more users streaming. Streaming services that exist today there are still weaknesses in both the upload speed, streaming speed and limited types of video extensions that can be played. To resolve these problems then made a video streaming service based local area network with a system of cloud computing that can work effectively in terms of upload speeds, streaming and variations in video formats. Video streaming application is classified as a service IaaS (Infrastructure as a Service Cloud) in cloud computing. On the use of streaming applications the user does not need to convert the video, with the purpose of uploading process can be faster and applications can play a variety of video formats.
Streaming multimedia application for mobile devices for audio & videoMike Taylor
Streaming Multimedia Application for Mobile Devices for interactive streaming of audio and video files, editing, manipulation & tagging platform for content distribution.
bccon-2014 dev04 domino_apps_reaching_up&outICS User Group
Domino applications deliver value in numerous ways. The comprehensive platform and tools continue to deliver an unmatched set of core functionality. New enhancements improve the ability for these applications to reach Out to mobile devices and social applications. Upcoming capabilities will allow one to run Domino applications in the cloud. Come hear about the latest and greatest so you can unleash the potential energy of Domino!
Download Complete Material - https://www.instamojo.com/prashanth_ns/
This Java Mobile Application Development Using J2ME (Java 2 Micro Edition) contains 12 Units and each unit contains 50 to 60 slides in it.
Contents…
• Identify the types of wireless technologies
• Identify the need for J2ME
• Identify the goals and characteristics of JTWI specification
• Identify the MIDlet development lifecycle
• Execute a MIDlet by using NetBeans
• Explain the profiles and configurations in J2ME technology
• Manage MIDlet suite and its packaging
• Develop, package, and run MIDlet suites by using NetBeans
• Describe MIDP User Interface components and their hierarchy
• Work with Screen and its elements
• Create UI using high-level UI APIs
• Create a mail application UI that implements high-level APIs
• Create User Interfaces (UIs) using low-level UI APIs
• Manage a wallpaper from a mobile device
• Implement persistent storage in MIDlets
• Develop a personal expense manager application
• Establish network connection by using the GCF
• Implement classes and interfaces in javax.microedition.io package
• Develop a new application that displayed on the mobile device as a ticker
• Implement MIDlet security
• Develop a banking application
• Identify MMAPI packages and its components
• Play sounds and videos by using the MMAPI package
• Develop a jukebox application
• Identify the basics of WMA
• Create, send, and receive SMS messages by using WMA
• Demonstrate the use of SMS in NetBeans
• Analyze and implement classes in the MIDP Game API
• Develop a Tic Tac Toe game by using the Game API
• Deploy MIDlets through the local machine and Web server
• Explore the push registry
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Foundry Management System Desktop Application Dharmendra Sid
Presentation of Industrial Project Final Semester Department of Computer Science, Shivaji University, Kolhapur in the year March-2012.
Designed & Developed at Kadam Software & Services
Use of Automation Codecs Streaming Video Applications Based on Cloud ComputingTELKOMNIKA JOURNAL
Streaming technology is currently experiencing a great progress. Faster internet more users streaming. Streaming services that exist today there are still weaknesses in both the upload speed, streaming speed and limited types of video extensions that can be played. To resolve these problems then made a video streaming service based local area network with a system of cloud computing that can work effectively in terms of upload speeds, streaming and variations in video formats. Video streaming application is classified as a service IaaS (Infrastructure as a Service Cloud) in cloud computing. On the use of streaming applications the user does not need to convert the video, with the purpose of uploading process can be faster and applications can play a variety of video formats.
Streaming multimedia application for mobile devices for audio & videoMike Taylor
Streaming Multimedia Application for Mobile Devices for interactive streaming of audio and video files, editing, manipulation & tagging platform for content distribution.
Multimedia authoring tools and User interface designSagar Rai
Multimedia authoring tools and user interface design,
multimedia.
authoring tools of multimedia.
user interface design of multimedia.
user interface.
authoring tools.
design of multimedia.
basic concept of multimedia.
Flash-based audio and video communicationKundan Singh
Modern multimedia communication systems have roots in several different technologies: transporting video over phone lines, using multicast on Internet2's Mbone, adding video session to VoIP or instant messaging, or adding interactive mode in existing streaming systems. Adobe's Flash Player has emerged as the most popular web platform for video content and used by almost all web users. More recently, several companies have attempted Flash-based interactive video communication. The high level abstractions offered by Flash Player and Flex framework significantly eases the development of video applications.
This talk will present the differences in video communication technologies, how it is being deployed in practice using the Flash platform, shedding some light on many confusions about what works and what does not, and how can Flash video work with standards such as SIP and HTML 5. This developer focused presentation will walk you through what it takes to build a Flash-based video communication system using example code.
VIDEOCONFERENCING WEB APPLICATION FOR CARDIOLOGY DOMAIN USING FLEX/J2EE TECHN...cscpconf
The recent advances in computer technology and data networking have made videoconferencing
system a popular medium for users to interact with one another from remote locations. This
system offers communication between more than two users, who are able to interact through
their webcams, microphone and other components. The use of this system has been increased
recently due to many reasons, for one thing, progress in Internet access in different networks
like companies, universities and houses, with the increase of available bandwidth whereas the
decrease of delay in sending and receiving packets . On the other hand, the coming of Rich
Internet Applications (RIA) means that a large part of web application started to be
implemented on the web browsers. This paper discusses the conception of multiparty
videoconferencing systems using technologies of Web 2.0. For our conceptual
Videoconferencing Platform, we have developed many feature : live audio video, text
chat, video recording, user and room management and quality control. Videoconferencing
modules have been carried out using open source technologies Flex and J2EE.
Now-a-days, Internet has become an important part of human’s life, a person
can shop, invest, and perform all the banking task online. Almost, all the organizations have
their own website, where customer can perform all the task like shopping, they only have to
provide their credit card details. Online banking and e-commerce organizations have been
experiencing the increase in credit card transaction and other modes of on-line transaction.
Due to this credit card fraud becomes a very popular issue for credit card industry, it causes
many financial losses for customer and also for the organization. Many techniques like
Decision Tree, Neural Networks, Genetic Algorithm based on modern techniques like
Artificial Intelligence, Machine Learning, and Fuzzy Logic have been already developed for
credit card fraud detection. In this paper, an evolutionary Simulated Annealing algorithm is
used to train the Neural Networks for Credit Card fraud detection in real-time scenario.
This paper shows how this technique can be used for credit card fraud detection and
present all the detailed experimental results found when using this technique on real world
financial data (data are taken from UCI repository) to show the effectiveness of this
technique. The algorithm used in this paper are likely beneficial for the organizations and
for individual users in terms of cost and time efficiency. Still there are many cases which are
misclassified i.e. A genuine customer is classified as fraud customer or vise-versa.
Wireless sensor networks (WSN) have been widely used in various applications.
In these networks nodes collect data from the attached sensors and send their data to a base
station. However, nodes in WSN have limited power supply in form of battery so the nodes
are expected to minimize energy consumption in order to maximize the lifetime of WSN. A
number of techniques have been proposed in the literature to reduce the energy
consumption significantly. In this paper, we propose a new clustering based technique
which is a modification of the popular LEACH algorithm. In this technique, first cluster
heads are elected using the improved LEACH algorithm as usual, and then a cluster of
nodes is formed based on the distance between node and cluster head. Finally, data from
node is transferred to cluster head. Cluster heads forward data, after applying aggregation,
to the cluster head that is closer to it than sink in forward direction or directly to the sink.
This reduction in distance travelled improves the performance over LEACH algorithm
significantly.
The next generation wireless networks comprises of mobile users moving
between heterogeneous networks, using terminals with multiple access interfaces and
services. The most important issue in such environment is ABC (Always Best Connected) i.e.
allowing the best connectivity to applications anywhere at any time. For always best
connectivity requirement various vertical handover strategies for decision making have
been proposed. This paper provides an overview of the most interesting and recent
strategies.
This paper presents the design and performance comparison of a two stage
operational amplifier topology using CMOS and BiCMOS technology. This conventional op
amp circuit was designed by using RF model of BSIM3V3 in 0.6 μm CMOS technology and
0.35 μm BiCMOS technology. Both the op amp circuits were designed and simulated,
analyzed and performance parameters are compared. The performance parameters such as
gain, phase margin, CMRR, PSRR, power consumption etc achieved are compared. Finally,
we conclude the suitability of CMOS technology over BiCMOS technology for low power
RF design.
In Cognitive Radio Networks (CRN), Cooperative Spectrum Sensing (CSS) is
used to improve performance of spectrum sensing techniques used for detection of licensed
(Primary) user’s signal. In CSS, the spectrum sensing information from multiple unlicensed
(Secondary) users are combined to take final decision about presence of primary signal. The
mixing techniques used to generate final decision about presence of PU’s signal are also
called as Fusion techniques / rules. The fusion techniques are further classified as data
fusion and decision fusion techniques. In data fusion technique all the secondary users
(SUs) share their raw information of spectrum detection like detected energy or other
statistical information, while in decision fusion technique all the SUs take their local
decisions and share the decision by sending ‘0’ or ‘1’ corresponding to absence and presence
of PU’s signal respectively. The rules used in decision fusion techniques are OR rule, AND
rule and K-out-of-N rule. The CSS is further classified as distributed CSS and centralized
CSS. In distributed CSS all the SUs share the spectrum detection information with each
other and by mixing the shared information; all the SUs take final decision individually. In
centralized CSS all the SUs send their detected information to a secondary base station /
central unit which combines the shared information and takes final decision. The secondary
base station shares the final decision with all the SUs in the CRN. This paper covers
overview of information fusion methods used for CSS and analysis of decision fusion rules
with simulation results.
ZigBee has been developed to support lower data rates and low power consuming
applications. This paper targets to analyze various parameters of ZigBee physical (PHY).
Performance of ZigBee PHY is evaluated on the basis of energy consumption in
transmitting and receiving mode and throughput. Effect of variation in network size is
studied on these performance attributes. Some modulation schemes are also compared and
the best modulation scheme is suggested with tradeoffs between different performance
metrics.
This paper gives a brief idea of the moving objects tracking and its application.
In sport it is challenging to track and detect motion of players in video frames. Task
represents optical flow analysis to do motion detection and particle filter to track players
and taking consideration of regions with movement of players in sports video. Optical flow
vector calculation gives motion of players in video frame. This paper presents improved
Luacs Kanade algorithm explained for optical flow computation for large displacement and
more accuracy in motion estimation.
A rapid progress is seen in the field of robotics both in educational and industrial
automation sectors. The Robotics education in particular is gaining technological advances
and providing more learning opportunities. In automotive sector, there is a necessity and
demand to automate daily human activities by robot. With such an advancement and
demand for robotics, the realization of a popular computer game will help students to learn
and acquire skills in the field of robotics. The computer game such as Pacman offers
challenges on both software and hardware fronts. In software, it provides challenges in
developing algorithms for a robot to escape from the pool of attacking robots and to develop
algorithms for multiple ghost robots to attack the Pacman. On the hardware front, it
provides a challenge to integrate various systems to realize the game. This project aims to
demonstrate the pacman game in real world as well as in simulation. For simulation
purpose Player/Stage is used to develop single-client and multi-client architectures. The
multi- client architecture in player/stage uses one global simulation proxy to which all the
robot models are connected. This reduces the overhead to manage multiple robots proxy.
The single-client architecture enables only two robot models to connect to the simulation
proxy. Multi-client approach offers flexibility to add sensors to each port which will be used
distinctly by the client attached to the respective robot. The robots are named as Pacman
and Ghosts, which try to escape and attack respectively. Use of Network Camera has been
done to detect the global positions of the robots and data is shared through inter-process
communication.
In Content-Based Image Retrieval (CBIR) systems, the visual contents of the
images in the database are took out and represented by multi-dimensional characteristic
vectors. A well known CBIR system that retrieves images by unsupervised method known
as cluster based image retrieval system. For enhancing the performance and retrieval rate
of CBIR system, we fuse the visual contents of an image. Recently, we developed two
cluster-based CBIR systems by fusing the scores of two visual contents of an image. In this
paper, we analyzed the performance of the two recommended CBIR systems at different
levels of precision using images of varying sizes and resolutions. We also compared the
performance of the recommended systems with that of the other two existing CBIR systems
namely UFM and CLUE. Experimentally, we find that the recommended systems
outperform the other two existing systems and one recommended system also comparatively
performed better in every resolution of image.
Information Systems and Networks are subjected to electronic attacks. When
network attacks hit, organizations are thrown into crisis mode. From the IT department to
call centers, to the board room and beyond, all are fraught with danger until the situation is
under control. Traditional methods which are used to overcome these threats (e.g. firewall,
antivirus software, password protection etc.) do not provide complete security to the system.
This encourages the researchers to develop an Intrusion Detection System which is capable
of detecting and responding to such events. This review paper presents a comprehensive
study of Genetic Algorithm (GA) based Intrusion Detection System (IDS). It provides a
brief overview of rule-based IDS, elaborates the implementation issues of Genetic Algorithm
and also presents a comparative analysis of existing studies.
Step by step operations by which we make a group of objects in which attributes
of all the objects are nearly similar, known as clustering. So, a cluster is a collection of
objects that acquire nearly same attribute values. The property of an object in a cluster is
similar to other objects in same cluster but different with objects of other clusters.
Clustering is used in wide range of applications like pattern recognition, image processing,
data analysis, machine learning etc. Nowadays, more attention has been put on categorical
data rather than numerical data. Where, the range of numerical attributes organizes in a
class like small, medium, high, and so on. There is wide range of algorithm that used to
make clusters of given categorical data. Our approach is to enhance the working on well-
known clustering algorithm k-modes to improve accuracy of algorithm. We proposed a new
approach named “High Accuracy Clustering Algorithm for Categorical datasets”.
Brain tumor is a malformed growth of cells within brain which may be
cancerous or non-cancerous. The term ‘malformed’ indicates the existence of tumor. The
tumor may be benign or malignant and it needs medical support for further classification.
Brain tumor must be detected, diagnosed and evaluated in earliest stage. The medical
problems become grave if tumor is detected at the later stage. Out of various technologies
available for diagnosis of brain tumor, MRI is the preferred technology which enables the
diagnosis and evaluation of brain tumor. The current work presents various clustering
techniques that are employed to detect brain tumor. The classification involves classification
of images into normal and malformed (if detected the tumor). The algorithm deals with
steps such as preprocessing, segmentation, feature extraction and classification of MR brain
images. Finally, the confirmatory step is specifying the tumor area by technique called
region of interest.
A Proxy signature scheme enables a proxy signer to sign a message on behalf of
the original signer. In this paper, we propose ECDLP based solution for chen et. al [1]
scheme. We describe efficient and secure Proxy multi signature scheme that satisfy all the
proxy requirements and require only elliptic curve multiplication and elliptic curve addition
which needs less computation overhead compared to modular exponentiations also our
scheme is withstand against original signer forgery and public key substitution attack.
Water marking has been proposed as a method to enhance data security. Text
water marking requires extreme care when embedding additional data within the images
because the additional information must not affect the image quality. Digital water marking
is a method through which we can authenticate images, videos and even texts. Add text
water mark and image water mark to your photos or animated image, protect your
copyright avoid unauthorized use. Water marking functions are not only authentication, but
also protection for such documents against malicious intentions to change such documents
or even claim the rights of such documents. Water marking scheme that hides water
marking in method, not affect the image quality. In this paper method of hiding a data using
LSB replacement technique is proposed.
Today among various medium of data transmission or storage our sensitive data
are not secured with a third-party, that we used to take help of. Cryptography plays an
important role in securing our data from malicious attack. This paper present a partial
image encryption based on bit-planes permutation using Peter De Jong chaotic map for
secure image transmission and storage. The proposed partial image encryption is a raw data
encryption method where bits of some bit-planes are shuffled among other bit-planes based
on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De
Jong map the position of all the bit-planes are permuted. The result of the several
experimental, correlation analysis and sensitivity test shows that the proposed image
encryption scheme provides an efficient and secure way for real-time image encryption and
decryption.
This paper presents a survey of Dependency Analysis of Service Oriented
Architecture (SOA) based systems. SOA presents newer aspects of dependency analysis due
to its different architectural style and programming paradigm. This paper surveys the
previous work taken on dependency analysis of service oriented systems. This study shows
the strengths and weaknesses of current approaches and tools available for dependency
analysis task in context of SOA. The main motivation of this work is to summarize the
recent approaches in this field of research, identify major issue and challenges in
dependency analysis of SOA based systems and motivate further research on this topic.
In this paper, proposed a novel implementation of a Soft-Core system using
micro-blaze processor with virtex-5 FPGA. Till now Hard-Core processors are used in
FPGA processor cores. Hard cores are a fixed gate-level IP functions within the FPGA
fabrics. Now the proposed processor is Soft-Core Processor, this is a microprocessor fully
described in software, usually in an HDL. This can be implemented by using EDK tool. In
this paper, developed a system which is having a micro-blaze processor is the combination
of both hardware & Software. By using this system, user can control and communicate all
the peripherals which are in the supported board by using Xilinx platform to develop an
embedded system. Implementing of Soft-Core process system with different peripherals like
UART interface, SPA flash interface, SRAM interface has to be designed using Xilinx
Embedded Development Kit (EDK) tools.
The article presents a simple algorithm to construct minimum spanning tree and
to find shortest path between pair of vertices in a graph. Our illustration includes the proof
of termination. The complexity analysis and simulation results have also been included.
Wimax technology has reshaped the framework of broadband wireless internet
service. It provides the internet service to unconnected or detached areas such as east South
Africa, rural areas of America and Asia region. Full duplex helpers employed with one of
the relay stations selection and indexing method that is Randomized Distributed Space Time
are used to expand the coverage area of primary Wimax station. The basic problem was
identified at cell edge due to weather conditions (rain, fog), insertion of destruction because
of multiple paths in the same communication channel and due to interference created by
other users in that communication. It is impractical task for the receiver station to decode
the transmitted signal successfully at the cell edges, which increases the high packet loss and
retransmissions. But Wimax is a outstanding technology which is used for improving the
quality of internet service and also it offers various services like Voice over Internet
Protocol, Video conferencing and Multimedia broadcast etc where a little delay in packet
transmission can cause a big loss in the communication. Even setup and initialization of
another Wimax station nearer to each other is not a good alternate, where any mobile
station can easily handover to another base station if it gets a strong signal from other one.
But in rural areas, for few numbers of customers, installation of base station nearer to each
other is costlier task. In this review article, we present a scheme using R-DSTC technique to
choose and select helpers (relay nodes) randomly to expand the coverage area and help to
mobile station as a helper to provide secure communication with base station. In this work,
we use full duplex helpers for better utilization of bandwidth.
Radio Frequency identification (RFID) technology has become emerging
technique for tracking and items identification. Depend upon the function; various RFID
technologies could be used. Drawback of passive RFID technology, associated to the range
of reading tags and assurance in difficult environmental condition, puts boundaries on
performance in the real life situation [1]. To improve the range of reading tags and
assurance, we consider implementing active backscattering tag technology. For making
mobiles of multiple radio standards in 4G network; the Software Defined Radio (SDR)
technology is used. Restrictions in Existing RFID technologies and SDR technology, can be
eliminated by the development and implementation of the Software Defined Radio (SDR)
active backscattering tag compatible with the EPC global UHF Class 1 Generation 2 (Gen2)
RFID standard. Such technology can be used for many of applications and services.
2. 435
gadgets hence satisfying in the needs of future generations. So in all Virtual Classroom is a must have
application for the students who prefer better utilization of resources in an efficient manner.
II. LITERATURE STUDIES
In the present scenario there is considerable development in the accessibility of resources. The information
sharing and internet facilities have embarked their presence in the current prospective WiFi [1], a type of
IEEE 802.11 WLAN (Wireless Local Area Network) that is a name for WiFi Fidelity defined by WiFi [12]
Alliances. It is designed for cable replacement in corporate environment, providing IP connectivity.
Android [2] is an operating system that runs on top of Linux kernel with a custom JVM set on top of it. It
allows only JAVA [8] applications to be installed. It shows better performance compared to Sun embedded
JVM without JIT because of bionic libc and better VM design. It is developed in C, C++ language.
Video Coding [3] deals with the compression of image to that of being most ubiquitous resource activity for
the audience to learn about coding standards without having to plough through formal documentation .Basic
stress is given on video generalization, digitalization and formats. A major video codec that we have used in
“Virtual Classroom” is H.264 [4]. It is a latest video coding standard of ITU-T Video Coding Experts Group
and ISO/IEC Moving Picture Experts Group. Scope of Video coding standardization is shown in Fig 1.
Fig.1: Scope of Video Coding Standardization [4]
XML Parsing [5] starts with character conversion followed by lexical analysis that is invariant among
different parsing models with syntactic analysis creates data representation based on parsing model used.
Using xml parsing in “Virtual Classroom” we have included the streaming capability feature. It requires low
latency and memory usage and usually parses a small portion of document sequentially without having full
fledged information of entire document structure.
Video Streaming [6] in android is divided into five layers, including the user interface, data capture and data
output codec and network transmission layer. With this the cycle and complexity of media application cycle
gets reduced and hence improves overall software maintainability. This development was meant to enhance
the stability and provide portability to the various android based applications.
III. PROPOSED METHOD
Android [13] operating system is defined as an open source system developed by Google in Linux platform
using C, C++ and JAVA [8] language. In “Virtual classroom” we have proposed an android version of 2.2.
And above.
Basic implementation of the application comprises of the following desired tasks. Starting with the feature
that is the basic idea for the application prototype is video streaming from the server which is at the same
network of android mobile client. Next is the subtopics task to provide easiness and is potent in viewing the
video lecture. When a user feels tired or exhausted while viewing the lecture he/she can pause at that moment
and record the timeline so that whenever the video is buffered it starts from the last saved timeline, this
feature is called bookmark. Its updating is also possible from application context. Moreover if a user is not
comfortable in understanding English then an option called subtitle is provided to adjust it according to the
preferable language. And the latest feature that is imposed is based on multiple video format support in
android [15] mobile device. Our proposed software is the solution for the problem discussed above .Basic
implementation of this software can be summarized in following lines. Basically after installing the android
application connect with the same network through which server is connected. On server video, lectures and
xml files and subtitles files are stored. When you first start the application it will ask for the IP of server and
connection will be created with server. Now in android client list of the video lectures will be displayed. User
3. 436
can select any of the video lectures that are played and XML [9] file corresponding to that video lectures will
be parsed and you can view the subtopics in a list view. Also there are additional features like bookmarking
and play with subtitle. In bookmarking feature user can save timing of video lecture along with its complete
URL. These timings are stored on SQLITE [10] database and retrieved again. Another feature is playing
subtitle along with video in different regional languages, this enhances better understand ability of concepts.
The tasks are developed using the tools like Eclipse, Android [7], XML Parsing, External Storage, SQL Lite
Database, Wi-Fi and JAVA [14] language.
IV. TEST RESULTS
Application was tested on Samsung Galaxy S5360Y.All the operations can be summarized as in the
following table
TABLE I: TESTING RESULTS
ID Test Description Test Result Check
1 Installing .apk file Installation successful 1
2 Launch+WI-Fi Check Prompt user if Wi-Fi disabled 1
3 Launching Time Valid connection with server. 1
4 Subtitle check Loads subtitle if exists 1
5 Subtopics Xml is loaded + topics displayed 1
6 Bookmark Video buffered from last bookmark 1
Fig.2:Data Flow Diagram
V. DISCUSSION
Using the Data Flow Diagram Fig.2 all its respective features are presented .The diagrammatical description
starts from user perspective where a user starts in either from Wi-Fi [12] connectivity or through SD card
[11] .On successful connection video list is displayed in the mobile device. The next depiction of Data Flow
Diagram indicates in that selected video is being played and its XML [9] is loaded in to the device and it can
be activated using sliding drawer where all the topics are indexed. Additional option are provided to subtitle
in the a particular video and hence a user is allowed to bookmark and also update in a particular video by
saving in current timeline and then resuming the video in case a user wants to continue from the last
bookmarked position. At the end of Data Flow Diagram Fig.2 a user adds in the bookmark in SQLITE [10]
database and that particular timestamp is recorded and hence saved in when video is again processed.
The motive of data Flow Diagram is to provide in clear view in the minds of user who access in the
application for first time. The one sided arrows indicates that the process is irreversible and the circle
indicates that it is a process while open rectangular block signifies that it is a storage whereas closed
rectangle is a user. All the testing results are shown in Table 1.
4. 437
Education is the most expensive and proposed portal in the current scenario. It makes a person literate and
gives him/her knowledge to learn the basic needs of life. So taking all these things in mind an android
application “Virtual Classroom” is developed to dynamically load /stream the video lectures just by making a
secure Wi-Fi connection with the available local server .Some of the inbuilt features in the application are-
Bookmark feature that helps in pausing the lecture and marking a timestamp so that whenever it is
again started, buffers from the last modified time.
Subtitles (.srt files) allow a user to view the lecture in his/her preferred language.
There is one option to store the important lectures in the SD card [11], in case there is loss of Wi-Fi
[12] connectivity.
Bookmark updating feature.
Supports video formats like 3GPP, MPEG-4
VI. CONCLUSION
Virtual Classroom would definitely provide new revolution in our education system scenario. The portability
it provides is beneficial from student’s point of view. The feature it has makes it a better education tool for
students.
In this paper we have stated the utility of the application “Virtual Classroom” that would certainly define the
future perspective of the education in society. The methods that are being implicated are useful for learning
and saving time and effort.
The application provides a real time streaming of video and is portable so the range within which one can
operate is reasonable.
Finally we can conclude that the use of this application will embark a true mark in the education society and
then learning would be affordable to distances.
VII. FUTURE DIRECTION
Virtual Classroom not only creates an interactive environment but also save their time and enhance the mode
of portability by enabling a user with the proposed features. So taking its compatibility in mind there are
some future perspective to improve the overall performance.
Audio Dubbing in different languages in order to view lecture in regional languages.
Support of all video formats on android mobile client.
Adjusting the video quality and aspect ratio according to network strength.
User can adjust the speed of the buffered video lecture according to the need.
Shows the list of related video lecture at the end of current video lecture.
REFERENCES
[1] WiFi : Retrieved from: http://www.ieee.org/portal/site/emergingtech/techindex.jsp?techId=48
[2] K. Paul and T. K. Kundu, “Android on Mobile Devices: An Energy Perspective,” in IEEE 10th International
Conference on Computer and Information Technology (CIT), 2010, pp. 2421–2426.
[3] M. Ghanbari ,”Video Coding: An Introduction to Standard Codecs” in Electronics & Communication Engineering
Journal, Vol.12 , Issue. 2 , April 2000.
[4] T. Wiegand, G. J. Sullivan, G. Bjøntegaard, and A. Luthra, “Overview of the H.264/AVC Video Coding Standard”in
IEEE Transactions On Circuits and Systems for Video Technology, Vol. 13, No. 7, July 2003.
[5] T. Cheung (Brian) Lam, Jianxun Jason Ding, Jyh-Charn Liu, "XML Document Parsing: Operational and
Performance Characteristics," Computer, vol. 41, no. 9, pp. 30-37, Sept. 2008.
[6] Xueliang Zhao and Dan Tian “The Architecture Design of Streaming Media Applications for Android OS”, May
2005.
[7] Android Developers : Retrieved from:http://developer.android.com
[8] Webopedia : Java Tutorial Reference , Retrieved from : http://www.webopedia.com/TERM/J/Java.html
[9] Lars Vogel (2012 , May) Android XML Processing with the XmlPullParser Version 1.3, Retrieved
from:http://www.vogella.com/articles/AndroidXML/article.html
[10] Android Developers: Android Sqlite Reference, Retrieved
from:http://developer.android.com/reference/android/database/sqlite/package-summary.html
[11] Android Developers: Android External Storage Reference, Retrieved
from:http://developer.android.com/guide/topics/data/data-storage.html
[12] Android Developers: Android Wi-Fi Reference, Retrieved
from:http://developer.android.com/reference/android/net/wifi/package-summary.html
5. 438
[13] Shawn ,Van Every .Pro Android Media. : Apress,2009;167-172
[14] Deitel .Java How To Program. 4Th Edition : Prentice Hall
[15] Zigurd Mednieks, Laird Dornin, G. Blake Meike, Masumi Nakamura. Programming Android. 2nd Edition: O'Reilly
Media, September 2012.