Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
The document proposes a bus monitoring system using an Android application that allows users to track buses in real-time on a map, view arrival and departure times at stops, and see the live location and route of buses. It discusses the existing problems with public transportation and how the proposed system would allow users to more efficiently plan their journeys and reduce time wasted waiting for buses. The system is intended to be implemented using GPS tracking on buses along with an Android app and website interfaces for users.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
The document discusses m-learning (mobile learning) in education. It proposes a mobile application that allows students to learn subjects through their mobile devices by downloading educational materials uploaded by faculty. Students can take online tests and view results. They can also engage in individual or group chats with other students and faculty. All user data and materials are stored in the cloud to allow remote access. The system aims to enable collaborative and peer-reviewed learning outside the classroom through mobile devices. It was found to improve students' theoretical understanding compared to traditional methods. Security of transmitted data is ensured through encryption methods.
Developing virtual environments of computer hardware using hierarchical embed...ijma
Various fields have been taking opportunities to fu
lly utilize the strengths of Virtual Reality (VR) i
n
developing robust and sophisticated applications. C
omputer hardware is one of the important topics
formally and informally learned by students in all
programs in universities and even in schools. Knowl
edge
of computers become mandatory to learn since the st
udents get involved in daily utilizing the computer
s for
finishing assignments, social networking, downloadi
ng notes, answering test or quiz online and other
learning and teaching activities involving the comp
uters. Since the computer hardware consists of many
devices, understanding and recognizing the devices
are essential especially for the students who forma
lly
register or take this course. Furthermore, this reg
istered course usually has its assessments such as
examination, quiz and assignment to be evaluated. D
ue to the lacks and problems in recognizing the
devices, they can lead to the misunderstanding and
mistakes in the usages of the computers. In this pa
per,
the development of virtual environments for the com
puter hardware using HEVO method has been
proposed and discussed in detail to allow teachers
creating and managing the 3D computer hardware and
to enable students viewing, interacting and navigat
ing in the VEs. Levels of students’ knowledge and s
kill
for this topic as well as the usability study of th
e created VEs are also analysed and evaluated.
1) The document describes a student portal mobile application that was developed to allow students and teachers at colleges under VTU (Visvesvaraya Technological University) to communicate, share information and resources, and participate in academic activities.
2) The application was built using Android Studio and utilizes Firebase for backend functions like authentication, database, storage, and messaging. It includes features like posting, messaging, sharing notes and events, taking quizzes, and finding other users.
3) Screenshots show interfaces for logging in, viewing feeds, events, messages, notes, finding friends, and giving feedback. The application aims to improve communication and knowledge sharing between colleges compared to existing options.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
An Advanced Library Management System Using Android DeviceIJLT EMAS
Android platform is gaining popularity and holds
more users than other platforms. Earlier Librarian needed to
keep track of books in a vast room. But evolution of the
computers, smart phones and internet have made the work much
easier. LIBKART application helps the users to access their
required information and queries without the help of computers
or the librarians but through their android devices which saves
their time and energy. In this paper we provide an efficient
access over library system using a Smartphone application
named as LIBKART. The main purpose of this paper is to
provide an easy access to library and to provide details of library
books, issue of books and notify the user due dates of book being
issued. The paper also aims at providing a reference section of
books where the books can be downloaded through permission
from admin. The user can access the newspapers on daily basis
and can also download university question papers.
IRJET- Bus Monitoring System using Android ApplicationIRJET Journal
The document proposes a bus monitoring system using an Android application that allows users to track buses in real-time on a map, view arrival and departure times at stops, and see the live location and route of buses. It discusses the existing problems with public transportation and how the proposed system would allow users to more efficiently plan their journeys and reduce time wasted waiting for buses. The system is intended to be implemented using GPS tracking on buses along with an Android app and website interfaces for users.
GROUP MEMBER :
MOHD.AIRIL SOLEHAN BIN JOHARI 043911
MUHAMMAD AIMAN BIN ABD GHANI 043959
MUHAMMAD NAUFAL BIN FARID 043953
MUHAMMAD NURAZRUL AMRI BIN NOOR AZLAN 044416
MUHAMMAD NUR ATHARI BI SHAFIEE 044439
The document discusses m-learning (mobile learning) in education. It proposes a mobile application that allows students to learn subjects through their mobile devices by downloading educational materials uploaded by faculty. Students can take online tests and view results. They can also engage in individual or group chats with other students and faculty. All user data and materials are stored in the cloud to allow remote access. The system aims to enable collaborative and peer-reviewed learning outside the classroom through mobile devices. It was found to improve students' theoretical understanding compared to traditional methods. Security of transmitted data is ensured through encryption methods.
Developing virtual environments of computer hardware using hierarchical embed...ijma
Various fields have been taking opportunities to fu
lly utilize the strengths of Virtual Reality (VR) i
n
developing robust and sophisticated applications. C
omputer hardware is one of the important topics
formally and informally learned by students in all
programs in universities and even in schools. Knowl
edge
of computers become mandatory to learn since the st
udents get involved in daily utilizing the computer
s for
finishing assignments, social networking, downloadi
ng notes, answering test or quiz online and other
learning and teaching activities involving the comp
uters. Since the computer hardware consists of many
devices, understanding and recognizing the devices
are essential especially for the students who forma
lly
register or take this course. Furthermore, this reg
istered course usually has its assessments such as
examination, quiz and assignment to be evaluated. D
ue to the lacks and problems in recognizing the
devices, they can lead to the misunderstanding and
mistakes in the usages of the computers. In this pa
per,
the development of virtual environments for the com
puter hardware using HEVO method has been
proposed and discussed in detail to allow teachers
creating and managing the 3D computer hardware and
to enable students viewing, interacting and navigat
ing in the VEs. Levels of students’ knowledge and s
kill
for this topic as well as the usability study of th
e created VEs are also analysed and evaluated.
1) The document describes a student portal mobile application that was developed to allow students and teachers at colleges under VTU (Visvesvaraya Technological University) to communicate, share information and resources, and participate in academic activities.
2) The application was built using Android Studio and utilizes Firebase for backend functions like authentication, database, storage, and messaging. It includes features like posting, messaging, sharing notes and events, taking quizzes, and finding other users.
3) Screenshots show interfaces for logging in, viewing feeds, events, messages, notes, finding friends, and giving feedback. The application aims to improve communication and knowledge sharing between colleges compared to existing options.
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...vivatechijri
In today's era where almost everything is digitized, even then at the end of the day we have to come across the paperwork when it comes to document submission and verification for any process. As a result, with increased advancement in the technology, easy availability and access of data and documents is the main concern. This project is intended to develop an application based system where student data and documents will be stored on a server and create a smart profile on the basis of student data. Student can also use that data and document anywhere anytime. The main aim is to provide a common application for all parts of education. Where each necessary details and document of a student will be available on one single portal also can be accessible by other higher authorities. Additionally, evaluating the profile and clustering of students can be done for better recommendation.
The Smart Portal system will be useful in document extraction during the admission process as well as it will be used for requirement of details and document of a candidate during interview. Students can upload their data and documents on the server after registration. Then their data will be analysed by the system by evaluating and clustering. This data is retrieved using QR code scanning system or Email verification/ OTP.
An Advanced Library Management System Using Android DeviceIJLT EMAS
Android platform is gaining popularity and holds
more users than other platforms. Earlier Librarian needed to
keep track of books in a vast room. But evolution of the
computers, smart phones and internet have made the work much
easier. LIBKART application helps the users to access their
required information and queries without the help of computers
or the librarians but through their android devices which saves
their time and energy. In this paper we provide an efficient
access over library system using a Smartphone application
named as LIBKART. The main purpose of this paper is to
provide an easy access to library and to provide details of library
books, issue of books and notify the user due dates of book being
issued. The paper also aims at providing a reference section of
books where the books can be downloaded through permission
from admin. The user can access the newspapers on daily basis
and can also download university question papers.
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
The document describes the methodology used to develop a Campus News Information System Android application. It discusses using the Android SDK, Eclipse IDE, and phpMyAdmin to build the application. The application will use components like Shared Preferences, Notification Manager, and SQLite to store and retrieve data from the campus server. The goal is to create a system that allows students and faculty to access campus information from their Android devices via a HTTP-based connection. This overcomes limitations of prior approaches that used Bluetooth technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document describes a smart library system project that uses smart cards for university campus libraries to automate processes like book issuing and returning.
2. It provides details of the software requirements and testing done for the library management system module created during an internship. This includes unit testing of modules like admin and student login.
3. The system aims to reduce queues, overhead time and make the library management more efficient using smart card technology while saving costs. It will benefit both students and library staff.
This document provides an overview of the Data Tag project, which aims to intelligently tag textual data and web pages based on their semantic context rather than just keywords. It begins with an introduction describing the purpose, system overview, and problem statement. It then discusses requirements such as user characteristics, functional requirements, dependencies, and constraints. The design section covers the functional design using data flow diagrams, database design using Redis, and GUI design. It also describes the coding, testing, installation, user instructions, future work, and provides a summary.
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
Ray's Scheme is a proposed hybrid graphical password authentication system for smart handheld devices. The system combines recognition and recall-based techniques and has two phases: registration and authentication. During registration, the user selects a username, textual password, and graphical password by choosing objects and corresponding digits. During authentication, the user enters their username, password, and recalls the graphical password by selecting the objects and entering the digits. The system aims to provide more security while being user-friendly for smart devices.
Object Recognition in Mobile Phone Application for Visually Impaired UsersIOSR Journals
The document describes a mobile phone application developed to help visually impaired users with object recognition, color detection, and locating light sources. The application uses image recognition algorithms like SIFT to match scanned objects to a database and identify objects. It can also detect major colors in scenes and locate the brightest areas to indicate light sources. The system architecture includes modules for these tasks that analyze photos and communicate results to the user via recorded verbal messages to aid with daily living activities. It aims to provide portable assistance without requiring special tags on objects like existing low-tech labeling systems.
This is a BSc final Project book on Student portal system application which is mobile based on android application. it will help students to write the project book in a proper way.
This document describes a college enquiry chatbot that was developed to provide students with a way to get information about their college without having to visit in person. The chatbot uses algorithms to analyze user queries and respond to common questions about things like fees, admission processes, exams, and other college activities. It was created to reduce the time and effort spent by students and parents in obtaining information from the college. The chatbot system includes a database to store question and answer pairs, and an admin interface to update responses for questions not currently in the database.
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
The document describes an indoor guidance system called Engfi Gate that uses augmented reality and markers. It consists of three subsystems: 1) a marker-based cyber-physical interaction system that connects the physical and digital environments using visible and invisible markers, 2) an indoor positioning system that tracks a user's location using visible markers or beacons, and 3) an augmented reality system that provides guidance information to users through their mobile device or head-mounted display. The system was implemented and tested on a university campus as a way to help new students navigate buildings.
The project is to ask college related queries and get the responses through a chatbot an Artificial Conversational Entity. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chatting. Students can chat using any format there is no specific format the user has to follow. This system helps the student to be updated about the college activities.
IRJET- College Enquiry Chat-Bot using API.AIIRJET Journal
This document describes a college enquiry chatbot developed using API.ai (now known as Dialogflow). The chatbot is an Android application that allows students to get answers to their college-related queries without having to visit the college in person. It analyzes user queries using natural language processing and responds in text and audio format by integrating text-to-speech. The chatbot was built using Dialogflow to match user inputs with predefined intents and return appropriate responses from a database of FAQs. It aims to provide students with a convenient way to stay updated on college activities and information.
Development of vocabulary learning application by using machine learning tech...journalBEEI
Nowadays an educational mobile application has been widely accepted and opened new windows of opportunity to explore. With its flexibility and practicality, the mobile application can promote learning through playing with an interactive environment especially to the children. This paper describes the development of mobile learning to help children above 4 years old in learning English and Arabic language in a playful and fun way. The application is developed with a combination of Android Studio and the machine learning technique, TensorFlow object detection API in order to predict the output result. Developed application namely “LearnWithIman” has successfully been implemented and the results show the prediction of application is accurate based on the captured image with the list item. The inclusion of the user database for lesson tracking and new lesson will be added for improvement in the future.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
This document provides a literature survey of email filtering. It discusses different areas of email filtering application including spam filtering, generalized filtering and segregation of emails, and inbound and outbound email filtering. It also outlines some issues faced in email filtering such as spammers avoiding terms treated as spam, the double opt-in problem used by spammers, and the encrypted email problem.
5.[25 33]survey on 2-step security for authentication in m-bankingAlexander Decker
This document summarizes a paper on using a two-step authentication process for mobile banking transactions. The first step uses steganography to hide user ID and password in an image that is sent to the server. The second step uses face recognition, where the user's image is captured and sent to the server database for verification. The full paper provides details on how steganography and face recognition would work as part of the two-step authentication process, discusses security risks of online banking, and outlines the authentication process flow.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
SmartPoly is secure and easy to use communication platform that empowers teacher and students. Android college management system is an android application which is helpful for students as well as the colleges. In the existing system all the activities are done manually. It is very costly and time consuming .In our proposed system students can view results using Android phones. The data will view stored in the college server. The faculty can login into their college account through the app itself and update the academic result, in this system, student have easy access for viewing the marks by Prof. Chougule V. V, Mr. Birajdar Dattatraya P, Miss. Deshmukh Akanksha B and Mr. Choudhari Jalilahamad M 2018. Smartpoly Android Application. International Journal on Integrated Education. 1, 1 (Dec. 2018), 67-70 https://journals.researchparks.org/index.php/IJIE/article/view/786/755 https://journals.researchparks.org/index.php/IJIE/article/view/786
Augmented reality application for chemical bonding based on androidIJECEIAES
Augmented Reality can provide information that can be more easily understood by the user. Because of its advantages, Augmented Reality can be utilized to create learning applications that can support teaching and learning process. Chemical learning about chemical reactions is usually boring by students. This is because students only know the theory of the book and the explanation of teachers only. This research utilized Augmented Reality to be able to see 3D model of each chemical element and also can see animation of merging between elements. In order to bring up 3D objects of chemical elements then made a card that will be used as a marker / tracker. In addition, there can be a combination of several chemical elements based on several cards detected from the camera. The test is performed for chemical elements with periodic table such as H, Ca, Na, K, C, Cl, Br, O, S, SO2, CO2, OH. Testing the application by performing several merge elements such as HCl, NaCl, H20, CO2, MgS, SO2, O2, CaCl2, HCN, N2, and others. The results of this study will be tested on several students to see the benefits of student learning.
Online Examination System for English Grammarijtsrd
This paper presents the Online Examination System OES for testing English Grammar. The OES is an online test system that allows user to take online tests. The OES is to be used for only English Grammar Multiple Choice Question online test by schools, colleges, other universities. The system is designed currently for three English Grammar levels. They are basic level and advance level. The administrator is to add new question into the system with three options and one right answer. User can login with by using registered user email and password to take exam and view result. On choosing a level test, user can answer all the questions and tick the answers within the time limit. After the online English Grammar examination finished, the system goes to the result page and show user's scores to the student. Thandar Htwe | Myintzu Phyo Aung "Online Examination System for English Grammar" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27879.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/27879/online-examination-system-for-english-grammar/thandar-htwe
Nowadays, Android is the newest mobile device Operating System OS , which is the more popular in mobile device field than any other mobile OS such as i Phone OS, Windows mobile OS and so on. This has been designed to the best first step toward the exciting new open source mobile development. The format of this paper is such that it will take through Android application development. Android applications are developed in Java, especially android studio software and run on the Windows OS. In this paper, the user will be understand about the creation of college information system software such as the java programming coding, Android SDK management and android studio after learning of this application programming coding. This software will be absolutely useful for students and teachers in educational fields because it is included the college information that show in detail. Win Win Maw | Cho Cho Myint | San San Lwin ""College Information System using Android"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22774.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/22774/college-information-system-using-android/win-win-maw
Secured E-Learning Content on Handheld DeviceIOSR Journals
This document discusses securing e-learning content delivered to handheld devices. It proposes a system that provides authentication through system authentication, password protection, and data encryption using AES 128-bit encryption. The content can be viewed by connecting the handheld device to a television. The system aims to prevent piracy by controlling access through a web view and managing system controls. It discusses the need for security features like authentication, authorization, and encryption to protect valuable e-learning content from unauthorized access and piracy. The methodology uses tools like client-side scripting, payment gateways, authentication agents, and play modules to control access and verify users before allowing access to encrypted content.
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
Several large-scale parole leakages exposed users to associate unprecedented risk of speech act and abuse of their data. associate inadequacy of password-based authentication mechanisms is turning into a serious concern for the complete data society. carries with it 3 major modules: (1) Mouse–Behavior dynamics Capture, (2) Feature Construction, and (3) coaching or Classification. the primary module serves to make a taking mouse behavior user signs. The second module is employed to extract holistic and procedural options to characterize mouse behavior and to map the raw options into distance-based options by exploitation numerous distance metrics. The third module, within the coaching section, applies neural network on the distance-based feature vectors to reckon the predominant feature elements, then builds the user’s profile employing a one-class classifier. within the classification section, it determines the user’s identity exploitation the trained classifier within the distance-based feature exploitation NN. A four Digit OTP is generated to the user’s email ID. The user are going to be giving the ‘2’ digit OTP and therefore the server are going to be giving balance ‘2’ digit OTP. Users ‘2’ digit OTP is verified by the server and contrariwise.
The document describes the methodology used to develop a Campus News Information System Android application. It discusses using the Android SDK, Eclipse IDE, and phpMyAdmin to build the application. The application will use components like Shared Preferences, Notification Manager, and SQLite to store and retrieve data from the campus server. The goal is to create a system that allows students and faculty to access campus information from their Android devices via a HTTP-based connection. This overcomes limitations of prior approaches that used Bluetooth technology.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
1. The document describes a smart library system project that uses smart cards for university campus libraries to automate processes like book issuing and returning.
2. It provides details of the software requirements and testing done for the library management system module created during an internship. This includes unit testing of modules like admin and student login.
3. The system aims to reduce queues, overhead time and make the library management more efficient using smart card technology while saving costs. It will benefit both students and library staff.
This document provides an overview of the Data Tag project, which aims to intelligently tag textual data and web pages based on their semantic context rather than just keywords. It begins with an introduction describing the purpose, system overview, and problem statement. It then discusses requirements such as user characteristics, functional requirements, dependencies, and constraints. The design section covers the functional design using data flow diagrams, database design using Redis, and GUI design. It also describes the coding, testing, installation, user instructions, future work, and provides a summary.
11.graphical password based hybrid authentication system for smart hand held ...Alexander Decker
Ray's Scheme is a proposed hybrid graphical password authentication system for smart handheld devices. The system combines recognition and recall-based techniques and has two phases: registration and authentication. During registration, the user selects a username, textual password, and graphical password by choosing objects and corresponding digits. During authentication, the user enters their username, password, and recalls the graphical password by selecting the objects and entering the digits. The system aims to provide more security while being user-friendly for smart devices.
Object Recognition in Mobile Phone Application for Visually Impaired UsersIOSR Journals
The document describes a mobile phone application developed to help visually impaired users with object recognition, color detection, and locating light sources. The application uses image recognition algorithms like SIFT to match scanned objects to a database and identify objects. It can also detect major colors in scenes and locate the brightest areas to indicate light sources. The system architecture includes modules for these tasks that analyze photos and communicate results to the user via recorded verbal messages to aid with daily living activities. It aims to provide portable assistance without requiring special tags on objects like existing low-tech labeling systems.
This is a BSc final Project book on Student portal system application which is mobile based on android application. it will help students to write the project book in a proper way.
This document describes a college enquiry chatbot that was developed to provide students with a way to get information about their college without having to visit in person. The chatbot uses algorithms to analyze user queries and respond to common questions about things like fees, admission processes, exams, and other college activities. It was created to reduce the time and effort spent by students and parents in obtaining information from the college. The chatbot system includes a database to store question and answer pairs, and an admin interface to update responses for questions not currently in the database.
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
The document describes an indoor guidance system called Engfi Gate that uses augmented reality and markers. It consists of three subsystems: 1) a marker-based cyber-physical interaction system that connects the physical and digital environments using visible and invisible markers, 2) an indoor positioning system that tracks a user's location using visible markers or beacons, and 3) an augmented reality system that provides guidance information to users through their mobile device or head-mounted display. The system was implemented and tested on a university campus as a way to help new students navigate buildings.
The project is to ask college related queries and get the responses through a chatbot an Artificial Conversational Entity. This System is a web application which provides answer to the query of the student. Students just have to query through the bot which is used for chatting. Students can chat using any format there is no specific format the user has to follow. This system helps the student to be updated about the college activities.
IRJET- College Enquiry Chat-Bot using API.AIIRJET Journal
This document describes a college enquiry chatbot developed using API.ai (now known as Dialogflow). The chatbot is an Android application that allows students to get answers to their college-related queries without having to visit the college in person. It analyzes user queries using natural language processing and responds in text and audio format by integrating text-to-speech. The chatbot was built using Dialogflow to match user inputs with predefined intents and return appropriate responses from a database of FAQs. It aims to provide students with a convenient way to stay updated on college activities and information.
Development of vocabulary learning application by using machine learning tech...journalBEEI
Nowadays an educational mobile application has been widely accepted and opened new windows of opportunity to explore. With its flexibility and practicality, the mobile application can promote learning through playing with an interactive environment especially to the children. This paper describes the development of mobile learning to help children above 4 years old in learning English and Arabic language in a playful and fun way. The application is developed with a combination of Android Studio and the machine learning technique, TensorFlow object detection API in order to predict the output result. Developed application namely “LearnWithIman” has successfully been implemented and the results show the prediction of application is accurate based on the captured image with the list item. The inclusion of the user database for lesson tracking and new lesson will be added for improvement in the future.
American Journal of Multidisciplinary Research and Development is indexed, refereed and peer-reviewed journal, which is designed to publish research articles.
This document provides a literature survey of email filtering. It discusses different areas of email filtering application including spam filtering, generalized filtering and segregation of emails, and inbound and outbound email filtering. It also outlines some issues faced in email filtering such as spammers avoiding terms treated as spam, the double opt-in problem used by spammers, and the encrypted email problem.
5.[25 33]survey on 2-step security for authentication in m-bankingAlexander Decker
This document summarizes a paper on using a two-step authentication process for mobile banking transactions. The first step uses steganography to hide user ID and password in an image that is sent to the server. The second step uses face recognition, where the user's image is captured and sent to the server database for verification. The full paper provides details on how steganography and face recognition would work as part of the two-step authentication process, discusses security risks of online banking, and outlines the authentication process flow.
Securing mobile cloud using finger print authenticationIJNSA Journal
The document summarizes a research paper that proposes using fingerprint recognition for user authentication in mobile cloud computing. It introduces mobile cloud computing and the need to improve security by strengthening authentication methods. The proposed approach uses a mobile phone's camera to capture fingerprint images for authentication instead of additional hardware. The algorithm extracts features from captured images and matches them to stored templates. Experimental results on different mobile devices found processing times below standards. The solution was concluded to enhance mobile cloud security through accessible and cross-platform fingerprint authentication.
SmartPoly is secure and easy to use communication platform that empowers teacher and students. Android college management system is an android application which is helpful for students as well as the colleges. In the existing system all the activities are done manually. It is very costly and time consuming .In our proposed system students can view results using Android phones. The data will view stored in the college server. The faculty can login into their college account through the app itself and update the academic result, in this system, student have easy access for viewing the marks by Prof. Chougule V. V, Mr. Birajdar Dattatraya P, Miss. Deshmukh Akanksha B and Mr. Choudhari Jalilahamad M 2018. Smartpoly Android Application. International Journal on Integrated Education. 1, 1 (Dec. 2018), 67-70 https://journals.researchparks.org/index.php/IJIE/article/view/786/755 https://journals.researchparks.org/index.php/IJIE/article/view/786
Augmented reality application for chemical bonding based on androidIJECEIAES
Augmented Reality can provide information that can be more easily understood by the user. Because of its advantages, Augmented Reality can be utilized to create learning applications that can support teaching and learning process. Chemical learning about chemical reactions is usually boring by students. This is because students only know the theory of the book and the explanation of teachers only. This research utilized Augmented Reality to be able to see 3D model of each chemical element and also can see animation of merging between elements. In order to bring up 3D objects of chemical elements then made a card that will be used as a marker / tracker. In addition, there can be a combination of several chemical elements based on several cards detected from the camera. The test is performed for chemical elements with periodic table such as H, Ca, Na, K, C, Cl, Br, O, S, SO2, CO2, OH. Testing the application by performing several merge elements such as HCl, NaCl, H20, CO2, MgS, SO2, O2, CaCl2, HCN, N2, and others. The results of this study will be tested on several students to see the benefits of student learning.
Online Examination System for English Grammarijtsrd
This paper presents the Online Examination System OES for testing English Grammar. The OES is an online test system that allows user to take online tests. The OES is to be used for only English Grammar Multiple Choice Question online test by schools, colleges, other universities. The system is designed currently for three English Grammar levels. They are basic level and advance level. The administrator is to add new question into the system with three options and one right answer. User can login with by using registered user email and password to take exam and view result. On choosing a level test, user can answer all the questions and tick the answers within the time limit. After the online English Grammar examination finished, the system goes to the result page and show user's scores to the student. Thandar Htwe | Myintzu Phyo Aung "Online Examination System for English Grammar" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27879.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/27879/online-examination-system-for-english-grammar/thandar-htwe
Nowadays, Android is the newest mobile device Operating System OS , which is the more popular in mobile device field than any other mobile OS such as i Phone OS, Windows mobile OS and so on. This has been designed to the best first step toward the exciting new open source mobile development. The format of this paper is such that it will take through Android application development. Android applications are developed in Java, especially android studio software and run on the Windows OS. In this paper, the user will be understand about the creation of college information system software such as the java programming coding, Android SDK management and android studio after learning of this application programming coding. This software will be absolutely useful for students and teachers in educational fields because it is included the college information that show in detail. Win Win Maw | Cho Cho Myint | San San Lwin ""College Information System using Android"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22774.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/22774/college-information-system-using-android/win-win-maw
Secured E-Learning Content on Handheld DeviceIOSR Journals
This document discusses securing e-learning content delivered to handheld devices. It proposes a system that provides authentication through system authentication, password protection, and data encryption using AES 128-bit encryption. The content can be viewed by connecting the handheld device to a television. The system aims to prevent piracy by controlling access through a web view and managing system controls. It discusses the need for security features like authentication, authorization, and encryption to protect valuable e-learning content from unauthorized access and piracy. The methodology uses tools like client-side scripting, payment gateways, authentication agents, and play modules to control access and verify users before allowing access to encrypted content.
This document summarizes a student project to develop an attendance management system using face recognition. The system uses machine learning and image processing techniques to recognize students' faces and automatically mark attendance. A group of students contributed different modules to the project, including image training, login, attendance marking, and a website to display results. The system was created using Python, OpenCV, Tkinter for the GUI, and Firebase for the cloud database. It aims to provide a more efficient alternative to traditional paper-based attendance systems.
The document describes an attendance management system using face recognition. The system uses machine learning and image processing techniques to recognize students' faces and mark attendance automatically. It trains on images of students' faces and then detects and identifies faces in real-time to record attendance. The system is designed to reduce time spent on manual attendance processes. It stores attendance data in the cloud on Firebase and has a website interface to view records. The system aims to make attendance tracking more efficient through automated face recognition.
Attendance Management System using Face RecognitionNanditaDutta4
The project ppt presentation is made for the academic session for the completion of the work from Bharati Vidyapeeth Deemed University(IMED) MCA department
Final Year Projects Computer Science (Information security) -2015Syed Ubaid Ali Jafri
Final Year Project Ideas for Computer Science Students, These Projects helps students to enhance their Expertise in the area of Information Security + they would be able to understand the concept of Information Security
Design and Implementation of a Heterogeneous Distributed Database System for ...AhmedAliAlsamman
International Journal of Computing and Digital Systems ISSN (2210-142X) Int. J. Com. Dig. Sys. 15, No.1 (Mar-24) http://dx.doi.org/10.12785/ijcds/150175 Design and Implementation of a Heterogeneous Distributed Database System for Students Absence Automation Using Portable Devices Ahmed A. Alsamman1 1College of Computer Science and Mathematics, University of Mosul, Mosul, Iraq Received 5 Apr. 2023, Revised 26 Jan. 2024, Accepted 7 Feb. 2024, Published 1 Mar. 2024 Abstract: Students’ absence recording is a fundamental daily process that occurs within colleges, often relying on paper forms, which is inefficient when the college administration wants to gather absences from multiple remote departments (sites) and calculate the college’s students’ absence rates. In response to these challenges, a heterogeneous distributed database system was designed to declare and automate student absences in the colleges using smartphones or laptops and send absences in real-time from inside lecture halls or laboratories in departments to the college administration to generate absence reports. The system employed a client-server model to deliver services to the college and its various departments through the local area network (LAN) and the Internet. MSSQL database tables were designed and fragmented across college sites using horizontal fragmentation technology and then encrypted with the AES265 algorithm. The proposed system used private SQLite or MSSQL databases for the lecture’s Android or Windows devices. On the other hand, college administration staff used a secure website built with ASP.NET to access the MySQL database server, which contains the absence table populated from all sites. The system was protected against false absence declarations by utilizing the local server’s timing factor, allowing the lecturer only to declare absences on specific days and times. The experimental results showed high reliability and accuracy of the system and high satisfaction among the users about achieving the desired goals. The findings demonstrated a strong preference for the system among the lecturers over other systems that relied on student, biometric, and AI-based devices. At the same time, the college administration staff preferred automatic absence collection using the distributed design of the system over manual collection.
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...IJERA Editor
This document discusses security techniques for multimedia content systems stored in the cloud. It analyzes homomorphic encryption and secure hash techniques. The document provides an overview of homomorphic encryption, describing how it allows computation on encrypted data while preserving privacy. It also reviews related work applying homomorphic encryption and searchable encryption to securely store and process multimedia files in cloud systems. The goal is to push workloads in a fully homomorphic encrypted form to cloud storage while maintaining privacy and flexibility.
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
- The document proposes a new user authentication mechanism for mobile cloud computing using fingerprint recognition captured by a mobile phone camera.
- It describes designing and implementing a solution where fingerprint images are taken, preprocessed on the mobile device, and matched against stored templates in a cloud database to authenticate users for mobile cloud access.
- Experimental results on different mobile devices found average processing times between 0.4-0.8 seconds, meeting usability standards, demonstrating the feasibility of the proposed fingerprint-based authentication system for enhancing mobile cloud security.
Information security approach in open distributed multi agent virtual learnin...ijcsit
This paper presented the main information, security problems and threats in open multi-agent distributed
e-learning information systems and Proposed various approaches to solve information security attacks in
virtual learning environment using service oriented architecture which based on multi-agent information
systems architecture, the solution on the multi-agent learning information system implementation based on
the implementation of two types of systems the first system with the centralized mobile agent information
security management and the second system with decentralized mobile agents security management, and
proposed the migration behavior simulation for their active software components (software agents) .
Framework for online exam with graphical result and sms gatewayAkash Agrawal
The document proposes a framework for an online exam system with graphical results and SMS notifications. Key features include:
1) An online exam application that tests students on technical and aptitude topics and provides performance assessments to analyze strengths and weaknesses.
2) Immediate messaging of exam results to students through an SMS gateway integration.
3) Enhanced security through fingerprint and webcam authentication along with username/password login.
4) Randomized question delivery, time-limited questions, and automated grading to prevent cheating. Results are displayed graphically and can be texted to students.
5) The system aims to make online exams more accessible and secure while reducing the workload for teachers.
The prime objective of “Hostel out pass application” is to create a full-fledged Android application which could help
the students to fill an out pass form and get approval from the consent staff and coordinators at one click. The form will be
approved finally by the parent also thus making sure that the student’s activity is brought to parents notice. This helps in avoiding
the problems which occur when carried out manually. It improves the efficiency of the system. It is a customized user-friendly
application for hostel students which provides out pass information. This project offers the user to enter the data through simple and interactive manner.
Research Paper on Android Graphical Image Passwordijtsrd
This document summarizes a research paper on graphical passwords for Android devices. The paper proposes a new three-layer graphical password scheme that aims to improve security and usability. The scheme programs a new graphical password system for use in anonymous information exchange systems and user registration chat rooms. A user survey was conducted to analyze password entropy and security. The results showed the proposed scheme has high entropy and can protect against various attacks, demonstrating improved security over existing schemes.
This document proposes a system that combines mobile intelligent tutoring with cloud computing. It discusses the benefits of mobile learning and cloud computing individually. The proposed system is based on a multi-layer mobile cloud computing architecture. It is intended to increase battery life, memory capacity, and processing power for mobile educational systems while providing advantages like lower costs and greater access. The system would allow learning anywhere and anytime through an intelligent tutor hosted in the cloud.
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
Nowadays, with the rapid growth of cloud computing, many industries are going to move their computing
activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through
mobile platforms. This paper offers a model to accompany the benefits of “Mobile Intelligent Learning”
technology and “Cloud Computing”. The architecture of purposed system is based on multi-layer
architecture of Mobile Cloud Computing. Despite the existing challenges, the system has increased the life
of mobile device battery. It will raise working memory capacity and processing capacity of the educational
system in addition to the greater advantage of the educational system. The proposed system allows the
users to enjoy an intelligent learning every-time and every-where, reduces training costs and hardware
dependency, and increases consistency, efficiency, and data reliability.
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
This document proposes an employee tracking and monitoring system using Android smartphones. It allows managers to monitor employee call logs, messages, browsing history, location via GPS, and data usage on a centralized server. If an employee leaves a specified area, an alert message is sent to the manager. The system calculates employee behavior - good, bad, average or loyal - using a k-means clustering algorithm based on unauthorized calls and data usage. It uses AES encryption to securely transmit data between devices over a WiFi network. The system aims to give managers better oversight of how employees use company-provided phones.
This document proposes and evaluates a context-based access control (CBAC) mechanism for Android systems. The CBAC mechanism allows users to set configuration policies over applications' usage of device resources and services based on the user's context. The proposed system uses context sensing and machine learning to classify contexts and then dynamically grants or revokes application privileges. Experiments show the CBAC mechanism incurs negligible energy overhead compared to the stock Android system. The CBAC framework provides improved privacy and security over existing location-based policy systems.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
This document provides a comparative study of existing intrusion detection systems for smartphones. It discusses 5 different intrusion detection approaches: 1) a cloud-based anomaly detection system, 2) a signature-based host-based IDS, 3) a rule-based host-based IDS called AMOXID, 4) an anomaly-based behavioral detection framework called Andromaly, and 5) an anomaly-based cloud-based detection system. It provides an overview of each approach and compares them based on parameters like detection method, positioning, type of analysis, alerts, scalability, pros, and cons. The conclusion is that combining anomaly and signature-based detection could improve attack detection performance for smartphones.
The design of smart notification on android gadget for academic announcementTELKOMNIKA JOURNAL
In this article, we try to design the architecture of a smart notification system using an Android gadget for academic notification in college. Academic notification in colleges now utilizes bulletin boards and online media such as websites or social media. The problem faced is the high cost and resources required to deliver the academic notification. Another problem is whether the information delivered can be right to the students who need it. We proposed the architecture of a smart notification system that can reduce the cost, and the information delivered can be right on target to the students in need.
Similar to A privacy learning objects identity system for smartphones based on a virtual learning environment database (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
A privacy learning objects identity system for smartphones based on a virtual learning environment database
1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
A PRIVACY - LEARNING OBJECTS IDENTITY SYSTEM
FOR SMARTPHONES BASED ON A VIRTUAL
LEARNING ENVIRONMENT DATABASE
LeThanhHieu*#, JinHai*, DeQingZou *,WangDaiBin*
*Cluster Grid Computing Laboratory (CGCL)
Computer Science Department, HuaZhong University of Science and Technology
Address 1037 Luoyu Road, Wuhan, China
#Hue University's college of Education
Address: 32 Le Loi, Hue city, Viet Nam
ABSTRACT
Smartphones are widely used today, with many features such as GPS map navigation, capturing
photos with camera equipment such as digital camera, internet connection via wifi or 3G devices that
function as computers. These devices are being used for various purposes including online learning, where
learners can study from anywhere and anytime for example in the street, home, office and school. However,
identifing a method by which teachers in these virtural environements can remember their learners “faces”
in the classroom or manage "Identification Number Student" (ID student or user) is not reliable when the
teacher cannot see all of the learners in the class or know who is online from a particular account. In this
paper, we propose a system, Android Virtual Learner Identify (AVLI), which collects images captured by
the face of the learning object directly from the camera, the location of the learner by identifing where the
learner is studying and configuration of information including Time, Mac, IP addresses, IMEI number and
location via GPS. The systen then saves learner profiles to help the teacher or education managers on the
Virtual Learning Environment (VLE) identify learning object. We used the VLE that we built on
mobile.ona.vn domain. We implemented the AVLI prototype Android phone with solution password
encryption and images taken directly from the camera to ensure that the information is transmitted and
stored securely in the Virtual Learning Environment System Database (VLE Data) of learning objects while
preserving the ability to identify learning objects by a teacher or education manager.
In addition, we solve the problem of image size on a smartphone device by compressing images.
We demonstrate our solution which is secure enough to prevent fraud of the learner as well as the
transmission of data from the client device to the server with three layers of protection by taking images
directly from the camera, converting images from string and encoding them before transmission.
KEYWORDS
Privaxy, security Mlearning, learning management system, Virtual Learning Environment System
1. INTRODUCTION
With the development of technology, smartphones have become increasingly popular. They offer
"all in one," which goes beyond the features of traditional telephony. Its features include phone,
calendar, games, and address management, where users can browse the web using internet
connectivity through General Packet Radio Service (GPRS), Data network cards or connect
phone service form (sim card) allows users to read email, view photos, and use video
DOI : 10.5121/ijcsit.2013.5508
117
2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
applications, such as satellite navigation, photography. According to Gartner: Worldwide mobile
phone sales to end users totalled nearly 426 million units in the first quarter of 2013. In the
Smartphone operating system (OS) market, Android continued to increase its lead, with nearly 50
percent more Android Smart phones in the market than a year ago. Mr. Anshul said “There are
two clear leaders in the OS market and Android’s dominance in the OS market is unshakable” [1].
Thus, smartphones have become an important role in our lives, including online learning
activities.
In the process of online learning activities, identification of the learner objects, if only managed
by teachers with students in the classroom as it is in the traditional education environment or
managed via an student identification number, is not reliable when the teacher cannot remember
all of their learners in the class or know who is online with a particular account, even though it
may have a password, learners can send photos or coursework and there it is difficult for the
teacher to know whether or not the content has been edited before. The solution requires to
identify who the learner is with the combination multiple forms of information. Here, we focus on
the relevant data on learners, such as personal information devices, network address, and learner
location and image. Our primary purpose collected factors and them data safety rather than
focusing on one element for determing participant’s learning.
In our system the client application is installed from Smartphone devices using the Android
operating system that supports GPS, and built-in Camera, which allows one to capture learning
objects. In particular, we use many solutions such as image capture, which is stored in memory
variables instead of from files and data are transmitted from the client to the Virtual Learning
Environment data (VLE data), which is encrypted.
The contribution of this paper is that it outlines a secure solution, as well as variable
management and image size. In addition, it detailes the combination of information related to
making learning object assessment more accurate. With data storage systems that we built on the
system from the Virtual Learning Environment (VLE) by Moodle software and PHP server on
website "http://mobile.ona.vn," teachers and learners are allowed to review their information,
communicate with each other on the web server and restrictions and directions for development
are gathered.
We chose the Android platform (version 2.3) of the Google and Virtual Learning Environment
(MLE) on the PHP server, as it requires one to build 1 server API (Application Programming
Interface) which allows communication between the Android operating system and the PHP web
server. Our evaluations show that the use of GPS to locate the object is more efficient than the use
of IP. Additionally, our solution ensures safety from the client application when image learning
objects are taken directly from the camera instead of the image file and the image data coding
(encoding Base64) and confirmation of the password encryption (one-way MD5 encryption with
salt) is transmitted to the server API for decoding and comparing with the stored data storage is
secure.
The rest of the paper is organized as follows:
In section 2, we introduce our client system platform built on Android mobile devices. In the third
section, we present the Virtual Learning Environment system built on the PHP web server
including a database structure that we use to store data from the Android client- a server API
enables communication between two systems. In the fourth section, we present a security analysis
to use multiple methods of identifing objects from the client and the server. In the fifth section,
we present some implementations from our system on telephone equipment and some evaluation
118
3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
regarding image size and time when its data is transmitted to our system. Finally, we present
conclusions and future work.
2. A NDROID CLIENT
Our client system is built on a Android mobile platform device. Figure 1 shows the
workflow of AVLI when it is executed on a mobile device.
Object
Course
Module
Object
Picture
Module
Key
Mannagement
Module
Other
Application
Get
Imfomation
Module
Kernel services and Hardware interfaces
Figure 1. AVLI Client runs on Smartphone
The AVLI system includes three modules: the first module certification object participated
(based on user and password), and the second module to acquire images directly from the camera.
Both modules are encrypted, including the first module which is encrypted using the MD5
encryption method (one-way encryption) combined with the salt [4], the second module is
encrypted with the Base64 method. The third module gathers other information to clarify the
object, as follows:
2.1. Login Object Course Module:(Figure 2)
Course Database is stored in table "user" and includes "user" and "password" information. This
module is implemented by the client to input "user" and "password." After that, the password will
be encrypted (MD5 encrypted + salt) before it is sent from the client to the server API to compare
with values stored in the table "user" on the VLE system.
Figure 2. Object Course Checking
We use the MD5 hash function of the Java language to establish a one-way encryption to
provide the security of password and combine "salt" to increase difficulty of cracking. This
solution is synchronized from the client and server.
119
4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
2.2. Object Image module:
The teacher or education manager of the Virtual Learning Environment System Database (VLE
Data) create the properties that the AVLI system would like to store, such as: picture, GPS
(Latitude, Longitude), network (IP and MAC), Config of mobile: IMEI. Its structure is described
in Figure 3:
Figure 3. Object Picture module
2.3. Image Encryption Method:
Base64 is a group of similar binary-to-text encoding schemes that represent binary
data in an ASCII string format by translating it into a radix-64 representation. Base64 is
commonly used in a number of applications including email via MIME, and storing
complex data in XML [2].
We use the Base64 method to encode and decode. Base64 class is held as follows (see
Figure 4):
Figure 4. Upload picture from Android to Server PHP
2.4. Get Information module:
This module will take the MAC address, IP address of the device access and configuration
devices "IMEI" (International Mobile Station Equipment Identity). The IMEI number is used by
a GSM network to identify valid devices and therefore can be used for stopping a stolen phone
from accessing that network, it alos includes information on the origin, model, and serial number
of the device [3].
120
5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
3. V IRTUAL LEARNING ENVIRONMENT
Moodle is a Course Management System (CMS), also known as a Learning Management
System (LMS) or a Virtual Learning Environment (VLE) [5]. It is a free web application that
educators can use to create effective online learning sites. We have built a Host and Domain
"mobile.ona.vn." It allows us to create online learning environments with configurations as
follows: model 1.9 (software), PHP 4.3.0 (language), and MySQL 4.1.16 (database). In which, we
build a course "Android Virtual Learning Identification" with a Virtual Learning Environment
System Database (VLE Data) and "Proof and identify learners Database" to store the value
obtained from AVLI system.
Figure 5. A course on mobile.ona.vn
3.1. AVLI system:
3.1.1. Structure (Figure 6):
Figure 6. Communication between Client and Virtual Learning Environment Database
3.1.2. The server API module is written in PHP language in our system on "mobile.ona.vn"
website. It allows for the receiving of encrypted string data to decrypt and to be stored in an
mysql database or directory. The algorithm is as follows:
a. Server API access mysql database:
POST (data); //gets the data from client
Mysql_select_db(database); //access database
Mysql_query(table); // query command
-Update (field); //saves data from client to database on server
-Select (field); //find data
-Get filed send to client
b. Server API saves an image from the camera
POST (data); //gets the data from client
Mysql_select_db(database); //access database
Mysql_query(table); // query command
-Select (field); //find a folder to save the image
-Save the file: fopen(), fwrite(), fclose();
121
6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
3.1.3. Virtual Learning Environment Database Structure (my SQL):review figure 7
Figure 7. Virtual Learning Environment Database Structure
4. SECURITY A NALYSIS
4.1. Take an image from the camera: take the photo from an image file or use image variables.
(see Table 1):
Table 1
Compare camera pictures taken from file or from memory variables
Issue
Customiz
e
Speed
Memory
File
space
File
Easy review or editing
Variables
No editing
Slow to Read and write files
Can store multiple images and
variable space is much smaller
than the size of the extend
memory
It can compress the image by
variables or compress software
Fast Memory Access
The number of images stored depends on
the limit of internal memory
It can compress images to a smaller size
The communication between the phone and the network system need latency time.
4.2. Confirm location of learning object by GPS: a comparison with the use IP. (see Table 2):
Table 2
Compare location of objects between GPS and IP
No.
Connectio
n devices
GPS
One: Smartphone
must have GPS
Speed
Depending on the
signal and weather
Google Maps API,
map Baidu API…
High
Support
Accuracy
IP
Many: network card or wifi or USB
3G or GPRS
(Via cellular networks)
MB number can download
information from mobile subscribers
Difficult to determine based on the IP
address when accessing the network
Low or undefined if the IP address is
changed using virtual IP, VPN,
122
7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
4.3. Security evaluation of encryption methods includes: encode MD5+salt and encode
Base64.
4.3.1. Encode password by "MD5+salt" method: this is a one-way encryption, it
allows for encryption but not decryption. Thus, when only the password is raised, the new
password is changed instead of bowing to find the password. In addition, "Salt" combined with
MD5 encryption makes the system more secure[4].
4.3.2. Encode by the Base64 bit method: Base64 encoding schemes are commonly used
when there is a need to encode binary data that needs to be stored and transferred over media that
are designed to deal with textual data. It is suitable for using encryption to image and text data
such as GPS, IP, and MAC in the AVLI system.
5. IMPLEMENTATION AND EVALUATION
As Android is the most popular mobile OS, we implement a prototype of AVLI on Lenovo
P70, supported by Android 2.3 Gingerbread, 512MB of RAM. The system hosting the
experiments was host domain: mobile.ona.vn and it was installed on Moodle software. It was
connected to the Internet with wifi. We programmed AVLI in java using Eclipse IDE with an
Android SDK, developed the software on an Android emulator and ran it on a real phone. Figure
8 shows the modules of the AVLI implementation.
Figure 8. Android Virtual Learner Identify System
We obtain location data from Lenovo P70 with values: longitude: 114.40672, latitude:
30.517261666666666 and called upon Google Maps to display the point of the learner in
maps (Figure 9). In the future, we will embed Google Maps API in the Android system to
track learners and their coordinates for more intuition [15,16,17].
Figure 9. Virtual Learning Environment Database Structure
Device configuration information such as: time, date and IP address that learners are able
to access via the school's network or not during school hours or outside school hours. In addition,
some software uses GPS and IMEI which not only allows one to identify the owner of the phone
device being accessed, or check some information about the device [6], but also allows one to
search the missing device [7].
123
8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
An image is saved as a folder with its structure as a number. That number is a stored
value
corresponding
with
table.ID
in
the
database.
Figure
10,
folder:
mobile.ona.vn/data/4/moddata/9/22/15 is the position of an image [10]: mdl_course.id=4 (No.
course), mdl_data.id=9 (name database), mdl_data_fields.id=22 (No. image field) and
mdl_data_records.id=15 (No. user). We use PHPMyAdmin to review database structure.[11]
Figure 10. Folder Structure to save the image
For effectiveness of the compressed image, data transmitted from the AVLI system before the
image is uploaded onto the Database’s Virtual Learning Environment (VLE Data), we use
System.currentTimeMillis(); [8] function to get the time and bitmap.compress
(Bitmap.CompressFormat.PNG,% compression, stream); [9] function to select the image
compression rate, the following results in table 3:
Table 3
Compare the image compression rate with time to upload them
% Compression
100
90
80
70
60
50
40
30
20
10
Time (milliseconds)
1143
1103
1089
1076
1057
1034
1021
1012
1007
965
From Table 3, we found that with the reduced compression rate, the image size will be smaller
and the transmission time will be faster. However, image quality is inversely proportional to the
reduced compression ratio and the quality of images captured is also determined by the camera.
We chose a compression rate of 90% for image upload and review; the system still recognized
the faces of the learner object.
The source code of AVLI system includes: 3983 lines java, 443 lines xml code, 100 lines PHP
code and the installation package size on an Android is 69 KB.
124
9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
6. RELATED WORK
The Smartphone is a unique device with the following devices rolled into one: phone, PC,
networked device, audio/video capable of recording and playback, GPS enabled, live TV, gaming
device, accelerometer. Inputs to mobile could be through many interfaces including: keypad,
touch screen, camera (photo & video), barcode scanners, microphone voice, motion sensor, and
network input to GPS [12].
These features are integrated more on the computer, allowing learners to easily access course
content, as well as permission to use these functions to define learning objects which
outperformed the computer. But the issues with them are higher development cost and no cross
platform support. Thus, the learning application is tied down to one platform[13].
During the implementation process of our system, we had to install the application MLE
(Mobile Learning Engine) and Mono (Mobile Moodle) in website mobile.ona.vn. This project
was not supported in later versions of the Android and Java version and was configuration
dependent. In addition, support the development of client applications, but do not take advantage
of the existing infrastructure of the course’s teaching Virtualization Environment.
The organisational process we teach in this system also faced difficulties in identifying and
selecting a teaching object mobile platform after deciding on the Android platform as they are
widely used to solve the issue of the costs of Smart phones.
The integrity and identification of online learning also been mentioned in [14], : Ninety-six
percent (96%) of the respondents indicate their college requires learners to authenticate their
identity—using a unique username and password—to access their online course and user.id in
distance education are not secure. They take place in circumstances that include firm learner
identification such as: time limits, and sending emails to confirm receipt.
7. C ONCLUSIONS
We have built a virtual learning environment system (domain mobile.ona.cn) including
applications for mobile devices (AVLI system). The system uses the database to help teachers and
education managers to identify learning objects by collecting information about the object
properties. Such information includes: user location, IP address, image and time; the inclusion of
such elements would increase accuracy of user authentication.
Our proposed approach to safety in the process of communication between the phone devices
and the server, especially between the Android system and the PHP server is to use the password
encryption solution, and encryption images.
We present the design, implementation and security analysis and evaluation of the AVLI
system. Finally, we present the problem in the future development and management of our
system.
REFERENCES
[1] Gartner, (07/2013) “Says Asia/Pacific Led Worldwide Mobile Phone Sales to Growth in First Quarter
of 2013”.
[2] Wikipedia, (2013) “Base64”, https://en.wikipedia.org/wiki/Base64.
125
10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 5, No 5, October 2013
[3] Wikipedia,
(2013)
“International
Mobile
Station
Equipment
Identity
(IMEI)”,
http://en.wikipedia.org/wiki/International_Mobile_Station_Equipment_Identity.
[4] Viral Patel, (06/08/2012) “Java MD5 Hashing & Salting: Secure Your Passwords”,
http://viralpatel.net/blogs/java-md5-hashing-salting-password/.
[5] Moodle, (2013) https://moodle.org/?lang=vi,.
[6] Website checks regarding information about the device: (07/2013) “IMEI” from
http://www.imei.info/, http://www.numberingplans.com/.
[7] ZhaoKao, JinHai, DeQingZou,WangDaiBin, , (2012) “A Privacy-Preserving Location Tracking
System for Smartphones Based on Cloud Storage”, Mobicom13, p.234.
[8] (07/2013)
“AndroidAPIs,java.lang.System »,
http://developer.android.com/reference
/java/lang/System.html#currentTimeMillis() , 07/2013.
[9] AndroidAPIs,
(07/2013)
“
android.graphics.Bitmap »,
http://developer.android.com/
reference/android/graphics/Bitmap.html#compress(android.graphics.Bitmap.CompressFormat,
int,
java.io. OutputStream), 2013.
[10] Sau Hi, (07/2013) “Learn how to use FTP by FileZilla”, www.youtube.com/watch?v=G9wCcq4bAgU
[11] ituplusdotcom, (07/2013) “Learn how to use PHPMyAdmin”, www.youtube.com/watch?v=J4PoclzoO8
[12] Amit
Garg,
(07/2013)
“How
To
Create
Successful
M-Learning
Strategy”,
http://www.upsidelearning.com/blog/index.php/2010/06/23/how-to-create-successful-m-learningstrategy-mlearncon-part-i/.
[13] Amar
Jadhav,
(03/2010)
“Tools
For
Mobile
Learning
Development”,
http://www.upsidelearning.com/blog/index.php/2010/03/21/tools-for-mobile-learning-development/.
[14] Mike Jortberg, (07/2013) “Mike.Jortberg@Acxiom.com, "Academic Integrity and Identity in Online
Learning", Midwest Blackboard User's Group (SLATE) Meeting at Lewis University.
[15] Wikipedia, (07/2013) “ Longitude”, http://en.wikipedia.org/wiki/Longitude, 07/2013.
[16] Wikipedia, (07/2013) “Latitude”, http://en.wikipedia.org/wiki/Latitude,.
[17] (07/2013)
“How
To
Convert
a
Decimal
to
Sexagesimal”,
http://geography.about.com/library/howto/htdegrees.htm.
Authors
Le Thanh Hieu was born in Hue city, VietNam, in 1976. He received the Diploma in
Informatics from Hue University's college of Education and became a lecturer in there
from 1998. He also holds a Master's of Computer science in School Information and
Communication Technology of the HaNoi University of Science and Technology.
Currently, Dr. Le Thanh Hieu is Ph.D student of Computer Science Department,
HuaZhong University of Science and Technology, Wuhan, China. His research
interests are in the fields of elearning and education management security and privacy.
126