Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
NLP-based personal learning assistant for school education IJECEIAES
Computer-based knowledge and computation systems are becoming major sources of leverage for multiple industry segments. Hence, educational systems and learning processes across the world are on the cusp of a major digital transformation. This paper seeks to explore the concept of an artificial intelligence and natural language processing (NLP) based intelligent tutoring system (ITS) in the context of computer education in primary and secondary schools. One of the components of an ITS is a learning assistant, which can enable students to seek assistance as and when they need, wherever they are. As part of this research, a pilot prototype chatbot was developed, to serve as a learning assistant for the subject Scratch (Scratch is a graphical utility used to teach school children the concepts of programming). By the use of an open source natural language understanding (NLU) or NLP library, and a slackbased UI, student queries were input to the chatbot, to get the sought explanation as the answer. Through a two-stage testing process, the chatbot’s NLP extraction and information retrieval performance were evaluated. The testing results showed that the ontology modelling for such a learning assistant was done relatively accurately, and shows its potential to be pursued as a cloud-based solution in future.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICESijmpict
Mobile Learning (M-Learning) is an emerging discipline in the area of education and educational technology. So researchers are trying to optimize and expanding its application in the field of education. The aim of this paper is to investigate the role of mobile devices and expert systems in disseminating and supporting the knowledge gained by intelligent tutors and to propose a system based on integration of intelligent M-Learning with expert systems. It acts as an intelligent tutor which can perform three processes - pre-test, learning concept and post-test - according to characteristic of the learner. The proposed system can improves the education efficiency highly as well as decreases costs. As a result, every time and everywhere (ETEW) simple and cheap learning would be provided via SMS, MMS and so on in this system. The global intention of M-Learning is to make learning “a way of being”.
The size of the Internet enlarging as per to grow the users of search providers continually demand search
results that are accurate to their wishes. Personalized Search is one of the options available to users in
order to sculpt search results based on their personal data returned to them provided to the search
provider. This brings up fears of privacy issues however, as users are typically anxious to revealing
personal info to an often faceless service provider along the Internet. This work proposes to administer
with the privacy issues surrounding personalized search and discusses ways that privacy can be improved
so that users can get easier with the dismissal of their personal information in order to obtain more precise
search results.
An Examination of the Prior Use of E-Learning Within an Extended Technology A...Maurice Dawson
The purpose of this empirical study was to test specific factors of behavioral intention to use m-learning in a community college setting using a modified technology acceptance model and antecedent factors suggested by the researcher’s review of the literature. In addition, the study’s purpose was to expand understanding of behavioral intention to use m-learning and to contribute to the growing body of research. This research model was based on relevant technology acceptance literature. The study examines the significance of “prior use of e-learning” and correlation with the behavioral intention to use m-learning. Existing models have looked at prior use of e-learning in other domains, but not specifically m-learning. Other models and studies have primarily looked at the prior use of e-learning variable as a moderating variable and not one that is directly related to attitude and behavioral intention. The study found that there is a relationship between prior use of e-learning and behavioral intention to use m-learning. This research direction was proposed by Lu and Viehland.
NLP-based personal learning assistant for school education IJECEIAES
Computer-based knowledge and computation systems are becoming major sources of leverage for multiple industry segments. Hence, educational systems and learning processes across the world are on the cusp of a major digital transformation. This paper seeks to explore the concept of an artificial intelligence and natural language processing (NLP) based intelligent tutoring system (ITS) in the context of computer education in primary and secondary schools. One of the components of an ITS is a learning assistant, which can enable students to seek assistance as and when they need, wherever they are. As part of this research, a pilot prototype chatbot was developed, to serve as a learning assistant for the subject Scratch (Scratch is a graphical utility used to teach school children the concepts of programming). By the use of an open source natural language understanding (NLU) or NLP library, and a slackbased UI, student queries were input to the chatbot, to get the sought explanation as the answer. Through a two-stage testing process, the chatbot’s NLP extraction and information retrieval performance were evaluated. The testing results showed that the ontology modelling for such a learning assistant was done relatively accurately, and shows its potential to be pursued as a cloud-based solution in future.
Validating Measurements of Perceived Ease Comprehension and Ease of Navigatio...drboon
Many universities are realizing that the implementation and use of online learning tool become a competitive advantage to address the actual learning needs. The purpose of this study is to determine the factors that influence users’ perceived ease of use of Webct an online learning tool. We administrated a questionnaire to undergraduate students from an university in Quebec, Canada. The results tend to corroborate that ease of comprehension and ease of navigation are the key factors which influence the perceived ease of use of WebCT. More specifically, the terms used in educational web applications must be as simple and relevant as possible. Jargon and technical terms in the wording of text used for links should be carefully avoided. This research is extending the finding of IT adoption studies by specifying what make an online tool easy to use.
A Multimedia Data Mining Framework for Monitoring E-Examination Environmentijma
Academic dishonesty has been a growing concern in e-learning environment due to the fact that eexamination takes place under supervised and unsupervised learning environment despite its huge advantages. The e-examination environment has faced various security breaches such as academic dishonesty (impersonation), identity theft, unauthorised access and illegal assistance as a result of inefficient measures employed. Hence, an efficient framework which will aid the monitoring of the eexamination is needed. This paper reviews the process of mining multimedia data and propose a framework for monitoring the e-examination environment in order to extract images and audio features. The framework has four major phases: data pre-processing, mining, association and post processing. The
pre-processing phases carries out the extraction and transformation of multimedia data features, the mining phase does the classification and clustering of these features, the association does pattern matching while the post processing carries out the knowledge interpretation and reporting. The approach presented in this study will allow for efficient and accurate monitoring of e-examination environment which will help provide adequate security and reduce unethical behaviour in e-examination environment.
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICESijmpict
Mobile Learning (M-Learning) is an emerging discipline in the area of education and educational technology. So researchers are trying to optimize and expanding its application in the field of education. The aim of this paper is to investigate the role of mobile devices and expert systems in disseminating and supporting the knowledge gained by intelligent tutors and to propose a system based on integration of intelligent M-Learning with expert systems. It acts as an intelligent tutor which can perform three processes - pre-test, learning concept and post-test - according to characteristic of the learner. The proposed system can improves the education efficiency highly as well as decreases costs. As a result, every time and everywhere (ETEW) simple and cheap learning would be provided via SMS, MMS and so on in this system. The global intention of M-Learning is to make learning “a way of being”.
The size of the Internet enlarging as per to grow the users of search providers continually demand search
results that are accurate to their wishes. Personalized Search is one of the options available to users in
order to sculpt search results based on their personal data returned to them provided to the search
provider. This brings up fears of privacy issues however, as users are typically anxious to revealing
personal info to an often faceless service provider along the Internet. This work proposes to administer
with the privacy issues surrounding personalized search and discusses ways that privacy can be improved
so that users can get easier with the dismissal of their personal information in order to obtain more precise
search results.
Random forest application on cognitive level classification of E-learning co...IJECEIAES
The e-learning is the primary method of learning for most learners after the regular academics studies. The knowledge delivery through E-learning technologies increased exponentially over the years because of the advancement in internet and e-learning technologies. Knowledge delivery to some people would never have been possible without the e-learning technologies. Most of the working professional do focused studies for carrier advancement, promotion or to improve the domain knowledge. These learner can find many free e-learning web sites from the internet easily in the domain of interest. However it is quite difficult to find the best e-learning content suitable for their learning based on their domain knowledge level. User spent most of the time figuring out the right content from a plethora of available content and end up learning nothing. An intelligent framework using machine learning algorithms with random forest Classifier is proposed to address this issue, which classifies the e-learning content based on its difficulty levels and provide the learner the best content suitable based on the knowledge level .The frame work is trained with the data set collected from multiple popular e-learning web sites. The model is tested with real time e-learning web sites links and found that the e-contents in the web sites are recommended to the user based on its difficulty levels as beginner level, intermediate level and advanced level.
Assessing students’ continuance intention in using multimedia online learningTELKOMNIKA JOURNAL
The study aims to assess the students’ continuance intention (SCI) in using multimedia online learning including students’ perceived usefulness (SPU), students’ ease of use (SPE), and students’ flow experience (SFE). There is no, so far, assessment of students’ activity in using multimedia online learning within the extended Technology Acceptance Model (TAM).There were 523 students as the samples. They learned and examined the content of online English learning resources as well as multimedia aspects.TAM was used to predict the SCI. The results indicate that the students’ intentions are influenced positively by perceived usefulness, ease of use, and the flow experience. The SPU influenced more students’ motivation than SPE. It is recommended that designers of online learning should be more specific in determining target users. The online learners’ skill on ICT, pedagogical principles, and technological barrier in different region are among the determinant aspects for receiving positive enduring intention.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Over the past year Community question answering (cQA) services have Achieved popularity. It allow
members to post and answer questions as enables general users to seek information from comprehensive set of
well-answered questions. But Still, existing cQA forums usually only provide textual answers, for many questions
which are not informative enough. In this paper, we propose a schema that is able to enrich textual answers in
CQA with Appropriate media data. For multimedia search, and multimedia data selection and presentation our
scheme consists of three components: answer medium selection, question base classification ,query generation,
MM data selection and presentation. This method automatically decides which type of media information should
be added for textual answer. It then automatically gathers data from the web. Our approach can enable a novel
multimedia question answering (MMQA) approach by processing large set of QA pairs and adding them to the
pool. users can find multimedia answers by matching their questions with those in a pool. Our approach is based
on community-contributed textual answers and thus it is able to deal with more complex questions.
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
Video activity recognition has grown to be a dynamic location of analysis in latest years. A widespread
information-driven approach is denoted in this paper that produces descriptions of video content into
textual content description inside the Hindi language. This method combines the final results of modern
item with "real-international" records to pick the in all subject-verb-object triplet for depicting a video. The
usage of this triplet desire technique, a video is tagged via the trainer, mainly, Subject, Verb, and object
(SVO) and then this data is mined to improve the result of checking out video clarification by using pastime
as well as item identity. Contrasting preceding approaches, this method can annotate arbitrary videos
deprived of wanting the large series and annotation of a similar schooling video corpus. The proposed
work affords initial and primary text description within the Hindi language that is producing easy words
and sentence formation. But the fundamental challenging attempt on this work is to extract grammatically
accurate and expressive text records in Hindi textual content regarding video content.
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Selection of Learning Materials Based on Students’ Behaviors in 3DMUVLETELKOMNIKA JOURNAL
Learning in 3-dimensional virtual environments has been widely used as a complement to traditional learning. Multi User Virtual Learning Environment in 3 Dimensions (3DMUVLE) provides many benefits and can support lifelong learning. In its implementation, this learning has not supported personal learning. This study aims to build a 3DMUVLE with personalized materials based on students' models. The system development model uses the Linear Sequence model by integrating MOODLE, SLOODLE and OPENSIM. Student's model in this research is Myer Briggs Type Indicator (MBTI) and determination of type uses fuzzy logic. The results of this study are 16 types of students and each type consists of 3 levels: low, medium and high. Each level has a specific learning material. The implication of this research is the level of MBTI type so that the learning material is more specific.
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
Wireless communication with Mobile Terminals has become popular tools for collecting and sending information and data. With mobile communication comes the Short Message Service (SMS) technology which is an ideal way to stay connected with anyone, anywhere anytime to help maintain business relationships with customers. Sending individual SMS messages to long list of mobile numbers can be very time consuming, and face problems of wireless communications such as variable and asymmetric bandwidth, geographical mobility and high usage costs and face the rigidity of lists. This paper proposes a technique that assures sending the message to semantically specified group of recipients. A recipient group is automatically identified based on personal information (interests, work place, publications, social relationships, etc.) and behavior based on a populated ontology created by integrating the publicly available FOAF (Friend-of-a-Friend) documents. We demonstrate that our simple technique can first, ensure extracting groups effectively according to the descriptive attributes and second send SMS effectively and can help combat unintentional spam and preserve the privacy of mobile numbers and even individual identities. The technique provides fast, effective, and dynamic solution to save time in constructing lists and sending group messages which can be applied both on personal level or in business.
Word2Vec model for sentiment analysis of product reviews in Indonesian languageIJECEIAES
Online product reviews have become a source of greatly valuable information for consumers in making purchase decisions and producers to improve their product and marketing strategies. However, it becomes more and more difficult for people to understand and evaluate what the general opinion about a particular product in manual way since the number of reviews available increases. Hence, the automatic way is preferred. One of the most popular techniques is using machine learning approach such as Support Vector Machine (SVM). In this study, we explore the use of Word2Vec model as features in the SVM based sentiment analysis of product reviews in Indonesian language. The experiment result show that SVM can performs well on the sentiment classification task using any model used. However, the Word2vec model has the lowest accuracy (only 0.70), compared to other baseline method including Bag of Words model using Binary TF, Raw TF, and TF.IDF. This is because only small dataset used to train the Word2Vec model. Word2Vec need large examples to learn the word representation and place similar words into closer position.
Content Based Message Filtering For OSNS Using Machine Learning ClassifierIJMER
Online social networking(OSNs) sites like Twitter, Orkut, YouTube, and Face book are among
the most popular sites on the Internet. Users of these web sites forms a social network, which provides a
powerful means of sharing, organizing, and finding useful information .Unlike web information , the
Online social networks (OSN) are organized around more number of users joins the network, shares their
information and create the links to communicate with other online users. The resulting social network
sites provides a basis for maintaining social relationships, for finding users with similar interests, and for
locating content and knowledge that has been contributed or endorsed by other users. In OSNs
information filtering can be used for avoiding the unwanted messages sharing or commenting on the user
Walls. In this paper, we have proposed a system to filter undesired messages from OSN walls. The system
exploits a machine learning soft classifier to enforce customizable content-dependent FRs. Moreover, the
flexibility of the proposed system in terms of filtering options is enhanced through the management of
BLs.
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...ijwmn
Coordinated multi-point transmission and reception (CoMP) is introduced in LTE-A to mitigate co-channel
interference and improve the cell-edge user experience. In this paper we propose a joint transmission
scheme for LTE-CoMP and we enhance the performance of CoMP with two techniques: 1- dynamic MIMO
cell selection and 2- closed loop MIMO with global precoding matrix selection. A cell-edge user selects the
base stations that jointly transmit the desired signal from the available ones (we assumed 3). The user also
selects the closed loop precoding matrices for MIMO in a joint fashion to fit the independent MIMO
channels from two base stations (eNBs). In addition, edge users are likely to be subject to severe Cochannel
interference from eNBs outside the joint transmission set.To address co-channel interference from
the base station(s) that are not included in CoMP joint transmission set, the user equipment employs
Minimum Mean Squared Error receiver with Interference Rejection Combining (MMSE-IRC). We illustrate
the effect of fading correlation between elements of the transmit and receive antennas. Also, the effect of
the desired to interference eNB power ratio in case of medium correlation for 3 and 4 layers using MMSEIRC
receiver is studied. Also we compare the BER performance for 3 and 4 layers in case of different values of the desired to interference eNB power ratio. Simulation results show that the performance of CoMP with cell selection considerably improves the performance. Also, global selection of the precoding matrices outperforms local selection. In addition, using MMSE-IRC gives much better performance than the conventional minimum mean square error (MMSE) in the presence of co-channel interference.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
Spatial multiplexing ofdmoqam systems with time reversal techniqueijwmn
Orthogonal Frequency Division Multiplexing with Offset Quadrature Amplitude Modulation (OFDM/OQAM) is a multicarrier modulation scheme that can be considered as an alternative to the conventional Orthogonal Frequency Division Multiplexing (OFDM) with Cyclic Prefix (CP) for transmission over multipath fading channels. In this paper, we investigate the combination of the OFDM/OQAM with Multiple Input Multiple Output (MIMO) system with Time Reversal (TR) technique.
TR can be viewed as a precoding scheme which can be combined with OFDM/OQAM and easily carried out in a MIMO context using spatial data multiplexing.
We present the simulation results of the performance of OFDM/OQAM system in SISO case compared with the conventional CP-OFDM system and the performance of the combination MIMO-OFDM/OQAM with TR compared to MIMO-CP-OFDM. The performance is derived by computing the Bit Error Rate (BER) as a function of the transmit signal-to-noise ratio (SNR).
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...ijwmn
n voice communication systems, noise cancellation
using adaptive digital filter is a renowned techniq
ue
for extracting desired speech signal through elimin
ating noise from the speech signal corrupted by noi
se.
In this paper, the performance of adaptive noise ca
nceller of Finite Impulse Response (FIR) type has b
een
analysed employing NLMS (Normalized Least Mean Squa
re) algorithm.
An extensive study has been made
to investigate the effects of different parameters,
such as number of filter coefficients, number of s
amples,
step size, and input noise level, on the performanc
e of the adaptive noise cancelling system. All the
results
have been obtained using computer simulations built
on MATLAB platform.
Random forest application on cognitive level classification of E-learning co...IJECEIAES
The e-learning is the primary method of learning for most learners after the regular academics studies. The knowledge delivery through E-learning technologies increased exponentially over the years because of the advancement in internet and e-learning technologies. Knowledge delivery to some people would never have been possible without the e-learning technologies. Most of the working professional do focused studies for carrier advancement, promotion or to improve the domain knowledge. These learner can find many free e-learning web sites from the internet easily in the domain of interest. However it is quite difficult to find the best e-learning content suitable for their learning based on their domain knowledge level. User spent most of the time figuring out the right content from a plethora of available content and end up learning nothing. An intelligent framework using machine learning algorithms with random forest Classifier is proposed to address this issue, which classifies the e-learning content based on its difficulty levels and provide the learner the best content suitable based on the knowledge level .The frame work is trained with the data set collected from multiple popular e-learning web sites. The model is tested with real time e-learning web sites links and found that the e-contents in the web sites are recommended to the user based on its difficulty levels as beginner level, intermediate level and advanced level.
Assessing students’ continuance intention in using multimedia online learningTELKOMNIKA JOURNAL
The study aims to assess the students’ continuance intention (SCI) in using multimedia online learning including students’ perceived usefulness (SPU), students’ ease of use (SPE), and students’ flow experience (SFE). There is no, so far, assessment of students’ activity in using multimedia online learning within the extended Technology Acceptance Model (TAM).There were 523 students as the samples. They learned and examined the content of online English learning resources as well as multimedia aspects.TAM was used to predict the SCI. The results indicate that the students’ intentions are influenced positively by perceived usefulness, ease of use, and the flow experience. The SPU influenced more students’ motivation than SPE. It is recommended that designers of online learning should be more specific in determining target users. The online learners’ skill on ICT, pedagogical principles, and technological barrier in different region are among the determinant aspects for receiving positive enduring intention.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Over the past year Community question answering (cQA) services have Achieved popularity. It allow
members to post and answer questions as enables general users to seek information from comprehensive set of
well-answered questions. But Still, existing cQA forums usually only provide textual answers, for many questions
which are not informative enough. In this paper, we propose a schema that is able to enrich textual answers in
CQA with Appropriate media data. For multimedia search, and multimedia data selection and presentation our
scheme consists of three components: answer medium selection, question base classification ,query generation,
MM data selection and presentation. This method automatically decides which type of media information should
be added for textual answer. It then automatically gathers data from the web. Our approach can enable a novel
multimedia question answering (MMQA) approach by processing large set of QA pairs and adding them to the
pool. users can find multimedia answers by matching their questions with those in a pool. Our approach is based
on community-contributed textual answers and thus it is able to deal with more complex questions.
VIDEO OBJECTS DESCRIPTION IN HINDI TEXT LANGUAGE ijmpict
Video activity recognition has grown to be a dynamic location of analysis in latest years. A widespread
information-driven approach is denoted in this paper that produces descriptions of video content into
textual content description inside the Hindi language. This method combines the final results of modern
item with "real-international" records to pick the in all subject-verb-object triplet for depicting a video. The
usage of this triplet desire technique, a video is tagged via the trainer, mainly, Subject, Verb, and object
(SVO) and then this data is mined to improve the result of checking out video clarification by using pastime
as well as item identity. Contrasting preceding approaches, this method can annotate arbitrary videos
deprived of wanting the large series and annotation of a similar schooling video corpus. The proposed
work affords initial and primary text description within the Hindi language that is producing easy words
and sentence formation. But the fundamental challenging attempt on this work is to extract grammatically
accurate and expressive text records in Hindi textual content regarding video content.
Sybian Technologies Pvt Ltd
Final Year Projects & Real Time live Projects
JAVA(All Domains)
DOTNET(All Domains)
ANDROID
EMBEDDED
VLSI
MATLAB
Project Support
Abstract, Diagrams, Review Details, Relevant Materials, Presentation,
Supporting Documents, Software E-Books,
Software Development Standards & Procedure
E-Book, Theory Classes, Lab Working Programs, Project Design & Implementation
24/7 lab session
Final Year Projects For BE,ME,B.Sc,M.Sc,B.Tech,BCA,MCA
PROJECT DOMAIN:
Cloud Computing
Networking
Network Security
PARALLEL AND DISTRIBUTED SYSTEM
Data Mining
Mobile Computing
Service Computing
Software Engineering
Image Processing
Bio Medical / Medical Imaging
Contact Details:
Sybian Technologies Pvt Ltd,
No,33/10 Meenakshi Sundaram Building,
Sivaji Street,
(Near T.nagar Bus Terminus)
T.Nagar,
Chennai-600 017
Ph:044 42070551
Mobile No:9790877889,9003254624,7708845605
Mail Id:sybianprojects@gmail.com,sunbeamvijay@yahoo.com
Selection of Learning Materials Based on Students’ Behaviors in 3DMUVLETELKOMNIKA JOURNAL
Learning in 3-dimensional virtual environments has been widely used as a complement to traditional learning. Multi User Virtual Learning Environment in 3 Dimensions (3DMUVLE) provides many benefits and can support lifelong learning. In its implementation, this learning has not supported personal learning. This study aims to build a 3DMUVLE with personalized materials based on students' models. The system development model uses the Linear Sequence model by integrating MOODLE, SLOODLE and OPENSIM. Student's model in this research is Myer Briggs Type Indicator (MBTI) and determination of type uses fuzzy logic. The results of this study are 16 types of students and each type consists of 3 levels: low, medium and high. Each level has a specific learning material. The implication of this research is the level of MBTI type so that the learning material is more specific.
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
Wireless communication with Mobile Terminals has become popular tools for collecting and sending information and data. With mobile communication comes the Short Message Service (SMS) technology which is an ideal way to stay connected with anyone, anywhere anytime to help maintain business relationships with customers. Sending individual SMS messages to long list of mobile numbers can be very time consuming, and face problems of wireless communications such as variable and asymmetric bandwidth, geographical mobility and high usage costs and face the rigidity of lists. This paper proposes a technique that assures sending the message to semantically specified group of recipients. A recipient group is automatically identified based on personal information (interests, work place, publications, social relationships, etc.) and behavior based on a populated ontology created by integrating the publicly available FOAF (Friend-of-a-Friend) documents. We demonstrate that our simple technique can first, ensure extracting groups effectively according to the descriptive attributes and second send SMS effectively and can help combat unintentional spam and preserve the privacy of mobile numbers and even individual identities. The technique provides fast, effective, and dynamic solution to save time in constructing lists and sending group messages which can be applied both on personal level or in business.
Word2Vec model for sentiment analysis of product reviews in Indonesian languageIJECEIAES
Online product reviews have become a source of greatly valuable information for consumers in making purchase decisions and producers to improve their product and marketing strategies. However, it becomes more and more difficult for people to understand and evaluate what the general opinion about a particular product in manual way since the number of reviews available increases. Hence, the automatic way is preferred. One of the most popular techniques is using machine learning approach such as Support Vector Machine (SVM). In this study, we explore the use of Word2Vec model as features in the SVM based sentiment analysis of product reviews in Indonesian language. The experiment result show that SVM can performs well on the sentiment classification task using any model used. However, the Word2vec model has the lowest accuracy (only 0.70), compared to other baseline method including Bag of Words model using Binary TF, Raw TF, and TF.IDF. This is because only small dataset used to train the Word2Vec model. Word2Vec need large examples to learn the word representation and place similar words into closer position.
Content Based Message Filtering For OSNS Using Machine Learning ClassifierIJMER
Online social networking(OSNs) sites like Twitter, Orkut, YouTube, and Face book are among
the most popular sites on the Internet. Users of these web sites forms a social network, which provides a
powerful means of sharing, organizing, and finding useful information .Unlike web information , the
Online social networks (OSN) are organized around more number of users joins the network, shares their
information and create the links to communicate with other online users. The resulting social network
sites provides a basis for maintaining social relationships, for finding users with similar interests, and for
locating content and knowledge that has been contributed or endorsed by other users. In OSNs
information filtering can be used for avoiding the unwanted messages sharing or commenting on the user
Walls. In this paper, we have proposed a system to filter undesired messages from OSN walls. The system
exploits a machine learning soft classifier to enforce customizable content-dependent FRs. Moreover, the
flexibility of the proposed system in terms of filtering options is enhanced through the management of
BLs.
COMP-JT WITH DYNAMIC CELL SELECTION, GLOBAL PRECODING MATRIX AND IRC RECEIVER...ijwmn
Coordinated multi-point transmission and reception (CoMP) is introduced in LTE-A to mitigate co-channel
interference and improve the cell-edge user experience. In this paper we propose a joint transmission
scheme for LTE-CoMP and we enhance the performance of CoMP with two techniques: 1- dynamic MIMO
cell selection and 2- closed loop MIMO with global precoding matrix selection. A cell-edge user selects the
base stations that jointly transmit the desired signal from the available ones (we assumed 3). The user also
selects the closed loop precoding matrices for MIMO in a joint fashion to fit the independent MIMO
channels from two base stations (eNBs). In addition, edge users are likely to be subject to severe Cochannel
interference from eNBs outside the joint transmission set.To address co-channel interference from
the base station(s) that are not included in CoMP joint transmission set, the user equipment employs
Minimum Mean Squared Error receiver with Interference Rejection Combining (MMSE-IRC). We illustrate
the effect of fading correlation between elements of the transmit and receive antennas. Also, the effect of
the desired to interference eNB power ratio in case of medium correlation for 3 and 4 layers using MMSEIRC
receiver is studied. Also we compare the BER performance for 3 and 4 layers in case of different values of the desired to interference eNB power ratio. Simulation results show that the performance of CoMP with cell selection considerably improves the performance. Also, global selection of the precoding matrices outperforms local selection. In addition, using MMSE-IRC gives much better performance than the conventional minimum mean square error (MMSE) in the presence of co-channel interference.
Elgamal signature for content distribution with network codingijwmn
Network coding is a slightly new forwarding technique which receives various applications in traditional
computer networks, wireless sensor networks and peer-to-peer systems. However, network coding is
inherently vulnerable to pollution attacks by malicious nodes in the network. If any fake node in the
network spreads polluted packets, the pollution of packets will spread quickly since the output of (even an)
honest node is corrupted if at least one of the incoming packets is corrupted. There have been adapted a
few ordinary signature schemes to network coding that allows nodes to check the validity of a packet
without decoding. In this paper, we propose a scheme uses ElGamal signature in network coding. Our
scheme makes use of the linearity property of the packets in a coded system, and allows nodes to check the
integrity of the packets received easily.
Spatial multiplexing ofdmoqam systems with time reversal techniqueijwmn
Orthogonal Frequency Division Multiplexing with Offset Quadrature Amplitude Modulation (OFDM/OQAM) is a multicarrier modulation scheme that can be considered as an alternative to the conventional Orthogonal Frequency Division Multiplexing (OFDM) with Cyclic Prefix (CP) for transmission over multipath fading channels. In this paper, we investigate the combination of the OFDM/OQAM with Multiple Input Multiple Output (MIMO) system with Time Reversal (TR) technique.
TR can be viewed as a precoding scheme which can be combined with OFDM/OQAM and easily carried out in a MIMO context using spatial data multiplexing.
We present the simulation results of the performance of OFDM/OQAM system in SISO case compared with the conventional CP-OFDM system and the performance of the combination MIMO-OFDM/OQAM with TR compared to MIMO-CP-OFDM. The performance is derived by computing the Bit Error Rate (BER) as a function of the transmit signal-to-noise ratio (SNR).
A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. When designing mobile ad hoc networks, several interesting and difficult problems arise because of the shared nature of the wireless medium, limited transmission power (range) of wireless devices, node mobility, and battery limitations. This paper aims at providing a new schema to improve Dynamic Source Routing (DSR) Protocol. The aim
behind the proposed enhancement is to find the best route in acceptable time limit without having broadcast storm. Moreover, O-DSR enables network not only to overcome congestion but also maximize the lifetime of mobile nodes. Some simulations results show that the Route Request (RREQ) and the Control Packet Overhead decrease by 15% when O-DSR is used, consequently. Also the global energy consumption in O-DSR is lower until to 60 % , which leads to a long lifetime of the network.
P ERFORMANCE A NALYSIS O F A DAPTIVE N OISE C ANCELLER E MPLOYING N LMS A LG...ijwmn
n voice communication systems, noise cancellation
using adaptive digital filter is a renowned techniq
ue
for extracting desired speech signal through elimin
ating noise from the speech signal corrupted by noi
se.
In this paper, the performance of adaptive noise ca
nceller of Finite Impulse Response (FIR) type has b
een
analysed employing NLMS (Normalized Least Mean Squa
re) algorithm.
An extensive study has been made
to investigate the effects of different parameters,
such as number of filter coefficients, number of s
amples,
step size, and input noise level, on the performanc
e of the adaptive noise cancelling system. All the
results
have been obtained using computer simulations built
on MATLAB platform.
WIRELESS MESH NETWORKS CAPACITY IMPROVEMENT USING CBF ijwmn
Wireless mesh network has recently received a great deal of attention as a promising technology to provideubiquitous high bandwidth access for a large number of users. Such network may face a significant broadcast traffic that may consequently degrade the network reliability.
In this paper, we have focused interest to wireless mesh network based IEEE 802.11s and we have designed
a self-pruning method to control and reduce the broadcast traffic forwarding. Our scheme, namely Control of Broadcast Forwarding (CBF), defines two behaviours to manage the broadcasting operation. Routing
packets are managed differently from data broadcast messages to avoid afflicting the routing process.
The simulations results show that CBF ameliorates the network capacity by reducing considerably the
number of redundant packets, improving the end to end delay and providing high reachability and packet
delivery ration.
Multiple optimal path identification using ant colony optimisation in wireles...ijwmn
Wireless Sensor Network WSN is tightly constrained for resources like energy, computational power and
memory. Many applications of WSN require to communicate sensitive information at sensor nodes SN to
Base station BS. The basic performance of WSN depends upon the path length and numbers of nodes in the
path by which data is forwarded to BS. In this paper we present bio-inspired Ant Colony Optimisation ACO
algorithm for Optimal Path Identification OPI for packet transmission to communicate between SN to BS.
Our modified algorithm OPI using ACO is base-station driven which considers the path length and the
number of hops in path for data packet transmission. This modified algorithm finds optimal path OP as
well as several suboptimal paths between SN & BS which are useful for effective communication.
Zigbee based wearable remote healthcare monitoring system for elderly patientsijwmn
Remote health care monitoring system (RHCMS) has drawn considerable attentions for the last decade. As
the aging population are increasing and at the same time the health care cost is skyrocketing there has
been a need to monitor a patient from a remote location. Moreover, many people of the World are out of
the reach of existing healthcare systems. To solve these problems many research and commercial versions
of RHCMS have been proposed and implemented till now. In these systems the performance was the main
issue in order to accurately measure, record, and analyze patients’ data. With the ascent of wireless
network RHCMS can be widely deployed to monitor the health condition of a patient inside and outside of
the hospitals. In this work we present a ZigBee based wireless healthcare monitoring system that can
provide real time online information about the health condition of a patient. The proposed system is able to
send alarming messages to the healthcare professional about the patient’s critical condition. In addition
the proposed system can send reports to a patient monitoring system, which can be used by the healthcare
professionals to make necessary medical advices from anywhere of the World at any time.
Mobile elements scheduling for periodic sensor applicationsijwmn
In this paper, we investigate the problem of designing the mobile elements tours such that the length of each tour is below a per-determined length and the depth of the multi-hop routing trees bounded by k. The path of the mobile element is designed to visit subset of the nodes (cache points). These cache points store other nodes data. To address this problem, we propose two heuristic-based solutions. Our solutions take into consideration the distribution of the nodes during the establishment of the tour. The results of our experiments indicate that our schemes significantly outperforms the best comparable scheme in the literature.
Advanced antenna techniques and high order sectorization with novel network t...ijwmn
Mobile operators commonly use macro cells with trad
itional wide beam antennas for wider coverage in th
e
cell, but future capacity demands cannot be achieve
d by using them only. It is required to achieve max
imum
practical capacity from macro cells by employing hi
gher order sectorization and by utilizing all possi
ble
antenna solutions including smart antennas. This pa
per presents enhanced tessellation for 6-sector sit
es
and proposes novel layout for 12-sector sites. The
main target of this paper is to compare the perform
ance
of conventional wide beam antenna, switched beam sm
art antenna, adaptive beam antenna and different
network layouts in terms of offering better receive
d signal quality and user throughput. Splitting mac
ro cell
into smaller micro or pico cells can improve the ca
pacity of network, but this paper highlights the
importance of higher order sectorization and advanc
e antenna techniques to attain high Signal to
Interference plus Noise Ratio (SINR), along with im
proved network capacity. Monte Carlo simulations a
t
system level were done for Dual Cell High Speed Dow
nlink Packet Access (DC-HSDPA) technology with
multiple (five) users per Transmission Time Interva
l (TTI) at different Intersite Distance (ISD). The
obtained results validate and estimate the gain of
using smart antennas and higher order sectorization
with
proposed network layout.
Analyse Performance of Fractional Fourier Transform on Timing and Carrier Fr...ijwmn
This paper deals with the performance of the use of fractional Fourier transform (FRFT) instead of
conventional Fourier transform (FFT) in either symbol timing offset (STO) and carrier frequency offset
(CFO) estimation. Orthogonal frequency division multiplexing is widely used in many systems due to
advantages of theses technique compared with mono-carrier systems. In spite of his advantages, OFDM
presents drawbacks such as sensitivity to timing and frequency offsets. Many techniques are used in the
literature to estimate these two parameters in order to compensate them (synchronization task). These
techniques used conventional Fourier transform. In this paper, we are interested in estimating STO and
CFO using fractional Fourier transform. Monte Carlo simulation demonstrates the performance of the use
of FRFT instead of FFT.
A new channel coding technique to approach the channel capacityijwmn
After Shannon’s 1948 channel coding theorem, we have witnessed many channel coding techniques developed to achieve the Shannon limit. A wide range of channel codes is available with different complexity levels and error correction performance. Many powerful coding schemes have been deployed in the power-limited Additive White Gaussian Noise (AWGN) channel. However, it seems like we have arrived at an end of advancement path, for most of the existing channel codes. This article introduces a new coding technique that can either be used as the last coding stage of concatenated coding scheme or in parallel configuration with other powerful channel codes to achieve reliable error performance with moderately complex decoding. We will go through an example to understand the overall approach of the proposed coding technique, and finally we will look at some simulation results over an AWGN channel to demonstrate its potential.
Opportunistic and playback sensitive scheduling for video streamingijwmn
Given the strict Quality of Service (QoS) requirements of video streaming, this paper proposes a novel
solution for simultaneous streaming of multiple video sessions over a mobile cellular system. The proposed
solution combines a buffer management strategy with a packet scheduling algorithm. The buffer
management strategy selectively discards packets of a user from base station buffer whereas the packet
scheduling algorithm schedules packets of a user according to its instantaneous channel quality, average
throughput and playback buffer information. Simulation results demonstrate that the proposed solution is
effective in providing a continuous video playback with good perceptual quality for more users. If at least a
good perceptual quality is to be satisfied for all users (QoS constraint of video streaming), then the
proposed solution improves the system capacity by 40% over a conventional packet scheduling algorithm.
The four basic Radio Resource Management (RRM) measurements in Long Term Evolution (LTE) system
are Channel Quality Indicator (CQI), Reference Signal Received Power (RSRP), Reference Signal
Received Quality (RSRQ), and Carrier Received Signal Strength Indicator (RSSI). A measurement of channel quality represented by Signal to Interference plus Noise Ratio (SINR) is used for link adaptation along with packet scheduling, whereas RSRP and RSRQ are needed for making handover decision during intra-eUTRAN (evolved Universal Terrestrial Random Access Network) handover in LTE. In this paper,
some practical measurement results recorded from a live LTE network of Australia using a commercial measurement tool namely NEMO Handy are analysed to verify the possible relationships among SINR, RSRP, RSSI and RSRQ as well as to evaluate the effects of SNR on throughput. In addition, the intraeUTRAN handover events occurred during the test period within the test area are studied. The analysis
yields some useful information such as: if the SINR is good for a measurement slot, higher throughput is
achieved; RSRP and SNR are proportional to each other on average; and lesser is the difference between
RSSI and RSRP, better is the RSRQ – each of which is consistent with theory. All the measurement results
are evaluated using computer programs built on MATLAB platform.
Long-Term Evolution (LTE), an emerging and promising fourth generation mobile technology, is expected
to offer ubiquitous broadband access to the mobile subscribers. In this paper, the performance of Frame
Level Scheduler (FLS), Exponential (EXP) rule, Logarithmic (LOG) rule and Maximum-Largest Weighted
Delay First (M-LWDF) packet scheduling algorithms has been studied in the downlink 3GPP LTE cellular
network. To this aim, a single cell with interference scenario has been considered. The performance
evaluation is made by varying the number of UEs ranging from 10 to 50 (Case 1) and user speed in the
range of [3, 120] km/h (Case 2). Results show that while the number of UEs and user speed increases, the
performance of the considered scheduling schemes degrades and in both case FLS outperforms other three
schemes in terms of several performance indexes such as average throughput, packet loss ratio (PLR),
packet delay and fairness index.
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...IJSEA
Nowadays, with the rapid growth of cloud computing, many industries are going to move their computing
activities to clouds. Researchers of virtual learning are also looking for the ways to use clouds through
mobile platforms. This paper offers a model to accompany the benefits of “Mobile Intelligent Learning”
technology and “Cloud Computing”. The architecture of purposed system is based on multi-layer
architecture of Mobile Cloud Computing. Despite the existing challenges, the system has increased the life
of mobile device battery. It will raise working memory capacity and processing capacity of the educational
system in addition to the greater advantage of the educational system. The proposed system allows the
users to enjoy an intelligent learning every-time and every-where, reduces training costs and hardware
dependency, and increases consistency, efficiency, and data reliability.
Transcript is an inventory system holding student academic record. This system has been implemented conventional, electronically or implemented using web services approaches which have been devoid of mobile computing approach and system classification rules. The proposed architecture provides an assiduous pathway for the implementation of the aforementioned issues. This architecture has the propensity for cutting down operational cost and hardcopy documentation while handling organizational procedures and processes.
Transcript is an inventory system holding student academic record. This system has been implemented conventional, electronically or implemented using web services approaches which have been devoid of mobile computing approach and system classification rules. The proposed architecture provides an assiduous pathway for the implementation of the aforementioned issues. This architecture has the propensity for cutting down operational cost and hardcopy documentation while handling organizational procedures and processes.
AN ENHANCED ELECTRONIC TRANSCRIPT SYSTEM (E-ETS)ijcsit
Transcript is an inventory system holding student academic record. This system has been implemented
conventional, electronically or implemented using web services approaches which have been devoid of
mobile computing approach and system classification rules. The proposed architecture provides an
assiduous pathway for the implementation of the aforementioned issues. This architecture has the
propensity for cutting down operational cost and hardcopy documentation while handling organizational
procedures and processes
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to answer only for the factorial questions where we can get direct answer from the data base servers. The web search engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile nodes are help full for accessing internet because these techniques are used to generate low node overload, higher server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective, capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is used find correct person who ready and willing to answer questions hence this type of search are used reduce searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile Q&A system in the cloud based environment through which the data has been as been transmitted form cloud server to the centralized server at any time.
The term, “Mobile Education Service System” itself implies that this service is for the college students to lift their education quality/speed one step above. This paper aims to look at M-education service from an educationalist’s view. This paper proposes the concept of mobile education service system for college students. The modules of this system work as eyes of humans. From the eagle’s sight that is, The Mobile Service System’s sight, the total students’ world is shortened and shrunk in their hands as a hand-held device. All that is the students and the tutors would warmly welcome this system to be in their campus.
Adoption of Digital Learning Technology: An Empirical Analysis of the Determi...IJAEMSJORNAL
Technology has advanced significantly from the analogue period to the digital era. Digital Learning Technology (DLT) is a learning paradigm based on the use of ubiquitous latest technologies, by using smart devices. It can be described as a learning environment that is assisted in daily life by wireless networks, mobile, and embedded computers. It aims to offer content and interaction to students wherever they are, at any time. The learning process has advanced thanks to the technology revolution, which has also fundamentally altered how knowledge is shared and learned. At present, there exist other frameworks too, but they are centered towards different paradigms, and point of view pertaining to DLT with its emphasis on Telecommunication Sector has not been taken into consideration. As, existing frameworks are centered towards different environments hence there exists a need to add dimensions of Empowered Learner, Digital Citizen, Knowledge Curator, Innovative Designer, Computational Thinker and Creator, Communicator & Global Collaborator. These have not been integrated together in existing available research. The study will ascertain level of knowledge of DLT and examined factors which affect the adoption rate, use, and role of DLT in telecoms setups. The results of this research will help create a framework that, if used in any academic or learning setting in a technology-based firm.
User experience evaluation for a bus tracking apps in smart campus initiativejournalBEEI
Satisfying user experience (UX) is one of the major goals for any application. A good UX will contribute to the higher rate adoption of the application itself. With the emergence of IoT, the concept of smart campus is widely being researched and developed. Smart campus initiative is relatively important as the campus can be considered as a small town by utilizing the same IT infrastructure as smart city. Bus tracking system is one of the initiatives in smart campus environment. One of the main issues is to assess the usability of this apps before it can be deployed widely in campus. This paper will discuss the user experiences evaluation using MeCUE technique on UMS HopIn! a bus tracking apps an initiative towards implementation of smart campus in Universiti Malaysia Sabah. The app gives user the real time location of campus buses and the estimated time of arrival (ETA) for each of the buses. Based on user evaluation it has been found that the application has meet within the expectation with most of the requirements has been fulfilled and the good of UX rating. Thus, the same approach can be applied to support the development of any future smart campus initiative.
With the advent of mobile network communication system, users have been offered lots of services
such as ability to send multimedia messages like SMS, Video, Data files, Images e.t.c. This paper describes the
design and implementation of a system (Result Alert System) that conveniently provides examination results to
students with the use of Email and SMS technology via their Mobile phones and devices.
Mobile phones and devices are necessary assets, most especially to students as it makes communication and the
spread of information a lot easier. Result Alert System takes advantage of some of the technologies that Mobile
devices provide, technologies such as the Email and Short Message Service (SMS). The implemented system
allows registered students to access their results, including past results, provided they are available in the system’s database.
Technological development have altered the way we communicate, learn, think, share, and spread information. Mobile technologies are those that make use of wireless technologies to gain some sort of data. As mobile connectedness continues to spread across the world, the value of employing mobile technologies in the arena of learning and teaching seems to be both self-evident and unavoidable The fast deployment of mobile devices and wireless networks in university campuses makes higher education a good environment to integrate learners-centered m-learning. This paper discusses mobile learning technologies that are being used for educational purposes and the effect they have on teaching and learning methods.
Framework for online exam with graphical result and sms gatewayAkash Agrawal
A project on a system providing Online exams to the students of the university either for exam purpose or for aptitude tests for placements the application of this project is unlimited.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
An educational bluetooth quizzing application in android
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
AN EDUCATIONAL BLUETOOTH QUIZZING
APPLICATION IN ANDROID
Michael Hosein and Laura Bigram
Department of Computing and Information Technology,
University of the West Indies, St Augustine, Trinidad
ABSTRACT
Bluetooth is one of the most prevalent technologies available on mobile phones. One of the key questions
how to harness this technology in an educational manner in universities and schools. This paper is about a
Bluetooth quizzing system which will be used to administer quizzes to students of a university. The
Bluetooth quizzing application consists of a server and client mobile Android application. It will utilize a
queuing system to allow many clients to connect simultaneously to the server. When clients connect, they
can register or choose the option to complete a quiz that the lecturer selected. Results are automatically
sent when quiz is done from the client application. Data analysis can then be done to review the progress of
students.
KEYWORDS
Bluetooth, Wireless networks, Educational applications, Quizzing applications
1. INTRODUCTION
The use of Bluetooth is eminent in today's society. It is usually a default technology that is
present on all mobile phones as stated by (Korucu and Alkan 2011, 1929). The ratio of mobile
phones to fixed phones in Trinidad and Tobago is 6.3:1 as stated by the (International
Telecommunications Union 2011). Hence, it is safe to assume that Bluetooth is one of the most
prominent wireless technologies in Trinidad and Tobago.
Its uses range from transferring files to opening garage doors. (Hosny 2007, 972) stated that it is
a low power, inexpensive, short-range wireless standard supporting local area networks (LANs).
It is a useful tool for executing small tasks that are not data intensive.
One of the key questions is how to harness the use of this technology in the education system.
The purpose of this project is to explore the use of Bluetooth as a line of communication for the
delivery of educational materials. The problems that this could address at any educational institute
are: 1) low attendance rate 2) low pass rates 3) poor learning curve of students.
A paper based quiz system in every class can be too time-consuming. Therefore, a Bluetooth
quizzing system was thought to be the most cost effective, quick method of addressing the above
problems. The system collects responses, calculate marks and send quiz scores back to students.
In this way, students are encouraged to learn their work continuously before every class.
(Bar, Haussge, Robling 2007, 281) stated that when taking a 2(two) minute break after 20(twenty)
minutes of lecture, the learning result of students is increased. The media break, as the study
DOI : 10.5121/ijwmn.2013.5605
69
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
outlines, is in the form of questions directed to the students. Asking these questions, presents the
students with an opportunity to reflect the learnt material. Using this concept, the report aims to
utilize the Bluetooth quizzing system as the break format during lectures to stimulate the students
about thinking about the course more in depth and to encourage them to ask questions. The
questions in the Bluetooth quizzing system are in the form of multiple choices.
Also, (Ruhl and Suritsky 1995, 2) and (Ruhl et al. 2012, 62) indicated that the pause procedure
alone was most effective for enhancing student performance on immediate free-recall of lecture
ideas. Even though this study was done using students with disabilities, the same concept can be
applied to any other student, with the use of quizzes during lectures.
The system consists of a server component and a client component. The server component is
controlled by the lecturer whereas the client component is in the hands of the students. Both
components are in the form of an Android application. At the server, the lecturer allows students
to register (send their initial data to the server), add/edit courses, students and quizzes.
Registration consists of data such as first name, last name student identification number among
other bio-data. The lecturer can also create quizzes consisting of multiple choice questions. After
creating these quizzes, the lecturer can dispense the quiz to students via the quizzing phase (This
is explained in greater detail later). The quizzing phase also consists of sending back results to
students. In addition, the lecturer can then perform data analysis on the data received. Statistics is
represented with the use of pie charts. This will allow the lecturer to keep track of the students’
performances. This Bluetooth quizzing system will be referred to as BLUEQ.
2. LITERATURE REVIEW
There have been other attempts to implement a classroom Bluetooth quizzing system to
encourage interaction between the lecturer and students.
(Davidrajulh 2009) presented a Bluetooth-based classroom tool. It is a paper focused on
evaluating a Bluetooth-based classroom tool. This tool was used to help lecturers automate their
assignment tests. The paper however, was limited to 2 (two) handhelds and a master device. In
this system, students used their mobile phones to submit answers to assignment tests to the
lecturer’s computer via Bluetooth. By doing this, the lecturer does not need to correct assignment
tests. In addition, the system was also used to disperse multiple choice questions to the students
during the lectures. The students would then submit their answers to the lecturer’s machine. In
both scenarios however, no test scores were sent back to the student.
Another system was also developed by (El Sharkawy and Meawad 2009) which was a mobile
quizzing system through which students can answer short questions in lectures with the use of
SMS (short messaging service) or Bluetooth. The main objective of this system was to provide
the students with different technology options that would enhance their learning experience, as
well as, encourage them to attend lectures thereby increasing the level of participation. The server
component of this system consisted of a web module, a GSM modem, and SMS gateway and a
Bluetooth module.
The client consisted of Java ME mobile application. The evaluation of this system showed that
students were enthusiastic about using the system. The system also consisted of a statistical
section that allowed the lecturer to view the statistics after a quizzing session. In this section, all
the submitted answers are gathered, and charts displaying the different answers were shown.
Another complex system was developed by (Bar et al. 2006, 361) which encompassed SMS (short
messaging service), WLAN (wireless local area network) and Bluetooth as part of the system to
70
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
engage the students in their classrooms (Figure 1 shows the arrangement).It allowed students to
use their mobile devices, using Bluetooth to interact with the educator during lectures. That is, it
allowed students to answer questions presented by the educator. The answers to the questions
were presented at the end of the lecture. Their Bluetooth model was designed for Linux using
Blueproxy (Blueproxy is a simple proxy server to convert Bluetooth RFCOMM connections into
TCP connections). While this was a fantastic idea for implementing the system, this option is
costly (SMS is costly) whereas Bluetooth is free and pervasive. Hence, Bluetooth will be a better
suited option for the delivery of content to students via the Bluetooth quizzing system. However,
SMS is facilitated once in close proximity to a cell tower, whereas Bluetooth has a range of 10
meters for class 3 devices.
Figure 1 – The system architecture (Bar et al. 2006).
Yet another (Zhang, Li, and Fu 2007) Bluetooth based e-learning system, was used to break the
constraints of time and space (The teacher received instant feedback from students and check
students’ performance at any time. Later (Zhang, Xiong, and Luo 2011) applied the same
principle to a mobile English assistant learning system based on Bluetooth. That is, the system
was later built around an English lecture session.
(Mitchell et al. 2006) investigated the use of mobile and smart phones as a platform for delivering
mobile learning services and administrative information on a personalized basis. The system
utilized two technologies SMS (short messaging service) and Bluetooth. The two technologies
were used to complement each other to offer an alternative communications platform for students.
This combination provided a mechanism for communication with undergraduates on a large scale.
Figure 2 shows the architecture, with the flow beginning the mobile phone.
71
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
Figure 2 – The system architecture for (Mitchell et al. 2006)
Finally, (Wang, Zhu, and Zhao 2010) developed a wireless communication educational lab based
on Bluetooth. The goal of this system was to encourage students to learn by themselves. This lab
focused on practical assignments which would help the students develop skills not found in a
textbook. The aim was to help students grasp wireless communication from theory to practice.
As it can be seen, there have been many attempts at creating a Bluetooth quizzing application for
interaction between lecturer and student. However, these implementations are a bit outdated and
none of have been designed for the Android platform, which is the leading operating system
today. According to International Data Corporation (2013), the Android operating system (OS)
had 68.8 % market share, which makes it the best OS to create applications that will reach a wider
audience (in this case students). This report seeks to fill this gap while solving the issues outlined
in the Introduction.
72
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
3. APPLICATION DETAILS
There are 2 components to the Bluetooth quizzing system: Server Side and Client Side. Both
components are implemented on the Android operating system (on a phone). Android was chosen
as it is very popular mobile platform today. Options presented at the server are: Start Server,
Manager, Data Analysis and Exit. Figure 3 shows the main menu for the server. ‘Exit’ is used to
exit the application. ‘Start Server’ turns the server on/off, monitors incoming connections as well
as provides a list of quizzes to allow the lecturer to select a quiz to send to students. ‘Manager’
consists of creating and editing new courses, quizzes and students. ‘Data Analysis’ is for
performing basic statistical analysis on results obtained from quizzes.
Figure 3 – The main menu for the server application of BLUEQ.
73
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
Figure 4 – Client/Server sequence diagram.
In Figure 4, the server is started when the user presses the Start Server toggle button on the server
application. Figure 5 shows the“Start Server” screen of the BLUEQ application.
74
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
Figure 5 – Start Server screen of the BLUEQ application.
The method start Server() turns on Bluetooth at the same time. In order for client devices to find
the server, it must be made discoverable by calling ensure Discoverable(). Once the server can be
seen, then the quizzing service is started by calling setup Service(). At this point, the server is
started and sequentially selects a UUID from a queue of UUID’s. A Bluetooth Server Socketis
created listening on the RFCOMM channel associated with this UUID. When a client opens a
connection using the same UUID, a Bluetooth Socket is spawned for that client. The server then
listens on another RFCOMM channel for another client.
A blocking queue was used to store the UUIDS that are going to be used to get the RFCOMM
channels. There are 8 UUIDS that will be selected. Since the accept() method is a system
blocking call, it states that the device will not be able to perform anything else, hence only one
server can be used. But the UUID’s will be cycled to choose the correct RFCOMM.
According to the RFCOMM white paper, protocol theoretically supports up to 60 simultaneous
connections between two Bluetooth devices. The number of connections that can be used
simultaneously in a Bluetooth device is implementation-specific. In experiment at with the
android devices, this value was found to be roughly 5. More memory could contribute to more
connections simultaneously. Hence, we estimated around 8 UUID’s, that’s why 8 UUIDswere
chosen.
For the client application to work, the Bluetooth must be turned on. The client has to then search
for the server by doing a device discovery. Scan For Devices () searches for all devices in close
proximity to the client. A list of devices found is presented to the user. User interaction is
required to select the server.
Once the server is selected, a service discovery is executed. This is where the client uses the same
UUID as the server. The server then does a look in the service discovery database to ensure
service is listed. Once the match is successful, the server sends the RFCOMM channel number on
which the service is listening.
75
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
The client then connects to the server using the RFCOMM channel number. Data transfer to the
server then begins.Data transfer in this case, will be the requests sent by the client. For example,
as in Figure 6 showing the client requested a quiz, which is shown.
Figure 6– Quiz details presented to the student.
4. MODELING
This section presents a probability model of how successful clients will be in connecting to the
server. We have 8 UUIDS, assuming there n = 25 (25 clients trying to connect).
We have managed to model the above scheme using the geometric distribution.
X is the discrete random variable, which is the number of attempts needed to connect to an
RFCOMM channel successfully.
X~Geo(p) where p = 8/25 = 0.32(assuming 8 UUIDs always in the queue in the client, since only
1 can connect at a time)and q = 17/25=0.68
Probability that the first success is obtained at the rth attempt P(X=r) = qr-1 x p
So finding the probability that the client connects on its 2th attempt, P(X=2) = (17/25)1(8/25) =
0.22
And finding the probability that the client connects on its 6th attempt, P(X=6) = (17/25)5 (8/25) =
0.05
Hence, the probability that the client takes a large number of attempts to connect decreases as the
number of attempts increases. This means the probability of connecting on the first few attempts
is large.
76
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
5. CONCLUSION
A Bluetooth quizzing application was developed for use in lectures, to help lecturers administer
quizzes and in turn help students revise work previously learnt. Students will benefit by revising
work done in previous classes.
The queuing method of UUID’s proved to be very useful due to the constraints of the Bluetooth
technology. The probability of taken too many attempts was found to be very small.
Future works could improve on this method for supporting more simultaneously Bluetooth
connections on the server side. Also, the means of communicated can be improved by using XML
to structure messages passed between client and server.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
Android
Developer.
2013.
“Bluetooth
Adapter”.
Accessed
June
11,
2013.
http://developer.android.com/reference/android/bluetooth/BluetoothAdapter.html.
Atmel Coporation .1991.The Bluetooth Wireless Technology. Atmel Corporation
Bär, Henning, Gina Häussge, and Guido Rößling. 2007. “An Integrated System for Interaction
Support in Lectures.” ACM SIGCSE Bulletin 39 (3): 281. doi:10.1145/1269900.1268865.
Bär, Henning, Guido Rößling, Erik Tews, and Elmar Lecher. 2006.
“Bluetooth Interaction Support in Lectures.” In Proceedings of Mobile Learning, 2006, 360364.IADIS Press.
Bluetooth Special Interest Group. 2009. Specificiation of the Bluetooth System, Core Version 3.0.
Accessed August 24, 2012. https://www.bluetooth.org/en-us/specification/adopted-specifications
Davidrajuh, Reggie. 2009. “Evaluating Performance of a Bluetooth-Based Classroom Tool.”
International Journal of Mobile Learning and Organisation 3(2): 148-163. doi:
10.1504/IJMLO.2009.024424.
Zhang, Guoliang, Ningbo Univ, Ningbo, FengXiong, and Qi Luo. 2007. “Mobile English Assistant
Learning System Based.” In 2nd International Conference on Pervasive Computing and Applications,
26-27 July, 2007, 689 - 692. Birmingham.
Hosny, W. 2007. “Power Engineering Mobile Education Technology.” 2007 42nd International
Universities Power Engineering Conference, 4-6 September, 2007, 971–974. Brighton.
Hopkins, Bruce, and Ranjith Antony. 2003. Bluetooth for java .Apress.
Huang, Albert S., and Larry Rudolph. 2007. Bluetooth essentials for programmers.Cambridge
University Press.
International Telecommunications Union. 2011. “Mobile Cellular telephon subscriptions.” Accessed
May
24,
2013.http://www.itu.int/ITUD/icteye/Reporting/ShowReportFrame.aspx?ReportName=/WTI/CellularSubscribersPublic&ReportF
ormat=HTML4.0&RP_intYear=2011&RP_intLanguageID=1&RP_bitLiveData=False.
International Data Corporation. 2013. “IDC – Press Release.” Accessed May 24, 2013.
http://www.idc.com/getdoc.jsp?containerId=prUS23946013#.UTCOPjd4DlY
Miller, Michael. 2001.DiscoveringBluetooth.Sybex Incorporated.
Mitchell, Keith, Nicholas P. Race, Duncan McCaffery, Mark Bryson, and Zhen Cai. 2006. “Unified
and Personalized Messaging to Support E-Learning.” 2006 Fourth IEEE International Workshop on
Wireless, Mobile and Ubiquitous Technology in Education,16-17 November, 2006, 164–168. Athens.
Kammer, David, Gordon McNutt, Brian Senese, and Jennifer Bray. 2002. Bluetooth application
development guide: The short range interconnect solution. Syngress Publishing Incorporated.
Korucu, AgahTugrul, and AyseAlkan. 2011. “Differences Between M-learning (mobile Learning) and
E-learning, Basic Terminology and Usage of M-learning in Education.” 3rd World Conference on
Educational Sciences, 2011,1925-1930.
Kumar, C. Bala, Paula J. Kline, and Timothy J Thompson. 2004.Bluetooth application programming
with Java API. Elsevier Incorporated.
77
10. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 6, December 2013
[18] Rößling, Guido, Ari Korhonen, Rainer Oechsle, J. Ángel Velázquez Iturbide, Mike Joy, Andrés
Moreno, AtanasRadenski, et al. 2008. “Enhancing Learning Management Systems to Better Support
Computer Science Education.” ACM SIGCSE Bulletin 40 (4): 142. doi:10.1145/1473195.1473239.
[19] Ruhl, Kathy L, Charles A. Hughes, Anna H. Gajar, Kathy L Ruhl, Charles A. Hughes, and Anna H.
Gajar. 2012. “Efficacy of the Pause Procedure for Enhancing Learning Disabled and Nondisabled
College Students ’ Recall Long- and Short-Term Facts Presented Through Lecture.” Learning
Disability Quarterly 13 (1): 55–64.
[20] Ruhl, Kathy L, and Sharon Suritsky. 1995. “The Pause Procedure And / Or An Outline : Free Recall
Effect On Immediate And Lecture Notes Taken by College Students with Learning Disabilities.”
Learning Disability Quarterly 18 (1): 2–11.
[21] Sharkawy, Bahia Fayez El, and FatmaMeawad. 2009. “Instant Feedback Using Mobile Messaging
Technologies.” 2009 Third International Conference on Next Generation Mobile Applications,
Services and Technologies, September: 539–544. doi:10.1109/NGMAST.2009.93.
[22] Wang, Qing, Xiuxin Zhu, and Gaoxing Zhao. 2010. “Wireless Communication Educational Lab
Construction Based on Bluetooth.” 2010 5th International Conference on Computer Science &
Education. August: 1574–1577. doi:10.1109/ICCSE.2010.5593770.
[23] Zhang, Yanhui, Wu Li, and Yingzi Fu. 2007. “A Mobile Learning System Based on Bluetooth.” Third
International Conference on Natural Computation, August: 768–771. doi:10.1109/ICNC.2007.64.
[24] Zhang, Yonghong, Shiying Zhang, Son Vuong, and Kamran Malik. 2006. “Mobile Learning with
Bluetooth-based E-learning System.” Proceeding of the 2005 2nd International Conference on
Communications and Mobile Computing – IWCMC, 15-17 November, 2005, 5. Guangzhou.
78