SlideShare a Scribd company logo
R.V. College of Engineering
Department of Information Science and Engineering Page 28
CHAPTER 7
CONCLUSION
The system emulates the actions of mouse and keyboard with the help of mobile phone. Some
of the PC applications like media player and browsers can also be controlled via the bluetooth
enabled mobile device. The system operates in keyboard, mouse, application and utilities
mode. The keyboard mode allows performing basic functions on text editor and movement of
cursor. The mouse mode provides full support for controlling the mouse movements and
clicks. Also, the computer desktop is generated on the phone. In the application mode,
applications like power point, media players and browsers can be controlled. Utilities mode
enables running command and sending of message to the personal computer.
The Bluetooth technology and J2ME are made use by the system to allow the users to view
and access the desktop screen of the PC on the mobile phones, control applications and
thereby interact with the computer through Bluetooth.
7.1 FUTURE ENHANCEMENT
The system can be extended to support the following functionalities:
 Multi-word commands can be executed under the utilities mode.
 Integrating more Multimedia applications like downloading image, audio, video etc.
R.V. College of Engineering
Department of Information Science and Engineering Page 29
REFERENCES
[1] Keith Cheverst, Alan Dix, Daniel Fitton, Chris Kray, Mark Rouncefield, Corina Sas,
George Saslis-Lagoudakis, Jennifer G. Sheridan,” Exploring Bluetooth based Mobile Phone
Interaction with the Hermes Photo Display” in Department of Computing, Infolab21
Lancaster University,2012
[2] R.S.S.Vishnu Priya , P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad,
P.D.Nageswara Rao ,”Mobile-PC Suite: Using Mobile Phone as Remote to Control PC
Operations” in Dept. of CSE, KLCE Vaddeswaram, India, (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 3 (2) , 2012,3355 – 3359,2013
[3] Dr. Khanna, SamratVivekanand, Omprakash ,”Concept of Remote controlling PC with
Smartphone Inputs from remote place with internet”in Information Technology Dept, ISTAR,
Sardar Patel University, VV Nagar, India, 2012
[4] Faisal Baig, Saira Beg and Muhammad Fahad Khan, “Zigbee Based Home Appliances
Controlling Through Spoken Commands Using Hand held Devices” in nternational Journal
of Smart Home Vol. 7, No. 1, January, 2013.
[5]Nokia Corporation(2011),”PC Connectivity over Bluetooth in Java Applications”,Version
1.0,Publication date :December 8,2011.
[6] Ting Zhang, Yuanxin Ouyang , “Case Study of Human Computer Interaction Based on
RFID and Context-Awareness” in Ubiquitous Computing Environments Volume
4555, 2007, pp 264-271.
[7] K. V. S. S. S. S. Sairam, Dr. M. G. R, N. Gunasekaran, S. Rama Reddy, “Bluetooth in
Wireless Communication“ in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
2008.
[8] N. Golmie, R. E. Van Dyck, and A. Soltanian, “Interference of Bluetooth and IEEE
802.11: Simulation Modeling and Performance Evaluation” in National Institute of Standards
and Technology Gaithersburg, Maryland 20899, 2010.
[9] P. Johansson, R. Kapoor, M. Kazantzidis, and M. Gerla, “Personal Area Networks:
Bluetooth”, in International Journal of Wireless Information Networks, Vol. 9, No. 2, April
2002.
R.V. College of Engineering
Department of Information Science and Engineering Page 30
[10] K. V. S. S. S. S. Sairam, University of Madras, Dr. M. G. R. Engineering College N.
Gunasekaran, Anna UniversityS. Rama Reddy, Jerusalem College of Engineering, Dr. M. G.
R. Engineering College,” Bluetooth in Wireless Communication”,2002
[11] Peng Zhou,” HCI-based bluetooth master-slave monitoring system design”, Nat. Key
Lab. of Sci. & Technol. on Communication, Univ. of Electron. Sci. & Technol. of China,
Chengdu, China ; Xiang Ling,2010.
[12] Beg, M.S. ,Fatimah, B. ,Jain, S. ; Muzammil, R.,” Bluetooth based implementations for
realising new consumer systems”, ; Deptt. of Electron. Eng., AMU, Aligarh, India, 2009.
[13]Yabin Liu ; Sch. of Autom; Shouqian Yu ; Weihai Chen ; Wei Li,” Wireless
Communication Technology Based on Bluetooth and Its Application to a Manipulator”,
Beijing Univ. of Aeronaut. & Astronaut., Beijing,2006.
[14] Siegemund, F,Florkemeier C.,” Interaction in pervasive computing settings using
Bluetooth-enabled active tags and passive RFID technology together with mobile phones”,
; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland,2003
[15] Jin-Shyan Lee Yu-Wei Su ; Chung-Chou Shen,” A Comparative Study of Wireless
Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, ; Ind. Technol. Res. Inst., Hsinchu,2007
[16] Ballagas, R., Rohs, M., Sheridan, J.G. and Borchers, J.,Sweep and point & shoot:
Phonecam-based interactions for large public displays. In Proceedings of the SIGCHI
conference on Human factors in computing systems (CHI'05) Extended abstracts, ACM
Press, 2005.
[17] Cheverst, K. Dix, A., Fitton, D., Kray, C., Rouncefield, M.,Saslis-Lagoudakis, G. and
Sheridan, J. G., Exploring Mobile Phone Interaction with Situated Displays, In Proceedings
of the 1st workshop on Pervasive Mobile Interaction Devices (PERMID),2005.
[18] Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,Crabtree, A. and Hemmings, T.,
SPAM on the menu: the practical use of remote messaging in community care, In
Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada, ACM
Press. 2003, 23-29.
[19] Ferscha, A. and S. Vogl, Pervasive Web Access via Public Communication Walls: In
Proceedings of Pervasive Computing, LNCS 2414, Zurich, Switzerland, 2002, 84-97.
[20] Gaver, W., Dunne, A. and Pacenti, E., Cultural Probes, Interactions: New Visions of
Human-Computer Interaction. (1) (1999).
R.V. College of Engineering
Department of Information Science and Engineering Page 31
[21] Graham, K., Cheverst, K., Rouncefield, M. and Kray, C. Going More Public: Situated
Display Design in a Care Setting through Co-realisation, Submitted to the 2005 Conference
on Designing for User eXperience (DUX’05).
[22] Himanshu R., Gossweiler, R. and Milojicic, D., ContentCascade Incremental Content
Exchange between Public Displays and Personal Devices, In Proceedings of the International
Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04),
Boston, Massachussets, USA, 2004, 374-381.
[23] Shwetak N. Patel and Gregory D. Abowd,” Beyond Mobile Telephony: Exploring
Opportunities for Applications on the Mobile Phone Handset”,College of Computing & GVU
Center, 801 Atlantic Drive, Atlanta, GA 30332-0280, USA {shwetak,
abowd}@cc.gatech.edu,2010
[24] Motorola Global Telecom Solution Sector. (2002) "i95cl Multi-Communication Device
J2ME Developers' Guide". Motorola, 2002.
[25] Nichols, J., B. A. Myers, M. Higgins, J. Hughes, T. K. Harris, R. Rosenfeld and
M.Pignol.(2002) Generating remote control interfaces for complex appliances. Proceedings
of the 15th annual ACM symposium on User interface software and technology (UIST 2002),
ACM Press, Paris, France, pp 161—170.
[26]. Patel, S.N. and G.D. Abowd. (2003) A 2-way Laser-assisted Selection Scheme for
Handhelds in a Physical Environment. Technical Note submitted for review to Ubicomp
2003.
[27] Yesim Tunccekic, and Kivanc Dincer,”Mobile Mapping Applications over J2ME
Enabled PhonesHAVELSAN Eskisehir Yolu, Ankara, TURKE, 2007.
[28] Minoi,J. L., Green P., Arnab, S., 2002, Navigation Application with Mobile Telephony:
Shortest-path, University Malaysia Sarawak, University of Manchester, Map Asia 2002.
[29] Liu, J., Mobile Map: A Case Study in the Design & Implementation of a Mobile
Application, Computer Engineering Dept of Carleton University, http://www.sce.
carleton.ca/wmc/chameleon/mc/JaneThesis.pdf,2002.
[30] Revel, S.,” How Does Location Govern Task? The Delivery of an Intelligent Tourist
Aide Over a Palm Device”,Univ. of Edinburgh, MSc Dissertation Plan, http://www.
geo.ed.ac.uk/~gisadmin/submission/msc0138/plan.html,2007.
[31] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V.Veijalainen, J., Katanosov, A.,
Tirri, H,” Developing GIS-supported Location Based Services”, Helsinki
University of Technology, University of Jyvaskyla, Finland, 2002.
R.V. College of Engineering
Department of Information Science and Engineering Page 32
[32] Megler, V., “ i-mode:From bandwidth problem into Internetphenomenon”, http://www-
106.ibm.com/ developerworks/library/wi-imode/index.html,2002.
[33] Keryer, P., Nara, T.,” i-mode: A Successful Lauch of The Mobile Internet Market”,
Alcatel Telecommunications Review – First Quarter 2001.
[34] Dru, M-A, Saada, S.,” Location-Based Mobile Services”, The Essentials, Alcatel
Telecommunications Review – First Quarter 2001.
[35] Goodman, D. J.,” The wireless Internet: Promises and Challenges”, July 2000 IEEE
Computer magazine.
[36] Laitinen, H., Sun’s Worldwide Java Developer Conference, Development Tools for the
J2ME, 2003 http://www.forum.nokia.com/main/1,35452,1_0_75,00.html,2001.

More Related Content

What's hot

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
IJNSA Journal
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
ijwmn
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
ijwmn
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
ijwmn
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
ijmnct
 
Sohail cv (updated) (1)
Sohail cv (updated) (1)Sohail cv (updated) (1)
Sohail cv (updated) (1)
Muhammad Sohail
 
context aware computing
context aware computingcontext aware computing
context aware computingswati sonawane
 
Context aware
Context awareContext aware
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
AIRCC Publishing Corporation
 
IRJET- Voice Assistant for Visually Impaired People
IRJET-  	  Voice Assistant for Visually Impaired PeopleIRJET-  	  Voice Assistant for Visually Impaired People
IRJET- Voice Assistant for Visually Impaired People
IRJET Journal
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
Human Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of WaterlooHuman Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of WaterlooPlinio Morita, PhD MSc PEng
 
A novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devicesA novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devices
eSAT Journals
 

What's hot (20)

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
JEGADEESAN_CV
JEGADEESAN_CVJEGADEESAN_CV
JEGADEESAN_CV
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
Sohail cv (updated) (1)
Sohail cv (updated) (1)Sohail cv (updated) (1)
Sohail cv (updated) (1)
 
CV_Ngurah Indra Er
CV_Ngurah Indra ErCV_Ngurah Indra Er
CV_Ngurah Indra Er
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
Context aware
Context awareContext aware
Context aware
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
IRJET- Voice Assistant for Visually Impaired People
IRJET-  	  Voice Assistant for Visually Impaired PeopleIRJET-  	  Voice Assistant for Visually Impaired People
IRJET- Voice Assistant for Visually Impaired People
 
cvpdf
cvpdfcvpdf
cvpdf
 
cv - sundar-Feb-2016
cv - sundar-Feb-2016cv - sundar-Feb-2016
cv - sundar-Feb-2016
 
Human Factors Research Group Slides
Human Factors Research Group SlidesHuman Factors Research Group Slides
Human Factors Research Group Slides
 
Future Of It
Future Of ItFuture Of It
Future Of It
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Bahaa_Younis_s_CV
Bahaa_Younis_s_CVBahaa_Younis_s_CV
Bahaa_Younis_s_CV
 
Human Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of WaterlooHuman Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of Waterloo
 
A novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devicesA novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devices
 

Similar to Conclusion

May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
rinzindorjej
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
ijujournal
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
IJCNCJournal
 
New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...
ijseajournal
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
ijitcs
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
IJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
 

Similar to Conclusion (20)

May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfMay_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 

More from hanmya

6 results
6 results6 results
6 resultshanmya
 
5 testing
5 testing5 testing
5 testinghanmya
 
4 implementation
4 implementation4 implementation
4 implementationhanmya
 
3 design
3 design3 design
3 designhanmya
 
1 introduction
1 introduction1 introduction
1 introductionhanmya
 
0index
0index0index
0indexhanmya
 

More from hanmya (7)

6 results
6 results6 results
6 results
 
5 testing
5 testing5 testing
5 testing
 
4 implementation
4 implementation4 implementation
4 implementation
 
3 design
3 design3 design
3 design
 
2 srs
2 srs2 srs
2 srs
 
1 introduction
1 introduction1 introduction
1 introduction
 
0index
0index0index
0index
 

Recently uploaded

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 

Recently uploaded (20)

Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 

Conclusion

  • 1. R.V. College of Engineering Department of Information Science and Engineering Page 28 CHAPTER 7 CONCLUSION The system emulates the actions of mouse and keyboard with the help of mobile phone. Some of the PC applications like media player and browsers can also be controlled via the bluetooth enabled mobile device. The system operates in keyboard, mouse, application and utilities mode. The keyboard mode allows performing basic functions on text editor and movement of cursor. The mouse mode provides full support for controlling the mouse movements and clicks. Also, the computer desktop is generated on the phone. In the application mode, applications like power point, media players and browsers can be controlled. Utilities mode enables running command and sending of message to the personal computer. The Bluetooth technology and J2ME are made use by the system to allow the users to view and access the desktop screen of the PC on the mobile phones, control applications and thereby interact with the computer through Bluetooth. 7.1 FUTURE ENHANCEMENT The system can be extended to support the following functionalities:  Multi-word commands can be executed under the utilities mode.  Integrating more Multimedia applications like downloading image, audio, video etc.
  • 2. R.V. College of Engineering Department of Information Science and Engineering Page 29 REFERENCES [1] Keith Cheverst, Alan Dix, Daniel Fitton, Chris Kray, Mark Rouncefield, Corina Sas, George Saslis-Lagoudakis, Jennifer G. Sheridan,” Exploring Bluetooth based Mobile Phone Interaction with the Hermes Photo Display” in Department of Computing, Infolab21 Lancaster University,2012 [2] R.S.S.Vishnu Priya , P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao ,”Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations” in Dept. of CSE, KLCE Vaddeswaram, India, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3355 – 3359,2013 [3] Dr. Khanna, SamratVivekanand, Omprakash ,”Concept of Remote controlling PC with Smartphone Inputs from remote place with internet”in Information Technology Dept, ISTAR, Sardar Patel University, VV Nagar, India, 2012 [4] Faisal Baig, Saira Beg and Muhammad Fahad Khan, “Zigbee Based Home Appliances Controlling Through Spoken Commands Using Hand held Devices” in nternational Journal of Smart Home Vol. 7, No. 1, January, 2013. [5]Nokia Corporation(2011),”PC Connectivity over Bluetooth in Java Applications”,Version 1.0,Publication date :December 8,2011. [6] Ting Zhang, Yuanxin Ouyang , “Case Study of Human Computer Interaction Based on RFID and Context-Awareness” in Ubiquitous Computing Environments Volume 4555, 2007, pp 264-271. [7] K. V. S. S. S. S. Sairam, Dr. M. G. R, N. Gunasekaran, S. Rama Reddy, “Bluetooth in Wireless Communication“ in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008. [8] N. Golmie, R. E. Van Dyck, and A. Soltanian, “Interference of Bluetooth and IEEE 802.11: Simulation Modeling and Performance Evaluation” in National Institute of Standards and Technology Gaithersburg, Maryland 20899, 2010. [9] P. Johansson, R. Kapoor, M. Kazantzidis, and M. Gerla, “Personal Area Networks: Bluetooth”, in International Journal of Wireless Information Networks, Vol. 9, No. 2, April 2002.
  • 3. R.V. College of Engineering Department of Information Science and Engineering Page 30 [10] K. V. S. S. S. S. Sairam, University of Madras, Dr. M. G. R. Engineering College N. Gunasekaran, Anna UniversityS. Rama Reddy, Jerusalem College of Engineering, Dr. M. G. R. Engineering College,” Bluetooth in Wireless Communication”,2002 [11] Peng Zhou,” HCI-based bluetooth master-slave monitoring system design”, Nat. Key Lab. of Sci. & Technol. on Communication, Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Xiang Ling,2010. [12] Beg, M.S. ,Fatimah, B. ,Jain, S. ; Muzammil, R.,” Bluetooth based implementations for realising new consumer systems”, ; Deptt. of Electron. Eng., AMU, Aligarh, India, 2009. [13]Yabin Liu ; Sch. of Autom; Shouqian Yu ; Weihai Chen ; Wei Li,” Wireless Communication Technology Based on Bluetooth and Its Application to a Manipulator”, Beijing Univ. of Aeronaut. & Astronaut., Beijing,2006. [14] Siegemund, F,Florkemeier C.,” Interaction in pervasive computing settings using Bluetooth-enabled active tags and passive RFID technology together with mobile phones”, ; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland,2003 [15] Jin-Shyan Lee Yu-Wei Su ; Chung-Chou Shen,” A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, ; Ind. Technol. Res. Inst., Hsinchu,2007 [16] Ballagas, R., Rohs, M., Sheridan, J.G. and Borchers, J.,Sweep and point & shoot: Phonecam-based interactions for large public displays. In Proceedings of the SIGCHI conference on Human factors in computing systems (CHI'05) Extended abstracts, ACM Press, 2005. [17] Cheverst, K. Dix, A., Fitton, D., Kray, C., Rouncefield, M.,Saslis-Lagoudakis, G. and Sheridan, J. G., Exploring Mobile Phone Interaction with Situated Displays, In Proceedings of the 1st workshop on Pervasive Mobile Interaction Devices (PERMID),2005. [18] Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,Crabtree, A. and Hemmings, T., SPAM on the menu: the practical use of remote messaging in community care, In Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada, ACM Press. 2003, 23-29. [19] Ferscha, A. and S. Vogl, Pervasive Web Access via Public Communication Walls: In Proceedings of Pervasive Computing, LNCS 2414, Zurich, Switzerland, 2002, 84-97. [20] Gaver, W., Dunne, A. and Pacenti, E., Cultural Probes, Interactions: New Visions of Human-Computer Interaction. (1) (1999).
  • 4. R.V. College of Engineering Department of Information Science and Engineering Page 31 [21] Graham, K., Cheverst, K., Rouncefield, M. and Kray, C. Going More Public: Situated Display Design in a Care Setting through Co-realisation, Submitted to the 2005 Conference on Designing for User eXperience (DUX’05). [22] Himanshu R., Gossweiler, R. and Milojicic, D., ContentCascade Incremental Content Exchange between Public Displays and Personal Devices, In Proceedings of the International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04), Boston, Massachussets, USA, 2004, 374-381. [23] Shwetak N. Patel and Gregory D. Abowd,” Beyond Mobile Telephony: Exploring Opportunities for Applications on the Mobile Phone Handset”,College of Computing & GVU Center, 801 Atlantic Drive, Atlanta, GA 30332-0280, USA {shwetak, abowd}@cc.gatech.edu,2010 [24] Motorola Global Telecom Solution Sector. (2002) "i95cl Multi-Communication Device J2ME Developers' Guide". Motorola, 2002. [25] Nichols, J., B. A. Myers, M. Higgins, J. Hughes, T. K. Harris, R. Rosenfeld and M.Pignol.(2002) Generating remote control interfaces for complex appliances. Proceedings of the 15th annual ACM symposium on User interface software and technology (UIST 2002), ACM Press, Paris, France, pp 161—170. [26]. Patel, S.N. and G.D. Abowd. (2003) A 2-way Laser-assisted Selection Scheme for Handhelds in a Physical Environment. Technical Note submitted for review to Ubicomp 2003. [27] Yesim Tunccekic, and Kivanc Dincer,”Mobile Mapping Applications over J2ME Enabled PhonesHAVELSAN Eskisehir Yolu, Ankara, TURKE, 2007. [28] Minoi,J. L., Green P., Arnab, S., 2002, Navigation Application with Mobile Telephony: Shortest-path, University Malaysia Sarawak, University of Manchester, Map Asia 2002. [29] Liu, J., Mobile Map: A Case Study in the Design & Implementation of a Mobile Application, Computer Engineering Dept of Carleton University, http://www.sce. carleton.ca/wmc/chameleon/mc/JaneThesis.pdf,2002. [30] Revel, S.,” How Does Location Govern Task? The Delivery of an Intelligent Tourist Aide Over a Palm Device”,Univ. of Edinburgh, MSc Dissertation Plan, http://www. geo.ed.ac.uk/~gisadmin/submission/msc0138/plan.html,2007. [31] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V.Veijalainen, J., Katanosov, A., Tirri, H,” Developing GIS-supported Location Based Services”, Helsinki University of Technology, University of Jyvaskyla, Finland, 2002.
  • 5. R.V. College of Engineering Department of Information Science and Engineering Page 32 [32] Megler, V., “ i-mode:From bandwidth problem into Internetphenomenon”, http://www- 106.ibm.com/ developerworks/library/wi-imode/index.html,2002. [33] Keryer, P., Nara, T.,” i-mode: A Successful Lauch of The Mobile Internet Market”, Alcatel Telecommunications Review – First Quarter 2001. [34] Dru, M-A, Saada, S.,” Location-Based Mobile Services”, The Essentials, Alcatel Telecommunications Review – First Quarter 2001. [35] Goodman, D. J.,” The wireless Internet: Promises and Challenges”, July 2000 IEEE Computer magazine. [36] Laitinen, H., Sun’s Worldwide Java Developer Conference, Development Tools for the J2ME, 2003 http://www.forum.nokia.com/main/1,35452,1_0_75,00.html,2001.