In this paper, for the first time, the detail of the internet-offline solution for rural/village schools is described, and its benchmarking is reported. For providing offline knowledge access, four (4) different systems have examined. An affordable, the Raspberry Pi3 server found to be able to provide web as well as file sharing service for up to 20 clients at 100 Mbps throughput. UnixBench shows that the Raspberry Pi3 about 25% performance of a four-core i5 system. Using consumer grade power banks at 10000-20000 mAh, the Raspberry Pi3 server may provide a 6+ hour operation. With reliable electrical power, a mini PC provides a more reliable alternative at an order of magnitude increase in cost. For more than 100 users, one may use i5 or higher engines to keep the price-performance ratio low. Besides, in the internet-offline system, teachers no longer have to worry about bullies, hoax, or pornographic contents.
ICT in Practice Technology and Education Online Magazine Issue 8Yasemin Allsop
ICT in Practice is an online education and technology magazine. It contains articles about mobile learning, game based learning, digital literacy, computing, coding and much more. The magazine is non-profit and created by educators from around the world.
The document discusses key topics related to information and communication technology (ICT). It defines ICT as the use of communication technologies like mobile phones and the internet to locate, save, send and edit information. It also discusses the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction. Popular examples of social media and how they enable users to share content are provided. The top uses of ICT in the Philippines are also summarized.
The document provides a summary of the origins and development of the Internet. It began as a military experiment in the 1960s to create a communication system that could withstand nuclear war. This network eventually became known as the ARPANET and helped pioneer packet switching and other key Internet technologies. By the 1990s, commercial networks had merged with research networks to form the modern Internet, facilitating its widespread adoption and incorporation into daily life. Today the Internet has over 4 billion users globally and has transformed communication, education, and many other aspects of society.
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
This document provides an introduction to information and communication technologies (ICT). It discusses how ICT allows people to locate, save, send, and edit information using technologies like mobile phones, the internet, and more. It notes that the Philippines is considered the ICT Hub of Asia and that ICT makes up a large portion of the country's employment. It then covers the evolution of ICT and the internet from early document sharing to modern interactive websites and cloud-based services.
ICT refers to technologies used for communication such as mobile phones, internet, etc. It deals with locating, saving, sending, and editing information. The Philippines is considered an ICT hub in Asia due to growth in ICT-related jobs like call centers.
Web 1.0 consisted of static webpages that could not be manipulated by users, while Web 2.0 added dynamic webpages that allow interaction and user-generated content. Web 3.0 aims to add semantics to better connect related information across the web.
Trends in ICT include technological convergence where different technologies work together toward similar goals, and the rise of social media which enables user-generated content sharing through sites like Facebook, Twitter, and
The document discusses empowerment technologies. It defines empowerment as giving power to promote self-actualization or enhance knowledge on a topic. Technology refers to using the internet, which is the major source of information. Empowerment technologies are important to teach millenials the proper use of information and communication technologies (ICT) and internet etiquette, rather than using them for cyberbullying or peer pressure. The document provides lessons on ICT, including definitions of information, communication, and technology, as well as examples of verbal and nonverbal communication methods. It analyzes communication models and how communication has changed with internet technology and social media.
This document discusses various topics related to information and communications technology (ICT) including technological convergence, web 2.0 and user participation, online safety and security, ethics guidelines for computer use, steps for online research, digital file formats for images and text, and online platform tools for developing ICT content. Specifically, it addresses how technology allows access to different file formats using one device, how users can contribute and collaborate online, principles for safe and ethical computer use, procedures for contextualized online searches, common image and text file types, and blogs as an online publishing platform.
ICT in Practice Technology and Education Online Magazine Issue 8Yasemin Allsop
ICT in Practice is an online education and technology magazine. It contains articles about mobile learning, game based learning, digital literacy, computing, coding and much more. The magazine is non-profit and created by educators from around the world.
The document discusses key topics related to information and communication technology (ICT). It defines ICT as the use of communication technologies like mobile phones and the internet to locate, save, send and edit information. It also discusses the evolution of the world wide web from static Web 1.0 pages to dynamic Web 2.0 pages that allow user interaction. Popular examples of social media and how they enable users to share content are provided. The top uses of ICT in the Philippines are also summarized.
The document provides a summary of the origins and development of the Internet. It began as a military experiment in the 1960s to create a communication system that could withstand nuclear war. This network eventually became known as the ARPANET and helped pioneer packet switching and other key Internet technologies. By the 1990s, commercial networks had merged with research networks to form the modern Internet, facilitating its widespread adoption and incorporation into daily life. Today the Internet has over 4 billion users globally and has transformed communication, education, and many other aspects of society.
Introduction to ICT (Web 1.0 and Web 2.0)Leelet1121
This document provides an introduction to information and communication technologies (ICT). It discusses how ICT allows people to locate, save, send, and edit information using technologies like mobile phones, the internet, and more. It notes that the Philippines is considered the ICT Hub of Asia and that ICT makes up a large portion of the country's employment. It then covers the evolution of ICT and the internet from early document sharing to modern interactive websites and cloud-based services.
ICT refers to technologies used for communication such as mobile phones, internet, etc. It deals with locating, saving, sending, and editing information. The Philippines is considered an ICT hub in Asia due to growth in ICT-related jobs like call centers.
Web 1.0 consisted of static webpages that could not be manipulated by users, while Web 2.0 added dynamic webpages that allow interaction and user-generated content. Web 3.0 aims to add semantics to better connect related information across the web.
Trends in ICT include technological convergence where different technologies work together toward similar goals, and the rise of social media which enables user-generated content sharing through sites like Facebook, Twitter, and
The document discusses empowerment technologies. It defines empowerment as giving power to promote self-actualization or enhance knowledge on a topic. Technology refers to using the internet, which is the major source of information. Empowerment technologies are important to teach millenials the proper use of information and communication technologies (ICT) and internet etiquette, rather than using them for cyberbullying or peer pressure. The document provides lessons on ICT, including definitions of information, communication, and technology, as well as examples of verbal and nonverbal communication methods. It analyzes communication models and how communication has changed with internet technology and social media.
This document discusses various topics related to information and communications technology (ICT) including technological convergence, web 2.0 and user participation, online safety and security, ethics guidelines for computer use, steps for online research, digital file formats for images and text, and online platform tools for developing ICT content. Specifically, it addresses how technology allows access to different file formats using one device, how users can contribute and collaborate online, principles for safe and ethical computer use, procedures for contextualized online searches, common image and text file types, and blogs as an online publishing platform.
The document discusses the history and development of information and communications technology (ICT) from ancient times to the present. It describes four main periods in the evolution of ICT: premechanical (3000 BCE to 1450 CE), mechanical (1450 CE to 1840s), electromechanical (1840s to 1940s), and electronic (1940s to present). Key developments discussed include the abacus, Pascaline calculator, telegraph, telephone, vacuum tubes, transistor, integrated circuit, and computer processor. The document emphasizes that modern ICT is built upon foundations laid by innovations of the past.
Appraisal of E-learning structure in Nigerian Polytechnics: A Case study of F...IOSR Journals
Abstract: E-learning represents an entirely new learning environment where information and communication
systems, whether networked learning or not, serve as specific media to implement the learning process for
students. In response to the fast development in Information and Communication Technologies (ICT), e-learning
was therefore adopted by many universities and other higher institutions around the globe as a way of
improving and supporting their teaching-learning activities and making education accessible for all society
members.. Unfortunately, this rapidly changing technological resource along with the ever growing and mobile
society has no doubt created many challenges for students, teachers, parents, administrators and policymakers
particularly in developing countries. This actually made the paper to assess the e-learning structure in term of
physical infrastructure and human development at the Federal Polytechnic, Ado Ekiti through data collected
both by structured interview and questionnaires. The analyses of which the states of development are at low
realm therefore, call for a robust synergy that will be able to meet and cope with the test of the time.
Keywords: Challenges, collaboration, E-learning, Infrastructure, Policymaker
The Research on E-book-oriented Mobile Learning System Environment Applicatio...haiguang fang
This document discusses research on e-book-oriented mobile learning system environments and applications. It analyzes three case studies, including a 5th grade Chinese textbook accessed on iPads and iPods, a one-to-one self-regulated e-schoolbag system, and an interactive response system used in classrooms. It outlines the typical components of these systems, including terminal devices, network access, platform development, resource construction, content design and activities. Finally, it summarizes four tendencies of e-book-oriented mobile learning systems: usability, interactive environments, green support and background services.
The document discusses current and future trends in information and communication technology (ICT). It covers topics like Web 2.0, which enables greater user interactivity and collaboration, as well as Web 3.0, which aims to make web pages more intelligent through semantic analysis. Converging technologies, social media, mobile devices, and assistive media are also shaping new ICT trends. The document provides examples of these concepts and outlines some challenges of emerging technologies like compatibility and security issues with Web 3.0.
This document provides information about accessing and using the internet. It begins with an introduction to the learning guide and its objectives to teach students how to open internet browsers, set browser preferences, access websites, and perform other basic internet tasks. It then provides three pages of detailed information sheets about internet terminology, the structure of web addresses and URLs, how information is transmitted over the internet, and laws related to online privacy. The document aims to give students the necessary knowledge to meet the learning outcome of being able to perform basic internet functions.
Information and communication technologyTamojit Das
This document provides an introduction to information and communication technology (ICT). It defines ICT as forms of technology that transmit, process, store, create, display, share or exchange information electronically. ICT includes traditional technologies like radio and TV as well as modern technologies like smartphones, computers, networks, software, and satellite systems. The document discusses how ICT has influenced various aspects of everyday life including business, financial services, entertainment, public services, and education. It provides examples of how ICT has simplified tasks like communicating information to parents and analyzing student work. The overall document serves to outline the broad applications and impact of ICT.
ICT stands for information and communication technology and refers to technologies that provide access to information through communication, such as computers, internet, broadcasting technologies, and cellular phones. An information kiosk is a stand-alone computer terminal that provides public access to information on a given topic. Information kiosks provide information in an organized, easily accessible, and constantly up-to-date manner without requiring many staff resources. Some key considerations in designing information kiosks include the user interface, durability for the location, and graphic design elements to effectively communicate with users.
This document provides an introduction to information and communications technology (ICT). It defines ICT as the diverse set of tools used to generate, store, process, spread and share information, including computers, the internet, broadcasting technologies and telephony. The document then discusses ICT in the Philippines, noting its role in business process outsourcing and the government agencies responsible for ICT development. It also outlines trends in ICT like technological convergence, social media, mobile media and assistive technologies. The document concludes by discussing online systems, functions and platforms.
This document discusses information and communications technology (ICT). It defines ICT as encompassing any communication devices, applications, radio, television, phones, computers, software, satellite systems and associated services. The document discusses how the Philippines ranks in networked world readiness assessments between 2012-2016. It also discusses 5 categories of networked world readiness - access, learning, society, economy, and policy. The document then covers online safety, security, ethics and etiquette and provides tips for privacy and security online.
The document provides an overview of the history and development of information and communications technology (ICT). It discusses the four main periods in the development of ICT: premechanical, mechanical, electromechanical, and electronic. Key events and innovations from each period are described, including the invention of writing, mechanical calculators, the telegraph, telephone, vacuum tubes, transistors, integrated circuits, and computer processors. The document also discusses modern ICT topics like the World Wide Web, social media, online research, and information verification. Learning outcomes and activities related to understanding and applying ICT concepts are presented.
Legal, Ethical and Social Issues in TechnologyRachel Farnese
This document provides an overview of an interactive PowerPoint about legal, social, and ethical issues related to technology education. It discusses topics like social networking, acceptable use policies, cyberbullying, student data privacy, the digital divide, copyright, fair use, and Creative Commons licenses. The PowerPoint contains pictures and buttons that link to additional explanatory videos and navigate between topics.
The document discusses the evolution and components of the Internet. It explains that the Internet began as ARPANET, connecting a few computers, and eventually evolved into today's network linking millions of devices globally. It also describes the development of the World Wide Web in 1989 by Tim Berners-Lee as a system of interlinked web pages accessible via the Internet. Finally, it outlines the various groups that comprise the modern Internet community, including users, internet service providers, web developers, and infrastructure companies.
2005
TAFE NSW International Center for Teaching and Learning
ICVET The Learning Powerhouse Whats happening in the engine room - Presenter
Teacher empowerment through technology
With technology there is no finishing line; there is constant change and possibility, there is no set way to use it for teaching and learning, technology is but a tool. It can seem over-whelming. What can a teacher do to stay afloat? Ask the Network...
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
The Author personally conducts the Lecture-Workshop in your Country. She lives in Tagaytay City, Philippines. To Reserve a Workshop Date in your Venue, please call her directly: Local (Philippines): 09295197788 or International: (63) 9266787938.E-mail: wellnesspilipinasinternational@gmail.com. E-mail: ambassadorzara@gmail.com
ARRANGEMENT & FEES:
Professional Fee: (Philippines):
P10,000 per talk provided the Organizer will fetch and bring back the Speaker in Tagaytay City.
For Companies Without Transportation Arrangement, Speaker's Fee is P15,000 for Private Companies
Hotel Accommodation and Plane Tickets c/o Organizer (for out-of-town)
INTERNATIONAL Professional Fee: $1,000 USD per talk
Hotel Accommodation and Plane Tickets c/o Organizer
FYI: Ambassador Zara Jane Juan conducts the Training herself to fund the Peace Missionary Programs of Sailing for Peace because she doesn’t receive donations to prevent corruption.
PEACE VIGIL Programs are:
Initiating Peace: Interfaith Interracial Intercultural Worldwide Prayers to End Terrorism
Educating Peace: Wellness for Peace Education on Climate Change Worldwide
Innovating Peace: Climate Change & Peace Building Eco Forum and Symposium
The document discusses the Internet and its use in education. It provides background information on how the Internet functions as a decentralized collection of networks that communicate through standardized TCP/IP protocols. It then discusses how the Internet can be accessed from educational institutions and how it provides a vast sea of information for students and teachers to navigate. Examples are given of how elementary schools are using email to communicate and how educational software and resources available online are becoming more sophisticated. The future of the Internet in education is portrayed as limitless, with potential for students to access libraries, museums, and communicate globally through its continued growth.
This document discusses intellectual property (IP) issues related to e-learning 2.0, which emphasizes social learning using Web 2.0 tools like blogs, wikis and podcasts. It outlines the main IP rights, including copyright, and examines copyright exceptions and implied licenses that may apply to content sharing on these platforms. The document concludes that those working with e-learning 2.0 need awareness of potential IP risks and should assess defenses like fair use or seek permissions when incorporating third-party materials.
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
If you want to help or donate please donate at my paypal:
dyokimura@gmail.com
The Higher Technology for Human Being
SUPPORT ME:
https://www.buymeacoffee.com/dyokimura6
CHECK MY GAMING CHANNEL:
https://www.youtube.com/channel/UCoKOObshfyyxhVkw1VjyQNA
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
The document provides an introduction to connectivity to the internet, describing different connection types like dial-up, DSL, cable, and wireless; it explains what the internet is and how it functions as a global network of interconnected computer networks; the document also gives an overview of searching the internet safely and effectively for educational purposes.
CORE's ten trends presentation from the Learning at School conference in Rotorua, February 2009. CORE's annual ten trends summary represents a view of some key areas of interest for NZ educators with regards to the impact of ICTs on teaching and learning.
The Promise of Grid Computing Technologies for E-Learning Systems in KenyaUmma Khatuna Jannat
This document discusses implementing grid computing technologies to improve e-learning systems in Kenya. It outlines challenges universities may face, such as hardware and software heterogeneity. Grid computing could connect distributed resources to build expandable, shared e-learning platforms. This would allow institutions to save costs while providing more powerful applications and faster results. The document concludes grids can help universities take advantage of internet technologies to establish e-learning systems.
The document discusses the history and development of information and communications technology (ICT) from ancient times to the present. It describes four main periods in the evolution of ICT: premechanical (3000 BCE to 1450 CE), mechanical (1450 CE to 1840s), electromechanical (1840s to 1940s), and electronic (1940s to present). Key developments discussed include the abacus, Pascaline calculator, telegraph, telephone, vacuum tubes, transistor, integrated circuit, and computer processor. The document emphasizes that modern ICT is built upon foundations laid by innovations of the past.
Appraisal of E-learning structure in Nigerian Polytechnics: A Case study of F...IOSR Journals
Abstract: E-learning represents an entirely new learning environment where information and communication
systems, whether networked learning or not, serve as specific media to implement the learning process for
students. In response to the fast development in Information and Communication Technologies (ICT), e-learning
was therefore adopted by many universities and other higher institutions around the globe as a way of
improving and supporting their teaching-learning activities and making education accessible for all society
members.. Unfortunately, this rapidly changing technological resource along with the ever growing and mobile
society has no doubt created many challenges for students, teachers, parents, administrators and policymakers
particularly in developing countries. This actually made the paper to assess the e-learning structure in term of
physical infrastructure and human development at the Federal Polytechnic, Ado Ekiti through data collected
both by structured interview and questionnaires. The analyses of which the states of development are at low
realm therefore, call for a robust synergy that will be able to meet and cope with the test of the time.
Keywords: Challenges, collaboration, E-learning, Infrastructure, Policymaker
The Research on E-book-oriented Mobile Learning System Environment Applicatio...haiguang fang
This document discusses research on e-book-oriented mobile learning system environments and applications. It analyzes three case studies, including a 5th grade Chinese textbook accessed on iPads and iPods, a one-to-one self-regulated e-schoolbag system, and an interactive response system used in classrooms. It outlines the typical components of these systems, including terminal devices, network access, platform development, resource construction, content design and activities. Finally, it summarizes four tendencies of e-book-oriented mobile learning systems: usability, interactive environments, green support and background services.
The document discusses current and future trends in information and communication technology (ICT). It covers topics like Web 2.0, which enables greater user interactivity and collaboration, as well as Web 3.0, which aims to make web pages more intelligent through semantic analysis. Converging technologies, social media, mobile devices, and assistive media are also shaping new ICT trends. The document provides examples of these concepts and outlines some challenges of emerging technologies like compatibility and security issues with Web 3.0.
This document provides information about accessing and using the internet. It begins with an introduction to the learning guide and its objectives to teach students how to open internet browsers, set browser preferences, access websites, and perform other basic internet tasks. It then provides three pages of detailed information sheets about internet terminology, the structure of web addresses and URLs, how information is transmitted over the internet, and laws related to online privacy. The document aims to give students the necessary knowledge to meet the learning outcome of being able to perform basic internet functions.
Information and communication technologyTamojit Das
This document provides an introduction to information and communication technology (ICT). It defines ICT as forms of technology that transmit, process, store, create, display, share or exchange information electronically. ICT includes traditional technologies like radio and TV as well as modern technologies like smartphones, computers, networks, software, and satellite systems. The document discusses how ICT has influenced various aspects of everyday life including business, financial services, entertainment, public services, and education. It provides examples of how ICT has simplified tasks like communicating information to parents and analyzing student work. The overall document serves to outline the broad applications and impact of ICT.
ICT stands for information and communication technology and refers to technologies that provide access to information through communication, such as computers, internet, broadcasting technologies, and cellular phones. An information kiosk is a stand-alone computer terminal that provides public access to information on a given topic. Information kiosks provide information in an organized, easily accessible, and constantly up-to-date manner without requiring many staff resources. Some key considerations in designing information kiosks include the user interface, durability for the location, and graphic design elements to effectively communicate with users.
This document provides an introduction to information and communications technology (ICT). It defines ICT as the diverse set of tools used to generate, store, process, spread and share information, including computers, the internet, broadcasting technologies and telephony. The document then discusses ICT in the Philippines, noting its role in business process outsourcing and the government agencies responsible for ICT development. It also outlines trends in ICT like technological convergence, social media, mobile media and assistive technologies. The document concludes by discussing online systems, functions and platforms.
This document discusses information and communications technology (ICT). It defines ICT as encompassing any communication devices, applications, radio, television, phones, computers, software, satellite systems and associated services. The document discusses how the Philippines ranks in networked world readiness assessments between 2012-2016. It also discusses 5 categories of networked world readiness - access, learning, society, economy, and policy. The document then covers online safety, security, ethics and etiquette and provides tips for privacy and security online.
The document provides an overview of the history and development of information and communications technology (ICT). It discusses the four main periods in the development of ICT: premechanical, mechanical, electromechanical, and electronic. Key events and innovations from each period are described, including the invention of writing, mechanical calculators, the telegraph, telephone, vacuum tubes, transistors, integrated circuits, and computer processors. The document also discusses modern ICT topics like the World Wide Web, social media, online research, and information verification. Learning outcomes and activities related to understanding and applying ICT concepts are presented.
Legal, Ethical and Social Issues in TechnologyRachel Farnese
This document provides an overview of an interactive PowerPoint about legal, social, and ethical issues related to technology education. It discusses topics like social networking, acceptable use policies, cyberbullying, student data privacy, the digital divide, copyright, fair use, and Creative Commons licenses. The PowerPoint contains pictures and buttons that link to additional explanatory videos and navigate between topics.
The document discusses the evolution and components of the Internet. It explains that the Internet began as ARPANET, connecting a few computers, and eventually evolved into today's network linking millions of devices globally. It also describes the development of the World Wide Web in 1989 by Tim Berners-Lee as a system of interlinked web pages accessible via the Internet. Finally, it outlines the various groups that comprise the modern Internet community, including users, internet service providers, web developers, and infrastructure companies.
2005
TAFE NSW International Center for Teaching and Learning
ICVET The Learning Powerhouse Whats happening in the engine room - Presenter
Teacher empowerment through technology
With technology there is no finishing line; there is constant change and possibility, there is no set way to use it for teaching and learning, technology is but a tool. It can seem over-whelming. What can a teacher do to stay afloat? Ask the Network...
The document discusses interactive multimedia, which allows users to control, combine, and manipulate different types of media like text, sound, video, graphics, and animation. It provides examples of uses for interactive multimedia like education, training, games, simulations, and more. Specific examples discussed include using videos on YouTube, audio on SoundCloud, online games like Farmville, online tests and surveys, e-learning courses, podcasts on apps like Spotify, and vodcasts on YouTube. The document emphasizes that these tools should be used wisely to achieve work goals efficiently.
The Author personally conducts the Lecture-Workshop in your Country. She lives in Tagaytay City, Philippines. To Reserve a Workshop Date in your Venue, please call her directly: Local (Philippines): 09295197788 or International: (63) 9266787938.E-mail: wellnesspilipinasinternational@gmail.com. E-mail: ambassadorzara@gmail.com
ARRANGEMENT & FEES:
Professional Fee: (Philippines):
P10,000 per talk provided the Organizer will fetch and bring back the Speaker in Tagaytay City.
For Companies Without Transportation Arrangement, Speaker's Fee is P15,000 for Private Companies
Hotel Accommodation and Plane Tickets c/o Organizer (for out-of-town)
INTERNATIONAL Professional Fee: $1,000 USD per talk
Hotel Accommodation and Plane Tickets c/o Organizer
FYI: Ambassador Zara Jane Juan conducts the Training herself to fund the Peace Missionary Programs of Sailing for Peace because she doesn’t receive donations to prevent corruption.
PEACE VIGIL Programs are:
Initiating Peace: Interfaith Interracial Intercultural Worldwide Prayers to End Terrorism
Educating Peace: Wellness for Peace Education on Climate Change Worldwide
Innovating Peace: Climate Change & Peace Building Eco Forum and Symposium
The document discusses the Internet and its use in education. It provides background information on how the Internet functions as a decentralized collection of networks that communicate through standardized TCP/IP protocols. It then discusses how the Internet can be accessed from educational institutions and how it provides a vast sea of information for students and teachers to navigate. Examples are given of how elementary schools are using email to communicate and how educational software and resources available online are becoming more sophisticated. The future of the Internet in education is portrayed as limitless, with potential for students to access libraries, museums, and communicate globally through its continued growth.
This document discusses intellectual property (IP) issues related to e-learning 2.0, which emphasizes social learning using Web 2.0 tools like blogs, wikis and podcasts. It outlines the main IP rights, including copyright, and examines copyright exceptions and implied licenses that may apply to content sharing on these platforms. The document concludes that those working with e-learning 2.0 need awareness of potential IP risks and should assess defenses like fair use or seek permissions when incorporating third-party materials.
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
If you want to help or donate please donate at my paypal:
dyokimura@gmail.com
The Higher Technology for Human Being
SUPPORT ME:
https://www.buymeacoffee.com/dyokimura6
CHECK MY GAMING CHANNEL:
https://www.youtube.com/channel/UCoKOObshfyyxhVkw1VjyQNA
The presentation gives the basic idea on how internet is used as a powerful tool for education. In India UGC is the apex body for higher education. Also find information on INFLIBNET centre which is an Autonomous Inter-University Centre (IUC) of University Grants Commission (UGC) of India.
The document provides an introduction to connectivity to the internet, describing different connection types like dial-up, DSL, cable, and wireless; it explains what the internet is and how it functions as a global network of interconnected computer networks; the document also gives an overview of searching the internet safely and effectively for educational purposes.
CORE's ten trends presentation from the Learning at School conference in Rotorua, February 2009. CORE's annual ten trends summary represents a view of some key areas of interest for NZ educators with regards to the impact of ICTs on teaching and learning.
The Promise of Grid Computing Technologies for E-Learning Systems in KenyaUmma Khatuna Jannat
This document discusses implementing grid computing technologies to improve e-learning systems in Kenya. It outlines challenges universities may face, such as hardware and software heterogeneity. Grid computing could connect distributed resources to build expandable, shared e-learning platforms. This would allow institutions to save costs while providing more powerful applications and faster results. The document concludes grids can help universities take advantage of internet technologies to establish e-learning systems.
APPLICATION OF DIGITAL CLOUD LIBRARIES FOR ETHIOPIAN PUBLIC HIGHER LEARNING I...IAEME Publication
Information and communication technologies (ICT) have become common place entities in all aspects of life. Across the past twenty years the use of ICT has fundamentally changed the practices and procedures of nearly all forms of endeavor within business and governance. Investment in Information and Communication Technology (ICT) in Ethiopia is considered to be one of the highest in the world, taking into consideration the prevailing poverty levels. The basic principle of cloud computing entails the reduction of in-house data centers and the delegation of a portion or all of the Information Technology infrastructure capability to a third party. Universities and Colleges are the core of innovation through their advanced research and development. Digital Cloud Libraries may soon be building and managing their own data centers.
1) Indonesia faces a digital connectivity challenge, with uneven access to mobile and fixed broadband internet that leaves many underserved.
2) While internet and technology usage is high, infrastructure investment and quality remain issues that the government aims to address through policy reforms.
3) Proposed reforms include expanding broadband access through fiber and satellite, reallocating spectrum to improve mobile speeds, incentivizing infrastructure sharing between operators, and modernizing regulations.
This document provides an introduction to information and communication technologies (ICT). It discusses the course objectives, which are to provide a basic understanding of ICT, computers, software, hardware, and how they are used in the workplace. It defines ICT as the combination of information technology and communication technology. Information technology involves how computers work and store/process information, while communication technology allows individuals to communicate electronically across distances. Popular ICT tools include email, instant messaging, cell phones, and social media. The document also discusses how ICT is used in education to provide increased access to resources, distance learning, and supplementing traditional learning.
The document summarizes developments in school connectivity and digital technologies over the last decade and plans for the future. It outlines New Zealand's plan to provide ultra-fast broadband (UFB) to nearly all schools by 2016 to support new online learning opportunities. It discusses issues around the fiber optic rollout and temporary policies on costs. It also describes ongoing initiatives to upgrade school networks, provide devices, build teacher capability and trial a national education network.
Mobile learning architecture using fog computing and adaptive data streamingTELKOMNIKA JOURNAL
With the huge development in mobile and network fields, sensor technologies and fog computing help the students for more effective learning, flexible and in and effective manner from anywhere. Using the mobile device for learn encourage the transition to mobile computing (cloud and fog computing) which is led to the ability to design customized system that help student to learn via context aware learning which can be done by set the user preference and use proper methods to show only related manner subject. The presented study works on developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation.
The Internet is a worldwide system of interconnected computer networks that began as a US military project. It allows users to access and share information across vast distances. Today, the Internet is a public resource used by billions of people worldwide as a primary source of information through activities like social media, online shopping, communication, and more. While it provides vast access to information and opportunities for connection, overreliance on the Internet also poses risks like reduced social skills, spread of misinformation, and security/privacy issues that come with vast data collection online. Care must be taken to achieve a balanced use of both online and real-world information sources and interactions.
This document describes an IoT-based smart home system using the Blynk framework. The system allows users to control and monitor home appliances and sensors via a smartphone. It uses a Raspberry Pi as a private server to store sensor data and communicate with users. NodeMCU microcontrollers connect appliances, sensors and the internet, acting as gateways. The system is designed to automate tasks like watering plants based on sensor readings when users are offline.
The document summarizes research on user opinions towards the internet. It provides background on the development of the internet and world wide web. It then presents 10 tables that analyze data collected from 100 internet users. The tables cover demographics of respondents, devices used, internet connections, purposes for use, and information gathered. Most respondents were ages 21-30, used mobile phones, had monthly incomes of $25,000-$50,000, and accessed the internet for browsing and gathering educational knowledge.
The document outlines a vision for the EPT afronum Networking School in Cameroon with the goals of developing connectivity, strengthening student efficiency, and establishing a nationwide school support network. The school aims to gradually eliminate communication problems in schools, develop e-learning in rural primary schools, and provide basic IT skills from primary to professional networking levels while securing rural information access and teaching IT to youth at low cost. Currently, Cameroonian schools lack vital communication infrastructure and basic IT design, resulting in ineffective education. The proposed school will be a top-level networking and telecommunications school specialized in Linux and open to students and employees seeking networking careers.
1) ICT refers to technologies like computers, phones, television and radio that are used for communicating and managing information. ICT allows for digital communication and sharing of information through tools on the internet.
2) The document discusses the evolution of the internet from static Web 1.0 to dynamic Web 2.0 that allows for user participation and sharing. It provides examples of technologies and trends in ICT like social media, mobile technologies, and assistive media.
3) Current ICT issues in the Philippines are discussed like slow internet, lack of coverage, hacking, and online scams. The role of ICT in education and its advantages and disadvantages are also summarized.
This document outlines plans for the BarAcc Project, which aims to establish internet access points in remote barangays in Oriental Negros, Philippines. Key points:
- The project is a collaboration between 1stBuglas Foundation, a telecommunications company, and Silliman University/NORSU to set up sustainable internet kiosks in barangays.
- A pilot project will demonstrate the viability of using WiFi technology to connect Barangay Access Points to centralized Access Centers over long distances.
- The project team from SU/NORSU will develop a 5-year plan and 1-year implementation budget, with the goal of launching 3 pilot sites within the first year.
- The document
Information technology management frog vle applicationValerie Sinti
Through the 1BestariNet project, FrogAsia brings the future of education to every student, teacher and parent in Malaysia. Combining high-speed 4G internet access, a world class learning platform, and access to ‘best-in-class’ resources and technology, Malaysia is the first country in the world to bring its entire education community together on a single converged network designed specifically to meet the needs of teaching and learning.
This document contains self-instructional packets for an Empowerment Technology course. It discusses various topics related to information and communication technology (ICT), including defining ICT and giving examples of its uses. It also covers trends in ICT in the Philippines, different online platforms and websites, and the evolution of the World Wide Web from Web 1.0 to Web 3.0. Additionally, the document addresses important issues like online safety, computer security, threats, computer ethics, and netiquette guidelines for appropriate online behavior. Students are provided with learning activities to help apply and evaluate their understanding of the concepts covered.
Internet Access Using Ethernet over PDH Technology for Remote AreaRadita Apriana
There was still is gap among people living in city and in remote area to get information access,
especially who lived in the Eastern part of Indonesia. People living in such remote area usually were
isolated from town by natural condition like rivers, valleys, hills and so on. Therefore, telecommunication
infrastructure for remote area using cooper was not effective and efficient way to build. The issue was how
information and communication technology could penetrate such areas. This research aimed to propose
technology that could be implemented to overcome the difficulties. Ethernet over Plesiochronous Digital
Hierarchy (EoPDH) was one of many techniques that provided Ethernet connectivity over non-Ethernet
networks. EoPDH was a standardized methodology for transporting native Ethernet frames over the
existing established PDH transport technology. To provide last milefor the local people, use of Mesh
Wireless Local Area Network was made and connected to internet gateway via Ethernet over PDH based
microwave radio link. The test showed that The Ethernet frames were successfully transported to remote
area with good quality of service such as throughput, response time, and transaction rate.
This document discusses various information and communication technologies (ICT). It begins by defining key concepts like Web 2.0, Web 3.0, technological convergence, social media, mobile media, and assistive media. It then provides global statistics on ICT developments from 2001 to 2016. Examples of how ICT impacts students' lives at school, home, and in society are presented. The document concludes by listing references used.
Seminar presented in July 2009 at the Universidad Nacional Autonoma de Nicaragua (UNAN), in Managua (Nicaragua), in the framework of UNAN - UNIMIB (University of Milano Bicocca) agreement.
UNESCO ITU Support to Digital Readiness Within Education Systems.pdfcarmelasalzano1
This document discusses possibilities for hybrid learning by examining connectivity, affordability, digital skills gaps, and education system readiness. It notes that while internet connectivity has increased globally, many still rely on slower 2G and 3G networks. Affordability and lack of digital skills also prevent internet access. The pandemic highlighted that education systems were unprepared for remote learning due to a lack of devices, teacher training, and integrated digital technologies. Moving forward, infrastructure development, existing digital integration levels, teacher readiness, and support/training need strengthening to enable effective hybrid learning, especially in low-income countries. Country examples from Estonia, Wales, and Uruguay showcase promising practices in digitalizing education systems.
Similar to Internet-offline solution: detail description and benchmarking (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Properties of Fluids, Fluid Statics, Pressure MeasurementIndrajeet sahu
Properties of Fluids: Density, viscosity, surface tension, compressibility, and specific gravity define fluid behavior.
Fluid Statics: Studies pressure, hydrostatic pressure, buoyancy, and fluid forces on surfaces.
Pressure at a Point: In a static fluid, the pressure at any point is the same in all directions. This is known as Pascal's principle. The pressure increases with depth due to the weight of the fluid above.
Hydrostatic Pressure: The pressure exerted by a fluid at rest due to the force of gravity. It can be calculated using the formula P=ρghP=ρgh, where PP is the pressure, ρρ is the fluid density, gg is the acceleration due to gravity, and hh is the height of the fluid column above the point in question.
Buoyancy: The upward force exerted by a fluid on a submerged or partially submerged object. This force is equal to the weight of the fluid displaced by the object, as described by Archimedes' principle. Buoyancy explains why objects float or sink in fluids.
Fluid Pressure on Surfaces: The analysis of pressure forces on surfaces submerged in fluids. This includes calculating the total force and the center of pressure, which is the point where the resultant pressure force acts.
Pressure Measurement: Manometers, barometers, pressure gauges, and differential pressure transducers measure fluid pressure.
Prediction of Electrical Energy Efficiency Using Information on Consumer's Ac...PriyankaKilaniya
Energy efficiency has been important since the latter part of the last century. The main object of this survey is to determine the energy efficiency knowledge among consumers. Two separate districts in Bangladesh are selected to conduct the survey on households and showrooms about the energy and seller also. The survey uses the data to find some regression equations from which it is easy to predict energy efficiency knowledge. The data is analyzed and calculated based on five important criteria. The initial target was to find some factors that help predict a person's energy efficiency knowledge. From the survey, it is found that the energy efficiency awareness among the people of our country is very low. Relationships between household energy use behaviors are estimated using a unique dataset of about 40 households and 20 showrooms in Bangladesh's Chapainawabganj and Bagerhat districts. Knowledge of energy consumption and energy efficiency technology options is found to be associated with household use of energy conservation practices. Household characteristics also influence household energy use behavior. Younger household cohorts are more likely to adopt energy-efficient technologies and energy conservation practices and place primary importance on energy saving for environmental reasons. Education also influences attitudes toward energy conservation in Bangladesh. Low-education households indicate they primarily save electricity for the environment while high-education households indicate they are motivated by environmental concerns.
Impartiality as per ISO /IEC 17025:2017 StandardMuhammadJazib15
This document provides basic guidelines for imparitallity requirement of ISO 17025. It defines in detial how it is met and wiudhwdih jdhsjdhwudjwkdbjwkdddddddddddkkkkkkkkkkkkkkkkkkkkkkkwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwioiiiiiiiiiiiii uwwwwwwwwwwwwwwwwhe wiqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq gbbbbbbbbbbbbb owdjjjjjjjjjjjjjjjjjjjj widhi owqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq uwdhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhwqiiiiiiiiiiiiiiiiiiiiiiiiiiiiw0pooooojjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj whhhhhhhhhhh wheeeeeeee wihieiiiiii wihe
e qqqqqqqqqqeuwiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiqw dddddddddd cccccccccccccccv s w c r
cdf cb bicbsad ishd d qwkbdwiur e wetwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwwww w
dddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddfffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffw
uuuuhhhhhhhhhhhhhhhhhhhhhhhhe qiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiii iqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc ccccccccccccccccccccccccccccccccccc bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbu uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuum
m
m mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm m i
g i dijsd sjdnsjd ndjajsdnnsa adjdnawddddddddddddd uw
Sri Guru Hargobind Ji - Bandi Chor Guru.pdfBalvir Singh
Sri Guru Hargobind Ji (19 June 1595 - 3 March 1644) is revered as the Sixth Nanak.
• On 25 May 1606 Guru Arjan nominated his son Sri Hargobind Ji as his successor. Shortly
afterwards, Guru Arjan was arrested, tortured and killed by order of the Mogul Emperor
Jahangir.
• Guru Hargobind's succession ceremony took place on 24 June 1606. He was barely
eleven years old when he became 6th Guru.
• As ordered by Guru Arjan Dev Ji, he put on two swords, one indicated his spiritual
authority (PIRI) and the other, his temporal authority (MIRI). He thus for the first time
initiated military tradition in the Sikh faith to resist religious persecution, protect
people’s freedom and independence to practice religion by choice. He transformed
Sikhs to be Saints and Soldier.
• He had a long tenure as Guru, lasting 37 years, 9 months and 3 days
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
UNIT-III- DATA CONVERTERS ANALOG TO DIGITAL CONVERTER
Internet-offline solution: detail description and benchmarking
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 4, August 2020, pp. 1809~1818
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i4.13309 1809
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Internet-offline solution: detail description and benchmarking
Onno W. Purbo
IBI Darmajaya (Graduate Study, Computer Science, IBI Darmajaya), Indonesia
Article Info ABSTRACT
Article history:
Received Jun 12, 2019
Revised Mar 29, 2020
Accepted April 9, 2020
In this paper, for the first time, the detail of the internet-offline solution
for rural/village schools is described, and its benchmarking is reported.
For providing offline knowledge access, four (4) different systems have
examined. An affordable, the Raspberry Pi3 server found to be able to
provide web as well as file sharing service for up to 20 clients at 100 Mbps
throughput. UnixBench shows that the Raspberry Pi3 about 25% performance
of a four-core i5 system. Using consumer grade power banks at 10000-20000
mAh, the Raspberry Pi3 server may provide a 6+ hour operation. With reliable
electrical power, a mini PC provides a more reliable alternative at an order
of magnitude increase in cost. For more than 100 users, one may use i5
or higher engines to keep the price-performance ratio low. Besides, in
the internet-offline system, teachers no longer have to worry about bullies,
hoax, or pornographic contents.
Keywords:
Internet for education
Internet-offline
Linux
Open source
Rural education
This is an open access article under the CC BY-SA license.
Corresponding Author:
Onno W. Purbo,
IBI Darmajaya (Graduate Study, Computer Science, IBI Darmajaya),
93 A.Z. Pagar Alam St., Labuhan Batu, Bandar Lampung, Indonesia.
Email: onno@indo.net.id
1. CONSEQUENCES OF ICT CLASS RE-INCLUSION INTO SCHOOL CURRICULUM
End of 2018, the Indonesian Ministry of Education interested in re-include ICT as part of the school
curriculum. The consequences to considered are (1) prepare a good Informatics curriculum. This includes
topics on computational thinking, basic graphical programming, robotics, 3D printing, (2) prepare the required
500,000 new ICT teachers for 240,000 schools in a short time, and (3) prepare infrastructure, laboratories,
networks and must be low cost, low power consumption as electrical power is scarce in rural. Moreover,
no less critical can operate without any connection to the Internet.
This work will not focus on the curriculum and educational policy this work focus on providing
the infrastructure solution, especially for the village and rural schools. The Internet is scared in Indonesian
rural [1]. The signal scarcity in Indonesian rural is apparent and may easily be obtained from OpenSignal apps
crowdsourcing [2-4]. Consequently, for rural applications, all materials, such as multimedia files video, audio,
photos as well as Internet web content including Wikipedia, should be copied to a low-cost local server called
internet-offline server [5].
Internet-offline server is an open solution and well documented at OnnoCenter’s wiki [5].
The primary device is a Raspberry Pi3 Server, under US$100 per unit, which may provide a small local Wi-Fi
hotspot [6-8]; thus, no need for additional Wi-Fi access point in a small network. Also, any schools may easily
replicate the internet-offline system. Power banks may power the whole system. Students and teachers may
use smartphones as a client device [5]. Financial and budget constraints in correlation with operating and
maintenance costs may require more in-depth analysis.
2. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1809 - 1818
1810
2. INTERNET-OFFLINE SOLUTION FOR RURAL/VILLAGES
Efforts to create internet-offline access may not be new, since the early development of the Internet,
some have been looking for a solution on how to read Internet content while offline. Some may fulfill by
backing up emails, SMS, WA, to more complex activities such as downloading songs, movies, files, PDFs,
ebooks. Not many patents described internet-offline technology. Most patents concentrated on system and
methods for providing offline viewing experience of online website content [9-11]. This work is not using any
of the above patents. This work more focuses on providing the library/Internet content offline rather than
viewing experience.
In this work, the focus is on providing offline access to educational content. Only a handful of
institutions/researches in the world are trying to provide solutions for areas with limited Internet access. Thus,
there are some activities on internet-offline initiatives. Some of the well documented and similar initiatives are
SolarSPELL, WiderNet eGranary Digital Library, and Kiwix. A glimpse of these initiatives are as follows,
- SolarSPELL (solar powered educational learning library) is a student-centered initiative hosted at Arizona
State University. It is a library powered by Raspberry Pi, with the WiFi access point. Today, 272
SolarSPELL digital libraries have been deployed in Fiji, Vanuatu, Samoa, Tonga, the federated states of
Micronesia, Rwanda, South Sudan, and Comoros. Unfortunately, no detail circuity and schematics
available [12-15].
- WiderNet Project has been around for more than 20 years. The eGranary Digital Library solution-with
permission, thousands of educational Web sites has been copied and deliver them to intranet Web servers
inside Widernet partner institutions in developing countries and other under-served places around the globe.
Over 2,000 institutions lack adequate Internet access to adopt the eGranary Digital Library, also known as
"The Internet in a Box" [16-19].
- Kiwix provides free software to bring free knowledge even to remote places, such as schools in
the countryside in a developing country. Kiwix gives access to Wikipedia, WikiVoyage, Project Gutenberg,
and a lot more free content from the internet-even there is no Internet connection. Kiwix is available for
Android, iOS, Windows, MacOS, and Linux [20, 21].
Also, there are several initiatives mostly in Africa, both non-governmental organizations (NGOs) and
state institutions. Information on the projects is available online. However, not much info on detail circuitry,
schematics, apps usage, and not well documented in refereed journal articles. Some of these initiatives are,
- ICT Centre Uganda https://sites.google.com/site/ictcentreuganda/ - The ICT Center of Uganda strives to
create a system so that schools can access content on the internet-offline. It seems that there are several
similar efforts, especially in Africa, to create/copy Internet content so that it can be accessed offline
- EduAir-EduAir, formerly Kwiizi, from Cameroon is the concept name for offering a better education via
digital with or without the Internet. Their work focuses on the design of portable and open media libraries
in the form of Boxes with solar energy giving access to millions of educational content and offering
an integrated communication system where learners can make video calls within the local network deployed
by the Box http://www.eduairbox.com.
- Project Tawasol Tunisia - IEEE Sight in Tunisia developed Raspberry Pi operated devices with a hard disk
that can be updated periodically with relevant content such as Wikipedia pages, TED Talks, and other
educational content from the internet. They are capable of automatically updating content when connected
to WiFi or 3G networks. No detailed configuration is available.
SolarSPELL and WiderNet Project are providing electronic library accessible via local WiFi
networks. WiderNet copies abundant internet web content to its hard disk and, thus, requires more
powerful hardware. From hardware configuration, the internet-offline Solution is somewhat similar to
SolarSPELL. However, no detailed information on the software and content configuration of SolarSPELL.
The internet-offline solution is somewhat similar to the WiderNet Project incapability to copy and show
internet-offline web sites.
In contrast to the WiderNet Project, the internet-offline server includes offline Wikipedia, facilities to
do file sharing and streaming video, and much lower cost. The internet-offline solution is a server, not
a client. It can show web offline, file sharing, and streaming video. Also, the internet-offline solution includes
Kiwix for Wikipedia et al. All at low cost and will be nicely fit into the rural schools' requirements and
financial ability.
3. INTERNET-OFFLINE FRAMEWORK
In October 2018, the internet-offline framework was developed and presented for the first time on
OnnoCenter Channel in youtube and later presented at FOSSC 2019 in Oman [5]. In general, there are three
functions/sections, namely, 1) content controller and accumulator, 2) Operation of internet-offline facilities at
school, and 3) students/teachers who are accessing the content using smartphones/computers. The content
3. TELKOMNIKA Telecommun Comput El Control
Internet-offline solution: detail description and benchmarking (Onno W. Purbo)
1811
selection and collection may be centralized and performed by an authoritative body the collected content copies
into an SD/MicroSD card and ready to run. Material is then distributed to schools and installed on a local
Raspberry Pi server. Teachers and students can access local network facilities such as LAN and WiFi.
All the software used is open source-the detailed note on how to install it freely available on
OnnoCenter’s wiki in internet-offline topics. To synchronize needed content for offline web content, one uses
mainly the commands, 1) rsync a server app to synchronize content [6], and 2) wget a server app to partially
copy or copy the entire web content. Scripts for rsync and wget are developed to suit the required needs, such
as the URL of the web, and the depth of copied pages. In the internet-offline system, the server has several
services. Kiwix is used to display an offline wiki data. Apache, MySQL, PHP provides web services. Samba
provides file sharing and video streaming services. The DHCP server is used to give an IP address to LAN
clients. BIND-server is used to spoof the hostname and redirect to the local virtual hosting. On the client side,
regular tools for accessing the Internet can be used. The users do not have to know that the actual content is on
the local server in their school.
4. PRELIMINARY DEVELOPMENT
The author has self-financially started the initial development. The detail documentation is freely
released online via OnnoCenter's Wiki and, thus, schools may immediately receive the benefit from the open
technology. In general, there are three functions in the internet-offline System, namely, 1) content
collector/controller/ accumulator, and content distributor to schools, 2) internet-offline infrastructure at
schools, and 3) users mostly students/teachers who access the content via smartphones/computers.
Some of the vital tasks and issues of the content collector/controller/accumulator are as follows
1) determine which content/web needs to retrieved based on the school's curriculum, 2) total content size will
be limited to the size of MicroSD. The average affordable MicroSD has around 8-16 Gbyte space, which is
a lot for text content, but not much of video content, 3) content should be adjusted to the school's curriculum
at different levels/grades, and 4) content should be modified to the teaching methods in Indonesia, there is
currently no standard on the teaching methods on using online materials. Not many education faculties provide
a practical approach to maximize online teaching material in the learning process. Thus, a teacher's creativity
is required to maximize the benefits of existing content.
In-depth content analysis for the internet content selection process needs to be done. Research on
an automated content selection process using web crawling techniques with text mining and deep learning
classification is currently being performed. One of the most significant advantages of internet-offline Solution
is that teachers no longer have to worry about pornographic, inappropriate content, cyberbully, spam, hoax,
and unproductive contents from the Internet. Thus, schools may focus on actual teaching only content.
Technologically, the process of copying material to make it available offline is relatively simple, and even
the Wikipedia community has provided Kiwix for these purposes. To create a web copy of a site into
the Raspberry Pi's MicroSD is by using the following commands,
mkdir -p /var/www/html/webmirror
cd /var/www/html/webmirror
wget -mkEpnp https://thenameoftheweb.com/
It should be performed for all needed webs, after receiving their permission to copy. Next, a client
device may need to be spoofed to think it is accessing actual Internet sites, actually the internet-offline redirects
the request to its local server. A local BIND Domain Name System must be installed on the internet-offline
server and performed the redirection. The zone file of the BIND server has to be configured for each copied
web to redirect the Web request to the local internet-offline Server address. Thus, for each web of
thenameoftheweb.com, a zone file is created.
The web server Apache configuration needs to be added for each copied web, such as /etc/apache2/
sites-available/thenameoftheweb.com.conf for virtual hosting of the copied web. The configuration parameters are
quite simple, such as,
ServerName www.thenameoftheweb.com
ServerAlias thenameoftheweb.com
DocumentRoot /usr/local/src/webmirror/thenameoftheweb.com/
For each copied web, one needs to write an Apache configuration. Samba may provide file sharing for video,
multimedia, docs including for streaming videos. A more detailed configuration of the internet-offline server
is obtainable from OnnoCenter's Wiki.
4. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1809 - 1818
1812
This work uses dnsmasq [7] and hostapd [8] applications to activate the built-in WiFi client in
Raspberry Pi into a WiFi access point. The configuration parameter in dnsmasq sets the clients' IP address
allocation and the server's IP address. In the hostapd configuration file, several WiFi parameters, such as
interface, driver, SSID, WiFi mode, and channel, are set. The school's operator task is only to turn on the system
when needed and shuts it down after use. To reduce the MicroSD possible crash, it is advisable to login and
performs the proper server shutdown processes.
Students/teachers accessing the content via smartphone/computer may have several notes, such as
smartphones, tablets, laptops may be used to locate available teaching materials. For a large number of clients,
a school needs to provide additional WiFi access points and LAN cables. A single WiFi access point will
effectively serve a maximum of 10 simultaneous devices. To serve simultaneous access, many WiFi access
points configured to use 1, 6, or 11 orthogonal channels in 2.4GHz, are needed. The biggest problem is
the electrical power to keep smartphones, tablets, and laptops running for an extended period.
5. INTERNET-OFFLINE BENCHMARKING
The internet-offline system is benchmarked to estimate the limitation of the Raspberry Pi3 server.
Three different system configurations listed in the Table 1, are evaluated and compared. In this work,
we performed several benchmarking processes on the systems by measuring 1) packet per second (PPS)
of the network, 2) bandwidth (Mbps), 3) file sharing performance using dbench, 4) operating system
performance using UnixBench, 5) Apache Web performance using ab, 6) web Stress test using siege,
and 7) power consumption of the Raspberry Pi3 Server. To probe any network bottleneck, the benchmark of
the virtual machine will be performed and compared to both via physical LAN connection and direct bridge to
host client with no physical network connection.
Table 1. System specification
System Raspberry Pi3 Asus UN45H MiniPC VM on VirtualBox
SoC Broadcom BCM2837
CPU 4× ARM Cortex-A53, 1.2GHz. Intel® Braswell Dual-Core Celeron
N3000 Processor
Intel(R) Core(TM) i5-3330
CPU @ 3.00GHz. CORE 1-4
adjustable.
GPU Broadcom VideoCore IV. Intel® HD Graphics
RAM 1GB LPDDR2 (900 MHz) 2 GB Dual Channel DDR3L (1600MHz) 512-4096M adjustable.
Networking 10/100 Ethernet, 2.4GHz 802.11n
wireless.
100/1000/10/Gigabits Mbps Ethernet,
2.4GHz 802.11 b/g/n wireless.
Virtual Net connection and
Physical 100Mbps Ethernet.
OS Raspbian Ubuntu Server Ubuntu Server
Price US$35-50 US$600-700 US$200-300
5.1. Network throughput
Measurement network throughput (packet per second) is performed by blasting many packets into
the network interface of the device under test [22-24]. The simplest option is using the ping command
simultaneously running on several instances. However, to get a more accurate result, one may timed blast using
a faster hping3 command [22-24]. For a device at 192.168.0.1, the command is as follows,
time hping3 192.168.0.1 -q -i u40 --icmp|tail -n10
The -i -- interval switch tells the waiting time before the next ping packet. The uX parameter is in a microsecond.
The u40 means wait for 40 microseconds before the next ping. In the test, uX number was reduced until packet
loss increased by above 1%. To saturate the device under test, the firewall settings are flushed, and the operating
system (ICMP) ping rate limit is removed using the command,
sysctl net.ipv4.icmp_ratelimit=0
sysctl net.ipv4.icmp_ratemask=0
The measured packet per second can be calculated from two (2) times the number of packets received divide by
the measured time. The result measured packet per second is as shown in Table 2. The results clearly show that
the Raspberry Pi3 LAN network interface is only capable of 25% of the other devices. The Raspberry Pi3 WiFi
interface is an order of magnitude lower than its LAN interface, around 3-4% of other devices. In the case of
Virtual Machines, different network connection, core, and memory show no significant pps differences.
5. TELKOMNIKA Telecommun Comput El Control
Internet-offline solution: detail description and benchmarking (Onno W. Purbo)
1813
Table 2. Throughput measurement results
System -i u Packet per second (pps) Note
Raspberry Pi3 LAN 42 30.438
Raspberry Pi3 WiFi 270 5.740
Asus UN45H 7 64.371
VM 1 Core 1000MB 8 136.100 Via LAN
VM 4 Core 4096MB 8 128.715 Via LAN
VM 1 Core 1000MB 9 129.156 Direct bridge no LAN
VM 4 Core 4096MB 9 129.928 Direct bridge no LAN
5.2. Network bandwidth
Network bandwidth measurement is performed by transferring gigabyte zeros through the nc tunnel.
On the device under test, a server is run at specific port (e.g., 12345) using nc command,
nc -vvlnp 12345 >/dev/null
At the client side, connected on the same physical network, we use dd command-line utility for Unix and
Unix-like to convert and copy files and pass them out to nc tunnel to the device under test server
(e.g., 192.168.0.1) at port 12345 using the following command,
dd if=/dev/zero bs=1M count=1K | nc -vvn 192.168.0.1 12345
Table 3 shows clearly that all machines with LAN interface, such as the Raspberry Pi3 LAN interface,
Asus MiniPC UN45H, and the virtual machines have approximately 100Mbps network bandwidth.
The Raspberry Pi3 WiFi interface has a lower approximately 50Mbps network bandwidth. The network
bandwidth between the virtual machine and the client on a direct bridge on the same host without any physical
LAN interconnection indicates that the actual virtual machine bandwidth is much higher about 2264Mbps and
2376Mbps for single and four core virtual machine, respectively. Thus, the physical interface limits the network
bandwidth. It is interesting to note that increasing the core and memory in the virtual machine (VM) does not
improve the network bandwidth of the VM.
Table 3. Bandwidth measurement results
System Mbps Note
Raspberry Pi3 LAN 93,6
Raspberry Pi3 WiFi 50,4
Asus UN45H 94.4
VM 1 Core 1000MB 93,6 Via LAN
VM 4 Core 4096MB 93,6 Via LAN
VM 1 Core 1000MB 2264 Direct bridge no LAN
VM 4 Core 4096MB 2376 Direct bridge no LAN
5.3. System performance index
Measurement of system performance is done using UnixBench [25, 26]. UnixBench is capable
of measuring system performances for multi-core architectures [27]. System benchmarks index score
was obtained after measuring the system Execl throughput, file copy with 256, 1024, 4096 buffer size,
pipe throughput, pipe-based context switching, process creation, shell scripts with single and eight
concurrent processes, system call overhead, Dhrystone 2 using register variables, and double-precision
Whetstone. The resulting system benchmarks index score is as shown in Table 4. It shows clearly that
the Raspberry Pi and Asus MiniPC UN45H has somewhat similar UnixBench index score. While, the Virtual
Machine with one core and four core has twice and four times the UnixBench score as compared to
the Raspberry Pi3, respectively.
Table 4. UnixBench index
System UnixBench Index
RaspberryPi3 415.3
Asus UN45H 592.8
VM 1 Core 1000MB 1035.2
VM 4 Core 4096MB 2576.4
6. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1809 - 1818
1814
5.4. Apache web server performance
Apache Web Server performance, ApacheBench (ab) is used [28-31]. ApacheBench (ab) is a load
testing and benchmark tool for hypertext transfer protocol (HTTP) server. Moreover, it gets installed
automatically with Apache web server, or it can be installed separately as Apache utility. It runs off
the command line. A quick load testing output obtains in just one minute. ApacheBench (ab) is not stressing
the system. Thus, the results would be the same for the different concurrent clients. In this work, 10-150 client’s
concurrency was measured and find the results are the same for the same system under test. The following
Table 5 depict the ApacheBench results.
Table 5. ApacheBench measurement results
Rpi
LAN
Rpi
WiFi
Asus
VM 1 Core
LAN
VM 4 Core
LAN
VM 1 Core
no LAN
VM 4
Coreno LAN
Request/Sec(#/sec) 7.58 13.71 172.32 225 226 371 491
Mean Time/Req (ms) 131.96 72.98 5.80 4.43 4.43 2.7 2.0
Transfare Rate (Kb/s) 383.03 691.92 8700.70 11413 11411 18753 24835
It is interesting to note that, although the WiFi interface of the Raspberry Pi3 has lower bandwidth
than that of the LAN interface, the RasberryPi3’s ApacheBench (ab) results show that WiFi access seems to
have a better, double the performance than that of LAN access. Raspberry Pi3 has a capacity of around 7 and
14 requests per second for LAN and WiFi load, respectively. It is an order of magnitude lower than other
systems, i.e., Asus, Virtual Machine i5 3GHz single and four-core. Physical interface limits the virtual machine
performance. Benchmarking virtual machine via a direct bridge on the same host depict 40-50% higher
performance as compared to via physical network interface. There seems to be no performance difference
between a single and four cores virtual machine.
5.5. Stressing the web server
To test the web performance limit, Siege is used. Siege is an open source regression test and
benchmark utility [32-34]. Siege is configured to read many URLs into memory and simultaneously stress
the system. The program reports the total number of hits recorded, bytes transferred, response time,
concurrency, and return status. In the test, Siege was run various concurrent clients, to stress various URLs on
the wiki web server. Stress tests performed to a Wikipedia mirror in a short 60 seconds.
Figure 1 shows the availability (%) as the system stress using Siege. Above 20 simultaneous clients
degrades the Raspberry Pi3' availability. The availability degradation of Asus mini PC began to appear in
around 20 clients, and the more severe degradation after more than 80 simultaneous clients. The i5 virtual
machine engine seems far more resistant and able to withstand a load of more than 150 clients with only slight
availability degradation.
Figure 2 shows the hits received as the number of clients increases. Raspberry Pi3 is only able to
accept the lowest hits, around 1000-1500 hits, among the four (4) systems. While Asus Mini PC can accept
an order of magnitude hits, around 9,000-10000 hits. The i5 engine can receive above 15000 to 25000 hits,
around 25 times the ability of Raspberry Pi3. A four-core system able to receive, about 20%, higher hits as
compared to the single core machine.
Figure 1. Internet-offline system availability (%) Figure 2. Hits on the internet-offline system
7. TELKOMNIKA Telecommun Comput El Control
Internet-offline solution: detail description and benchmarking (Onno W. Purbo)
1815
Figure 3 shows successful transactions handled by the system; it is reasonably similar to
the characteristics of the hits received by the system. The Raspberry Pi3 is only able to handle around
700-900 transactions. Asus Mini PC can handle well 3000-4000 transactions. The i5 virtual machine can handle
well higher transactions, around 6000-8000 transactions. Thus, Raspberry Pi3 is only capable of meeting 10%
and 20% capability of i5 and Asus Mini PC, respectively. A four-core system able to receive, about 20%,
a higher successful transaction as compared to the single core machine.
Figure 4 shows the transaction rate, in transactions per second, for many clients loading the system.
The Raspberry Pi3 is only able to handle around 20-30 transactions per second. Asus Mini PC can handle
5-6 times as compared to Raspberry Pi3 for more than 150 transactions per second. The i5 engine capable of
handling much higher loads up to around 250-400 transactions per second or an order of magnitude that of
Raspberry Pi3. A four-core system may provide, about 20%, a higher transaction rate as compared to
the single-core machine.
Figure 3. Successful transaction during
siege web stress
Figure 4. Transaction rate during
siege web stress
Figure 5 shows the concurrency capability of the system in handling the clients' load. All systems able
to meet the concurrency to be the same as the number of clients up to 20 accessing clients. At 30 clients,
concurrency of Raspberry Pi3 and Asus Mini PC is flatten, unable to keep up with the number of accessing
clients. At 50 clients, the i5 virtual machine is no longer able to keep up with the number of accessing clients.
However, the concurrency of the i5 virtual machine is somewhat degraded but not flat and trying to keep up
with the number of accessing client.
Figure 6 shows the failed transaction as a function of the number of clients accessing the system.
In the Raspberry Pi and Asus Mini PC, fail transactions began to appear after 30 clients accessing the system.
At 40 clients, fail transactions drastically increase. The i5 machine is interestingly able to handle
the transactions quite well with fail transactions under five to above 100 clients. Figure 7 displays the longest
transaction of the stressed system. All systems seem to handle the load correctly to 20 clients. The Raspberry
Pi3 and Asus Mini PC shows a jump in the longest transaction after 30 and more clients load. The i5 virtual
machines experience a significant increase in the longest transaction after loading more than 50 clients.
Figure 5. Concurrency during siege web stress Figure 6. Fail transaction during siege web stress
8. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1809 - 1818
1816
Figure 8 shows the response time in ms for the incoming transaction as a function of the number of
clients. The Raspberry Pi shows a linear increase in response time as a function of numbers of clients, from
a single client up to about 20 clients. Above 20 clients, the responds time of Raspberry Pi3 seems to level off.
The Asus mini PC and i5 machine seem to be quite resistant to request transactions stress test and can hold
respond time under 0.4 seconds up to 100 clients.
It is interesting to note that the network interface limits the performance of the i5 virtual machines.
The Table 6 shows the average hits, average transaction rate, average successful transactions, and average fail
transactions for single-core and four-core virtual machines with LAN and direct bridging with a client on
the same host. It shows that the virtual machine with the direct bridging connection has higher performance
and much less fail transaction. The higher performance also observed on the higher core machines.
Figure 7. Longest transaction during
siege web stress
Figure 8. Responds time (sec) during
siege web stress
Table 6. Performance comparison LAN and direct bridge during siege web stress
ave. hits ave. transaction/sec ave. successful
transactions
ave. fail transactions
1 core LAN 15304 255 5300 14.8
1 core Nolan 17235 287 6084 1.4
4 core LAN 19429 342 6711 14.1
4 core Nolan 22365 373 7844 4.7
5.7. Raspberry Pi3 power consumption
Electrical power is scarce, especially in rural/villages. Thus, one needs to plan better prior using
Raspberry Pi3 as a server in rural schools in a limited power environment. Raspberry Pi3 current consumption
measured using a small ampere meter installed between the power bank output or the USB power plug and
the Raspberry Pi3. The current draw during the web stress test condition and the file-sharing test loads via both
LAN as well as WiFi connections is measured. The resulting current profile is as shown in Table 7.
Typical current during smartphone charging is around 1-2 A. Raspberry Pi3 current consumption is
found to be lower than the charging current of typical smartphones. When there are no activities,
the Raspberry Pi3 consumption is around 0.26 A. Heavy file sharing stress test draw 0.36 A and 0.39 A, for
LAN and WiFi stress test, respectively. Massive web access draws 0.43 A and 0.46 A for LAN and WiFi stress
test, respectively. WiFi access draws a little bit more current, around 0.03 A, than that of LAN network access.
Most of the affordable power banks sold in online shops have a capacity of around 10000-20000 mAh.
With such a large capacity, a fully charged power bank may supply the necessary power for the Raspberry Pi3
server to operate more than six hours. Alternative power resources such as solar cells integrated with the power
banks or battery may be of interest for longer operating hours.
Table 7. Raspberry Pi3 power consumption
Network Stress WiFi Stress
Standby / no activities 0.26 A 0.26 A
File sharing (dbench) 0.36 A 0.39 A
Web stress (siege) 0.43 A 0.46 A
9. TELKOMNIKA Telecommun Comput El Control
Internet-offline solution: detail description and benchmarking (Onno W. Purbo)
1817
6. INTERNET-OFFLINE PROPOSED USAGE STRATEGY IN RURAL SCHOOLS
The internet-offline solution based on Raspberry Pi3 has a limited service capacity. A fully charged
power may provide 6+ operation hours of a Raspberry Pi3 Server to serve a maximum of 20 clients. The ideal
condition is when (1) electrical power is available, (2) the server runs during the school operating hours, and
(3) each class has a small WiFi access point that can provide access to students to access the internet-offline
server. Since students have any time access to the system, the highest load likely occurs when students have
no class activities and do independent learning activities. With the Raspberry Pi3 server, the system will be
limited to serve 20 simultaneously access clients. Thus, for a large client based, a larger server is needed.
Assembling i5 or i7 machines may provide a low-cost solution for internet-offline servers. If electrical power
and funding are limited, then the rural usage strategy for Offline Internet would be:
- Integrate into the computer lab at school.
- Each class participates in the lab class for a particular time. For example, if one lab session about 2 hours,
in one day, there will be two (2) maximum class shifts.
- To reduce system load, two students may share one gadget. Therefore, in a single lab class, there will be
around 20 gadgets with 40 students.
- Educational content for each class/level should be different. All content in a school may not fit into
a single MicroSD. If it does not fit into a single MicroSD, one may split the educational content for each
level into separate MicroSDs. Consequently, a primary school may require around six (6) sets of MicroSD.
A junior high school requires three (3) sets of MicroSD.
It would of interest to pursue in-depth research work in (1) the content for online study, (3) courses that may
provide online enrichment materials to students, and (3) the online assisted teaching techniques.
7. SUMMARY AND CONCLUSION
The main contribution of the paper is in the benchmarking of the low-cost internet-offline solution for
rural and village schools. The Rasberry Pi3 server found to be able to serve about 20 clients and able to run for
6+ hours of operation using a low-cost consumer grade power bank. The internet-offline system provides
offline information, to overcome the knowledge scarcity in rural and village areas due to lack of Internet access.
The required online content copies to a local Raspberry Pi3 Server, and, thus, may be offline viewed by
the students. For large capacity, one may use an i5 or i7 PC to keep the price-performance ratio low. The system
uses open source, and detailed how-to posted on the OnnoCenter's web and wiki.
It is interesting to note that the network interface limits the performance of virtual machines.
The virtual machine with a direct bridging connection has higher performance and much less fail transactions.
Also, many core virtual machines demonstrate higher performance results. Web services, such as Kiwix,
is limited by the processing power. The physical interface significantly limits the ability to transfer files for
clients. For massive streaming and file sharing activities, it would be advisable to binding several network
physical interfaces in the server.
The most time-consuming and challenging work is in preparing the teaching materials to be copied to
the internet-offline server. From the hardware side, one will face the limitation of MicroSD storage size.
It thus limits the scenario and methods in providing the educational material to the students. With minimal
space in the MicroSD, one needs to focus on what material needs to be copied to MicroSD so that it is sufficient
for teaching processes. One of the most significant advantages of internet-offline Solution for schools is that
teachers no longer have to worry about pornographic, inappropriate content, cyberbully, spam, hoax, and much
unproductive content from the Internet. Thus, the teachers may focus on teaching the materials. This research
is still in the early stage. It hopes to produce a practical solution for schools in rural/village areas. Further work,
especially in preparing content in sync with the teaching method, is needed.
REFERENCES
[1] Purbo O. W., “Narrowing the digital divide,” Digital Indonesia: Connectivity and Divergence, pp. 75-92, 2017.
[2] Malandrino F., Chiasserini C. F., Kirkpatrick S., “Understanding the present and future of cellular networks through
crowdsourced traces,” 2017 IEEE 18th International Symposium on A World of Wireless, Mobile and Multimedia
Networks (WoWMoM), pp. 1-9, 2017.
[3] Kaup F., Fischer F., Hausheer D., “Measuring and predicting cellular network quality on trains,” 2017 International
Conference on Networked Systems (NetSys), pp. 1-8, 2017.
[4] Asrese A. S., Walelgne E. A., Bajpai V., Lutu A., Alay Ö., Ott J., “Measuring Web Quality of Experience in Cellular
Networks,” International Conference on Passive and Active Network Measurement, pp. 18-33, 2019.
[5] Purbo O. W., “Internet-Offline Solution for Rural/Village Schools,” 4th Free & Open Source Software Conference
(FOSSC’2019-OMAN), 2019.
[6] Andrew, et al., “The rsync algorithm,” The Australian National University, 1996.
[7] Kelley, Simon, “Dnsmasq,” Simon Kelley, 2008.
10. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 1809 - 1818
1818
[8] M. Jouni, “hostapd: Ieee 802.11 ap, ieee 802.1 x/wpa/wpa2/eap/radius authenticator,” 2013. [Online]. Available:
https://w1.fi/hostapd/
[9] United States Patent, “United States patent US 6,493,758,” 2002.
[10] Shaver R., “Systems and methods for providing a similar offline viewing experience of online web-site content,”
United States patent US 8,001,471, 2011.
[11] Shaver R., “Systems and methods for a single development tool of unified online and offline content providing
a similar viewing experience,” United States patent US 8,015,491, 2011.
[12] Linzy K., Hosman L., “The SolarSPELL Offline Digital library,” IFLAWLIC 2018 Kuala Lumpur, pp. 1-8, 2018.
[13] Perry A., “Global Education, Global Challenges: Licensing for the New American University,” Against the Grain,
vol. 29, no. 4, 2019.
[14] Oyelude A. A., “What’s trending in libraries from the internet cyberspherem alternate technology use,” Library
Hi Tech News, vol. 33, no. 10, pp. 15-6, 2016.
[15] Hosman L., “Impatience as a Virtue: Addressing Persistent ICT-in-Education Challenges in Small Developing
Countries,” ICT-Supported Innovations in Small Countries and Developing Regions, pp. 169-193, 2018.
[16] Maron D., Missen C., Tayag E., Mc Neirney K., “Lo-Fi to Hi-Fi" Crowd Cataloguing: Increasing E-Resource Records
and Promoting Metadata Literacy within WiderNet,” iConference 2015 Proceedings, 2015.
[17] Gafinowitz N. C., “Digital Library Appropriation in the Context of SubSaharan Countries: The Case of eGranary
Digital Library Implementation,” Proceedings of the 7th Annual Symposium on Computing for Development, 2016.
[18] Reed P. J., Kanya R. A., “ICT, Aspirations, and Career Decisions: Does Access to Information Change How Nigerian
Students Make Career Decisions?,” iConference 2018 Proceedings, 2018.
[19] Inefuku H. W., “Globalization, open access, and the democratization of knowledge,” Educause Review, vol. 52,
no. 4, pp. 62-63, 2017.
[20] Lin J., “The sum of all human knowledge in your pocket: Full-text searchable Wikipedia on a Raspberry Pi,”
Proceedings of the 15th ACM/IEEE-CS Joint Conference on Digital Libraries, pp. 85-86, 2015.
[21] Gagneux E., Bowers B., Garcia N., Harkat C., Diouf M., Engome V. P., “Afripédia: rebalancing access and visibility
on Wikipedia,” 24th BOBCATSSS Conference Proceedings & Abstracts, 2016.
[22] Luckie M., “Scamper: a scalable and extensible packet prober for active measurement of the internet,” Proceedings
of the 10th ACM SIGCOMM conference on Internet measurement, pp. 239-245, 2010.
[23] Chen B., Pattanaik N., Goulart A., Butler-Purry K. L., Kundur D., “Implementing attacks for modbus/TCP protocol
in a real-time cyber physical system test bed,” 2015 IEEE International Workshop Technical Committee on
Communications Quality and Reliability (CQR), pp. 1-6, 2015.
[24] Buchanan B., Flandrin F., Macfarlane R., Graves J., “A methodology to evaluate rate-based intrusion prevention
system against distributed denial-of-service (DDoS),” Cyberforensics, 2011.
[25] Smith B., Grehan R., Yager T., Niemi D. C., “Byte-unixbench: A Unix benchmark suite,” Technical report, 2011.
[26] Babu A., Hareesh M. J., Martin J. P., Cherian S., Sastri Y., “System performance evaluation of para virtualization,
container virtualization, and full virtualization using xen, openvz, and xenserver,” 2014 Fourth International
Conference on Advances in Computing and Communications, pp. 247-250, 2014.
[27] Litayem N., Saoud S. B., “Impact of the Linux real-time enhancements on the system performances for multi-core
intel architectures,” International Journal of Computer Applications, vol. 17, no. 3, pp. 17-23, 2011.
[28] Sheldon M. X., Weissman G. V., “Retrace: Collecting execution trace with virtual machine deterministic replay,”
Proceedings of the Third Annual Workshop on Modeling, Benchmarking and Simulation (MoBS 2007), 2007.
[29] Wu H., Liu F., Lee R. B., “Cloud Server Benchmarks for Performance Evaluation of New Hardware Architecture,”
arXiv preprint arXiv:1603.01352, pp. 1-5, 2016.
[30] Golasowski M., Slaninová K., Ševčík J., Ptošek V., Vojtek D., “Server-side navigation service benchmarking tool,
Proceedings of the 14th International Symposium on Operational Research, pp. 85-90, 2017.
[31] Prokofyeva N., Boltunova V., “Analysis and Practical Application of PHP Frameworks in Development of Web
Information Systems,” Procedia Computer Science, vol. 104, pp. 51-6, 2017.
[32] Abbas R., Sultan Z., Bhatti S. N., “Comparative analysis of automated load testing tools: Apache JMeter, Microsoft
Visual Studio (TFS), LoadRunner, Siege,” 2017 International Conference on Communication Technologies
(ComTech), pp. 39-44, 2017.
[33] Abbas R., Sultan Z., Bhatti S. N., “Comparative Study of Load Testing Tools: Apache JMeter, HP LoadRunner,
Microsoft Visual Studio (TFS), Siege,” International Conference on Computing and Mathematical Sciences
ICCMS’2017, 2017.
[34] Pradeep S., Sharma Y. K., “A Pragmatic Evaluation of Stress and Performance Testing Technologies for Web Based
Applications,” 2019 Amity International Conference on Artificial Intelligence (AICAI), pp. 399-403, 2019.