Pub Date : 2022-01-17DOI: 10.36548/jucct.2021.4.002
H. Andi
Currently, there is no way soon to stop the coronavirus epidemic that has spread over the globe. People are alarmed by its quick and widespread expansion. COVID-19's transmission chain was then broken by everyone. There was a gradual decrease in social and physical closeness. Distancing yourself from others is a way to prevent the transmission of disease. The purpose of this research is to investigate how online learning can be implemented in Tamil Nadu, India, during the COVID-19 epidemic. This research works focuses to find efficient learning procedure in eLearning protocols. The findings indicated that Google Classroom, WhatsApp, and Zoom Clouds Meeting were consecutively the most commonly utilized programs to help in remote learning. Despite this, most instructors continue to use the learning paradigm while teaching in virtual environments. Online learning and remote education are the most common methods of learning. The instructor claims that the learning model used is beneficial to their work in creating a virtual classroom since it adheres to the model's structured grammar. The experimental test has been conducted with 125 students who anonymously filled out a questionnaire and voted for more visual based eLearning. The findings show that students in distance education believed that there were more tasks than in face-to-face education. At the same time, students indicated that they spent more time studying at home than in school.
{"title":"Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics","authors":"H. Andi","doi":"10.36548/jucct.2021.4.002","DOIUrl":"https://doi.org/10.36548/jucct.2021.4.002","url":null,"abstract":"Currently, there is no way soon to stop the coronavirus epidemic that has spread over the globe. People are alarmed by its quick and widespread expansion. COVID-19's transmission chain was then broken by everyone. There was a gradual decrease in social and physical closeness. Distancing yourself from others is a way to prevent the transmission of disease. The purpose of this research is to investigate how online learning can be implemented in Tamil Nadu, India, during the COVID-19 epidemic. This research works focuses to find efficient learning procedure in eLearning protocols. The findings indicated that Google Classroom, WhatsApp, and Zoom Clouds Meeting were consecutively the most commonly utilized programs to help in remote learning. Despite this, most instructors continue to use the learning paradigm while teaching in virtual environments. Online learning and remote education are the most common methods of learning. The instructor claims that the learning model used is beneficial to their work in creating a virtual classroom since it adheres to the model's structured grammar. The experimental test has been conducted with 125 students who anonymously filled out a questionnaire and voted for more visual based eLearning. The findings show that students in distance education believed that there were more tasks than in face-to-face education. At the same time, students indicated that they spent more time studying at home than in school.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"8 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121217872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-27DOI: 10.36548/jucct.2020.2.005
Subarna Shakya
The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.
{"title":"Computational Enhancements of Wearable Healthcare Devices on Pervasive Computing System","authors":"Subarna Shakya","doi":"10.36548/jucct.2020.2.005","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.005","url":null,"abstract":"The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"211 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131990969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-26DOI: 10.36548/jucct.2020.2.001
Dr. Mugunthan S. R.
Communication is an essential thing for any work to be done on desired condition. There are several ways are there to communicate between a person to a machine. Switches are made as primary communication medium to do a specific task by a machine. The advancement of technologies introduced a remote switch for operation. The advancement is still continuing with voice recognition, hand gesture movement and mind reading models. Recently machine to machine communication was introduced to communicate their status between another machine or a system for implementing smart work on its own intelligence. The paper introduces a smart communication between vehicles to traffic signals and vehicle to vehicle using Li-Fi (Light Fidelity) technology for sharing necessary information to the nearby vehicle. The paper also describes the limitations and challenges in the Li-Fi technology for further communication improvement.
{"title":"Concept of Li-Fi on Smart Communication between Vehicles and Traffic Signals","authors":"Dr. Mugunthan S. R.","doi":"10.36548/jucct.2020.2.001","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.001","url":null,"abstract":"Communication is an essential thing for any work to be done on desired condition. There are several ways are there to communicate between a person to a machine. Switches are made as primary communication medium to do a specific task by a machine. The advancement of technologies introduced a remote switch for operation. The advancement is still continuing with voice recognition, hand gesture movement and mind reading models. Recently machine to machine communication was introduced to communicate their status between another machine or a system for implementing smart work on its own intelligence. The paper introduces a smart communication between vehicles to traffic signals and vehicle to vehicle using Li-Fi (Light Fidelity) technology for sharing necessary information to the nearby vehicle. The paper also describes the limitations and challenges in the Li-Fi technology for further communication improvement.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"9 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141203033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-26DOI: 10.36548/jucct.2020.2.003
Anand J.V.
The paper emphasis on an instinctual and efficacious method to forecast and analyze the condition of different atmospheric determinants all over the world. The difficulty in the extant remedies or the apparatus is its incapability to provide a comprehensive information regarding the evaluation of the attributes of the atmosphere. The proposed methodology in the paper gathers the actual information about the atmospheric attributes such as the water, air, the forest and the tree cover etc. from the government bases and processes the collective information. The methodology does the extrication transformation load over the original collective data’s that are in its raw format. The converted information sets are imported into the database to develop a dash boards with the multiple information’s displayed on it. This allows to have an evaluated data about the various atmospheric factors. To forecast the deteriorations and the conditions of the atmospheric attributes the methodology proffered utilizes the Fuzzy C means clustering, R-studio, and the ARIMA frame work. The dash board assists the NLP enabling the end users to post their queries as input and get back the desired output. The developed deterioration forecasting and evaluation can be used in the evaluation of the conditions of atmospheric attributes for the different countries in the world.
本文强调了一种预报和分析全球不同大气决定因素状况的直观有效的方法。现有补救措施或仪器的难点在于无法提供有关大气属性评估的全面信息。本文提出的方法从政府数据库中收集有关大气属性的实际信息,如水、空气、森林和树木覆盖等,并对这些集体信息进行处理。该方法对原始格式的集体数据进行提取转换加载。转换后的信息集被导入数据库,以开发显示多种信息的仪表板。这样就可以获得有关各种大气因素的评估数据。为了预测大气属性的恶化和状况,所提出的方法利用了模糊 C 表示聚类、R-studio 和 ARIMA 框架。仪表板协助 NLP 使最终用户能够将其查询作为输入,并获得所需的输出。所开发的恶化预测和评估可用于评估全球不同国家的大气属性条件。
{"title":"A Methodology of Atmospheric Deterioration Forecasting and Evaluation through Data Mining and Business Intelligence","authors":"Anand J.V.","doi":"10.36548/jucct.2020.2.003","DOIUrl":"https://doi.org/10.36548/jucct.2020.2.003","url":null,"abstract":"The paper emphasis on an instinctual and efficacious method to forecast and analyze the condition of different atmospheric determinants all over the world. The difficulty in the extant remedies or the apparatus is its incapability to provide a comprehensive information regarding the evaluation of the attributes of the atmosphere. The proposed methodology in the paper gathers the actual information about the atmospheric attributes such as the water, air, the forest and the tree cover etc. from the government bases and processes the collective information. The methodology does the extrication transformation load over the original collective data’s that are in its raw format. The converted information sets are imported into the database to develop a dash boards with the multiple information’s displayed on it. This allows to have an evaluated data about the various atmospheric factors. To forecast the deteriorations and the conditions of the atmospheric attributes the methodology proffered utilizes the Fuzzy C means clustering, R-studio, and the ARIMA frame work. The dash board assists the NLP enabling the end users to post their queries as input and get back the desired output. The developed deterioration forecasting and evaluation can be used in the evaluation of the conditions of atmospheric attributes for the different countries in the world.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141202887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-03-30DOI: 10.36548/jucct.2020.1.006
Madhura .S, Thilak Raj L
Smart Cities, Homes and Communities are the spaces where IoT sensors are used to the fullest in the Utilities sector. Advanced Metering Infrastructure (AMI) providing the peer-to-peer communication between metering equipment that reads, calculate and provides the information related to distribution and measure the consumption. This paper outlines the network monitoring and management architecture that can be used in Smart Cities, homes and communities using the integrated IoT and Blockchain technology. Blockchain technology provides trustworthy resource monitoring of utilities for all members of the smart community that in-turn benefit the members of smart communities with enhanced monitoring and optimize the consumption of resources in protected and transparent way.
{"title":"A Secure Protocol for Smart Meters using IoT Enabled Distribution Networks and Blockchain Security Mechanism","authors":"Madhura .S, Thilak Raj L","doi":"10.36548/jucct.2020.1.006","DOIUrl":"https://doi.org/10.36548/jucct.2020.1.006","url":null,"abstract":"Smart Cities, Homes and Communities are the spaces where IoT sensors are used to the fullest in the Utilities sector. Advanced Metering Infrastructure (AMI) providing the peer-to-peer communication between metering equipment that reads, calculate and provides the information related to distribution and measure the consumption. This paper outlines the network monitoring and management architecture that can be used in Smart Cities, homes and communities using the integrated IoT and Blockchain technology. Blockchain technology provides trustworthy resource monitoring of utilities for all members of the smart community that in-turn benefit the members of smart communities with enhanced monitoring and optimize the consumption of resources in protected and transparent way.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":" 0","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141220047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-12-21DOI: 10.36548/jucct.2019.2.003
Suma
The latest developments in the communication and the information technologies have turned out to be the foundation for the emergence of the industrial developments and progress in the business causing digital transformation in the industrial and the business operations. The clubbing of the internet and the information technology along with the tangible things that are the responsible for the industrial operations, generate a huge set of data that requires enormous network bandwidth, high processing power and accessible resolutions. So the paper presents the elastic cloud computing approach to bring down the complexities in deploying, cost of the groundwork and maintenance and provide an automated resource provisioning according to the demands. This method increases the amount of the computing power available, network properties and the storage. The experimental results for the novel elastic approach for the big data analytics is obtained by the simulation through MATLAB in terms response time, processing power and cost.
{"title":"ELASTIC CLOUD COMPUTING APPROACH FOR BIG DATA ANALYTICS","authors":"Suma","doi":"10.36548/jucct.2019.2.003","DOIUrl":"https://doi.org/10.36548/jucct.2019.2.003","url":null,"abstract":"The latest developments in the communication and the information technologies have turned out to be the foundation\u0000for the emergence of the industrial developments and progress in the business causing digital transformation in the industrial and\u0000the business operations. The clubbing of the internet and the information technology along with the tangible things that are the\u0000responsible for the industrial operations, generate a huge set of data that requires enormous network bandwidth, high processing\u0000power and accessible resolutions. So the paper presents the elastic cloud computing approach to bring down the complexities in\u0000deploying, cost of the groundwork and maintenance and provide an automated resource provisioning according to the demands.\u0000This method increases the amount of the computing power available, network properties and the storage. The experimental\u0000results for the novel elastic approach for the big data analytics is obtained by the simulation through MATLAB in terms response\u0000time, processing power and cost.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-30DOI: 10.36548/jucct.2019.1.006
S. Smys, J. S. Raj
Routing and mobile data traffic management is a major performance affecting issue in vehicular Ad Hoc networks (VANET). High-rise structures and such radio obstacles cause trouble in proper reception of signals when position-based routing schemes are used. Other major challenges include constrained mobility and irregular distribution of vehicular nodes. A stochastic mobile data traffic model is presented in this paper. This model offers security, reliability, safety and comfort for driving by overcoming the problems of traffic congestion, interference and jamming. It also addresses the handover (HO) issue that occurs during fast mobility. Along with this, the quality parameters of the system such as throughput, packet delivery ratio and delay are also evaluated.
{"title":"A STOCHASTIC MOBILE DATA TRAFFIC MODEL FOR VEHICULAR AD HOC NETWORKS","authors":"S. Smys, J. S. Raj","doi":"10.36548/jucct.2019.1.006","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.006","url":null,"abstract":"Routing and mobile data traffic management is a major performance affecting issue in vehicular Ad Hoc networks (VANET). High-rise structures and such radio obstacles cause trouble in proper reception of signals when position-based routing schemes are used. Other major challenges include constrained mobility and irregular distribution of vehicular nodes. A stochastic mobile data traffic model is presented in this paper. This model offers security, reliability, safety and comfort for driving by overcoming the problems of traffic congestion, interference and jamming. It also addresses the handover (HO) issue that occurs during fast mobility. Along with this, the quality parameters of the system such as throughput, packet delivery ratio and delay are also evaluated.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127783041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-23DOI: 10.36548/jucct.2019.1.005
Suma
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security in multitude sectors that is under the control of the government and the private. The paper also presents the security and the privacy mechanism using the block chain to prevent the misuse and the corruption in the sharing of huge set of data generated from the judiciary, security, legislature, commercial code registries etc. The proposed system enables reliability and the trust in the data sharing in the communication channels utilizing the block chain with the RSA digital signature. The proposed system is simulated as a java programming version to evince the enhancement in the latency in the sharing of the information’s along with the privacy and the security.
{"title":"SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN","authors":"Suma","doi":"10.36548/jucct.2019.1.005","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.005","url":null,"abstract":"Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security in multitude sectors that is under the control of the government and the private. The paper also presents the security and the privacy mechanism using the block chain to prevent the misuse and the corruption in the sharing of huge set of data generated from the judiciary, security, legislature, commercial code registries etc. The proposed system enables reliability and the trust in the data sharing in the communication channels utilizing the block chain with the RSA digital signature. The proposed system is simulated as a java programming version to evince the enhancement in the latency in the sharing of the information’s along with the privacy and the security.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-21DOI: 10.36548/jucct.2019.1.004
A Pasumponpandian, S. Smys
The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.
{"title":"DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK\u0000USING MACHINE LEARNING","authors":"A Pasumponpandian, S. Smys","doi":"10.36548/jucct.2019.1.004","DOIUrl":"https://doi.org/10.36548/jucct.2019.1.004","url":null,"abstract":"The telecommunication network that is the assemblage of the terminal nodes enables the whole to be connected. The swift progress in the telecommunication networks and the information technology has enabled a seamless connection and the capacity to store and communicate vast scale of information in the form of text and voice that are sensitive. This makes the telecommunication networks prey to multiple cyber-threats of which the DDOS (distributed denial of service) are the more predominant type of the cyber-threat causing the denial of the services to the users. So the paper utilizing the combination of the neural network and the support vector machine presents the detection and the classification method for the DDOS attacks in the telecommunication network. The performance evaluation using the network simulator-2 enables to have the enhanced detection accuracy for the proposed method.","PeriodicalId":443052,"journal":{"name":"Journal of Ubiquitous Computing and Communication Technologies","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115110489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}