scholarly journals The Implementation of Augmented Reality Applications in Education

Author(s):  
Kalliopi Kanaki ◽  
Nikolaos D. Katsali

In this paper, we present augmented reality applications implemented by students and teachers of the 5th Vocational High School of Heraklion in Crete, within the context of informatics courses. The applications aim to enhance the traveling experience of the visitors of Heraklion city, exploiting the global spread of smart mobile devices in contemporary societies and the facilities they provide. The whole project was accomplished in a collaborative manner and focused on the provision of information about museums and monuments of Heraklion city. The applications have to be installed on the smart mobile device of the user.

2013 ◽  
Vol 684 ◽  
pp. 509-512
Author(s):  
Cheng Min Lin ◽  
Ching Yuan Huang ◽  
Dun Yu Yang ◽  
Tzu Chi Lin ◽  
Chiu Chiao Chung ◽  
...  

In recent years, making use of smart mobile devices to the tour is more important due to these devices are popular and people pay much attention to tourism. The purpose of this work is to integrate technologies, including Android, wireless sensor networks and augmented reality to design an interactive museum exhibit system. The main contributions of this paper are twofold: the integration framework of interactive museum exhibit system is provided and the integration of museum exhibit system and wireless sensor networks. Implementation of this work includes Android, wireless sensor networks and augmented reality to design an interactive museum exhibit system.


2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Qinglong Huang ◽  
Haiping Huang ◽  
Wenming Wang ◽  
Qi Li ◽  
Yuhan Wu

With the increasing number of smart mobile devices, applications based on mobile network take an indispensable role in the Internet of Things. Due to the limited computing power and restricted storage capacity of mobile devices, it is very necessary to design a secure and lightweight authentication scheme for mobile devices. As a lightweight cryptographic primitive, the hash chain is widely used in various cryptographic protocols and one-time password systems. However, most of the existing research work focuses on solving its inherent limitations and deficiencies, while ignoring its security issues. We propose a novel construction of hash chain that consists of multiple different hash functions of different output lengths and employ it in a time-based one-time password (TOTP) system for mobile device authentication. The security foundation of our construction is that the order of the hash functions is confidential and the security analysis demonstrates that it is more secure than other constructions. Moreover, we discuss the degeneration of our construction and implement the scheme in a mobile device. The simulation experiments show that the attacker cannot increase the probability of guessing the order by eavesdropping on the invalid passwords.


Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


Sign in / Sign up

Export Citation Format

Share Document