SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
R.V. College of Engineering
Department of Information Science and Engineering Page 28
CHAPTER 7
CONCLUSION
The system emulates the actions of mouse and keyboard with the help of mobile phone. Some
of the PC applications like media player and browsers can also be controlled via the bluetooth
enabled mobile device. The system operates in keyboard, mouse, application and utilities
mode. The keyboard mode allows performing basic functions on text editor and movement of
cursor. The mouse mode provides full support for controlling the mouse movements and
clicks. Also, the computer desktop is generated on the phone. In the application mode,
applications like power point, media players and browsers can be controlled. Utilities mode
enables running command and sending of message to the personal computer.
The Bluetooth technology and J2ME are made use by the system to allow the users to view
and access the desktop screen of the PC on the mobile phones, control applications and
thereby interact with the computer through Bluetooth.
7.1 FUTURE ENHANCEMENT
The system can be extended to support the following functionalities:
 Multi-word commands can be executed under the utilities mode.
 Integrating more Multimedia applications like downloading image, audio, video etc.
R.V. College of Engineering
Department of Information Science and Engineering Page 29
REFERENCES
[1] Keith Cheverst, Alan Dix, Daniel Fitton, Chris Kray, Mark Rouncefield, Corina Sas,
George Saslis-Lagoudakis, Jennifer G. Sheridan,” Exploring Bluetooth based Mobile Phone
Interaction with the Hermes Photo Display” in Department of Computing, Infolab21
Lancaster University,2012
[2] R.S.S.Vishnu Priya , P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad,
P.D.Nageswara Rao ,”Mobile-PC Suite: Using Mobile Phone as Remote to Control PC
Operations” in Dept. of CSE, KLCE Vaddeswaram, India, (IJCSIT) International Journal of
Computer Science and Information Technologies, Vol. 3 (2) , 2012,3355 – 3359,2013
[3] Dr. Khanna, SamratVivekanand, Omprakash ,”Concept of Remote controlling PC with
Smartphone Inputs from remote place with internet”in Information Technology Dept, ISTAR,
Sardar Patel University, VV Nagar, India, 2012
[4] Faisal Baig, Saira Beg and Muhammad Fahad Khan, “Zigbee Based Home Appliances
Controlling Through Spoken Commands Using Hand held Devices” in nternational Journal
of Smart Home Vol. 7, No. 1, January, 2013.
[5]Nokia Corporation(2011),”PC Connectivity over Bluetooth in Java Applications”,Version
1.0,Publication date :December 8,2011.
[6] Ting Zhang, Yuanxin Ouyang , “Case Study of Human Computer Interaction Based on
RFID and Context-Awareness” in Ubiquitous Computing Environments Volume
4555, 2007, pp 264-271.
[7] K. V. S. S. S. S. Sairam, Dr. M. G. R, N. Gunasekaran, S. Rama Reddy, “Bluetooth in
Wireless Communication“ in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY,
2008.
[8] N. Golmie, R. E. Van Dyck, and A. Soltanian, “Interference of Bluetooth and IEEE
802.11: Simulation Modeling and Performance Evaluation” in National Institute of Standards
and Technology Gaithersburg, Maryland 20899, 2010.
[9] P. Johansson, R. Kapoor, M. Kazantzidis, and M. Gerla, “Personal Area Networks:
Bluetooth”, in International Journal of Wireless Information Networks, Vol. 9, No. 2, April
2002.
R.V. College of Engineering
Department of Information Science and Engineering Page 30
[10] K. V. S. S. S. S. Sairam, University of Madras, Dr. M. G. R. Engineering College N.
Gunasekaran, Anna UniversityS. Rama Reddy, Jerusalem College of Engineering, Dr. M. G.
R. Engineering College,” Bluetooth in Wireless Communication”,2002
[11] Peng Zhou,” HCI-based bluetooth master-slave monitoring system design”, Nat. Key
Lab. of Sci. & Technol. on Communication, Univ. of Electron. Sci. & Technol. of China,
Chengdu, China ; Xiang Ling,2010.
[12] Beg, M.S. ,Fatimah, B. ,Jain, S. ; Muzammil, R.,” Bluetooth based implementations for
realising new consumer systems”, ; Deptt. of Electron. Eng., AMU, Aligarh, India, 2009.
[13]Yabin Liu ; Sch. of Autom; Shouqian Yu ; Weihai Chen ; Wei Li,” Wireless
Communication Technology Based on Bluetooth and Its Application to a Manipulator”,
Beijing Univ. of Aeronaut. & Astronaut., Beijing,2006.
[14] Siegemund, F,Florkemeier C.,” Interaction in pervasive computing settings using
Bluetooth-enabled active tags and passive RFID technology together with mobile phones”,
; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland,2003
[15] Jin-Shyan Lee Yu-Wei Su ; Chung-Chou Shen,” A Comparative Study of Wireless
Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, ; Ind. Technol. Res. Inst., Hsinchu,2007
[16] Ballagas, R., Rohs, M., Sheridan, J.G. and Borchers, J.,Sweep and point & shoot:
Phonecam-based interactions for large public displays. In Proceedings of the SIGCHI
conference on Human factors in computing systems (CHI'05) Extended abstracts, ACM
Press, 2005.
[17] Cheverst, K. Dix, A., Fitton, D., Kray, C., Rouncefield, M.,Saslis-Lagoudakis, G. and
Sheridan, J. G., Exploring Mobile Phone Interaction with Situated Displays, In Proceedings
of the 1st workshop on Pervasive Mobile Interaction Devices (PERMID),2005.
[18] Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,Crabtree, A. and Hemmings, T.,
SPAM on the menu: the practical use of remote messaging in community care, In
Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada, ACM
Press. 2003, 23-29.
[19] Ferscha, A. and S. Vogl, Pervasive Web Access via Public Communication Walls: In
Proceedings of Pervasive Computing, LNCS 2414, Zurich, Switzerland, 2002, 84-97.
[20] Gaver, W., Dunne, A. and Pacenti, E., Cultural Probes, Interactions: New Visions of
Human-Computer Interaction. (1) (1999).
R.V. College of Engineering
Department of Information Science and Engineering Page 31
[21] Graham, K., Cheverst, K., Rouncefield, M. and Kray, C. Going More Public: Situated
Display Design in a Care Setting through Co-realisation, Submitted to the 2005 Conference
on Designing for User eXperience (DUX’05).
[22] Himanshu R., Gossweiler, R. and Milojicic, D., ContentCascade Incremental Content
Exchange between Public Displays and Personal Devices, In Proceedings of the International
Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04),
Boston, Massachussets, USA, 2004, 374-381.
[23] Shwetak N. Patel and Gregory D. Abowd,” Beyond Mobile Telephony: Exploring
Opportunities for Applications on the Mobile Phone Handset”,College of Computing & GVU
Center, 801 Atlantic Drive, Atlanta, GA 30332-0280, USA {shwetak,
abowd}@cc.gatech.edu,2010
[24] Motorola Global Telecom Solution Sector. (2002) "i95cl Multi-Communication Device
J2ME Developers' Guide". Motorola, 2002.
[25] Nichols, J., B. A. Myers, M. Higgins, J. Hughes, T. K. Harris, R. Rosenfeld and
M.Pignol.(2002) Generating remote control interfaces for complex appliances. Proceedings
of the 15th annual ACM symposium on User interface software and technology (UIST 2002),
ACM Press, Paris, France, pp 161—170.
[26]. Patel, S.N. and G.D. Abowd. (2003) A 2-way Laser-assisted Selection Scheme for
Handhelds in a Physical Environment. Technical Note submitted for review to Ubicomp
2003.
[27] Yesim Tunccekic, and Kivanc Dincer,”Mobile Mapping Applications over J2ME
Enabled PhonesHAVELSAN Eskisehir Yolu, Ankara, TURKE, 2007.
[28] Minoi,J. L., Green P., Arnab, S., 2002, Navigation Application with Mobile Telephony:
Shortest-path, University Malaysia Sarawak, University of Manchester, Map Asia 2002.
[29] Liu, J., Mobile Map: A Case Study in the Design & Implementation of a Mobile
Application, Computer Engineering Dept of Carleton University, http://www.sce.
carleton.ca/wmc/chameleon/mc/JaneThesis.pdf,2002.
[30] Revel, S.,” How Does Location Govern Task? The Delivery of an Intelligent Tourist
Aide Over a Palm Device”,Univ. of Edinburgh, MSc Dissertation Plan, http://www.
geo.ed.ac.uk/~gisadmin/submission/msc0138/plan.html,2007.
[31] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V.Veijalainen, J., Katanosov, A.,
Tirri, H,” Developing GIS-supported Location Based Services”, Helsinki
University of Technology, University of Jyvaskyla, Finland, 2002.
R.V. College of Engineering
Department of Information Science and Engineering Page 32
[32] Megler, V., “ i-mode:From bandwidth problem into Internetphenomenon”, http://www-
106.ibm.com/ developerworks/library/wi-imode/index.html,2002.
[33] Keryer, P., Nara, T.,” i-mode: A Successful Lauch of The Mobile Internet Market”,
Alcatel Telecommunications Review – First Quarter 2001.
[34] Dru, M-A, Saada, S.,” Location-Based Mobile Services”, The Essentials, Alcatel
Telecommunications Review – First Quarter 2001.
[35] Goodman, D. J.,” The wireless Internet: Promises and Challenges”, July 2000 IEEE
Computer magazine.
[36] Laitinen, H., Sun’s Worldwide Java Developer Conference, Development Tools for the
J2ME, 2003 http://www.forum.nokia.com/main/1,35452,1_0_75,00.html,2001.

Más contenido relacionado

La actualidad más candente

context aware computing
context aware computingcontext aware computing
context aware computing
swati sonawane
 
Human Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of WaterlooHuman Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of Waterloo
Plinio Morita, PhD MSc PEng
 

La actualidad más candente (20)

Top cited Network Security Articles- Part 1
Top cited Network Security  Articles- Part 1Top cited Network Security  Articles- Part 1
Top cited Network Security Articles- Part 1
 
JEGADEESAN_CV
JEGADEESAN_CVJEGADEESAN_CV
JEGADEESAN_CV
 
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
March 2021: Top Ten Cited Article for International Journal of Wireless & Mob...
 
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
2021 Top Ten Cited Article - International Journal of Wireless & Mobile Netwo...
 
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
August 2021: Top Ten Cited Article - International Journal of Wireless & Mobi...
 
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...
 
Sohail cv (updated) (1)
Sohail cv (updated) (1)Sohail cv (updated) (1)
Sohail cv (updated) (1)
 
CV_Ngurah Indra Er
CV_Ngurah Indra ErCV_Ngurah Indra Er
CV_Ngurah Indra Er
 
context aware computing
context aware computingcontext aware computing
context aware computing
 
Context aware
Context awareContext aware
Context aware
 
New research articles 2020 june issue- international journal of computer sc...
New research articles   2020 june issue- international journal of computer sc...New research articles   2020 june issue- international journal of computer sc...
New research articles 2020 june issue- international journal of computer sc...
 
IRJET- Voice Assistant for Visually Impaired People
IRJET-  	  Voice Assistant for Visually Impaired PeopleIRJET-  	  Voice Assistant for Visually Impaired People
IRJET- Voice Assistant for Visually Impaired People
 
cvpdf
cvpdfcvpdf
cvpdf
 
cv - sundar-Feb-2016
cv - sundar-Feb-2016cv - sundar-Feb-2016
cv - sundar-Feb-2016
 
Human Factors Research Group Slides
Human Factors Research Group SlidesHuman Factors Research Group Slides
Human Factors Research Group Slides
 
Future Of It
Future Of ItFuture Of It
Future Of It
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Bahaa_Younis_s_CV
Bahaa_Younis_s_CVBahaa_Younis_s_CV
Bahaa_Younis_s_CV
 
Human Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of WaterlooHuman Factors Research Group at the University of Waterloo
Human Factors Research Group at the University of Waterloo
 
A novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devicesA novel and innovative method for designing of rf mems devices
A novel and innovative method for designing of rf mems devices
 

Similar a Conclusion

Similar a Conclusion (20)

International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
 
Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021Iju top 10 cited articles -january 2021
Iju top 10 cited articles -january 2021
 
New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...New research articles 2019 may issue international journal of computer networ...
New research articles 2019 may issue international journal of computer networ...
 
New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...New Research Articles 2020 July Issue International Journal of Software Engin...
New Research Articles 2020 July Issue International Journal of Software Engin...
 
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACHMOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
 
March 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its ApplicationsMarch 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdfOctober 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
February 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its ApplicationsFebruary 2023: Top 10 Read Articles in Network Security and Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsJanuary 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
November 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its ApplicationsNovember 2023 - Top 10 Read Articles in Network Security & Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 

Más de hanmya

6 results
6 results6 results
6 results
hanmya
 
5 testing
5 testing5 testing
5 testing
hanmya
 
4 implementation
4 implementation4 implementation
4 implementation
hanmya
 
3 design
3 design3 design
3 design
hanmya
 
1 introduction
1 introduction1 introduction
1 introduction
hanmya
 
0index
0index0index
0index
hanmya
 

Más de hanmya (7)

6 results
6 results6 results
6 results
 
5 testing
5 testing5 testing
5 testing
 
4 implementation
4 implementation4 implementation
4 implementation
 
3 design
3 design3 design
3 design
 
2 srs
2 srs2 srs
2 srs
 
1 introduction
1 introduction1 introduction
1 introduction
 
0index
0index0index
0index
 

Último

FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 

Último (20)

2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 

Conclusion

  • 1. R.V. College of Engineering Department of Information Science and Engineering Page 28 CHAPTER 7 CONCLUSION The system emulates the actions of mouse and keyboard with the help of mobile phone. Some of the PC applications like media player and browsers can also be controlled via the bluetooth enabled mobile device. The system operates in keyboard, mouse, application and utilities mode. The keyboard mode allows performing basic functions on text editor and movement of cursor. The mouse mode provides full support for controlling the mouse movements and clicks. Also, the computer desktop is generated on the phone. In the application mode, applications like power point, media players and browsers can be controlled. Utilities mode enables running command and sending of message to the personal computer. The Bluetooth technology and J2ME are made use by the system to allow the users to view and access the desktop screen of the PC on the mobile phones, control applications and thereby interact with the computer through Bluetooth. 7.1 FUTURE ENHANCEMENT The system can be extended to support the following functionalities:  Multi-word commands can be executed under the utilities mode.  Integrating more Multimedia applications like downloading image, audio, video etc.
  • 2. R.V. College of Engineering Department of Information Science and Engineering Page 29 REFERENCES [1] Keith Cheverst, Alan Dix, Daniel Fitton, Chris Kray, Mark Rouncefield, Corina Sas, George Saslis-Lagoudakis, Jennifer G. Sheridan,” Exploring Bluetooth based Mobile Phone Interaction with the Hermes Photo Display” in Department of Computing, Infolab21 Lancaster University,2012 [2] R.S.S.Vishnu Priya , P.Panini Sai, K.Ruth Ramya, N.Chandra Sekhar, K.Venkata Prasad, P.D.Nageswara Rao ,”Mobile-PC Suite: Using Mobile Phone as Remote to Control PC Operations” in Dept. of CSE, KLCE Vaddeswaram, India, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (2) , 2012,3355 – 3359,2013 [3] Dr. Khanna, SamratVivekanand, Omprakash ,”Concept of Remote controlling PC with Smartphone Inputs from remote place with internet”in Information Technology Dept, ISTAR, Sardar Patel University, VV Nagar, India, 2012 [4] Faisal Baig, Saira Beg and Muhammad Fahad Khan, “Zigbee Based Home Appliances Controlling Through Spoken Commands Using Hand held Devices” in nternational Journal of Smart Home Vol. 7, No. 1, January, 2013. [5]Nokia Corporation(2011),”PC Connectivity over Bluetooth in Java Applications”,Version 1.0,Publication date :December 8,2011. [6] Ting Zhang, Yuanxin Ouyang , “Case Study of Human Computer Interaction Based on RFID and Context-Awareness” in Ubiquitous Computing Environments Volume 4555, 2007, pp 264-271. [7] K. V. S. S. S. S. Sairam, Dr. M. G. R, N. Gunasekaran, S. Rama Reddy, “Bluetooth in Wireless Communication“ in IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008. [8] N. Golmie, R. E. Van Dyck, and A. Soltanian, “Interference of Bluetooth and IEEE 802.11: Simulation Modeling and Performance Evaluation” in National Institute of Standards and Technology Gaithersburg, Maryland 20899, 2010. [9] P. Johansson, R. Kapoor, M. Kazantzidis, and M. Gerla, “Personal Area Networks: Bluetooth”, in International Journal of Wireless Information Networks, Vol. 9, No. 2, April 2002.
  • 3. R.V. College of Engineering Department of Information Science and Engineering Page 30 [10] K. V. S. S. S. S. Sairam, University of Madras, Dr. M. G. R. Engineering College N. Gunasekaran, Anna UniversityS. Rama Reddy, Jerusalem College of Engineering, Dr. M. G. R. Engineering College,” Bluetooth in Wireless Communication”,2002 [11] Peng Zhou,” HCI-based bluetooth master-slave monitoring system design”, Nat. Key Lab. of Sci. & Technol. on Communication, Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Xiang Ling,2010. [12] Beg, M.S. ,Fatimah, B. ,Jain, S. ; Muzammil, R.,” Bluetooth based implementations for realising new consumer systems”, ; Deptt. of Electron. Eng., AMU, Aligarh, India, 2009. [13]Yabin Liu ; Sch. of Autom; Shouqian Yu ; Weihai Chen ; Wei Li,” Wireless Communication Technology Based on Bluetooth and Its Application to a Manipulator”, Beijing Univ. of Aeronaut. & Astronaut., Beijing,2006. [14] Siegemund, F,Florkemeier C.,” Interaction in pervasive computing settings using Bluetooth-enabled active tags and passive RFID technology together with mobile phones”, ; Dept. of Comput. Sci., Eidgenossische Tech. Hochschule, Zurich, Switzerland,2003 [15] Jin-Shyan Lee Yu-Wei Su ; Chung-Chou Shen,” A Comparative Study of Wireless Protocols: Bluetooth, UWB, ZigBee, and Wi-Fi”, ; Ind. Technol. Res. Inst., Hsinchu,2007 [16] Ballagas, R., Rohs, M., Sheridan, J.G. and Borchers, J.,Sweep and point & shoot: Phonecam-based interactions for large public displays. In Proceedings of the SIGCHI conference on Human factors in computing systems (CHI'05) Extended abstracts, ACM Press, 2005. [17] Cheverst, K. Dix, A., Fitton, D., Kray, C., Rouncefield, M.,Saslis-Lagoudakis, G. and Sheridan, J. G., Exploring Mobile Phone Interaction with Situated Displays, In Proceedings of the 1st workshop on Pervasive Mobile Interaction Devices (PERMID),2005. [18] Cheverst, K., Clarke, K., Fitton, D., Rouncefield, M.,Crabtree, A. and Hemmings, T., SPAM on the menu: the practical use of remote messaging in community care, In Proceedings of the 2003 ACM Conference on Universal Usability, Vancouver, Canada, ACM Press. 2003, 23-29. [19] Ferscha, A. and S. Vogl, Pervasive Web Access via Public Communication Walls: In Proceedings of Pervasive Computing, LNCS 2414, Zurich, Switzerland, 2002, 84-97. [20] Gaver, W., Dunne, A. and Pacenti, E., Cultural Probes, Interactions: New Visions of Human-Computer Interaction. (1) (1999).
  • 4. R.V. College of Engineering Department of Information Science and Engineering Page 31 [21] Graham, K., Cheverst, K., Rouncefield, M. and Kray, C. Going More Public: Situated Display Design in a Care Setting through Co-realisation, Submitted to the 2005 Conference on Designing for User eXperience (DUX’05). [22] Himanshu R., Gossweiler, R. and Milojicic, D., ContentCascade Incremental Content Exchange between Public Displays and Personal Devices, In Proceedings of the International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous'04), Boston, Massachussets, USA, 2004, 374-381. [23] Shwetak N. Patel and Gregory D. Abowd,” Beyond Mobile Telephony: Exploring Opportunities for Applications on the Mobile Phone Handset”,College of Computing & GVU Center, 801 Atlantic Drive, Atlanta, GA 30332-0280, USA {shwetak, abowd}@cc.gatech.edu,2010 [24] Motorola Global Telecom Solution Sector. (2002) "i95cl Multi-Communication Device J2ME Developers' Guide". Motorola, 2002. [25] Nichols, J., B. A. Myers, M. Higgins, J. Hughes, T. K. Harris, R. Rosenfeld and M.Pignol.(2002) Generating remote control interfaces for complex appliances. Proceedings of the 15th annual ACM symposium on User interface software and technology (UIST 2002), ACM Press, Paris, France, pp 161—170. [26]. Patel, S.N. and G.D. Abowd. (2003) A 2-way Laser-assisted Selection Scheme for Handhelds in a Physical Environment. Technical Note submitted for review to Ubicomp 2003. [27] Yesim Tunccekic, and Kivanc Dincer,”Mobile Mapping Applications over J2ME Enabled PhonesHAVELSAN Eskisehir Yolu, Ankara, TURKE, 2007. [28] Minoi,J. L., Green P., Arnab, S., 2002, Navigation Application with Mobile Telephony: Shortest-path, University Malaysia Sarawak, University of Manchester, Map Asia 2002. [29] Liu, J., Mobile Map: A Case Study in the Design & Implementation of a Mobile Application, Computer Engineering Dept of Carleton University, http://www.sce. carleton.ca/wmc/chameleon/mc/JaneThesis.pdf,2002. [30] Revel, S.,” How Does Location Govern Task? The Delivery of an Intelligent Tourist Aide Over a Palm Device”,Univ. of Edinburgh, MSc Dissertation Plan, http://www. geo.ed.ac.uk/~gisadmin/submission/msc0138/plan.html,2007. [31] Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V.Veijalainen, J., Katanosov, A., Tirri, H,” Developing GIS-supported Location Based Services”, Helsinki University of Technology, University of Jyvaskyla, Finland, 2002.
  • 5. R.V. College of Engineering Department of Information Science and Engineering Page 32 [32] Megler, V., “ i-mode:From bandwidth problem into Internetphenomenon”, http://www- 106.ibm.com/ developerworks/library/wi-imode/index.html,2002. [33] Keryer, P., Nara, T.,” i-mode: A Successful Lauch of The Mobile Internet Market”, Alcatel Telecommunications Review – First Quarter 2001. [34] Dru, M-A, Saada, S.,” Location-Based Mobile Services”, The Essentials, Alcatel Telecommunications Review – First Quarter 2001. [35] Goodman, D. J.,” The wireless Internet: Promises and Challenges”, July 2000 IEEE Computer magazine. [36] Laitinen, H., Sun’s Worldwide Java Developer Conference, Development Tools for the J2ME, 2003 http://www.forum.nokia.com/main/1,35452,1_0_75,00.html,2001.