SlideShare a Scribd company logo
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 5, October 2020, pp. 2454~2462
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i5.16712  2454
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Mobile learning architecture using fog computing
and adaptive data streaming
Shymaa Mohammed Jameel1
, Muayad Sadik Croock2
1
Institute of Informatics for Postgraduate Studiesc Iraqi Commission for Computers and Informatics, Iraq
2
Computer Engineering Department, University of Technology, Iraq
Article Info ABSTRACT
Article history:
Received May 17, 2020
Revised May 28, 2020
Accepted Jun 11, 2020
With the huge development in mobile and network fields, sensor
technologies and fog computing help the students for more effective learning,
flexible and in and effective manner from anywhere. Using the mobile device
for learn encourage the transition to mobile computing (cloud and fog
computing) which is led to the ability to design customized system that help
student to learn via context aware learning which can be done by set the user
preference and use proper methods to show only related manner subject.
The presented study works on developing a system of e-learning which has
been on the basis of fog computing concepts with deep learning approaches
utilized for classification to the data content for accomplishing the context
aware learning and use the adaptation of video quality using special equation
and the data encrypted and decrypted using 3DES algorithm to ensure
the security side of the operation.
Keywords:
CNN
Data streaming
Deep learning
Mobile learning
This is an open access article under the CC BY-SA license.
Corresponding Author:
Shymaa Mohammed Jameel,
Institute of Informatics for Postgraduate Studiesc Iraqi,
Commission for Computers and Informatics,
Baghdad, Iraq.
Email: shymaa792003@yahoo.com
1. INTRODUCTION
There has been a continuous development in mobile technologies as well as pervasive Internet
connectivity which is allowing users in accessing information anytime and anywhere, such feature might be
applied for instrumentation regarding various applications such as education. The use of mobile devices such as
laptops, tablets, and smart-phones, are making the process of learning more effective, simple and personal.
Mobile learning is the term provided for such learning type [1]. The mobile learning might be utilized along
with the e-learning and ubiquitous learning, also it might be specified as a sub-set regarding electronic-learning
which involves using mobile devices for allowing the process of learning anytime and anywhere. At the same
time, the ubiquitous learning isn’t essentially using the mobile devices. Based on a study conducted by
Klopfer et al. [2], there have been some properties related to mobile devices which making them suitable for
educational intents – individuality, context sensitivity, social interactivity, portability, and connectivity.
Some of the features included in mobile learning are as follows – personalized information, learning
throughout space-time, on-the-fly learning [3]. A study conducted by Wang [4] investigated the significance
of context sensitivity as well as indicating that the main unique feature that the mobile learning environments
must involve. Furthermore, the context-aware mobile learning might be helping the learner for effectively
using the provided information. There have been some problems faced when implementing mobile learning,
the materials of learning might involve presentations, images, and videos. In addition, supported file types,
TELKOMNIKA Telecommun Comput El Control 
Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel)
2455
storage capacity, screen size, resolution, Internet access, and processing time are major issues which must be
dealt with. The approaches of content adaptation must be applied for the purpose of addressing such diversity
issue [5]. Many studies are working on such concept of electronic-learning on the basis of fog or cloud
technologies in the following way.
A study conducted by [6] designed computer-aided education platform on the basis of cloud
computing technologies and mobile communication. With regard to clients, they are developing smart-phone
software on the basis of open-source JavaME UI framework (kuix) in addition to Jaber that is specified for
being one of the open source instant message protocols. For the purpose of helping the teachers in
conveniently using the system, the study developed a website on the basis of Google App Engine, also with
the use of communication platform, a student has the ability of communicating with the teacher at any
possible time, thus the teacher will know the teaching’s situation and the knowledge level of the student, also
the teachers will have the ability for answering questions or sending messages to students freely via such
communication platform. Practically, through such technical means, it is narrowing the gaps between
teachers and students and producing adequate results. A study conducted by [7] suggested electronic-learning
system which is based on cloud computing at Education 4.0. The major goal is producing a system which
might be applied as a concept to develop e-learning system based on cloud computing which is answering
the requirements of Education 4.0. Thus, this study is reviewing the works related to e-learning systems
which are based on clouds.
A study conducted by [8] suggesting using LoRaWAN fog computing-based system to provide
connectivity to the nodes of IoT used in the campus of University of a Coruña (UDC), Spain. For the purpose
of validating the suggested system, smart campus was realistically re-created via in-house created 3-D
Ray-launching radio-planning simulator which has the ability to consider minor details, like vegetation,
buildings, vehicles, traffic-lights, individuals, and urban furniture. The designed tool might be providing
suitable radio propagation estimation in the smart campus system with regard to energy efficiency, capacity,
and coverage of the network. The results which are acquired with planning simulator might be put to
comparison with empirical measurements for assessing the system’s accuracy and operating conditions.
The work is presenting experiments showing the adequate results acquired through planning simulator in
most significant developed scenario, that have been corroborating with empirical measurements. After that,
there will be explanation on the way that the tool might be utilized for designing LoRa WAN infrastructure
with regard to 3 smart campus outdoor applications.
2. FOG COMPUTING
This is considered as one of the distributed platforms which might be providing storage, computing,
as well as networking services between traditional cloud computing and IoT devices. The data centers that
might be residing at the network’s edge or as internal nodes related to distributed environments [9]. Also,
the fog computing might be specified as the scenario in which some ubiquitous and de-centralized devices
have the ability of performing many tasks in wireless and often autonomous approach might be
communicating and cooperating via the networks for the purpose of performing the processing tasks and
store the date with no third party’s intervention [10]. Such tasks might be supporting the essential functions
of the network or a few new applications and service run in its virtual environment. Furthermore, the fog
computing might be specified as one of the platforms related to distributed computing extending the services
provided via cloud datacenters at network’s IoT devices [11]. The fog computing might be providing facility
such as computing’s automating management, in addition to networking and store date between IoT devices
and cloud datacenters. The fog computing includes many components related to these applications that might
run on the cloud in addition to the edge devices between the cloud and sensor, also it is providing features
such as connectivity, communication and network protocols, computational resources, mobility, also
interface heterogeneity to the cloud in addition to the data analytics related to distributed network that deal
with a lot of necessities of various applications with some requirements such as low latency in addition to
dense and wide dense geographical distributions [12].
3. DEEP LEARNING
Artificial intelligence (AI), neural networks (NNs), and deep learning are subjects which might be
associated to achieve certain aims in some applications. One of the example purposes is classification. The deep
learning might be specified as a modern subject. Recently, it has been of high importance in many applications,
like NLP and computer vision. In comparison to conventional approaches of machine learning, the deep learning
comes with solid learning ability and might effectively utilize the data-sets for feature extraction [13].
The approaches of deep learning using algorithms referred to as NNs, that have been on the basis of
information processing approaches related to biological nervous system like brain and such approaches enable
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462
2456
the computer for learning that is represented by each data and what is meant via each of the corresponding
models [14]. Recently, the deep neural networks (DNNs) showed significant performance in the tasks of image
classification, also it has been specified as a machine learning model of high importance [15]. Since 2006,
the deep learning was generally utilized with the advancements in speech recognition. Deep learning’s recovery
might be due to the next aspects. The development of large-scale annotated training data, including Image Net,
for totally showing its extremely large capacity of learning; the rapid developments of high-performance
parallel computing systems, including the GPU clusters; major developments in designing the training strategies
and network structures [16]. The performance of deep earning in object recognition and image classification
presented major advancements due to the major developments related to deep learning.
4. CONVOLUTIONAL NEURAL NETWORKS (CNN)
AI, NNs, and deep learning have been subjected which might be associated to achieve some aims in
some application. A major approach for establishing modern deep CNNs has been via forming them in 2 NN
layers, the first one has been alternating convolutional, while the other one has been max-pooling, they have
been followed via a few layers which are dese, also being fully-connected [17]. Any one of the 3D volumes
representing layer input as well as being converted into other 3D volume for feeding to the next layer. In
the considered example, there are 5 convolutional layers, there are 3 layers of max-pooling type, also there
are 3 layers which are fully-connected [17]. Starting from the advancement in the year 2012, the ImageNet
competition that has been achieved through AlexNet representing the first entry which utilized deep neural
network (DNN), many other DNNs with more complexity were submitted to the challenge for the purpose of
achieving good performance [18].
- CNN layers: Through stacking different and multiple layers in CNN, the complex architectures have been
developed for classification problems [19].
- Convolution layers: This is the initial layer utilized for abstracting the features from input image [20].
The operation of convolution is extracting various input features. Also, the first convolution layer is
extracting low-level features such as corners, lines, and edges. Layers of higher-level are extracting
features of higher-level [21].
- Strides layers: With regard to CNN, a stride is representing the number of pixel’s shift in input matrix.
In the case when the value of stride is one, the at a time, a filter might be moved single pixel. In the case
when the value of stride is 2, then at a time, filters have been moved 2 pixels. Also, other stride’s values
are comparably considered [22].
- Padding layers: In certain cases, the filters are not adequately fit for the specified input image. In such
conditions, there are 2 options:
a) Valid: indicates no padding
b) Zero-padding: Simply, pad zeros in the picture to get a fit [23].
- Rectified linear unit (ReLU) layers: ReLU is considered as one of the non-linear operations, also it inserts
non-linearity in CNN and allowing efficient and rapid training via mapping negative values zero as well
as to maintain positive values. Furthermore, there are other non-linearities such as (sigmoid) or (tanh)
which might be replacing ReLU. The majority of designers or authors are using ReLU for enhanced
performance in it [24].
- Pooling layer: The presented section is contributing to the parameters’ number reduction when they are
large images. The spatial type pooling, also referred to as down sampling, or sub-sampling, result in
dimensionality reduction related to each one of the maps and keeping the significant information. A few
of the types related to spatial type pooling have been average pooling, max-pooling, and sum pooling.
The max pooling is assuming the biggest element in modified feature map. Suggesting the biggest
element might be assuming the average pooling. The sum pooling is produced via summing all elements
of feature map [25].
- Fully connected layers (FC): With regard to such type, the matrix of interest has been flattened to a vector
form as well as input, such as NN. There are 2 features related to Layer (L-1), each one of them has been
(2x2), for instance, has 4 elements. There are 2 features of Layer (L), each one with single element [26].
In such system, the matrix regarding the feature map is going to be turned to vectors (x1, x2, x3 …).
Model’s creating will be achieved via combination of features with the use of FC layers. Lastly, one
activation function, such as “sigmoid” or “soft-max”, has been applied for output classified to categories,
for instance, boat, house, cat, tree, etc. [27].
5. PROPOSED SYSTEM
Using the fog computing strategies and techniques within the e-learning environment is pretty useful
but still challengeable filed in general, challenges related to this topic is the security in the first place,
TELKOMNIKA Telecommun Comput El Control 
Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel)
2457
the channel occupancy and the data streaming of the content (audio or video), the presented work is
suggesting e-learning system is proposed that try to cover the main issues related to the general concepts used
within this field, the data is collected and prepared from different educational and known audio/video sites
than it content can be used as an e-learning and according to the preferences of the user the data will be
classify to meet that preference and to provide the correlated data only this is done via using the powerful
classification technique deep learning (CNN), after that the adaptation of the audio/video quality is done to
ensure the quality of service (QOS) according to the available link quality, the result of this is an adaptive
quality audio/video and data is ready for transmit and in order to protect the data secret key encryption
algorithm used to encrypt the data while the data is streamed from server to client, the client then receive
the encrypted data and in his device the data decrypted and the final data formed and viewed to him.
Figure 1 showing the general architecture related to the suggested system. The proposed system for
e-learning environment using fog computing techniques try to build accurate and usable platform that can
hold the main issues related to such system, this system is split up to five main phases each phase have it own
algorithms and related internal steps, the phases of the system can be summarized as follow as shown in
Figure 1 and Algorithm 1.
Figure 1. General architecture of the suggested system
1) Classification phase
In this phase the classification method used to check the activity of the classification process is
the deep learning convolutional neural network (CNN), this phase includes some internal steps as follow:
− Step1: The first step within this phase where the collected dataset id entered to the system with special
specification (each dataset member consist of 3 columns with numeric data which is represent the related
information of the video data files, the numeric data used as metric for the data and special indexing of it.
− Step2: The collected data need to pre-process before using it with the training inside the classification
algorithm and the classification process itself, the feature numeric numbers related to the columns in
step1 is converted to real number to use it as weight within the system.
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462
2458
− Step3: The classification step is done using deep learning (CNN), the result of such step is the user preference.
The classification and identification step are done using two main methods (using deep learning (CNN) and
using machine learning algorithms) which meet the context aware learning where the suggested videos to
the user will only related to the classification results which is based on his choices.
− Step4: the related subject connected to the selected subject of the user is shows within the system.
Figure 2 showing the major steps of classification phase.
Algorithm 1. Proposed system
Input: Acquire database elements (video and audio) (server side)
Output: audio/video view (client side)
Start
Phase 1 classification phase
step1: data (audio / video) Pre-processing.
Step2: apply the CNN classification algorithm
• Run input layer.
• Run hidden layers.
• Run output layer.
• Output the classified data.
Phase 2 Adaptation phase
Step3: Check the bandwidth amount (link quality)
Step4: Check number of users request same video at same time (N)
Step5: Adaptively control according to link quality (A)
Step6: Check the effected quality
Step7: Calculate the new quality
Step8: Adaptive spatial resolution control
Phase 3 Security phase
Step9: Request user password
Step10: Encrypt using 3DES
Step11: Encrypted video data
Phase 4: Data streaming phase
Step: data streamed inside channel
Phase 5: User interface phase
Step: Receive encrypted data
Step: Call user key
Step: Decrypt using 3DES
Step: Video, audio creation
Step: show to user
End
Figure 2. Flowchart of classification using CNN
Phase 1
Phase 2
Phase 3
Phase 5
TELKOMNIKA Telecommun Comput El Control 
Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel)
2459
2) Adaptation phase
In this phase the problem of channel capacity and bandwidth availability solved by adjusting
the quality of the audio/video using proper techniques and equations to reduce the resolution of
the audio/video in the case when the number of users requests the same video at the same time is huge and
the data need to be sent to users at the same time and the channel bandwidth will not be available and
the general concept of fog computing was used within the proposed system. Figure 3 and Algorithm 2
summarize the proposed methodology related to mobile video streaming system using adaptive spatial
resolution control; this method will be assigned to the server side to the system as shown in Figure 1 where
the client side will accept the output resolution video streaming without having any decision to the re-sizing
of the resolution.
The system owner (admin) will setup the best resolution of the video when many numbers of users
are within the system requesting the same video for data streaming according to energy consumption and best
available picture quality providing the available bit-rate and input video according to number of system users.
The new resolution of the chosen video is prepared and down sampled to the calculated resolution and
encoded via the encoder. The decoder on the user device (mobile application) when receive the bitrate and
the up-samples it will decode the video and display it on screen (after encryption/decryption process is done).
Figure 3. Architecture of proposed adaptive video streaming system
Algorithm 2. Adaptive video streaming
Input: video resolution, number of accepted reduction of quality (M), number of users at the same time (N), A = adaptively
control of this video
Output: new output resolution
Start
Step1: if N > A the goto step 3
Step2: if N<=A then F=1 AND find new resolution
New resolution =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁
Goto step 5
Step3: calculate F
F=
𝑀
𝑁
Step4: find new resolution
New resolution =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁∗𝐹
Step5: reduce the resolution and send the new video to all channels
End
The adaptively is controlled by the server admin or algorithm, since the resolution of the video is
cannot reduced to unlimited number of times, where the video content will disappear and cannot be
understandable, the system admin (server owner) will indicate the number of times that the max quality of t
he video reduced, if the number of user will reflect the requested number then the new video resolution will
be founded and send to all users of the system if not then the following equation will be applied,
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462
2460
𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁 ∗ 𝐹
where length and height is the video resolution,
N representing the number of users requested the video streaming at same time and F is the factor that adapts
the resolution and video quality which is calculated as follow:
𝐹 = 𝑀/𝑁
In which M representing the number of users prefer by the system admin (the resolution where the system
below it will not be recognizable).
E.g. if 𝑁 = 10 and the preferable number by admin is 𝑀 = 3 the result will be as follow:
3/10 = 0.3 which will represent the scale factor of the system
Example 1: video1 resolution is 600 ∗ 600 and the resolution setup by admin that it can be reduced to
4 times (A = adaptively control according to link quality) and
- 4 users order the video then
𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁 ∗ 𝐹
Since number of users is <=A then F=1
600 ∗ 600
4 ∗ 1
And the resolution will be distributed on four channels.
- 10 users order the video then
𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁∗𝐹
Since number of users is > A then 𝐹 =
𝑀
𝑁
which is
4
10
= 0.4
600 ∗ 600
10 ∗ 0.4
And the resolution will be distributed on four even if the users are 10 to keep the quality with
the accepted levels.
3) Security phase
A problem associated to using fog computing technology has been the security issues, within this
work a private key method used to encrypt the data transmitted from server-side to client-side inside the fog
computing map which is 3DES. This algorithm will be in both server-side (for encryption) and client-side
(for decryption) and the key for this operation is the user password. The developing a system of e-learning
which has been on the basis of fog computing concepts with deep learning approaches utilized for
classification to the data content for accomplishing the context aware learning and use the adaptation of video
quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure
the security side of the operation.
4) Data streaming phase
The data of the video streamed as bits using the channel of the video streaming which based on fog
computing this allow the client on the server side to view the video without the need to download it.
The data Streaming is continuously generated by different sources. And it processed incrementally using
Stream Processing techniques without needs to access to all data. In addition, it is usually used in the context
of big data in which it is generated by many different sources at high speed.
5) User interface phase
The data received on the client side (mobile phone) with programmed application using android
studio that will decrypt the data encrypted in the server side using the user password and show the video on
the user device. System outcome many dataset elements were used to tests the activity of the proposed
framework, the user preferences set up six times each time the user requests special lecture and the number of
TELKOMNIKA Telecommun Comput El Control 
Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel)
2461
users requested the same lecture is changed 3 times, within the tested framework with data set elements,
the network admin set that these resolutions can be reduce quality 4 times maximum according to link quality
at the moment of requesting the video and 2 scenarios assumed where:
a) One user request the videos
𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁 ∗ 𝐹
N= number of users =1, F=1 since the number of user is <= the number assigned by the system according
to the link quality.
484 ∗ 360
1 ∗ 1
Same quality will stream to the requested user.
b) 10 users order the video then
𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 =
𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡
𝑁 ∗ 𝐹
Since number of users is > A then 𝐹 =
𝑀
𝑁
which is
4
10
= 0.4
484 ∗ 360
10 ∗ 0.4
And the resolution will be distributed on four even if the users are 10 to keep the quality with
the accepted levels. Table 1 show the experiments results of the videos after applying the quality
reduction. In order to check the effectively related to the suggested system it has been compared to some
of the suggested system within the same field as shown in Table 2.
Table 1. Experiments results of the videos after applying the quality reduction
No. Lecture name
Resolution Resolution/2 Resolution/4
(Width High) (Width High) (Width High)
1. C++ programing Language 484 360 242 180 121 90
2. Introduction to Data Mining 1280 720 640 360 320 180
3. Hub, Switch, & Router What's the difference 1440 1080 720 450 360 270
4. Network Security 1920 1080 960 540 480 270
5. Self-Organizing Maps 640 480 320 240 160 120
6. Computer Science Vs. Computer Engineering 854 480 427 240 213 120
Table 2. Brief of analysis of different features provided put compared to other models
Features [6] [7] [8] Proposed system
Detects and takes into account the real-world contexts (real educational videos) No No Yes Yes
Situates learners in more than one learning scenario Yes Yes Yes Yes
Adapting learning content for individual learners Yes No No Yes
Adapting learning interface for individual learners No No No Yes
Provides learning guidance or support across contexts No No Yes Yes
Considering online learning status of learners No Yes No Yes
Learning from previous implementations and thus changing the content No No No Yes
6. CONCLUSION:
The use of mobile devices such as laptops, tablets, and smart-phones, are making the process of learning
more effective, simple and personal. Mobile learning is the term provided for such learning type. The mobile
learning might be utilized along with the e-learning and ubiquitous learning, also it might be specified as a sub-set
regarding electronic-learning which involves using mobile devices for allowing the process of learning anytime
and anywhere. In this paper a proposed architecture of fog-based e-learning framework using many techniques
related to the main manner of the system deep learning for classifying the data to comply with user preferences and
quality adaptation to change video resolution while send it via data streaming and the sent data were encrypted
using 3DES. The benefits of the frame work are to meet the user (student needs) and using fog computing which
 ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462
2462
faster than other techniques. The presented study works on developing a system of e-learning which has been on
the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for
accomplishing the context aware learning and use the adaptation of video quality using special equation and
the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation.
REFERENCES
[1] H. Crompton, "A historical overview of mobile learning: Toward learner-centered education," Handbook of Mobile
Learning, pp. 3-14, Routledge, 2013
[2] Eric Klopfer, Kurt Squire, et al., "Environmental detectives: PDAs as a window into a virtual simulated world,"
Proceedings. IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 95-98, 2002.
[3] Hendrik Thüs, Mohamed Amine Chatti, et al., "Mobile learning in context," International Journal of Technology
Enhanced Learning, vol. 4, no. 5-6, pp. 332-344, 2012.
[4] Y. K. Wang, “Context awareness and adaptation in mobile learning,” The 2nd IEEE International Workshop on
Wireless and Mobile Technologies in Education, pp. 154-158, 2004.
[5] Ramu Parupalli, Sarat Chandra Babu Nelaturu, and Dhanander Kumar Jain. "The role of content adaptation in
ubiquitous learning,” 2011 IEEE International Conference on Technology for Education, pp. 177-182, 2011.
[6] Weiqing Zhao, Yafei Sun, and Lijuan Dai. "Improving computer basic teaching through mobile communication and
cloud computing technology," 2010 3rd International Conference on Advanced Computer Theory and
Engineering(ICACTE), pp. V1-452, 2010.
[7] P. Hendradi, M. Khanapi, and S. N. Mahfuzah, "Cloud computing-based e-learning system architecture in
education 4.0," Journal of Physics: Conference Series, vol. 1196, no. 1, IOP Publishing, 2019.
[8] Paula Fraga-Lamas, et al., "Design and Experimental Validation of a LoRaWAN Fog Computing Based
Architecture for IoT Enabled Smart Campus Applications," Sensors, vol. 19, no. 15, 2019.
[9] Redowan Mahmud, Ramamohanarao Kotagiri, and Rajkumar Buyya, "Fog computing: A taxonomy, survey and
future directions," Internet of everything, Springer, Singapore, pp. 103-130, 2018.
[10] A. V. Dastjerdi, and Rajkumar Buyya, "Fog computing: Helping the Internet of Things realize its potential,"
Computer, vol. 49, no. 8, pp. 112-116, 2016.
[11] Koustabh Dolui, and Soumya Kanti Datta, "Comparison of edge computing implementations: Fog computing,
cloudlet and mobile edge computing," 2017 Global Internet of Things Summit (GIoTS), 2017.
[12] A. V. Dastjerdi, et al., "Fog computing: Principles, architectures, and applications," Internet of Things, pp. 61-75, 2016.
[13] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, "Deep learning," Nature, vol. 521, pp. 436-444, 2015.
[14] Li Deng, Dong Yu, "Deep learning: methods and applications," Foundations and Trends in Signal Processing,
vol. 7, no. 3–4, pp. 197-387, 2014.
[15] Jürgen Schmidhuber, "Deep learning in neural networks: An overview," Neural Networks, vol. 61, pp. 85-117, 2015.
[16] Chiyuan Zhang, et al., "Understanding deep learning requires rethinking generalization," arXiv preprint
arXiv:1611.03530, 2016.
[17] Fausto Milletari, et al., "Hough-CNN: deep learning for segmentation of deep brain regions in MRI and
ultrasound," Computer Vision and Image Understanding, vol. 164, pp. 92-102, 2017.
[18] Guanpeng Li, et al. "Understanding error propagation in deep learning neural network (DNN) accelerators and
applications," Proceedings of the International Conference for High Performance Computing, Networking, Storage
and Analysis, 2017.
[19] Jeremy Kawahara, Ghassan Hamarneh. "Multi-resolution-tract CNN with hybrid pretrained and skin-lesion trained
layers," International Workshop on Machine Learning in Medical Imaging, Springer, Cham, 2016.
[20] Geert Litjens, et al., "A survey on deep learning in medical image analysis," Medical Image Analysis, vol. 42,
pp. 60-88, 2017.
[21] Xiaoguang Chen, et al., "Convolution neural network for automatic facial expression recognition," 2017
International Conference on Applied System Innovation (ICASI), 2017.
[22] Mohammad Lotfollahi, et al., "Deep packet: A novel approach for encrypted traffic classification using deep
learning," Soft Computing, pp. 1-14, 2017.
[23] A. Britto Mattos, Dario Augusto Borges Oliveira, Edmilson Dasilva Morais, "Improving CNN-based viseme
recognition using synthetic data," 2018 IEEE International Conference on Multimedia and Expo (ICME), 2018.
[24] Heinz Boehmer Fiehn, et al., "Smart agriculture system based on deep learning," Proceedings of the 2nd
International Conference on Smart Digital Environment, 2018.
[25] Tsung-Han Chan, et al., "PCANet: A simple deep learning baseline for image classification?," IEEE transactions
on image processing, vol. 24, no. 12, pp. 5017-5032, 2015.
[26] Mohamad Mahmoud Al Rahhal, et al., "Deep learning approach for active classification of electrocardiogram
signals," Information Sciences, vol. 345, pp. 340-354, 2016.
[27] Qin Zou, et al., "Deep learning based feature selection for remote sensing scene classification," IEEE Geoscience
and Remote Sensing Letters, vol. 12, no. 11, pp. 2321-2325, 2015.

More Related Content

PDF
Design of an IT Capstone Subject - Cloud Robotics
PPTX
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
DOCX
Chapter 9 current trends
PDF
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICES
PDF
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
PDF
Sustainable Development for Higher Education Sector using Mobile Cloud with M...
PDF
A novel secure e contents system for multi-media interchange workflows in e-l...
Design of an IT Capstone Subject - Cloud Robotics
Widget and Smart Devices. A Different Approach for Remote and Virtual labs
Chapter 9 current trends
AN ADAPTIVE AND INTELLIGENT TUTOR BY EXPERT SYSTEMS FOR MOBILE DEVICES
A PARADIGM FOR THE APPLICATION OF CLOUD COMPUTING IN MOBILE INTELLIGENT TUTOR...
Sustainable Development for Higher Education Sector using Mobile Cloud with M...
A novel secure e contents system for multi-media interchange workflows in e-l...

What's hot (19)

PDF
Artificial intelligence in cyber defense
PDF
Optimized image processing and clustering to mitigate security threats in mob...
PDF
Mining knowledge graphs to map heterogeneous relations between the internet o...
PDF
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
PDF
A crisis-communication-network-based-on-embodied-conversational-agents-system...
PPTX
Research Challenges in Networked Systems
PDF
Interactive Technologies for Improving Quality of Education to Build Collabor...
PDF
Ijcatr04041023
PDF
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
PDF
Most cited articles in academia - International journal of network security &...
PDF
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
PDF
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
PDF
ICTs use and Academic Development in the Moshi Co-operative University (MoCU)
PDF
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
PDF
An Approach for Securing Voice Communication via Image Watermarking Technique
PDF
NLP-based personal learning assistant for school education
PDF
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
PPTX
Open Education and Teaching Profession in 2030
PDF
APPLICATION OF DIGITAL CLOUD LIBRARIES FOR ETHIOPIAN PUBLIC HIGHER LEARNING I...
Artificial intelligence in cyber defense
Optimized image processing and clustering to mitigate security threats in mob...
Mining knowledge graphs to map heterogeneous relations between the internet o...
Research Challenges in Networked Systems, Torsten Braun, Universität Bern
A crisis-communication-network-based-on-embodied-conversational-agents-system...
Research Challenges in Networked Systems
Interactive Technologies for Improving Quality of Education to Build Collabor...
Ijcatr04041023
Speech signal compression and encryption based on sudoku, fuzzy C-means and t...
Most cited articles in academia - International journal of network security &...
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
ICTs use and Academic Development in the Moshi Co-operative University (MoCU)
MOBILE CLOUD COMPUTING APPLIED TO HEALTHCARE APPROACH
An Approach for Securing Voice Communication via Image Watermarking Technique
NLP-based personal learning assistant for school education
Ensemble of Probabilistic Learning Networks for IoT Edge Intrusion Detection
Open Education and Teaching Profession in 2030
APPLICATION OF DIGITAL CLOUD LIBRARIES FOR ETHIOPIAN PUBLIC HIGHER LEARNING I...
Ad

Similar to Mobile learning architecture using fog computing and adaptive data streaming (20)

PDF
4213ijsea05
PDF
EFFECT OF CLOUD BASED MOBILE LEARNING ON ENGINEERING EDUCATION
PPT
Berkeley cyberlearning 030811_final
PDF
M learning in education
PDF
Applied research of e learning
PDF
A survey of fog computing concepts applications and issues
PDF
Fog-Computing-Applications.pdf
PDF
IRJET- Secure Architecture for Mobile Cloud based Learning
PDF
GGULIVRR: Touching Mobile and Contextual Learning
PDF
Research Talk at Bell Labs - IoT System Architecture and Interactions
PPT
Renaissance of a master storyteller cynthia calongne
PDF
SOFIA project INDRA NEO Publication
DOCX
Tvt word harjoitus
PPTX
Interaction system based on internet of things as support for education
PPTX
Computational Thinking and Acting: Future Technologies for Future Generations
PDF
Postdesktop
PDF
Towards the Intelligent Internet of Everything
PDF
Computational thinking and making in the age of machine learning
PDF
National Cheng Kung University
PDF
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
4213ijsea05
EFFECT OF CLOUD BASED MOBILE LEARNING ON ENGINEERING EDUCATION
Berkeley cyberlearning 030811_final
M learning in education
Applied research of e learning
A survey of fog computing concepts applications and issues
Fog-Computing-Applications.pdf
IRJET- Secure Architecture for Mobile Cloud based Learning
GGULIVRR: Touching Mobile and Contextual Learning
Research Talk at Bell Labs - IoT System Architecture and Interactions
Renaissance of a master storyteller cynthia calongne
SOFIA project INDRA NEO Publication
Tvt word harjoitus
Interaction system based on internet of things as support for education
Computational Thinking and Acting: Future Technologies for Future Generations
Postdesktop
Towards the Intelligent Internet of Everything
Computational thinking and making in the age of machine learning
National Cheng Kung University
An Exploratory Essay On Cloud Computing And Its Impact On The Use Of Informat...
Ad

More from TELKOMNIKA JOURNAL (20)

PDF
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
PDF
Implementation of ICMP flood detection and mitigation system based on softwar...
PDF
Indonesian continuous speech recognition optimization with convolution bidir...
PDF
Recognition and understanding of construction safety signs by final year engi...
PDF
The use of dolomite to overcome grounding resistance in acidic swamp land
PDF
Clustering of swamp land types against soil resistivity and grounding resistance
PDF
Hybrid methodology for parameter algebraic identification in spatial/time dom...
PDF
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
PDF
Deep learning approaches for accurate wood species recognition
PDF
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
PDF
Reversible data hiding with selective bits difference expansion and modulus f...
PDF
Website-based: smart goat farm monitoring cages
PDF
Novel internet of things-spectroscopy methods for targeted water pollutants i...
PDF
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
PDF
Convolutional neural network-based real-time drowsy driver detection for acci...
PDF
Addressing overfitting in comparative study for deep learningbased classifica...
PDF
Integrating artificial intelligence into accounting systems: a qualitative st...
PDF
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
PDF
Adulterated beef detection with redundant gas sensor using optimized convolut...
PDF
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...
Earthquake magnitude prediction based on radon cloud data near Grindulu fault...
Implementation of ICMP flood detection and mitigation system based on softwar...
Indonesian continuous speech recognition optimization with convolution bidir...
Recognition and understanding of construction safety signs by final year engi...
The use of dolomite to overcome grounding resistance in acidic swamp land
Clustering of swamp land types against soil resistivity and grounding resistance
Hybrid methodology for parameter algebraic identification in spatial/time dom...
Integration of image processing with 6-degrees-of-freedom robotic arm for adv...
Deep learning approaches for accurate wood species recognition
Neuromarketing case study: recognition of sweet and sour taste in beverage pr...
Reversible data hiding with selective bits difference expansion and modulus f...
Website-based: smart goat farm monitoring cages
Novel internet of things-spectroscopy methods for targeted water pollutants i...
XGBoost optimization using hybrid Bayesian optimization and nested cross vali...
Convolutional neural network-based real-time drowsy driver detection for acci...
Addressing overfitting in comparative study for deep learningbased classifica...
Integrating artificial intelligence into accounting systems: a qualitative st...
Leveraging technology to improve tuberculosis patient adherence: a comprehens...
Adulterated beef detection with redundant gas sensor using optimized convolut...
A 6G THz MIMO antenna with high gain and wide bandwidth for high-speed wirele...

Recently uploaded (20)

PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
DOCX
573137875-Attendance-Management-System-original
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Mechanical Engineering MATERIALS Selection
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CH1 Production IntroductoryConcepts.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
573137875-Attendance-Management-System-original
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Lecture Notes Electrical Wiring System Components
OOP with Java - Java Introduction (Basics)
Mechanical Engineering MATERIALS Selection
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Automation-in-Manufacturing-Chapter-Introduction.pdf
additive manufacturing of ss316l using mig welding
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

Mobile learning architecture using fog computing and adaptive data streaming

  • 1. TELKOMNIKA Telecommunication, Computing, Electronics and Control Vol. 18, No. 5, October 2020, pp. 2454~2462 ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018 DOI: 10.12928/TELKOMNIKA.v18i5.16712  2454 Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA Mobile learning architecture using fog computing and adaptive data streaming Shymaa Mohammed Jameel1 , Muayad Sadik Croock2 1 Institute of Informatics for Postgraduate Studiesc Iraqi Commission for Computers and Informatics, Iraq 2 Computer Engineering Department, University of Technology, Iraq Article Info ABSTRACT Article history: Received May 17, 2020 Revised May 28, 2020 Accepted Jun 11, 2020 With the huge development in mobile and network fields, sensor technologies and fog computing help the students for more effective learning, flexible and in and effective manner from anywhere. Using the mobile device for learn encourage the transition to mobile computing (cloud and fog computing) which is led to the ability to design customized system that help student to learn via context aware learning which can be done by set the user preference and use proper methods to show only related manner subject. The presented study works on developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation. Keywords: CNN Data streaming Deep learning Mobile learning This is an open access article under the CC BY-SA license. Corresponding Author: Shymaa Mohammed Jameel, Institute of Informatics for Postgraduate Studiesc Iraqi, Commission for Computers and Informatics, Baghdad, Iraq. Email: shymaa792003@yahoo.com 1. INTRODUCTION There has been a continuous development in mobile technologies as well as pervasive Internet connectivity which is allowing users in accessing information anytime and anywhere, such feature might be applied for instrumentation regarding various applications such as education. The use of mobile devices such as laptops, tablets, and smart-phones, are making the process of learning more effective, simple and personal. Mobile learning is the term provided for such learning type [1]. The mobile learning might be utilized along with the e-learning and ubiquitous learning, also it might be specified as a sub-set regarding electronic-learning which involves using mobile devices for allowing the process of learning anytime and anywhere. At the same time, the ubiquitous learning isn’t essentially using the mobile devices. Based on a study conducted by Klopfer et al. [2], there have been some properties related to mobile devices which making them suitable for educational intents – individuality, context sensitivity, social interactivity, portability, and connectivity. Some of the features included in mobile learning are as follows – personalized information, learning throughout space-time, on-the-fly learning [3]. A study conducted by Wang [4] investigated the significance of context sensitivity as well as indicating that the main unique feature that the mobile learning environments must involve. Furthermore, the context-aware mobile learning might be helping the learner for effectively using the provided information. There have been some problems faced when implementing mobile learning, the materials of learning might involve presentations, images, and videos. In addition, supported file types,
  • 2. TELKOMNIKA Telecommun Comput El Control  Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel) 2455 storage capacity, screen size, resolution, Internet access, and processing time are major issues which must be dealt with. The approaches of content adaptation must be applied for the purpose of addressing such diversity issue [5]. Many studies are working on such concept of electronic-learning on the basis of fog or cloud technologies in the following way. A study conducted by [6] designed computer-aided education platform on the basis of cloud computing technologies and mobile communication. With regard to clients, they are developing smart-phone software on the basis of open-source JavaME UI framework (kuix) in addition to Jaber that is specified for being one of the open source instant message protocols. For the purpose of helping the teachers in conveniently using the system, the study developed a website on the basis of Google App Engine, also with the use of communication platform, a student has the ability of communicating with the teacher at any possible time, thus the teacher will know the teaching’s situation and the knowledge level of the student, also the teachers will have the ability for answering questions or sending messages to students freely via such communication platform. Practically, through such technical means, it is narrowing the gaps between teachers and students and producing adequate results. A study conducted by [7] suggested electronic-learning system which is based on cloud computing at Education 4.0. The major goal is producing a system which might be applied as a concept to develop e-learning system based on cloud computing which is answering the requirements of Education 4.0. Thus, this study is reviewing the works related to e-learning systems which are based on clouds. A study conducted by [8] suggesting using LoRaWAN fog computing-based system to provide connectivity to the nodes of IoT used in the campus of University of a Coruña (UDC), Spain. For the purpose of validating the suggested system, smart campus was realistically re-created via in-house created 3-D Ray-launching radio-planning simulator which has the ability to consider minor details, like vegetation, buildings, vehicles, traffic-lights, individuals, and urban furniture. The designed tool might be providing suitable radio propagation estimation in the smart campus system with regard to energy efficiency, capacity, and coverage of the network. The results which are acquired with planning simulator might be put to comparison with empirical measurements for assessing the system’s accuracy and operating conditions. The work is presenting experiments showing the adequate results acquired through planning simulator in most significant developed scenario, that have been corroborating with empirical measurements. After that, there will be explanation on the way that the tool might be utilized for designing LoRa WAN infrastructure with regard to 3 smart campus outdoor applications. 2. FOG COMPUTING This is considered as one of the distributed platforms which might be providing storage, computing, as well as networking services between traditional cloud computing and IoT devices. The data centers that might be residing at the network’s edge or as internal nodes related to distributed environments [9]. Also, the fog computing might be specified as the scenario in which some ubiquitous and de-centralized devices have the ability of performing many tasks in wireless and often autonomous approach might be communicating and cooperating via the networks for the purpose of performing the processing tasks and store the date with no third party’s intervention [10]. Such tasks might be supporting the essential functions of the network or a few new applications and service run in its virtual environment. Furthermore, the fog computing might be specified as one of the platforms related to distributed computing extending the services provided via cloud datacenters at network’s IoT devices [11]. The fog computing might be providing facility such as computing’s automating management, in addition to networking and store date between IoT devices and cloud datacenters. The fog computing includes many components related to these applications that might run on the cloud in addition to the edge devices between the cloud and sensor, also it is providing features such as connectivity, communication and network protocols, computational resources, mobility, also interface heterogeneity to the cloud in addition to the data analytics related to distributed network that deal with a lot of necessities of various applications with some requirements such as low latency in addition to dense and wide dense geographical distributions [12]. 3. DEEP LEARNING Artificial intelligence (AI), neural networks (NNs), and deep learning are subjects which might be associated to achieve certain aims in some applications. One of the example purposes is classification. The deep learning might be specified as a modern subject. Recently, it has been of high importance in many applications, like NLP and computer vision. In comparison to conventional approaches of machine learning, the deep learning comes with solid learning ability and might effectively utilize the data-sets for feature extraction [13]. The approaches of deep learning using algorithms referred to as NNs, that have been on the basis of information processing approaches related to biological nervous system like brain and such approaches enable
  • 3.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462 2456 the computer for learning that is represented by each data and what is meant via each of the corresponding models [14]. Recently, the deep neural networks (DNNs) showed significant performance in the tasks of image classification, also it has been specified as a machine learning model of high importance [15]. Since 2006, the deep learning was generally utilized with the advancements in speech recognition. Deep learning’s recovery might be due to the next aspects. The development of large-scale annotated training data, including Image Net, for totally showing its extremely large capacity of learning; the rapid developments of high-performance parallel computing systems, including the GPU clusters; major developments in designing the training strategies and network structures [16]. The performance of deep earning in object recognition and image classification presented major advancements due to the major developments related to deep learning. 4. CONVOLUTIONAL NEURAL NETWORKS (CNN) AI, NNs, and deep learning have been subjected which might be associated to achieve some aims in some application. A major approach for establishing modern deep CNNs has been via forming them in 2 NN layers, the first one has been alternating convolutional, while the other one has been max-pooling, they have been followed via a few layers which are dese, also being fully-connected [17]. Any one of the 3D volumes representing layer input as well as being converted into other 3D volume for feeding to the next layer. In the considered example, there are 5 convolutional layers, there are 3 layers of max-pooling type, also there are 3 layers which are fully-connected [17]. Starting from the advancement in the year 2012, the ImageNet competition that has been achieved through AlexNet representing the first entry which utilized deep neural network (DNN), many other DNNs with more complexity were submitted to the challenge for the purpose of achieving good performance [18]. - CNN layers: Through stacking different and multiple layers in CNN, the complex architectures have been developed for classification problems [19]. - Convolution layers: This is the initial layer utilized for abstracting the features from input image [20]. The operation of convolution is extracting various input features. Also, the first convolution layer is extracting low-level features such as corners, lines, and edges. Layers of higher-level are extracting features of higher-level [21]. - Strides layers: With regard to CNN, a stride is representing the number of pixel’s shift in input matrix. In the case when the value of stride is one, the at a time, a filter might be moved single pixel. In the case when the value of stride is 2, then at a time, filters have been moved 2 pixels. Also, other stride’s values are comparably considered [22]. - Padding layers: In certain cases, the filters are not adequately fit for the specified input image. In such conditions, there are 2 options: a) Valid: indicates no padding b) Zero-padding: Simply, pad zeros in the picture to get a fit [23]. - Rectified linear unit (ReLU) layers: ReLU is considered as one of the non-linear operations, also it inserts non-linearity in CNN and allowing efficient and rapid training via mapping negative values zero as well as to maintain positive values. Furthermore, there are other non-linearities such as (sigmoid) or (tanh) which might be replacing ReLU. The majority of designers or authors are using ReLU for enhanced performance in it [24]. - Pooling layer: The presented section is contributing to the parameters’ number reduction when they are large images. The spatial type pooling, also referred to as down sampling, or sub-sampling, result in dimensionality reduction related to each one of the maps and keeping the significant information. A few of the types related to spatial type pooling have been average pooling, max-pooling, and sum pooling. The max pooling is assuming the biggest element in modified feature map. Suggesting the biggest element might be assuming the average pooling. The sum pooling is produced via summing all elements of feature map [25]. - Fully connected layers (FC): With regard to such type, the matrix of interest has been flattened to a vector form as well as input, such as NN. There are 2 features related to Layer (L-1), each one of them has been (2x2), for instance, has 4 elements. There are 2 features of Layer (L), each one with single element [26]. In such system, the matrix regarding the feature map is going to be turned to vectors (x1, x2, x3 …). Model’s creating will be achieved via combination of features with the use of FC layers. Lastly, one activation function, such as “sigmoid” or “soft-max”, has been applied for output classified to categories, for instance, boat, house, cat, tree, etc. [27]. 5. PROPOSED SYSTEM Using the fog computing strategies and techniques within the e-learning environment is pretty useful but still challengeable filed in general, challenges related to this topic is the security in the first place,
  • 4. TELKOMNIKA Telecommun Comput El Control  Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel) 2457 the channel occupancy and the data streaming of the content (audio or video), the presented work is suggesting e-learning system is proposed that try to cover the main issues related to the general concepts used within this field, the data is collected and prepared from different educational and known audio/video sites than it content can be used as an e-learning and according to the preferences of the user the data will be classify to meet that preference and to provide the correlated data only this is done via using the powerful classification technique deep learning (CNN), after that the adaptation of the audio/video quality is done to ensure the quality of service (QOS) according to the available link quality, the result of this is an adaptive quality audio/video and data is ready for transmit and in order to protect the data secret key encryption algorithm used to encrypt the data while the data is streamed from server to client, the client then receive the encrypted data and in his device the data decrypted and the final data formed and viewed to him. Figure 1 showing the general architecture related to the suggested system. The proposed system for e-learning environment using fog computing techniques try to build accurate and usable platform that can hold the main issues related to such system, this system is split up to five main phases each phase have it own algorithms and related internal steps, the phases of the system can be summarized as follow as shown in Figure 1 and Algorithm 1. Figure 1. General architecture of the suggested system 1) Classification phase In this phase the classification method used to check the activity of the classification process is the deep learning convolutional neural network (CNN), this phase includes some internal steps as follow: − Step1: The first step within this phase where the collected dataset id entered to the system with special specification (each dataset member consist of 3 columns with numeric data which is represent the related information of the video data files, the numeric data used as metric for the data and special indexing of it. − Step2: The collected data need to pre-process before using it with the training inside the classification algorithm and the classification process itself, the feature numeric numbers related to the columns in step1 is converted to real number to use it as weight within the system.
  • 5.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462 2458 − Step3: The classification step is done using deep learning (CNN), the result of such step is the user preference. The classification and identification step are done using two main methods (using deep learning (CNN) and using machine learning algorithms) which meet the context aware learning where the suggested videos to the user will only related to the classification results which is based on his choices. − Step4: the related subject connected to the selected subject of the user is shows within the system. Figure 2 showing the major steps of classification phase. Algorithm 1. Proposed system Input: Acquire database elements (video and audio) (server side) Output: audio/video view (client side) Start Phase 1 classification phase step1: data (audio / video) Pre-processing. Step2: apply the CNN classification algorithm • Run input layer. • Run hidden layers. • Run output layer. • Output the classified data. Phase 2 Adaptation phase Step3: Check the bandwidth amount (link quality) Step4: Check number of users request same video at same time (N) Step5: Adaptively control according to link quality (A) Step6: Check the effected quality Step7: Calculate the new quality Step8: Adaptive spatial resolution control Phase 3 Security phase Step9: Request user password Step10: Encrypt using 3DES Step11: Encrypted video data Phase 4: Data streaming phase Step: data streamed inside channel Phase 5: User interface phase Step: Receive encrypted data Step: Call user key Step: Decrypt using 3DES Step: Video, audio creation Step: show to user End Figure 2. Flowchart of classification using CNN Phase 1 Phase 2 Phase 3 Phase 5
  • 6. TELKOMNIKA Telecommun Comput El Control  Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel) 2459 2) Adaptation phase In this phase the problem of channel capacity and bandwidth availability solved by adjusting the quality of the audio/video using proper techniques and equations to reduce the resolution of the audio/video in the case when the number of users requests the same video at the same time is huge and the data need to be sent to users at the same time and the channel bandwidth will not be available and the general concept of fog computing was used within the proposed system. Figure 3 and Algorithm 2 summarize the proposed methodology related to mobile video streaming system using adaptive spatial resolution control; this method will be assigned to the server side to the system as shown in Figure 1 where the client side will accept the output resolution video streaming without having any decision to the re-sizing of the resolution. The system owner (admin) will setup the best resolution of the video when many numbers of users are within the system requesting the same video for data streaming according to energy consumption and best available picture quality providing the available bit-rate and input video according to number of system users. The new resolution of the chosen video is prepared and down sampled to the calculated resolution and encoded via the encoder. The decoder on the user device (mobile application) when receive the bitrate and the up-samples it will decode the video and display it on screen (after encryption/decryption process is done). Figure 3. Architecture of proposed adaptive video streaming system Algorithm 2. Adaptive video streaming Input: video resolution, number of accepted reduction of quality (M), number of users at the same time (N), A = adaptively control of this video Output: new output resolution Start Step1: if N > A the goto step 3 Step2: if N<=A then F=1 AND find new resolution New resolution = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁 Goto step 5 Step3: calculate F F= 𝑀 𝑁 Step4: find new resolution New resolution = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁∗𝐹 Step5: reduce the resolution and send the new video to all channels End The adaptively is controlled by the server admin or algorithm, since the resolution of the video is cannot reduced to unlimited number of times, where the video content will disappear and cannot be understandable, the system admin (server owner) will indicate the number of times that the max quality of t he video reduced, if the number of user will reflect the requested number then the new video resolution will be founded and send to all users of the system if not then the following equation will be applied,
  • 7.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462 2460 𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁 ∗ 𝐹 where length and height is the video resolution, N representing the number of users requested the video streaming at same time and F is the factor that adapts the resolution and video quality which is calculated as follow: 𝐹 = 𝑀/𝑁 In which M representing the number of users prefer by the system admin (the resolution where the system below it will not be recognizable). E.g. if 𝑁 = 10 and the preferable number by admin is 𝑀 = 3 the result will be as follow: 3/10 = 0.3 which will represent the scale factor of the system Example 1: video1 resolution is 600 ∗ 600 and the resolution setup by admin that it can be reduced to 4 times (A = adaptively control according to link quality) and - 4 users order the video then 𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁 ∗ 𝐹 Since number of users is <=A then F=1 600 ∗ 600 4 ∗ 1 And the resolution will be distributed on four channels. - 10 users order the video then 𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁∗𝐹 Since number of users is > A then 𝐹 = 𝑀 𝑁 which is 4 10 = 0.4 600 ∗ 600 10 ∗ 0.4 And the resolution will be distributed on four even if the users are 10 to keep the quality with the accepted levels. 3) Security phase A problem associated to using fog computing technology has been the security issues, within this work a private key method used to encrypt the data transmitted from server-side to client-side inside the fog computing map which is 3DES. This algorithm will be in both server-side (for encryption) and client-side (for decryption) and the key for this operation is the user password. The developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation. 4) Data streaming phase The data of the video streamed as bits using the channel of the video streaming which based on fog computing this allow the client on the server side to view the video without the need to download it. The data Streaming is continuously generated by different sources. And it processed incrementally using Stream Processing techniques without needs to access to all data. In addition, it is usually used in the context of big data in which it is generated by many different sources at high speed. 5) User interface phase The data received on the client side (mobile phone) with programmed application using android studio that will decrypt the data encrypted in the server side using the user password and show the video on the user device. System outcome many dataset elements were used to tests the activity of the proposed framework, the user preferences set up six times each time the user requests special lecture and the number of
  • 8. TELKOMNIKA Telecommun Comput El Control  Mobile learning architecture using fog computing and adaptive… (Shymaa Mohammed Jameel) 2461 users requested the same lecture is changed 3 times, within the tested framework with data set elements, the network admin set that these resolutions can be reduce quality 4 times maximum according to link quality at the moment of requesting the video and 2 scenarios assumed where: a) One user request the videos 𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁 ∗ 𝐹 N= number of users =1, F=1 since the number of user is <= the number assigned by the system according to the link quality. 484 ∗ 360 1 ∗ 1 Same quality will stream to the requested user. b) 10 users order the video then 𝑁𝑒𝑤 𝑟𝑒𝑠𝑜𝑙𝑢𝑡𝑖𝑜𝑛 = 𝐿𝑒𝑛𝑔𝑡ℎ ∗ ℎ𝑒𝑖𝑔ℎ𝑡 𝑁 ∗ 𝐹 Since number of users is > A then 𝐹 = 𝑀 𝑁 which is 4 10 = 0.4 484 ∗ 360 10 ∗ 0.4 And the resolution will be distributed on four even if the users are 10 to keep the quality with the accepted levels. Table 1 show the experiments results of the videos after applying the quality reduction. In order to check the effectively related to the suggested system it has been compared to some of the suggested system within the same field as shown in Table 2. Table 1. Experiments results of the videos after applying the quality reduction No. Lecture name Resolution Resolution/2 Resolution/4 (Width High) (Width High) (Width High) 1. C++ programing Language 484 360 242 180 121 90 2. Introduction to Data Mining 1280 720 640 360 320 180 3. Hub, Switch, & Router What's the difference 1440 1080 720 450 360 270 4. Network Security 1920 1080 960 540 480 270 5. Self-Organizing Maps 640 480 320 240 160 120 6. Computer Science Vs. Computer Engineering 854 480 427 240 213 120 Table 2. Brief of analysis of different features provided put compared to other models Features [6] [7] [8] Proposed system Detects and takes into account the real-world contexts (real educational videos) No No Yes Yes Situates learners in more than one learning scenario Yes Yes Yes Yes Adapting learning content for individual learners Yes No No Yes Adapting learning interface for individual learners No No No Yes Provides learning guidance or support across contexts No No Yes Yes Considering online learning status of learners No Yes No Yes Learning from previous implementations and thus changing the content No No No Yes 6. CONCLUSION: The use of mobile devices such as laptops, tablets, and smart-phones, are making the process of learning more effective, simple and personal. Mobile learning is the term provided for such learning type. The mobile learning might be utilized along with the e-learning and ubiquitous learning, also it might be specified as a sub-set regarding electronic-learning which involves using mobile devices for allowing the process of learning anytime and anywhere. In this paper a proposed architecture of fog-based e-learning framework using many techniques related to the main manner of the system deep learning for classifying the data to comply with user preferences and quality adaptation to change video resolution while send it via data streaming and the sent data were encrypted using 3DES. The benefits of the frame work are to meet the user (student needs) and using fog computing which
  • 9.  ISSN: 1693-6930 TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 5, October 2020: 2454 - 2462 2462 faster than other techniques. The presented study works on developing a system of e-learning which has been on the basis of fog computing concepts with deep learning approaches utilized for classification to the data content for accomplishing the context aware learning and use the adaptation of video quality using special equation and the data encrypted and decrypted using 3DES algorithm to ensure the security side of the operation. REFERENCES [1] H. Crompton, "A historical overview of mobile learning: Toward learner-centered education," Handbook of Mobile Learning, pp. 3-14, Routledge, 2013 [2] Eric Klopfer, Kurt Squire, et al., "Environmental detectives: PDAs as a window into a virtual simulated world," Proceedings. IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 95-98, 2002. [3] Hendrik Thüs, Mohamed Amine Chatti, et al., "Mobile learning in context," International Journal of Technology Enhanced Learning, vol. 4, no. 5-6, pp. 332-344, 2012. [4] Y. K. Wang, “Context awareness and adaptation in mobile learning,” The 2nd IEEE International Workshop on Wireless and Mobile Technologies in Education, pp. 154-158, 2004. [5] Ramu Parupalli, Sarat Chandra Babu Nelaturu, and Dhanander Kumar Jain. "The role of content adaptation in ubiquitous learning,” 2011 IEEE International Conference on Technology for Education, pp. 177-182, 2011. [6] Weiqing Zhao, Yafei Sun, and Lijuan Dai. "Improving computer basic teaching through mobile communication and cloud computing technology," 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE), pp. V1-452, 2010. [7] P. Hendradi, M. Khanapi, and S. N. Mahfuzah, "Cloud computing-based e-learning system architecture in education 4.0," Journal of Physics: Conference Series, vol. 1196, no. 1, IOP Publishing, 2019. [8] Paula Fraga-Lamas, et al., "Design and Experimental Validation of a LoRaWAN Fog Computing Based Architecture for IoT Enabled Smart Campus Applications," Sensors, vol. 19, no. 15, 2019. [9] Redowan Mahmud, Ramamohanarao Kotagiri, and Rajkumar Buyya, "Fog computing: A taxonomy, survey and future directions," Internet of everything, Springer, Singapore, pp. 103-130, 2018. [10] A. V. Dastjerdi, and Rajkumar Buyya, "Fog computing: Helping the Internet of Things realize its potential," Computer, vol. 49, no. 8, pp. 112-116, 2016. [11] Koustabh Dolui, and Soumya Kanti Datta, "Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing," 2017 Global Internet of Things Summit (GIoTS), 2017. [12] A. V. Dastjerdi, et al., "Fog computing: Principles, architectures, and applications," Internet of Things, pp. 61-75, 2016. [13] Yann LeCun, Yoshua Bengio, and Geoffrey Hinton, "Deep learning," Nature, vol. 521, pp. 436-444, 2015. [14] Li Deng, Dong Yu, "Deep learning: methods and applications," Foundations and Trends in Signal Processing, vol. 7, no. 3–4, pp. 197-387, 2014. [15] Jürgen Schmidhuber, "Deep learning in neural networks: An overview," Neural Networks, vol. 61, pp. 85-117, 2015. [16] Chiyuan Zhang, et al., "Understanding deep learning requires rethinking generalization," arXiv preprint arXiv:1611.03530, 2016. [17] Fausto Milletari, et al., "Hough-CNN: deep learning for segmentation of deep brain regions in MRI and ultrasound," Computer Vision and Image Understanding, vol. 164, pp. 92-102, 2017. [18] Guanpeng Li, et al. "Understanding error propagation in deep learning neural network (DNN) accelerators and applications," Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis, 2017. [19] Jeremy Kawahara, Ghassan Hamarneh. "Multi-resolution-tract CNN with hybrid pretrained and skin-lesion trained layers," International Workshop on Machine Learning in Medical Imaging, Springer, Cham, 2016. [20] Geert Litjens, et al., "A survey on deep learning in medical image analysis," Medical Image Analysis, vol. 42, pp. 60-88, 2017. [21] Xiaoguang Chen, et al., "Convolution neural network for automatic facial expression recognition," 2017 International Conference on Applied System Innovation (ICASI), 2017. [22] Mohammad Lotfollahi, et al., "Deep packet: A novel approach for encrypted traffic classification using deep learning," Soft Computing, pp. 1-14, 2017. [23] A. Britto Mattos, Dario Augusto Borges Oliveira, Edmilson Dasilva Morais, "Improving CNN-based viseme recognition using synthetic data," 2018 IEEE International Conference on Multimedia and Expo (ICME), 2018. [24] Heinz Boehmer Fiehn, et al., "Smart agriculture system based on deep learning," Proceedings of the 2nd International Conference on Smart Digital Environment, 2018. [25] Tsung-Han Chan, et al., "PCANet: A simple deep learning baseline for image classification?," IEEE transactions on image processing, vol. 24, no. 12, pp. 5017-5032, 2015. [26] Mohamad Mahmoud Al Rahhal, et al., "Deep learning approach for active classification of electrocardiogram signals," Information Sciences, vol. 345, pp. 340-354, 2016. [27] Qin Zou, et al., "Deep learning based feature selection for remote sensing scene classification," IEEE Geoscience and Remote Sensing Letters, vol. 12, no. 11, pp. 2321-2325, 2015.