“M-LearNiNg” - A Buzzword in Computer Technology
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2012, Vol 2, Issue 2
Abstract
With the exponential development in technology, there is always the danger that the equilibrium between technology and learning is disturbed. But Mobile Learning or short M-Learning creates completely new possibilities in learning. M-Learning creates completely new learning scenarios For example, a lecture about the unique architectural design of a building could take place at the building itself. This creates an entirely new learning experience This paper discusses the place of M-Learning as Part of E-Learning and D-Learning Relationships between D-, E-, and MLearning It also critically investigates the potentials of M-Learning while examining the positive and negative effects of M-Learning for learners. Furthermore, it will investigate what kind of learners may and may not benefit from M-learning. This paper also discusses how M-Learning can support classical learning and some M-learning practices that are in different sectors such as corporate, university and military have been mentioned This paper is a review of M-learning literature for understanding and discussion of current perspectives and theories in mobile learning In the end the paper describes issues and special care needed when designing learning material with the mobile devices in mind.
Authors and Affiliations
Pooja Grover, Rekha Garhwal and Ajaydeep
Establishment Of The Relationship Between Occupational/ Job Stress And Occupational Anxiety-A Study Of Marketing Managers Of Selected Indian Private Banks At Nagpur.
Management Facilitator Peter Drucker wrote “Marketing is the distinguishing unique function of the business.” In 1991, Marketing expert Regis Mckenna expressed a viewpoint in Harvard Business Review Article as –“Market...
Secure File Transmission Scheme Based on Hybrid Encryption Technique
To enhance the security level of data transmission in Open Network, a hybrid encryption Technique based on AES, RSA and MD5 is proposed. The mechanism makes full use of advantage of AES RSA, MD5 because encryption spee...
Incorporating security into Web Applications - An Aspect oriented approach
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web appli...
Fingerprint Matching Incorporating Ridge Features Using Wavelet Transform.
Next to DNA, fingerprint is the unique feature which identifies the individual. Due to distortions such as skin elasticity, non uniform pressure applied by the subject, different finger placement with the sensor and de...
Role of Ontology in NLP Grammar Construction for Semantic based Search Implementation in Product Data Management Systems
In this research paper we address the importance of Product Data Management (PDM) with respect to its contributions in industry. We also present PDM Systems in brief and highlight some of major challenges to the PDM co...