Design of Mobile Learning Content with a Mobile-Based Live Multimedia System

Authors

  • Izwan Amsyar Informatics Academy
  • Haznah Latifah Manipal International University
  • Dewi Wuisan Pelita Harapan University

DOI:

https://doi.org/10.34306/ijcitsm.v2i2.112

Keywords:

Internet, m-learning, multimedia

Abstract

With the rise of world progress, information technology and telecommunications to the Internet have become a top priority. These advancements mark a watershed moment in mobile learning, or "mobile learning," as it is known (m-learning). M Learning has some extra learning capacity that can be accessed by anybody, at any time, from anywhere. The issues still exist in m-learning, including a shortage of hardware and platforms required by the system architecture and accessibility. In order to become comfortable for the user, a thorough examination of each component dealing with existing m-learning is also required. This research aims to address the problem by employing multimedia as a material that can provide more precise and detailed information. Multimedia m-learning services necessitate an internet connection, excellent access, and adequate hardware to benefit from the overall bias with good services provided by phones that offer mobile multimedia facilities. The study's primary goal is to create m-learning with multimedia services, and the expected results are a software-based content provider.

References

E. Dolan and R. Widayanti, “Implementation Of Authentication Systems On Hotspot Network Users To Improve Computer Network Security,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 88–94, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.93.

M. R. Anwar, R. Panjaitan, and R. Supriati, “Implementation Of Database Auditing By Synchronization DBMS,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 197–205, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/53

A. Williams and C. S. Bangun, “Artificial Intelligence System Framework in Improving The Competence of Indonesian Human Resources,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 82–87, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.91.

N. P. Puji, A. Dudhat, H. Teja Sukmana, A. Mardiansyah, and M. Hardini, “Modern Technology Advances with Benefits for Humanity to Demonstrate Design with Conventional Sources Islamic,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 14–36, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/8

M. R. Anwar and S. Purnama, “Boarding House Search Information System Database Design,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 70–81, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.89.

A. Dudhat and T. Mariyanti, “Indoor Wireless Network Coverage Area Optimization,” International Journal of Cyber and IT Service Management, vol. 2, no. 1, pp. 55–69, Mar. 2022, doi: 10.34306/IJCITSM.V2I1.86.

T. Nurhaeni, N. Lutfiani, A. Singh, W. Febriani, and M. Hardini, “The Value of Technological Developments Based on An Islamic Perspective,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 1–13, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/4

W. Setyowati, R. Widayanti, and D. Supriyanti, “Implementation Of E-Business Information System In Indonesia : Prospects And Challenges,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 180–188, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/49

D. Immaniar, N. Azizah, D. Supriyanti, N. Septiani, and M. Hardini, “PoTS: Proof of Tunnel Signature for Certificate Based on Blockchain Technology,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 101–114, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/28

T. Ramadhan, Q. Aini, S. Santoso, A. Badrianto, and R. Supriati, “Analysis of the potential context of Blockchain on the usability of Gamification with Game-Based Learning,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 84–100, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/24

D. Cahyadi, A. Faturahman, H. Haryani, E. Dolan, and S. millah, “BCS : Blockchain Smart Curriculum System for Verification Student Accreditation,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 65–83, Apr. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/20

T. Ayuninggati, N. Lutfiani, and S. Millah, “CRM-Based E-Business Design (Customer Relationship Management) Case Study : Shoe Washing Service Company S-Neat-Kers,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 216–225, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/58

M. Mulyati, I. Ilamsyah, A. Aris, iketut gunawan, and M. Suzaki Zahran, “Blockchain Technology: Can Data Security Change Higher Education Much Better?,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 121–135, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/36

I. Y. Ruhiawati, A. P. Candra, and S. N. Sari, “Design and Build a Multimedia System for Indonesian Religious Activities Based on Android,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 233–239, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/64

P. Edastama, A. Dudhat, and G. Maulani, “Use of Data Warehouse and Data Mining for Academic Data : A Case Study at a National University,” International Journal of Cyber and IT Service Management, vol. 1, no. 2 SE-Articles, pp. 206–215, Oct. 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/55

B. Rawat and S. Purnama, “MySQL Database Management System (DBMS) On FTP Site LAPAN Bandung,” International Journal of Cyber and IT Service Management, vol. 1, no. 2, pp. 173–179, 2021.

G. Maulani, G. Gunawan, L. Leli, E. Ayu Nabila, and W. Yestina Sari, “Digital Certificate Authority with Blockchain Cybersecurity in Education,” International Journal of Cyber and IT Service Management, vol. 1, no. 1 SE-Articles, pp. 136–150, May 2021, [Online]. Available: https://iiast-journal.org/ijcitsm/index.php/IJCITSM/article/view/40

Downloads

Published

2022-09-20

How to Cite

Amsyar, I., Latifah, H., & Wuisan, D. (2022). Design of Mobile Learning Content with a Mobile-Based Live Multimedia System. International Journal of Cyber ​​and IT Service Management (IJCITSM), 2(2), 146–153. https://doi.org/10.34306/ijcitsm.v2i2.112

Issue

Section

Articles