-
6972
-
2043
-
1524
-
1385
-
1306
MONECT PC Remote: Gaming Redefined and Shaping the Future of Gaming Experience with Virtual Remote Layouts
DOI:
https://doi.org/10.30564/jeis.v7i1.8133Abstract
Since 2012, MONECT has pursued the conceptualization of a virtual remote controller, aiming to accommodate a diverse range of devices and peripherals within the realm of the virtual control landscape. Advancing to 2017–2019,we integrated this conceptualization into a remote desktop session with gaming controls, enhancing functionality across various game genres such as Racing, Frames Per Second (FPS), Role-Playing Game (RPG), and more. Each gaming category featured a tailored setup and a user-friendly layout, catering to different controller preferences. Further evolution occurred between 2019–2024, focusing on rapidly deployable features and advancements in both computing and gaming. Leveraging onboard sensors, the application aimed to provide an immersive gaming experience, utilizing sensors like the Accelerometer, G-Sensor, Gyroscope, Camera, and more. Each sensor played a distinct role in control;for instance, the Gyroscope sensor was activated in FPS mode, enabling precise aiming, while the G-Sensor facilitated steering movements in Race mode. The virtual remote sessions not only granted users the flexibility to use various controllers for specific gaming styles but also allowed simultaneous interaction among devices and peripherals. This realtime remote access, combined with the deployment research project’s outcomes, marked a significant stride in providing users with the ultimate gaming experience with remote associativity control access.
Keywords:
Artificial Intelligence (AI); Computer Vision; Virtual Keypad Controllers; Real-Time Remote Access; Real-Time Virtual Interactive Gameplay; Remote Access Control; Simultaneous Device Peripheral Interaction; User CustomizationReferences
[1] Akhtar, Z.B., 2019. Revolutionary Gaming Style in Motion. Proceedings of The 2019 IEEE 5th International Conference for Convergence in Technology (I2CT); March 29–31, 2019; Bombay, India. pp. 1–5. DOI: https://doi.org/10.1109/I2CT45611.2019.9033573
[2] Akhtar, Z.B., 2022. A Revolutionary Gaming Style in Motion. IntechOpen. DOI: https://doi.org/10.5772/intechopen.100551
[3] Dey, I., 2022. Computer-Mediated Communication. IntechOpen. DOI: https://doi.org/10.5772/intechopen.92467
[4] Akhtar, Z.B., 2025. Unveiling the Evolution of Generative AI (GAI). Available from: https://www.elivabooks.com/en/book/book-9619528862 (cited 20 March 2025).
[5] Akhtar, Z.B., Rawol, A.T., 2025. Harnessing artificial intelligence (AI) towards the landscape of big earth data: Methods, challenges, opportunities, future directions. Journal of Geography and Cartography. 8(1), 10224. DOI: http://dx.doi.org/10.24294/jgc10224
[6] Akhtar, Z.B., Rawol, A.T., 2024. Economy and empirical research perspectives towards artificial intelligence: A deep dive investigative exploration analysis. Economy, 11(1), 1–18. DOI: https://doi.org/10.20448/economy.v11i1.6270
[7] Akhtar, Z.B., 2024. Securing the future of mobility: Understanding the security perspectives of cybersecurity, operating systems (OS) Security, mobile computing. Open Access Journal of Computer Science and Engineering. 1(1), 51–66.
[8] Akhtar, Z.B., 2024. Generative artificial intelligence (GAI): From large language models (LLMs) to multimodal applications towards fine tuning of models, implications, investigations. Computing and Artificial Intelligence. 3(1), 1498. DOI: https://doi.org/10.59400/cai.v3i1.1498
[9] Akhtar, Z.B., Rawol, A.T., 2024. Harnessing artificial intelligence (AI) for cybersecurity: Challenges, opportunities, risks, future directions. Computing and Artificial Intelligence. 2(2), 1485. DOI: https://doi.org/10.59400/cai.v2i2.1485
[10] Akhtar, Z.B., 2024. Computer vision and beyond: A deep dive exploration and investigation. Trends in Technical & Scientific Research. 7(3), 555711.
[11] Akhtar, Z.B., 2024. Unveiling the evolution of generative AI (GAI): A comprehensive and investigative analysis toward LLM models (2021–2024) and beyond. Journal of Electrical Systems and Information Technology. 11, 22. DOI: https://doi.org/10.1186/s43067-024-00145-1
[12] Akhtar, Z.B., 2024. The design approach of an artificial intelligent (AI) medical system based on electronical health records (EHR) and priority segmentations. The Journal of Engineering. 2024(4), 1–10. DOI: https://doi.org/10.1049/tje2.12381
[13] Akhtar, Z.B., Rozario, V.S., 2020. The Design Approach of an Artificial Human Brain in Digitized Formulation Based on Machine Learning and Neural Mapping. Proceedings of The 2020 International Conference for Emerging Technology (INCET); June 5–7, 2020; Belgaum, India. pp. 1–7. DOI: https://doi.org/10.1109/INCET49848.2020.9154000
[14] Akhtar, Z.B., Rozario, V.S., 2025. AI Perspectives within computational neuroscience: EEG integrations and the human brain. Artificial Intelligence and Applications. 3(2), 145-160. DOI: https://doi.org/10.47852/bonviewaia52024174
[15] Jiang, M., Gou, G., Shi, J., et al., 2019. I Know What You are Doing with Remote Desktop. Proceedings of The 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC); October 29, 2019; London, England. pp. 1–7.
[16] Manson, J., 2022. Remote desktop software as a forensic resource. Journal of Cyber Security Technology. 6(1–2), 1–26.
[17] Song, T., Wang, J., Wu, J., et al., 2018. FastDesk: A remote desktop virtualization system for multi-tenant. Future Generation Computer Systems. 81, 478–491.
[18] Magaña, E., Sesma, I., Morato, D., et al., 2019. Remote access protocols for Desktop-as-a-Service solutions. PloS One. 14(1), e0207512.
[19] P.Lakshmi, S.Himabindu, 2015. Quality Of Experience In Remote Virtual Desktop Services. International Journal of Engineering and Computer Science, 4(07). DOI:https://www.ijecs.in/index.php/ijecs/article/view/3297
[20] Huang, T.Y., Wang, H.H., Peng, C.L., et al., 2015. A new remote desktop approach with mobile devices: design and implementation. In In: Park, J., Pan, Y., Chao, H.C. (eds.). Ubiquitous Computing Application and Wireless Sensor: UCAWSN-14. Springer: Dordrecht, Netherlands. pp. 305–321.
[21] Manson, J. (2022). Remote Desktop Software as a forensic resource. Journal of Cyber Security Technology, 6(1-2), 1-26.
[22] Saeed, S., Alam, M., 2022. Performance analysis of secure & efficient remote desktop manager. Journal of Information & Communication Technology. 11(1), 16–26.
[23] Sujana, A.P., Sinaga, R., 2018. The design and implementation of remote desktop using thin client. IOP Conference Series: Materials Science and Engineering. 407(1), 012172.
[24] Ernest, G.D., Timothy, A.A., Kpangkpari, G., 2016. The use of remote access tools by system administrators today and their effectiveness: Case study of remote desktop, virtual network computing and secure android app. International Journal of Computer Applications, 136(10), 35–38.
[25] Memon, V., Ali, Z., Kumar, C., et al., 2021. Performance Analysis of Internet Streams using Remote Desktop Tools. International Journal of Advanced Trends in Computer Science and Engineering. 10(3), 2600–2606.
[26] Fuqua, W. 2021. Windows Terminal Tips, Tricks, and Productivity Hacks: Optimize Your Command-Line Usage and Development Processes with Pro-Level Techniques. Packt Publishing: Birmingham, UK.
[27] Ma, L., 2023. Research on English Distance Learning Terminal Through Windows-Based Application Software on the Internet. Proceeings of The 2023 International Conference on Applied Physics and Computing (ICAPC); December 27–29, 2023; Ottawa, ON, Canada. pp. 611–615.
[28] Alfaif, A.K., Hatta, P., Wihidayat, E., 2024. Performance analysis of proxmox and virtualbox with overhead and linearity parameters to support server administration practice. Journal of Informatics and Vocational Education. 7(2), 35–41.
[29] Sakthivel, S. G., & Ramalingam, S., 2025. Network security threat prevention in step based file transfer system. International Conference on Green Computing for Communication Technologies(ICGCCT); March 6–7, 2024; Salem. India. pp. 3279 (1): 020105.
[30] Lazarov, W., Schafeitel-Tähtinen, T., Squillace, J. et al., 2025. Lessons Learned from Using Cyber Range to Teach Cybersecurity at Different Levels of Education. Technology, Knowledge and Learning. 1-36. https://doi.org/10.1007/s10758-025-09840-y
[31] Ricioppo, G. 2022. Delivering Remote Desktop Services to Remote Users: A QoE Perspective [PhD theis]. Politecnico di Torino: Turin, Italy.
[32] Diwakar, M., Sharma, K., Dhaundiyal, R., et al., 2021. A review on autonomous remote security and mobile surveillance using internet of things. Journal of Physics: Conference Series. 1854(1), 012034.
[33] Yoon, S., Kim, J. 2017. Remote security management server for IoT devices. Proceeings of The 2017 International Conference on Information and Communication Technology Convergence (ICTC); October, 18–20, 2017. Jeju, Korea. pp. 1162–1164.
[34] Ndichu, S., McOyowo, S., Okoyo, H., et al., 2020. A remote access security model based on vulnerability management. International Journal of Information Technology and Computer Science. 12(5), 38–51.
[35] Malecki, F. 2020. Overcoming the security risks of remote working. Computer Fraud & Security. 2020(7), 10–12.
[36] Miroshnikov, A., 2018. Windows Security Monitoring: Scenarios and Patterns. John Wiley & Sons: Hoboken, NJ, USA.
[37] Kulshrestha, A.A., Song, G., Zhu, T., 2023. The Inner Workings of Windows Security. [Preprint]. arXiv:2312.15150.
[38] Shan, Z., Wang, X., Chiueh, T.C., et al., 2016. Duplication of Windows Services. [Preprint]. arXiv:1608.08051.
[39] Easttom, C., Butler, W., Phelan, J., et al., 2024. Windows Forensics: Understand Analysis Techniques for Your Windows. Springer Nature: New York, NY, USA.
[40] Xu, B., Wang, S., 2024. Examining windows file system irp operations with machine learning for ransomware detection.[Preprint].
Downloads
How to Cite
Issue
Article Type
License
Copyright © 2025 Zarif Bin Akhtar

This is an open access article under the Creative Commons Attribution-NonCommercial 4.0 International (CC BY-NC 4.0) License.