http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-8-242-247.pdf
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
Abstract--E-learning has been a topic of increasing interest in recent years, due to the fact that increased scheduling flexibility as well as tool support can now be offered at a widely affordable level. As a result, many e-learning platforms and systems have been developed and commercialized; these are based on client-server, peer-topeer, or, more recently. An e-learning system can make an enterprise more competitive by increasing the knowledge of its employees. E-learning has been shown to have impressive potential in e-commerce. At present, most elearning environment architectures use single computers or servers as their structural foundations. As soon as their work loads increase, their software and hardware must be updated or renewed. The collaborative e-Learning services can be categorized as generalized services or need specific services. While it is easy to construct need specific services with the help of sophisticated tools available today, it is increasingly complex to build generalized collaborative elearning services. In the design and implementation of generalized services, the major ones are e-Resources discovery, scheduling, security and overall management and administration. An organization may implement an elearning system according to their requirements
Authors and Affiliations
Sanjeev Narayan Bal
Radio Interferences Performances in 750KV Transmission Line & 400KV Transmission Line of HVAC Transmission system by MATLAB program
This paper presents the methodologies for the radio interference measurements of electrical system in transmission lines, its effect, level, rules and design criteria describes that. This paper also shown that 750kV and...
An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields
AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...
Cloud Data Security using Authentication and Encryption Technique
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings...
Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks
Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing...
Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks
Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802.16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication...