http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-8-242-247.pdf 

Abstract

Abstract--E-learning has been a topic of increasing interest in recent years, due to the fact that increased scheduling flexibility as well as tool support can now be offered at a widely affordable level. As a result, many e-learning platforms and systems have been developed and commercialized; these are based on client-server, peer-topeer, or, more recently. An e-learning system can make an enterprise more competitive by increasing the knowledge of its employees. E-learning has been shown to have impressive potential in e-commerce. At present, most elearning environment architectures use single computers or servers as their structural foundations. As soon as their work loads increase, their software and hardware must be updated or renewed. The collaborative e-Learning services can be categorized as generalized services or need specific services. While it is easy to construct need specific services with the help of sophisticated tools available today, it is increasingly complex to build generalized collaborative elearning services. In the design and implementation of generalized services, the major ones are e-Resources discovery, scheduling, security and overall management and administration. An organization may implement an elearning system according to their requirements 

Authors and Affiliations

Sanjeev Narayan Bal

Keywords

Related Articles

Radio Interferences Performances in 750KV Transmission Line & 400KV Transmission Line of HVAC Transmission system by MATLAB program

This paper presents the methodologies for the radio interference measurements of electrical system in transmission lines, its effect, level, rules and design criteria describes that. This paper also shown that 750kV and...

An Effective S-Box Comparison by Parity Based Fault Detection Scheme Using Composite Fields

AES is the most effective algorithm for network security that is more confidential, reliable and robust. A key step in the Advanced Encryption Standard (AES) algorithm is the subbyte transformation and its inverse . The...

Cloud Data Security using Authentication and Encryption Technique

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In cloud computing application software and databases are moving to the centralized large data centres. This mechanism brings...

Detecting Sequence Number Collector Problem in Black Hole Attacks in AODV Based Mobile Adhoc Networks 

Mobile Ad-hoc Network (MANET) is an autonomous system, where nodes/stations are connected with each other through wireless links. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing...

Secured Cost Effective Group Handover Authentication Scheme For WiMAX Networks

Technological improvement of Wireless Communication is important aspect of our daily life. Mobile WiMAX IEEE 802.16m standard aims at fulfilling the requirements on 4G Systems. Providing seamless handover authentication...

Download PDF file
  • EP ID EP151741
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Sanjeev Narayan Bal (2012). http://ijarcet.org/wp-content/uploads/IJARCET-VOL-1-ISSUE-8-242-247.pdf . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(8), 234-241. https://europub.co.uk./articles/-A-151741