7 research outputs found

    An Improved Model for the Implementation of Web-Based Learning in Adult Secondary School Education in Kenya

    Get PDF
    The development of technology, which evolves continuously, has led to the transformation of traditional courses into web-based courses. However, as these e-learning systems grow more complex, involving numerous users with different levels of need, there is a need to have web-based learning models that adequately address such users’ needs, taking into consideration their levels of expertise, access and ability to interact with such systems. Most of the existing models present the adult learners with difficulties, as most of them have to concentrate mostly on learning the technology rather than learning the desired content. Most of the difficulties arise from the web-based learning model configurations in use in the country. The majority lack features and capabilities of highly interactive, fast-paced multimedia-supported learning currently demanded by most learners and tutors. Therefore, the main aim of this research was to devise an improved model for implementing a web-based learning programme in adult secondary school education. After analysing the existing models and establishing their operational challenges, an improved model was proposed. The proposed model was statistically tested using sample data. The results showed that recognizing both technological and user attributes along the recognized theoretical frameworks was important in increasing the users’ behavioural inclination to use the improved model. Therefore, it is recommended that more sensitization to web-based learning should be implemented by the adult education department in the Ministry of Education among adult learners in the country. It is also recommended that system developers should find ways of incorporating additional features into the model without affecting its architecture and function. Finally, there is need for future studies on the causal antecedents of the constructs presented in this research model to provide more precise practical implications

    Securing the IP Multimedia Subsystem with IPsec and HTTP Digest

    Get PDF
    Modern Telecommunication networks were combined from two communications: cellular networks and the Internet. The Internet Protocol Multimedia Subsystem (IMS) is the key element in the Modern Telecommunication networks architecture that makes it possible to provide wide range cellular access to all the services that the Internet provides. So, IMS is a great achievement in the communication world with advantage to maintain single communication platform for all but the big challenge is to maintain an adequate security level in this different network environment. IMS is based principally on IP protocol. Therefore, it inherits the security issues of IP networks. The IMS architecture is open, distributed and it has the advantage of being flexible in its implementation and deployment. This generates a variety of communication interfaces, which can make the system very vulnerable to attack. Add to that, the services offered on the IMS network must be provided by ensuring confidentiality and respect the privacy of users. Therefore, it is necessary to secure the IMS network at every level of its architecture including the final customer or subscriber device. Solutions like firewalls, anti-spy ware and antivirus systems failed to counter the emerging threats because they only target specific types of threats. In this study we are proposing security approach which is a Combination model composed of two protocols IPsec and HTTP digest

    A Framework for an E-government Based on Service Oriented Artichitecture

    Get PDF
    Electronic government is use of information and communication technologies in government to provide public services, to improve managerial effectiveness and to promote democratic values; as well as a regulatory framework that facilitates information intensive initiatives and fosters the knowledge society. To develop framework for an e-government may dynamically change in e-Government system requirements and the need for a highly autonomous approach for government agencies. The public Agency Professional Survey is based on service oriented architecture that will be used to gather the benefits experienced by departments that are currently involved in the e-Government initiatives. The expected findings may include the outcome of the implementation of e-Government initiatives in terms of operational efficiency and organizational effectiveness towards the online public services delivery channel. The study e-Government Based on Service Oriented Architecture will be helpful in implementation framework of e-Government in Governments

    Alternative Framework for Enhancing Image Quality of the Fingerprint

    Get PDF
    Fingerprint Identification is one of the most popular biometric methods used to verify and identify a person; formally it is defined as “The pattern of ridges and furrows on an individual finger”. Ridges are the lines in thumb and furrow is shallow trench of skin on an individual’s finger. Furrow is also referred to as valley. The combination of ridges and furrows makes an individual’s fingerprint and it’s called minutiae. A critical step in Fingerprint is to automatically and reliably extract minutiae from input finger print images. However the performance of the Minutiae extraction algorithm and other fingerprint recognition techniques relies heavily on the quality of the input fingerprint image. In order to ensure that the performance of the minutiae extraction algorithm will be robust with respect to the quality of input fingerprint images, an enhancement framework which can improve the clarity of the ridge structures is necessary. In this paper we reviewed, analyzed and evaluated some of the existing frameworks for image enhancement of the fingerprint which used Image or Minutiae Based and anticipated outcome of this effort is alternative hybrid framework of enhancing fingerprint image quality, that is a more proactive and consistent approach of improvement, 100 fingerprint from 4 DBs of FVC2006 was used for experiment and tested in MATLAB & Adobe Photoshop image processing Software’s, result indicates that proposed enhancement framework improved gap knowledge of the analyzed existing frameworks and Fingerprint were enhanced by correcting and removing noise from the input fingerprint

    Data Security in Cloud Computing with Elliptic Curve Cryptography

    Get PDF
    Cloud Computing (CC) is one of the most important and hottest deal of attention, both in academia researches and among users, due to its ability for satisfying the computing needs by reducing commercial expenditure bandwidth with computing compounds while increasing scalability and flexibility for computing services, accessing it through an Internet connection from anywhere in the world its available Internet network..However it becomes particularly serious because the data is located in different places even in the entire globe and should be taken into account such as violation of the confidentiality and privacy of customers’ data via unauthorized parties. So the only causes imperfection in the cloud computing is security impairment generally and especially data security. Despite about organizations and individual user adopting cloud computing, put their data in cloud due to the security issues challenges associated with it requires that organizations trust needs a technical tools protecting their data. Elliptical curve cryptography (ECC) is a public key encryption technique based on elliptic curve theory that can be used to create faster, smaller, and more efficient cryptographic keys. Hence, we proposed data security in cloud computing with elliptic curve cryptography a proficient data security model algorithm, as a secure tool to model a Secured platform for Data in cloud computing. The algorithm was simulated using Java Development Kit (JDK) to implement the curve operations to extract the data in the Cloud, encrypting, decrypting, signing and verifications the signature, followed by testing the acquired results the implemented classes and their design Although this topic represent a good sample of the work that is being done, there are many requirements to study this area due to the needs of cloud computing in the next generation both individuals and organization even governmental agencies Might parallel increase of cyber attackers and they improve their techniques so as a researcher suggest the importance of data in ECC to be studied

    An Alternative Model to Overcoming Two Phase Commit Blocking Problem

    Get PDF
    In distributed transactions, the atomicity requirement of the atomic commitment protocol should be preserved. The two phased commit protocol algorithm is widely used to ensure that transactions in distributed environment are atomic. However, a main drawback was attributed to the algorithm, which is a blocking problem. The system will get in stuck when participating sites or the coordinator itself crashes. To address this problem a number of algorithms related to 2PC protocol were proposed such as back up coordinator and a technique whereby the algorithm passes through 3PC during failure. However, both algorithms face limitations such as multiple site and backup coordinator failures. Therefore, we proposed an alternative model to overcoming the blocking problem in combined form. The algorithm was simulated using Britonix transaction manager (BTM) using Eclipse IDE and MYSQL. In this paper, we assessed the performance of the alternative model and found that this algorithm handled site and coordinator failures in distributed transactions using hybridization (combination of two algorithms) with minimal communication messages

    Alternative Face Recognition Using Neural Network

    Get PDF
    The main goal of this paper is to asses prototype of Alternative image recognition Using Neural network to check users As now days there are many security issues especially key areas such as banks , Government compound, universities as creating many challenges using human talent include customer queue ,time consuming for insuring security and high rate of security risks ,This access control as system allows only authorized persons to access to restricted areas. there was face recognition automatic system using RF and GSM technology but in this study we use with face recognition Neural network to overcome to the angle capture problems in image processing and increasing security by solving orientation angle ,light, pose , low resolution and facial expression and many factors also we compare many methods used in this area
    corecore