15 research outputs found

    Risks and remedies in e-learning system

    Full text link
    One of the most effective applications of Information and Communication Technology (ICT) is the emergence of E-Learning. Considering the importance and need of E-Learning, recent years have seen a drastic change of learning methodologies in Higher Education. Undoubtedly, the three main entities of E-Learning system can be considered as Student, Teacher & Controlling Authority and there will be different level, but a good E-Learning system needs total integrity among all entities in every level. Apart from integrity enforcement, security enforcement in the whole system is the other crucial way to organize the it. As internet is the backbone of the entire system which is inherently insecure, during transaction of message in E-Learning system, hackers attack by utilising different loopholes of technology. So different security measures are required to be imposed on the system. In this paper, emphasis is given on different risks called e-risks and their remedies called e-remedies to build trust in the minds of all participants of E-Learning system

    Object-Oriented Modeling of DIPRM System for E-Commerce Transaction

    Get PDF
    The ease of creation, modification, distribution, compatibility and above all, a large market opportunity drive the creator and the consumer to move towards the digital age to create and use their IP digitally called Digital Intellectual Property (DIP). But the DIP infringements in E-commerce drives us to design a unified generic model that can manage Digital Intellectual Property involving rules, regulations, practices, business models etc. In this scenario an attempt has been made here to design a well-structured prototype that brings all components of the E-commerce system into a common platform with a view to offer a model of a unified integrated ecommerce system. We have tried a maiden attempt to use UML to design the model of such system, which is the recent trend of software engineering practice. This allows developing a very flexible model that facilitates maintainability, reusability, portability and other Object Oriented features inherent in the new E-commerce scenario. Keywords: DIPRM, DRM, E-commerce, UML, OO

    On Designing a Secure E-Commerce Transaction Management System – A UML Based Approach

    Get PDF
    E-commerce gained popularity as a sophisticated transaction system for buying and selling of products and services efficiently through Internet. Due to lack of privacy and security, customers are unwilling to participate in E-commerce transaction system. To combat such inefficiency in transaction of E-commerce and to regain the customers trust an attempt is made here to design a prototype of a secure E-commerce transaction system that brings all components of the E-commerce into a common platform to offer a model of a unified integrated E-commerce system using DRM. In the proposed system, the transaction manager generates single use token consisting information about the customer, merchant, product, and payment amount etc. and thereafter wrapped as a DRM package. The advantages of using such token are, after a single use the token will expire, which minimizes the possible loss in the transaction, also, as the token wrapped as a DRM package, therefore only the intended user and the specified application software can open the DRM package using special key. The application, thereafter, will take care of the rights imposed on the ‘token’ and expires itself after the single use. To design the model of the proposed system we have tried to use Unified Modeling Language (UML), which allows developing a very flexible model that facilitates maintainability, reusability, portability and other Object Oriented software engineering features inherent in the E-commerce transaction system. Keywords: E-commerce, Object, Object Oriented Modeling (OOM), UML, DRM

    Determining the Secondary Structure of Elapid Toxins using Multi-Layer Perceptrons and Kohonen Networks

    Get PDF
    In this paper, a two-stage neural network consisting of a feed-forward neural network and a Kohonen self-organizing map, has been used to predict secondary structure. We have applied our methods to determine the structure of 245 proteins containing neurotoxins, cytotoxins, cardiotoxins and three-finger toxins, derived from venoms of Elapid snakes. In doing so, the system achieved a Q3 score of 70%, which is quite remarkable

    Securing Text Transmission in E-learning through Natural Language Steganography: An Object Oriented Approach

    Get PDF
    With the increasing availability of Internet, the e-learning is also getting popularity at a high speed. But for a secure and efficient e-learning system security is a great matter of concern. Some of the important documents transmit between the participants of e-learning are text files like the user id of the learner or the teacher, password, private keys etc. If the hacker can reach these documents, they can get full access of the system which resulting fake marks sheet or admit card, which is very harmful for any e-learning institute. So text steganography is a good technique through which confidential and valuable data may be transacted securely by integrating text steganography along with AES block cipher. In this paper, we proposed a model for securing the transmission of text documents from the sender to receiver in an e-learning system wrapped with AES encryption algorithm, which provide better security

    OBJECT ORIENTED METRIC BASED ANALYSIS OF TEXT TRANSMISSION IN E-LEARNING THROUGH NATURAL LANGUAGE STEGANOGRAPHY

    Get PDF
    E-learning is an application of information and communication technology in the field of learning. Through steganography the e-learning institution can provide security to other participants of e-learning like teacher and learner. Here we use text steganography with modified SNOW algorithm while passing secret texts from the administrator to the learner in an e-learning system. In this paper, we calculate the object oriented metric based analysis of CK and MOOD metrics of our proposed model, which ensures the advantages of code redundancy, code reusability, and cost effectiveness and so on
    corecore