Volume 10, Issue 3, March 2018

 

 

Blended Learning: Correlations on the Effectiveness of the Different Learning Environment
 

Blended Learning: Correlations on the Effectiveness of the Different Learning Environment

Pages: 41-49 (9) | [Full Text] PDF (288 KB)
LJB Caluza, DGD Funcion
Leyte Normal University, Philippines

Abstract -
Utilization of technology in the teaching and learning process has brought a significant impact to the education sector. Technology offers educators and learners a new learning experience to encourage and enrich the teaching and learning process. The study used descriptive-correlation to know the effectiveness of the different learning environment through pre-test and post-test and to determine the satisfaction rating of the respondents towards the different kinds of learning environment. It was found out in the result that blended learning shows an effective tool to enriched student performance in programming. It is recommended to use different learning mode of delivery to shows a significant increase and improvement in the academic performance.
 
Index Terms - Blended Learning, Student Performance, Correlation, Distance Learning, Information Technology

Citation - LJB Caluza, DGD Funcion. "Blended Learning: Correlations on the Effectiveness of the Different Learning Environment ." International Journal of Computer Engineering and Information Technology 10, no. 3 (2018): 41-49.

A Novel Probabilistic Algorithm for Indoor WLAN Fingerprinting System
 

A Novel Probabilistic Algorithm for Indoor WLAN Fingerprinting System

Pages: 50-53 (4) | [Full Text] PDF (467 KB)
MR Nicholaus, EN Nfuka, KA Greyson
Dept of ICT, The open University of Tanzania, Tanzania
Dept of Electronics and Telecoms Eng, Dar es Salaam Institute of Technology, Tanzania

Abstract -
Location-based systems for indoor positioning have been examined generally inferable from their application in different fields and simple deployment. However, it requires a database containing the distribution of received signal strength (RSS) of the area of interest, called radio map. The computational time of Wi-Fi indoor localization needs to be reduced meet the demand of viable mobile applications. The Probabilistic fingerprinting algorithm uses a compound probability density function (PDF) to estimate the best location which increases the positioning time. This paper proposes a novel fingerprinting algorithm, the enhanced probabilistic algorithm, which reduces positioning time by introducing mean filter prior to PDF. Experimental results show that the proposed algorithm has improved positioning time.
 
Index Terms - Probabilistic fingerprinting algorithm, Indoor positioning, Probability density function, Received signal strength, Computational time

Citation - MR Nicholaus, EN Nfuka, KA Greyson. "A Novel Probabilistic Algorithm for Indoor WLAN Fingerprinting System ." International Journal of Computer Engineering and Information Technology 10, no. 3 (2018): 50-53.

Encryption Techniques for Cloud Data Confidentiality for More Secure Cloud Enviroment
 

Encryption Techniques for Cloud Data Confidentiality for More Secure Cloud Enviroment

Pages: 54-65 (12) | [Full Text] PDF (829 KB)
MN Saxena
School of I.C.T , Computer Science and Information Studies, Gautam Buddha university, greater noida

Abstract -
Cloud computing is one of the fastest growing internet based technology that facilitates users to utilize services by making use of large poll of resources without installation of any software. Adoption of this technology is increasing rapidly because of many advantages including reduction of cost and IT load. Despite the popularity of cloud computing, it faces many difficulties such as security that is one of the major inhibitors in the growth of cloud computing. Data confidentiality is at the top of the list of security concern for this technology. Many methods have been introduced to overcome this issue; encryption is one of them and widely used method to ensure the data confidentiality in cloud environment. In this study, an attempt is made to review the encryption techniques used for the data confidentiality. The results of review are classified on the basis of type of approach and the type of validation used to validate the approach.
 
Index Terms - Cloud data security, Data concealment, Data Encryption, Encryption algorithm

Citation - MN Saxena. "Encryption Techniques for Cloud Data Confidentiality for More Secure Cloud Enviroment." International Journal of Computer Engineering and Information Technology 10, no. 3 (2018): 54-65.