In the process of sending information from sender to receiver, an unauthorized user may work in an active way (update it) or passive way (read or delay in sending). There must be some techniques which assures receiver that whatever information received from authorized user as well as must be same as sent from sender side, in addition to this receiver never make Denial of service. Nowadays sharing of information or resources is a very common thing from single user to the network to the cloud. When information is moving from one node to another node, security is a big challenge. When information is stored on the user's computer, it is under control but when it is in movement user lose control over it. In the world of security, to convert information from one form to another form, Encryption is used, so that only authorized party will able to read. Encryption is a technique for any security-conscious organization. In this paper, we present basic access control models along with encryption techniques.
The process of Teaching-Learning has evolved tremendously within the last 5-10 years. The mode of teaching is changed from normal blackboard classroom teaching to technological teaching. Due to the COVID-19 outbreak, the education system has been disrupted especially; it affects more for Higher Educational Institutes where students have come from various regions. The immediate lockdown in the country made the outside students reach their homes without any prior knowledge of its effects. Most of the education sector has switched to distance learning. Our institute has also adopted Virtual Learning. Various virtual platforms are available as the Learning Management System. We have adopted the use of ICT in education for the last 3-4 years. This helped us to handle the Teaching-Learning during a pandemic outbreak. We have used Moodle Learning Management System for Virtual Learning. Learners Centric MOOCs (LCM) model is implemented through LMS and the effectiveness is improved by adding Feedback and Assessment to it. The LCM model consists of structural elements: Learning Dialogs (LeD) in the form of short 10 to 12 minutes Videos, Learning by Doing (LbD) in the form of an assignment question or activity to do, Learning Experience Interactions (LxI) in the form reflection spot and discussion on the video provided and Learning Extension Trajectories (LxT) in the form of a small quiz on the video and resources. The major challenge for Virtual Learning is learner’s engagement. We have added feedback to improve the teaching-learning process. The model is effectively applied for Third Year Computer Science and Engineering class. The course of Compiler Construction is taken in to account for the implementation. A total of 73 students were involved in this activity. The results of feedback from students are satisfactory. More than 83% of the learners have given positive feedback towards this technological change of teaching. Learner’s engagement has improved to 30%.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.