Version-1 (May-June 2014)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper reports in part some of the findings of a PhD study regarding visibility of gender issues in the use of the internet in university contexts. The study adopted a cross sectional descriptive survey research design and collected data using a structured questionnaire. Data were obtained from 440 full time university academics that were selected using simple random sampling technique. Data were analysed quantitatively using descriptive and inferential statistics using SPSS version 17. This study revealed a significant relationship between gender and internet usage in favour of males. While both male and female academics were not fully utilizing the internet for university teaching, more male academics used the internet for research more than female academics did. The study concluded that gender is a key factor in the discourse concerning internet and university academic practice. Internet usage differences have serious implications on mainstreaming ICT in higher education curricula as both female and male academics are expected to mentor students and participate in virtual co-construction of knowledge. The study recommended that university management should develop gender sensitive information technology learning environments and targeted training programmes. Female lecturers should be encouraged to be proactive and participate in global developmental initiatives.
Keywords: Gender, academics, Internet usage, Search engines, university teaching. users.
Keywords: Gender, academics, Internet usage, Search engines, university teaching. users.
[1] B.T.S. Kumar, and G. Manjunath, Internet use and its impact on the academic performance of university teachers and researchers: A comparative study, Higher Education, Skills and Work-based Learning, 3(3), 2013, 219-238.
[2] M. Tsvere, S. Swamy, and L.T. Nyaruwata, Perceived competencies of university academics in the use of information and communication technology in university academic business, International Journal of Science and Research, 2(8), 2013, 284-289.
[3] E. Schmidt, and J. Cohen, The new digital age: reshaping the future of people, nations and business (London: John Murray, 2013).
[4] A. Gurumurthy, Gender and ICTs: an overview report (Institute of Development Studies: Bridge, 2004).
[5] S. Downes, The role of educator in a PLE world, Stephen's Web, 2010, http://www.downes.ca/post/54321.
[2] M. Tsvere, S. Swamy, and L.T. Nyaruwata, Perceived competencies of university academics in the use of information and communication technology in university academic business, International Journal of Science and Research, 2(8), 2013, 284-289.
[3] E. Schmidt, and J. Cohen, The new digital age: reshaping the future of people, nations and business (London: John Murray, 2013).
[4] A. Gurumurthy, Gender and ICTs: an overview report (Institute of Development Studies: Bridge, 2004).
[5] S. Downes, The role of educator in a PLE world, Stephen's Web, 2010, http://www.downes.ca/post/54321.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The GPRS based LAN monitoring and controlling system is mainly developed to focus on expansion of various networks services or facilities which are essential for brilliantly monitoring a LAN network. In this system, workstations are collected to arrange them in a network. Managing and regulating the activities in the network while at the workplace is an easy task. But, while you are outstation it becomes difficult to monitor and control. You can always have your smart handset or GPRS enable device of any type which will fulfill this purpose. The interface between the clients and the remote administrator is achieved via the central monitoring server through sending and receiving email only. The project targets to develop an integrated software solution also this permits a network supervisor to distantly monitor the LAN. This is done by his email compatible devices and can see tasks on the client side. This project is developed for giving out the best particulars about a network to its administrator, on his GPRS enable device, when he is at a remote location.
Keywords: LAN, GSM, GPRS, Remote Monitoring & Control, Desktop.
Keywords: LAN, GSM, GPRS, Remote Monitoring & Control, Desktop.
[1]. HamitErdem and Armaganner," A Multi-Channel Remote Controller For Home and Office Appliances ", IEEE Transactions on Consumer Electronics, Vol. 55, No. 4, November 2009.
[2]. Amol Poman , Mahesh Gundras, Prashant Pujari Department Of Computer Engineering GHRCEM, University of Pune," GSM Based LAN Monitoring System", Amol Poman et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012 ,3848-3851.
[3]. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka Waghmare Department of computer engineering, MIT pune-411038, India, "GSM Based LAN Monitoring and Controlling ", International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.2, Mar-Apr 2012 pp-387-389
[4]. A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda," GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System" , IEEE Transactions on Consumer Electronics,vol.57 ,no 4,November 2011.
[5]. Wente Zeng, Student Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE," Optimal Trade-off Between Performance and Security in Networked Control Systems Based on Co evolutionary Algorithms ", IEEE transactions on industrial electronics, vol. 59, no. 7, July 2012.
[2]. Amol Poman , Mahesh Gundras, Prashant Pujari Department Of Computer Engineering GHRCEM, University of Pune," GSM Based LAN Monitoring System", Amol Poman et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (3) , 2012 ,3848-3851.
[3]. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka Waghmare Department of computer engineering, MIT pune-411038, India, "GSM Based LAN Monitoring and Controlling ", International Journal of Modern Engineering Research (IJMER) Vol.2, Issue.2, Mar-Apr 2012 pp-387-389
[4]. A. R. Al-Ali, Imran A. Zualkernan, Assia Lasfer, Alaa Chreide, and Hadel Abu Ouda," GRPS-Based Distributed Home-Monitoring Using Internet-Based Geographical Information System" , IEEE Transactions on Consumer Electronics,vol.57 ,no 4,November 2011.
[5]. Wente Zeng, Student Member, IEEE, and Mo-Yuen Chow, Fellow, IEEE," Optimal Trade-off Between Performance and Security in Networked Control Systems Based on Co evolutionary Algorithms ", IEEE transactions on industrial electronics, vol. 59, no. 7, July 2012.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Mutual Trust to Provide Data Security in Cloud Environment |
| Country | : | India |
| Authors | : | Srinivas Kolli , Ch.Sravan Kumar , Dr P.Chenna Reddy, |
| : | 10.9790/0661-16311618 ![]() |
Abstract: We introduce a model for provable data possession (PDP) that allows a client that has stored data at an untrusted server to verify that the server possesses the original data without retrieving it. The model generates probabilistic proofs of possession by sampling random sets of blocks from the server, which drastically reduces I/O costs. The client maintains a constant amount of metadata to verify the proof. The challenge/response protocol transmits a small, constant amount of data, which minimizes network communication. Thus, the PDP model for remote data checking supports large data sets in widely-distributed storage systems. It is also superior in performance by minimizing the use of expensive public-key cryptography in metadata management. We present the architecture and implementation of various SHAROES com- ponents and our experiments demonstrate performance superior to other proposals by over 40% on a number of benchmarks.
Index Terms: Cloud Computing, Trust ability.
Index Terms: Cloud Computing, Trust ability.
[1]. A. Singh and L. Liu, "Sharoes: A data sharing platform for outsourced enterprise storage environments," in Proceedings of the 24th International Conference on Data Engineering, ICDE. IEEE, 2008, pp. 993–1002.
[2]. 104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPAA)," Online at http://aspe. hhs.gov/admnsimp/pl104191.htm, 1996.
[3]. R. ıdane, "Remote integrity checking," in 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), S. J. L. Strous, Ed., 2003, pp. 1–11..
[4]. B. e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, 2008..
[5]. M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008..
[2]. 104th United States Congress, "Health Insurance Portability and Accountability Act of 1996 (HIPAA)," Online at http://aspe. hhs.gov/admnsimp/pl104191.htm, 1996.
[3]. R. ıdane, "Remote integrity checking," in 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), S. J. L. Strous, Ed., 2003, pp. 1–11..
[4]. B. e, J. Domingo-Ferrer, A. Martinez-Balleste, Y. Deswarte, and J.-J. Quisquater, "Efficient remote data possession checking in critical information infrastructures," IEEE Trans. on Knowl. and Data Eng., vol. 20, no. 8, 2008..
[5]. M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," Cryptology ePrint Archive, Report 2008/186, 2008..
