An Efficient Integration of Knowledge Management and E-learning in a Portable Interactive System
Folasade Olubusola Isinkaye,
Jumoke Soyemi,
Adedoyin Olayinka Ajayi,
Amonatullahi Akorede Ismail
Issue:
Volume 10, Issue 3, June 2021
Pages:
23-30
Received:
18 April 2021
Accepted:
20 May 2021
Published:
16 June 2021
Abstract: The advent of the internet made it possible to have access to unlimited e-learning resources for knowledge acquisition. Presently, there is an interest to introduce Knowledge Management (KM) into e-Learning with the hope that KM can facilitate an improved e-Learning system. The integration of an e-Learning system with KM is usually referred to as knowledge resource repository, with the KM methods implemented to increase the effectiveness of knowledge dissemination. The importance of KM cannot be over emphasized in any economy and that informs why it is acknowledged as a simplified tool for distributing and utilizing knowledge in a way that directly influence performance in any organization. Also, the potentials and necessity of e-learning in building and developing human capacity cannot be overstressed. Researchers have designed many models for integrating knowledge management into the e-learning system. Some were practically implemented while some were not. Despite the various models, researchers are still looking for a more interactive, efficient, and effective methods that could be used to quickly identify the most relevant information (knowledge) and distribute them to meet the specific needs of users. This work reviewed different literature on e-learning, Knowledge Management and their integration. It also implemented the integration of e-learning and Knowledge Management in a portable interactive system.
Abstract: The advent of the internet made it possible to have access to unlimited e-learning resources for knowledge acquisition. Presently, there is an interest to introduce Knowledge Management (KM) into e-Learning with the hope that KM can facilitate an improved e-Learning system. The integration of an e-Learning system with KM is usually referred to as k...
Show More
Novel Access Control Mechanism Based New Chinese Remainder Theorem II (New Crt II)
Aremu Idris Aremu,
Ibitoye Akinfola Akinrinnola,
Nwaocha Vivian Ogochukwu
Issue:
Volume 10, Issue 3, June 2021
Pages:
31-36
Received:
17 March 2021
Accepted:
29 March 2021
Published:
22 June 2021
Abstract: Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify and describe intricate information system. An access Control mechanism is a main strategy for prevention and protection of the classified files in a database; this is carried out by restricting rights of access for different approved users of these files. This paper proposes a novel access control mechanism based on Chinese remainder theorem II which implements a single-key-lock system to encrypt one key called a secret key which is used for both encryption and decryption in the electronic information system for accessing the database. The key to be used in the decryption process must be exchanged between the entities in communication using symmetric encryption for the users to have access to the database. This method represents flocks and keys which is highly efficient and proficient. Also, this implementation can be achieved using the Chinese remainder theorem which executes faster operations and enables simpler construction of keys and locks to be provide for user to have access to control.
Abstract: Security is a very vital concern in information system in this modern day. The protection of confidential files and integrity of information kept in the database are also of great important, the security model play an important role in protecting the privacy and integrity of messages in the database from unlawful users is a formal method to verify ...
Show More