European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals

LAN

Learning Management System Usage On Teaching and Learning in Akatsi College of Education (Published)

The main objective of this study was to examine the effect of Learning Management System (LMS) usage in education in public College of Education using Akatsi College of Education as a case study organization. However, the specific objectives to be included are to identify the Learning Management System (LMS currently in use to support teaching and learning at Akatsi College of Education, assess the extent of the adoption of Learning Management System (LMS by Akatsi College of Education in teaching and learning and ascertain challenges that the management of the College is encountering in the use of Learning Management System (LMS. The study used the descriptive survey method as the research design. The selected population for the study was the staff, management and students of College in Akatsi. A sample size of 120 was used. This was made up of 5 Heads of Department, and 15 tutors and 100 students. By this, the sampling method that was used in selecting the lecturers and staff is convenience sampling technique, while the simple random sampling technique was used in selecting the students. The main instrument that was used for the collection of data is the questionnaire and primary data and secondary data were used as sources of data. The findings of the study showed that some of the Learning Management System (LMS) devices used at the College include projectors, internet and telecommunication systems, audio and video visual communication systems, telephone, computers, fax machines and many others. These resources enable them to serve the university community better. Besides, the College has further employed an application called MOODLE that has all students and tutors enrolled on. This to them provides the platform for assessing the students and tutors. Recommendations were that it is important that LMS systems at College are made available to every member of the College whether student, tutors or a non-teaching staff. From the study, ICT systems have been very effective in ensuring the productivity of users including teachers and non-teachers. Significantly, not all the respondents admitted that they use Learning Management System (LMS) system of the university. However, if the College wants to achieve productivity across the College, then the need to ensure that every member of the university is made to use LMS in their functions.

Keywords: CIS, ICT, LAN, LMS, NOC, Policy Makers, moodle

Comparison Study of 3g and 4g Mobile Technology (Published)

Third generation and fourth generation are standards for mobile communication. Standards specify how the airwaves must be used for transmitting information (voice and data). 3G networks were a significant improvement over 2G networks, offering higher speeds for data transfer. The improvement that 4G offers over 3G is often less pronounced.  The objective of this paper is to compare 3G and 4G mobile technology using descriptive analysis and previous study.

Keywords: 3G, 4G, CDMA, IEEE802.11, IEEE802.16, LAN, LTE, MTSO, WIMAX, WLAN

Securing Multi-Agent Based Network Monitoring Platform against Malicious Agent Attack (Published)

This research paper examined the security threat issues against agents/multi-agent based system platform by malicious agent attackers in a network environment. Several techniques like fault isolation or sandboxing, access control to host resources, digital signatures, strong authentication, proof carrying code and message encryption were suggested by different research scholars as a means of mitigating the menace but however, no strong evidence on their application / implementation were mentioned. This research work used a 2 Factor or Double Data Encryption Standard (DES) approach to encrypt / decrypt messages between agents in our proposed network monitoring platform to prevent malicious agent from hijacking the exact network data content during communication. Java programming language was used to implement the 2DES algorithm in the security mechanism proposed. The system was tested for its effectiveness and efficiency in both non-production and production network environment. Results revealed detection rate to be high and with a very minimal false alarm rate. The proposed system is highly recommended for usage in any local area network environment.

Keywords: 2DES Algorithm, Agents, Java, LAN, Security

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.