Examination and evaluation are two important phases of education at any level of a student’s curriculum. However, these assessment processes are problematic in the sense that they encourage learners to devise ways to be dishonest. The traditional way of conducting exams is particularly conducive to dishonesty. In view of this, this letter proposes an online lab examination management system to prevent misconduct and to secure the process of lab examination....
Compliance with the Service Level Agreement (SLA) metric is a major challenge in
a Multiprotocol Label Switching Virtual Private Network (MPLS VPN) because mandatory
models must be maintained on both sides of the MPLS VPN in order to achieve end-to-end
service levels. The end-to-end service of an MPLS VPN can be degraded owing to various
issues such as distributed denial of service (DDoS), and Random Early Detection (RED) that
prevents congestion and differentiates between legitimate and illegitimate user traffic.
Wireless mesh networks (WMNs) have been increasingly applied in private and public networks during the last decade. In a different context, voice over IP (VoIP) has emerged as a new technology for making voice calls around the world over IP networks and is replacing traditional telecommunication systems. The popularity of the two technologies motivated the deployment of VoIP over WMNs. However, VoIP over WMNs suffers from inefficient bandwidth utilization because of two reasons: i) attaching 40-byte RTP/UDP/IP header to a small VoIP payload (e.g., 10 bytes) and ii) 841 μs delay overhead of each packet in WMNs. Among several solutions, VoIP packet multiplexing is the most prominent one. This technique combines several VoIP packets in one header. In this study, we will survey all the VoIP multiplexing methods over WMNs. This study provides a clear understanding of the VoIP bandwidth utilization problem over WMNs, discusses the general approaches in which packet multiplexing methods could be performed, provides a detailed study of present multiplexing techniques, shows the aspects that hinder the VoIP multiplexing methods, discusses the factors affected by VoIP multiplexing schemes, shows the merits and demerits of different multiplexing approaches, provides guidelines for designing a new improved multiplexing technique, and provides directions for future research. This study contributes by providing guidance for designing a suitable and robust method to multiplex VoIP packets over WMNs....
irtualization is the central point empowering cloud infrastructure. Many services, such as web-based applications, databases, and instant messaging servers, are running on virtual systems to reduce total cost ownership and generate immediate return on investment. However, applications concerned with latency, such as the Voice over Internet Protocol (VoIP) application, are limited in virtual systems. Hence, in this research, we aim to study the VoIP behavior under virtualization environment. VoIP infrastructure should be equipped with security shield to protect itself from various forms of security threats; this security setup provides additional response time overhead. In this study, we implement VoIP on a virtual machine (VM) and measure various elements, such as signaling and medium transmission. The performance of the proposed system is studied with and without security shield. Virtualization environment never induces delay to the VM–VoIP system, even if it is deployed with security solutions....
Nowadays, large amounts of data are stored with cloud service providers. Third-
party auditors (TPAs), with the help of cryptography, are often used to verify this data.
However, most auditing schemes don't protect cloud user data from TPAs. A review of the
state of the art and research in cloud data auditing techniques highlights integrity and
privacy challenges, current solutions, and future research directions
CREATING “SELF-LEARNING”ENVIRONMENTS FOR
STUDENTS OF ENGLISH @ THE COLLEGE OF
ARTS & SCIENCES FOR GIRLS IN WADI ADDAWASIR...
Nowadays SCADA (Supervisory Control and Data Acquisition) systems became widely used technology. This fact is directly related to the ubiquity of smart systems using a wide range of technologies in control and supervision applications....