e-Learning is bringing training to the attention of upper management in a way that other learning technologies have never done. Web-based training will remain predominant to the design and delivery of workplace learning in the 21st century because of its advantages over traditional classroom-based training. A comprehensive framework that delineates the relationship between learner control and learning effectiveness in educational training is absent. This study therefore aims to fill this void. Unlike previous relevant research, this study compares learning effectiveness between two educational training delivery methodologies: traditional classroom-based training (TCT) and web-based training (WBT). Our framework focuses on learning effectiveness of web training in the context of the educational training programmes of two colleges' administration application systems. Based on the WBT literature, this study uses a model that investigates the relationship between learner control and learning effectiveness under five dimensions: learning performance, learner satisfaction, accumulation of learning experience, document navigation, and problem solving. To compare learning effectiveness between TCT and WBT we conducted a field experiment. Data were collected from two colleges that received training on their administration application systems. A total of 288 usable responses were analysed. The results allow five conclusions to be drawn: (1) learners receiving WBT achieved better learning performance than their counterparts receiving TCT;(2) learners receiving WBT reported higher levels of satisfaction than their counterparts with the traditional approach; (3) learners receiving WBT accumulated more learning experience than their counterparts with TCT; (4) WBT provided more integrated document navigation than the traditional format; (5) WBT offered faster problem solving mechanisms than TCT. The implications of this study are discussed and further research directions are proposed. IntroductionIn the present knowledge economy context knowledge has become the most important source of sustainable competitive advantage. With the explosion of information issues regarding information technology (IT) applications for teaching and learning have captured the interest and attention of both the academic and business communities. Web-based communications that allow enterprises to share experiences and competencies is a fundamental activity for the development of new
The most significant shortcoming of implanted devices is the battery life. With advanced technology, implanted devices can have the capability to communicate with other health-related devices, but this also means the energy consumption requirement is greater than ever. Less power consumption would extend the duration of the batteries of implanted medical devices. In this paper, an energy efficient and reliable communication service device scheme that does not require any modification to the existing wireless network structure or the implanted devices under consideration is proposed. The scheme is intended to save a target device's energy necessary for resending communication signals by introducing a neighbor group header node and cooperative (wearable) nodes. The simulation results show that the scheme would result in energy savings of 70 percent with one or two cooperative nodes as compared with the current best approach.
Recently, sensor networks are usually applied on collecting remote sensing information. The deployed sensor nodes are separated and responsible for specific purposes, and act as an individual device. They cooperatively transmit sensed data to the base station, as shown in Fig.1. However, the transmitted data are exposed to open environments, and possibly contain confidential information. If malicious attacks interfere in the communication using huge packets to break the communication, thus the system can not work properly. In general, attackers exploit a broadcast storm or a Distributed Denial-of-Service (DDoS) attack to paralyze the entire network. Therefore, this study proposes a queuing theory based scheme to detect whether the system encounters malicious attacks. Our proposed scheme provides the arrival requests with a queuing service on the base station, which is responsible for dealing with transmitted jobs. Once the jammed traffic is anomalous for long periods, the system immediately detects the malicious attacks using our proposed approach.
In recent years, the wireless network has been attracting a lot of attentions, and due to these devices has enjoyed a tremendous rise in popularity. However, the broadcast storm becomes a very serious problem for ad hoc networks to migrate into the overlay networks for the applications of group communications. The main concept of virtual subnet technology is the capability to group users into broadcast domains, which divides a virtual subnet into logic, instead of physical, segments and reduces the traffic overhead. With this characteristic, we propose an interoperability network model integrating self-organizing ad hoc networks and the Internet/a conventional network with the partition of physical/virtual subnets. Moreover, we describe a protocol to establish the virtual broadcast domains by using the IPv6 addressing concept in ad hoc networks and perform IP-based network communications in a multi-switch backbone. Since the virtual subnet technology functions by logically segmenting the network into different broadcast domains, packets can only be delivered between fixed/mobile nodes with the same virtual identity. Therefore we can prevent the broadcast storm problem in MANET. The hierarchical networks, physical/virtual subnets, addressing method, and mobility management are described, and some performance issues are evaluated.other, but has no fixed links like wireless infrastructure network. Each node acts as a router and is responsible for dynamically discovering other nodes it can directly communicate with [5][6][7][8][9][10]29]. The network topology of an ad hoc network changes frequently and unpredictable, so scalability and mobility become extremely challenging in the circumstance we mentioned previously. For many multimedia applications, however, it is desired that an inter-working functionality between the protocols in the ad hoc network and the IP-based Internet. Ad hoc networks should be adapted to deploy rapidly and freely communicating with the traditional mobile wireless networking systems and it does not need the pre-existing network infrastructures [11][12][13][14].However, the broadcast storm becomes a very serious problem for ad hoc networks to migrate into the overlay networks for the application of group communications. The main concept of virtual subnet technology is the capability to group users into broadcast domains, which divides a network into logic, instead of physical, segments and reduces the traffic overhead. The network switch was invented to assist networks to improve this situation. The switch network permits users to be combined into as a virtual subnet. In the router-based network devices are recognized by their physical location in the network. The network-layer address is used to inform the router the physical segment where the data must be sent. A virtual subnet behaves like an ordinary network, but connected devices do not have to be physically connected to the same segment. The virtual subnet allows a flexible mechanism; simply grouping physical ports together, or can comb...
Mobile ad-hoc networking (MANET) is a collection of mobile nodes that want to communicate to each others, but has no fixed links like wireless infrastructure networks to provide group applications and services. Therefore we need concern about providing each node with a secure and efficient key management system for dynamically discovering other nodes which can directly communicate with. Due to the network topology of an ad hoc network changes frequently and unpredictable, so the security of multicast routing becomes more challenging than the traditional networks. In this paper, we describe how any users in the multicast group can compose the group keys and propose a hierarchical group key management to securely multicast data from the multicast source to the rest of the multicast members in wireless ad hoc networks. This approach has a hierarchical structure where the group members are partitioned into rendezvous-location based clusters which can reduce the cost of key management. It not only provides the multicast routing information, but also fits the robustness of the wireless networks and reduces the overhead for the security management.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.