Md. Saifuddin Khalid

Learn More
Application of data mining for web log analysis has received significant attention in finding customers' behavioral pattern in e-commerce and learners' behavioral pattern in e- learning. While hit-counts indicate customers' interest in the product or purchasing behavior, a student's visits to a Learning Management System (LMS) do not necessarily involve(More)
MATERIALS AND METHODS Animals Albino Wistar rats of either sex, weighing 150-200 g, were used as the test animal. The experimental animals were procured from Sri Mahavir Enterprises, Hyderabad. The rats were fed on a standard pellet diet (Hindustan Lever Ltd., Bangalore, India) and water ad libitum and maintained at 25°C with 12 hr light / dark cycle. After(More)
The integration of video conferencing systems (VCS) have increased significantly in the classrooms and administrative practices of higher education institutions. The VCSs discussed in the existing literature can be broadly categorized as desktop systems (e.g. Scopia), WebRTC or Real-Time Communications (e.g. Google Hangout, Adobe Connect, Cisco WebEx, and(More)
Multiple choice question (MCQ)-based assessment for higher education students can be a solution to reduce workload where teacher-student ratio is significantly high and also in distance learning approaches. Originating from the users problem claiming that “web-based and mobile-based tests are inconvenient and does not allow expected performance”, this(More)
Digital libraries are fast expanding into the role of independent educational entities that aspire not only to complement traditional classroom teaching, but also allow remote access to Learning Objects. Multifaceted roles of Learning Objects can be realized only if the course content and the related content management system are versatile enough to be(More)
One major difficulty faced by organizations is the protection of data against malicious access. Six security mechanisms, namely, authentication, authorization, access control, auditing, encryption and integrity control are available in Oracle 10g database management systems (DBMS). These are implemented for protecting data. These typical database security(More)
  • 1