Journal of Engineering Education Transformations

Journal of Engineering Education Transformations

Year: 2020, Volume: 33, Issue: Special Issue, Pages: 102-105

Original Article

Hiding Lab Exercise in the Technical Education System: A Case Study (Oculto)

Abstract

Nowadays, it can be observed that computer laboratories in technical education system have encountered many challenges which prevent them to achieve their quality objectives. In a technical institution, the systems are maintained by the lab assistant/in-charge. One of their challenge is to monitor studentsďż˝ experiments in the laboratory during end semester examination and to make sure that student cannot access to previously practiced experiments during exams.To overcome this challenge and to help the lab assistant/incharge in further enhancing the quality of the laboratory exam, we have built an application an Oculto to hide and encrypt previous experiments from the students in the Department of Computer Science & Engineering at Anurag Group of Institutions, Hyderabad, India. The outcomes are successful and totally support the lab assistant/in-charge in additional boosting the productivity and effectiveness of the traditional practices thus helps academic institutions to reach a higher academic standard. Several directions for forthcoming improvements are possible. Among them, we can state: to be tested in the real time environment, where we can actually have the statistics of how the proposed solution improve malpractices by students and to find the impact on students' performance and support staff.

References

  • Werner Von Braun, Fuller, J. (2001). An integrated hands-on inquiry based cooperative learning approach: The impact of the PALMS approach on student growth. ERIC Publications: ED 453176.
  • Martin-Hansen, L. (2002). Defining inquiry: Exploring the many types of inquiry in the science classroom. The Science Teacher, 69(2), 34-37.
  • Sandeep Singh Rawat, S. Sreenatha Reddy, Devi Prasad Mishra, Salma Sultana (2015) Ascertaining the Factors Influencing Students' Performance for Engineering Pedagogy, Journal of Engineering Education Transformations. DOI: 10.16920/ijerit/2015/v0i0/59408.
  • Penner, Jon G. (1984). Why Many College Teachers Cannot Lecture. Springfield, Ill.: Charles C. Thomas.
  • Chelsea Sabo, A Burrows, Lois Childers (2014) Shaking Up Pre-Calculus: Incorporating Engineering into K-12 Curricula.
  • Bonwell, C. & Eison, J. (1991) Active learning: Creating excitement in the classroom. ERIC Clearinghouse on Higher Education (#ED340272). Washington, DC.
  • H. S. Saini, S. S. Rawat (2015) Industry Innovations for Enhanced Employability: A Case Study of Academic Industry Interaction. DOI: 10.16920/ijerit/2015/v0i0/59401.
  • . Hossain, M. A. (2014) Analysis of Different Cryptography Algorithms, International journal of Computer Science and Engineering, 2(4), 76-82.
  • . Chang L. and GuangMing X. (2012) Research and Implementation of File Encryption and Decryption, Advances in Intelligent and Soft Computing, 141, 165-170.
  • . Tripathi, R. (2014) Symmetric and Asymmetric Encryption Techniques, International Journal of Computer Applications, 4(6).
  • . Tseng, B.Y.C (2002) Secure data hiding scheme for binary images, IEEE Transactions on Communications, 50(8).
  • . Park N. (2011) Secure Data Access Control Scheme Using Type-Based Re-encryption in Cloud Environment, Semantic Methods for Knowledge Management and Communication, 381, 319-327.
  • . Stephen, O. (2014) Cloud Data Encryption, International Journal of Computer Science and Information Technologies, 4(10).
  • . Tayde, S. (2015) Encryption and Decryption using AES in android phone, International journal of Advances Computer Science and Information Technologies, 5 (5), 550-554.
  • . Raghav, P. (2016) Secure data using AES algorithm, International Journal of Computer Science and Information Technologies, 6(4).

DON'T MISS OUT!

Subscribe now for latest articles and news.