• No results found

Digital identity design and privacy preservation for e-learning

N/A
N/A
Protected

Academic year: 2019

Share "Digital identity design and privacy preservation for e-learning"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1 relationship between participants of traditional classrooms
Figure 3 Identity Hierarchy in an e-learning system

References

Related documents

The wavelet method is shown to perform well with the addition of a height restraint for nocturnal BLH retrievals (Fig. 8) in order to prevent the detection of RL signals or

a semigroup from a single function on a finite set, using directed graphs, studies the properties. of the

Moment invariants have been used as feature extractions in variety of object recognition applications during the last 40 years [16]. The moment invariants are used to

On the one hand, by 1980, the large-scale sector was a more “efficient and well established commercial sector of some 525 farmers milking exotic animals (who) produced about

Isolation, Screening and Optimization of Culture Conditions for Enhanced Antibacterial Activity by a Marine Epibiotic Bacterium Bacillus flexus APGI against Fouling

Based on the detailed literature review, the related theoretical analysis and the research of the structural model of the spirit of science, this paper puts forward

Total number of study participants was 124 from Dow International Medical College, Nursing Institute, College of Pharmacy, National Institute of Diabetes and Endocrinology,

We have analyzed the Environmental Kuznets Curve for the case of Tunisia, and we have found that the country has not yet reached the threshold of development from which economic