Secure Extended CVS for Academia
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2015, Vol 3, Issue 2
Abstract
During the academic lifespan, almost all students find it difficult to manage and backup the coding assignments conducted during their practical. Although students are instructed to create a folder on the computer and save all their assignments into it; there is no guarantee that the folder will not get deleted from the computer until the students next turn arrives. Also sometimes only partial program is completed in the college and remaining program needs to be done at home which is again a cause of concern. Also teachers cannot access all student coding assignments at one place and hence find it difficult to evaluate the student’s performance. Our system is developed to cater to all this needs. Our system will include an Eclipse plug-in as well as a web site with users having both the options to backup their assignments. Although Github, a product on similar lines already exists, it does not provide specific functionality needed for academia. Our system is specifically developed for colleges to simplify task of students as well as teachers. It can be used as self-contained application for code assignment backup and management.
Authors and Affiliations
Prof. Shailesh Hule, Gopi Krishna Kapagunta, Jerry Antony, Shreyas Kulkarni, Ashwin Bhide
Cloud Computing Deployment Models: A Comparative Study
Cloud computing has become the embraced in the computer world. Cloud implementation is the process of creating a virtual computing environment. Deployment in the cloud provides organizations with flexible and scalable vi...
Detail Study of Cloud Infrastructure Attacks and Security Techniques
Cloud computing is Internet-based computing and the next stage in the evolution of the internet. The uses of the cloud attract different industries in the recent decade, but this brings security challenges against attack...
Advanced Flood Monitoring and Auto Alert System
This paper contains implementation of system to monitor & control flood condition which sends alert sms in advance to people in nearby area for their security. This system will be useful to overcome current problems as i...
Efficient Secured Two Party Computing with Encrypted Data for Public Cloud
In this project we intervened certificateless encryption plan without matching operations for safely imparting public cloud. Intervened certificateless open key encryption (mCL-PKE –Mediated certificateless public key en...
Feature Extraction Techniques for Iris Recognition System: A Survey
The extraction of features involves the method of converting the original pixel values of an image to more meaningful, useful and measurable information that can be used in other techniques, such as image processing, pat...