Cloud Network Security Based on Biometrics Cryptography Intelligent Tutoring System

Download Edit this record How to cite View on PhilPapers
Intelligent Tutoring System (ITS) is becoming more famous through over the world, it impacts the view to appear obviously actually that anybody could teach at any place in whenever. Without the aid of intelligent tutoring system, the learning question's student's response can't be understood in time. Thus, it is important to create an intelligent tutoring system keeping in mind the end goal to give learning support service for students. In this thesis, the thesis presents an Intelligent Tutoring System for Learning Cloud Network Security Based on Bio-Cryptography (ITSCSBC). The elements of every said and the structure of this system present in the first place, then the program flow on that the agents in this system principle to participate with the others to propose reasonable learning pedagogical for individual student according to the estimate of students' cognitive ability level is discussed. Moreover, procedure and Process that are progressing to perform the designed functions of the agents will be discuss. The propose system (ITSCSBC) will derive adaptive learning pedagogical for an individual student to teach in a compelling and active way. This an intelligent tutoring system concentrates on the students enrolled in Advanced Topics in Information Security in the faculty of Engineering and Information Technology at Al-Azhar University in Gaza and we propose reasonable and suitable teaching pedagogical for individual student to execute adaptive teaching. During which the student will be capable to consider about the course and deal with linked issues and fixing the problems, and the results were satisfactory. The topic has been selected based on with the enormous increase in using cloud network computing which exhibits a special method to share services and distributed resources with the assist of the internet. In this way security turns into a basic issue in the cloud network security field, and cryptography is considered the best technique. In any case, the defects an encryption mechanisms can be avoided by using a cryptographic mechanism when joined with biometric encryption method is the modern world responding to network and data security problems.
(categorize this paper)
PhilPapers/Archive ID
Upload history
Archival date: 2019-04-09
View other versions
Added to PP index

Total views
212 ( #28,822 of 2,448,636 )

Recent downloads (6 months)
51 ( #12,256 of 2,448,636 )

How can I increase my downloads?

Downloads since first upload
This graph includes both downloads from PhilArchive and clicks on external links on PhilPapers.