NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 1 to 15 of 4,532 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Shahla Asadi; Jordan Allison; Madhu Khurana; Mehrbakhsh Nilashi – Education and Information Technologies, 2024
Simulation-based learning (SBL) offers an extensive variety of chances to practice complex computer and networking skills in higher education and to implement diverse kinds of platforms to facilitate effective learning. Utilizing visualization and computer network simulation tools in teaching computer networking courses has been found to be useful…
Descriptors: Computer Simulation, Student Attitudes, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Ramos, Júlio Cesar; L'Erario, Alexandre; Mendonça, Marcio; Fabri, José Augusto; Palácios, Rodrigo Henrique Cunha – Education and Information Technologies, 2023
The freshman student's perspective on the activities performed in a data center by the network analyst is complex and intricate. These activities include the configuration of equipment and the connection between network devices. There are several issues with these activities that demand technical knowledge. Questions such as: "what does this…
Descriptors: Game Based Learning, College Freshmen, Computer Science Education, Computer Networks
Benjamin L. Edelman – ProQuest LLC, 2024
This dissertation is about a particular style of research. The philosophy of this style is that in order to scientifically understand deep learning, it is fruitful to investigate what happens when neural networks are trained on simple, mathematically well-defined tasks. Even though the training data is simple, the training algorithm can end up…
Descriptors: Learning Processes, Research Methodology, Algorithms, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Elmekki, Ouchker; Maizate, Abderrahim; Ouzzif, Mohammed – International Journal of Web-Based Learning and Teaching Technologies, 2021
Wireless sensor networks (WSN) are an ad hoc network consisting of miniaturized autonomous sensors that communicate with each other over a radio link. In this paper, the authors' contribution is a cross-layer approach. To achieve this approach, the authors proposed in the first part an improvement of LEACH algorithm named WEIGHTED_LEACH. This…
Descriptors: Computer Networks, Telecommunications, Mathematics, Energy Conservation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Yihe Zhang – ProQuest LLC, 2024
Machine learning (ML) techniques have been successfully applied to a wide array of applications. This dissertation aims to take application data handling into account when developing ML-based solutions for real-world problems through a holistic framework. To demonstrate the generality of our framework, we consider two real-world applications: spam…
Descriptors: Artificial Intelligence, Problem Solving, Social Media, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Rina Dhopeshwarkar; Frances Jiménez; Sofia Ryan; Emma Plourde; Madjid Karimi – American Journal on Intellectual and Developmental Disabilities, 2024
Individuals with intellectual and developmental disabilities (IDD) continue to experience disparities in health and well-being despite improved provisions of person-centered care. Patient-centered outcomes research (PCOR) translates evidence into practice for meaningful outcomes. This piece describes findings from an environmental scan and…
Descriptors: Intellectual Disability, Developmental Disabilities, Medical Care Evaluation, Stakeholders
Peer reviewed Peer reviewed
Direct linkDirect link
Priyanshi Garg; S. P. Raja – International Journal of Learning and Change, 2024
Green internet of things is important to achieve atmospheric decarbonisation, it is crucial to implement procedures and practices that prioritise resource conservation and environmental protection. However, the growing use of internet of things devices poses a challenge due to their high-energy requirements for data reception and transmission…
Descriptors: Computer Interfaces, Internet, Equipment, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Ünlüsoy, Asli; Leander, Kevin M.; de Haan, Mariëtte – E-Learning and Digital Media, 2022
Understanding the affordances that networked platforms offer is a good place to start rethinking our notions of learning. The article discusses how social connectivity has changed, arguing that networking and networks have become foregrounded in how we perceive and experience our (digital) social worlds. Our aim is to understand the nature of…
Descriptors: Affordances, Social Media, Learning, Social Change
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Khalid Mohiuddin; Huda Fatima; Mohiuddin Ali Khan; Mohammad Abdul Khaleel; Zeenat Begum; Sajid Ali Khan; Omer Bin Hussain – SAGE Open, 2023
This article aims to design a novel edge-centric hierarchical cloud architecture to optimize mobile learning (m-learning) performance during learners executing computation-intensive learning applications. This research adopts the potential of distributed computing paradigms, that is, mobile edge, for improving the effectiveness of m-learning…
Descriptors: Computer Networks, Electronic Learning, College Students, Handheld Devices
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  303