NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 151 to 165 of 4,532 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Chiu Hung; Tzeng, Gwo-Hshiung; Hu, Shu-Kung – Interactive Learning Environments, 2016
The purpose of this study was to address this problem by applying a new hybrid fuzzy multiple criteria decision-making model including (a) using the fuzzy decision-making trial and evaluation laboratory (DEMATEL) technique to construct the fuzzy scope influential network relationship map (FSINRM) and determine the fuzzy influential weights of the…
Descriptors: Electronic Learning, Decision Making, Feedback (Response), Computer Networks
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Hill, Janette; Nuss, Michelle; Cervero, Ronald; Gaines, Julie; Middendorf, Bruce; Mishra, Supriya – Journal of Interactive Learning Research, 2019
The third year clerkship is an exciting yet challenging time for medical students (Cooke, Irby, & O'Brien, 2010). For the first time, students spend significant time in clinical settings (e.g., hospitals) assisting in the daily care of patients. Obtaining just-in-time and at point-of-care information and resources (Author, 2009) is one…
Descriptors: Patients, Handheld Devices, Graduate Medical Education, Medical Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bathon, Justin; van Rooyan, Jean W.; Jobert, Rika – Research in Educational Administration & Leadership, 2018
This article presents a review of the development of platform network models that rely on partnership contracts to implement comprehensive school reform. The literature from the previous three decades of development of school networks, emerging largely from the United States of America, is reviewed. The recent development of similar network models…
Descriptors: Educational Change, Partnerships in Education, Contracts, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Edwards, Darla – Learning Professional, 2019
A networked improvement community can be a tremendous resource for people who share a common interest and desire to learn from each other, and, thanks to technology, this can occur even when participants are separated by a large distance. This article discusses Virginia Advanced Study Strategies' Rural Math Innovation Network, a four-year project…
Descriptors: Networks, Rural Schools, Middle Schools, High Schools
Peer reviewed Peer reviewed
Direct linkDirect link
MacLeod, Jason; Yang, Harrison Hao; Zhu, Sha; Shi, Yinghui – Journal of Educational Computing Research, 2018
In an effort to address student engagement challenges, much research has explored student-to-student connected classroom climate (CCC). Research positively associates CCC to the benefits of student integration, learning, and retention in face-to-face environments. However, few studies have examined CCC in computer-mediated environments. This study…
Descriptors: Classroom Environment, Computer Networks, Computer Software, Computer Mediated Communication
Kamal, Ahmed Tashrif – ProQuest LLC, 2013
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera network is one of the fundamental problems in this domain. Distributed estimation algorithms…
Descriptors: Computer Networks, Mathematics, Computation, Information Transfer
Dogan, Gulustan – ProQuest LLC, 2013
Trust can be an important component of wireless sensor networks for believability of the produced data and historical value is a crucial asset in deciding trust of the data. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. Provenance can…
Descriptors: Computer Networks, Telecommunications, Credibility, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Alghamdi, Naif; den Heijer, Alexandra; de Jonge, Hans – International Journal of Sustainability in Higher Education, 2017
Purpose: The purpose of this paper is to analyse 12 assessment tools of sustainability in universities and develop the structure and the contents of these tools to be more intelligible. The configuration of the tools reviewed highlight indicators that clearly communicate only the essential information. This paper explores how the theoretical…
Descriptors: Universities, Sustainability, Institutional Evaluation, Evaluation Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tomczyk, Lukasz; Szyszka, Michal; Stošic, Lazar – Education Sciences, 2020
Problematic Internet Use (PIU) has of late come to the major attention of researchers of risky behaviours. For parents and teachers in turn, the various pathological forms of Internet use have become more and more noticeable. In recent years, the operationalisation of the term PIU has also been discussed and attempts to measure its various…
Descriptors: Internet, Risk, Behavior Problems, Pathology
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pytlarz, Ian; Pu, Shi; Patel, Monal; Prabhu, Rajini – International Educational Data Mining Society, 2018
Identifying at-risk students at an early stage is a challenging task for colleges and universities. In this paper, we use students' oncampus network traffic volume to construct several useful features in predicting their first semester GPA. In particular, we build proxies for their attendance, class engagement, and out-of-class study hours based…
Descriptors: College Freshmen, Grade Point Average, At Risk Students, Academic Achievement
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Dikaliotis, Theodoros K. – ProQuest LLC, 2013
In this thesis, delay and security issues in network coding are considered. First, we study the delay incurred in the transmission of a fixed number of packets through acyclic networks comprised of erasure links. The two transmission schemes studied are routing with hop-by-hop retransmissions, where every node in the network simply stores and…
Descriptors: Computer Networks, Information Security, Information Systems, Coding
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Pages: 1  |  ...  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  ...  |  303