NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20243
Since 2021 (last 5 years)6
Since 2016 (last 10 years)17
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Benjamin L. Edelman – ProQuest LLC, 2024
This dissertation is about a particular style of research. The philosophy of this style is that in order to scientifically understand deep learning, it is fruitful to investigate what happens when neural networks are trained on simple, mathematically well-defined tasks. Even though the training data is simple, the training algorithm can end up…
Descriptors: Learning Processes, Research Methodology, Algorithms, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Li; Xu, Yaqian – Canadian Journal of Learning and Technology, 2022
Connectivism, a learning theory that reveals a new learning in the Internet environment, has become a popular academic topic at the forefront of online learning. The MOOC Research Team at the Distance Education Research Centre at Beijing Normal University designed and developed the first massive open online course in China, adapting a connectivist…
Descriptors: Foreign Countries, Learning Theories, Educational Innovation, Internet
European Commission, 2019
The second objective of the '2nd Survey of Schools: ICT in Education' designs a conceptual model for a 'highly equipped and connected classroom' (HECC), defines three scenarios of a HECC and estimates the costs to equip and connect an average EU classroom with advanced components of the HECC model. The entry level scenario outlines the minimum and…
Descriptors: Computer Uses in Education, Technology Integration, Costs, Faculty Development
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zabasta, Anatolijs; Peuteman, Joan; Kunicina, Nadezda; Kazymyr, Volodymyr; Hvesenya, Sergey; Hnatov, Andrii; Paliyeva, Tatsiana; Ribickis, Leonids – Education Sciences, 2020
The increasing importance of continuingly complex Cyber-Physical Systems (CPS) challenges and encourages universities worldwide to organize up-to-date CPS oriented educational programs. The Erasmus+ project "CybPhys" aims to support CPS oriented educational programs in Belarus and Ukraine. We put forward a hypothesis that the educational…
Descriptors: Foreign Countries, Geographic Regions, Cultural Differences, Higher Education
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bathon, Justin; van Rooyan, Jean W.; Jobert, Rika – Research in Educational Administration & Leadership, 2018
This article presents a review of the development of platform network models that rely on partnership contracts to implement comprehensive school reform. The literature from the previous three decades of development of school networks, emerging largely from the United States of America, is reviewed. The recent development of similar network models…
Descriptors: Educational Change, Partnerships in Education, Contracts, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Mihai, Maryke A. – Africa Education Review, 2017
In April 2008, an interactive information communication technology (ICT) network was established in Mpumalanga, South Africa. the network involved the implementation of SMART board interactive whiteboards (IWBs) and collaboration between a leading school and several disadvantaged schools. the main purpose of the Mpumalanga IWB project was to reach…
Descriptors: Rural Schools, Computer Networks, Information Technology, Interviews
Duan, Yuchao – International Association for Development of the Information Society, 2016
Cloud computing is considered a new frontier in the field of computing, as this technology comprises three major entities namely: software, hardware and network. The collective nature of all these entities is known as the Cloud. This research aims to examine the impacts of various aspects namely: cloud computing, sustainability, performance…
Descriptors: Higher Education, Internet, Educational Technology, Technology Uses in Education
Previous Page | Next Page »
Pages: 1  |  2