NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Olga Agatova; Alexander Popov; Suad Abdalkareem Alwaely – Interactive Learning Environments, 2024
The paper examines the special aspects of using Big Data technology in education. The population was made up of 356 third-year university students. To study Big Data technology, a questionnaire was used where respondents rated: cloud technology; apps; Massive Open Online Courses (MOOCs) and digital learning platforms. The study suggested that the…
Descriptors: Data Use, Learning Processes, Technology Uses in Education, Information Storage