Publication Date
In 2025 | 1 |
Since 2024 | 5 |
Descriptor
Computers | 5 |
Computer Networks | 3 |
Computer Security | 2 |
Distance Education | 2 |
Information Technology | 2 |
Models | 2 |
Access to Computers | 1 |
Access to Internet | 1 |
Artificial Intelligence | 1 |
Barriers | 1 |
Computer Interfaces | 1 |
More ▼ |
Source
Education and Information… | 1 |
IEEE Transactions on Learning… | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
ProQuest LLC | 1 |
Author
Bekalu Tadesse Moges | 1 |
Bui Thanh Hung | 1 |
Gayatri Parasa | 1 |
Guo-Ping Liu | 1 |
Hong Zhou | 1 |
Melaku Mengistu Gebremeskel | 1 |
Prasun Chakrabarti | 1 |
S. Siva Shankar | 1 |
Sehla Ertan | 1 |
Shouket Ahmad Tilwani | 1 |
Sudipta Mondal | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhongcheng Lei; Hong Zhou; Wenshan Hu; Guo-Ping Liu – IEEE Transactions on Learning Technologies, 2024
Online laboratories have been widely used in education, research, and industrial applications. For online laboratories, various architectures have been constructed to provide good user experience and powerful capabilities for online experimentation, in which the controller is a crucial part to connect the server with a controlled test rig.…
Descriptors: Online Courses, Laboratories, Distance Education, Computers
Sudipta Mondal – ProQuest LLC, 2024
Graph neural networks (GNN) are vital for analyzing real-world problems (e.g., network analysis, drug interaction, electronic design automation, e-commerce) that use graph models. However, efficient GNN acceleration faces with multiple challenges related to high and variable sparsity of input feature vectors, power-law degree distribution in the…
Descriptors: Graphs, Models, Computers, Scaling
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Yalalem Assefa; Melaku Mengistu Gebremeskel; Bekalu Tadesse Moges; Shouket Ahmad Tilwani; Yibeltal Aemiro Azmera – International Journal of Information and Learning Technology, 2025
Purpose: In today's educational landscape, technology has become an undeniable force in shaping pedagogical approaches and even the definition of learning itself. But this path contains many obstacles. Within the higher education ecosystem, the digital divide -- the disparity in access and use of technology -- is proving to be a significant…
Descriptors: Equal Education, Cultural Context, Higher Education, Developing Nations