NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1 to 15 of 736 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Xu Yaqian; Zheng Qinhua – Interactive Learning Environments, 2024
The interactive mechanism between social and concept networks is a key question in connectivist learning, which explains the impact of interaction on cognitive development and knowledge generation. The successful practice of "Internet Change Education: Dialogue between Theory and Practice", the first cMOOC in China, provides data support…
Descriptors: Correlation, Social Networks, Status, MOOCs
Peer reviewed Peer reviewed
Direct linkDirect link
Chander Diwaker; Neha Miglani – Journal of Computer Assisted Learning, 2025
Background: The ever-increasing computational demands call for optimal resource utilisation and system performance in the cloud environment. Organisations are increasingly migrating workloads to cloud platforms, mandating the need for efficient resource distribution. Load balancing, a critical cloud component, ensures equitable distribution of…
Descriptors: Internet, Information Storage, Educational Practices, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
XiFeng Liao – International Journal of Information and Communication Technology Education, 2024
A modern technology-supported vocational educational system significantly affects the quality of vocational training and contributes to the innovation and economic development of the regional area. The visualization literature analysis was adopted with the purpose of exploring the theoretical framework for developing a 6G-assisted network to…
Descriptors: Computer Networks, Information Networks, Technology Integration, Regional Cooperation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Öznur Karakas – Minerva: A Review of Science, Learning and Policy, 2024
E-science, or networked, collaborative and multidisciplinary scientific research on a shared e-infrastructure using computational tools, methods and applications, has also brought about new networked organizational forms in the transition of higher education towards the entrepreneurial academy. While the under-representation of women in ICTs is…
Descriptors: Foreign Countries, Research and Development, Research Universities, Researchers
Peer reviewed Peer reviewed
Direct linkDirect link
Marielle Schuurman; Barbara Groot; Tineke Abma – Educational Action Research, 2025
Globally, many complex issues, like the ageing population and health inequalities, require attention. People are experimenting to combat these issues in their local contexts through bigger or smaller networks; however, much of the knowledge about these initiatives remains localised and elitist and omits the voices and perspectives of citizens.…
Descriptors: Foreign Countries, Computer Networks, Local Issues, Age Differences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Shahla Asadi; Jordan Allison; Madhu Khurana; Mehrbakhsh Nilashi – Education and Information Technologies, 2024
Simulation-based learning (SBL) offers an extensive variety of chances to practice complex computer and networking skills in higher education and to implement diverse kinds of platforms to facilitate effective learning. Utilizing visualization and computer network simulation tools in teaching computer networking courses has been found to be useful…
Descriptors: Computer Simulation, Student Attitudes, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Paolo Casari; Sabrina Maniero; Andrea Rosani; Federica Picasso; Anna Serbati – IEEE Transactions on Education, 2025
Contribution: An innovative teaching experience carried out at the University of Trento using team-based learning (TBL) in a large computer networks class. The impact of TBL on the students' learning and satisfaction was investigated. Background: Active learning pedagogies, including TBL, play an important role in enhancing higher-order cognitive…
Descriptors: Cooperative Learning, Teamwork, Computer Networks, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Ramos, Júlio Cesar; L'Erario, Alexandre; Mendonça, Marcio; Fabri, José Augusto; Palácios, Rodrigo Henrique Cunha – Education and Information Technologies, 2023
The freshman student's perspective on the activities performed in a data center by the network analyst is complex and intricate. These activities include the configuration of equipment and the connection between network devices. There are several issues with these activities that demand technical knowledge. Questions such as: "what does this…
Descriptors: Game Based Learning, College Freshmen, Computer Science Education, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Huichao Li; Dan Li – International Journal of Web-Based Learning and Teaching Technologies, 2024
Based on a brief analysis of the current situation of university education management and research on intelligent algorithms, this article constructs a university education management system based on big data. For the clustering and prediction modules in higher education management, corresponding algorithms are used for optimization design. A…
Descriptors: Data, Ideology, Algorithms, Multivariate Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Li; Xu, Yaqian – Canadian Journal of Learning and Technology, 2022
Connectivism, a learning theory that reveals a new learning in the Internet environment, has become a popular academic topic at the forefront of online learning. The MOOC Research Team at the Distance Education Research Centre at Beijing Normal University designed and developed the first massive open online course in China, adapting a connectivist…
Descriptors: Foreign Countries, Learning Theories, Educational Innovation, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Zhengrong Deng; Hong Xiang; Weijun Tang; Hanlie Cheng; Qiang Qin – International Journal of Information and Communication Technology Education, 2024
This paper employs BP Neural Network (BPNN) theory to evaluate innovation and entrepreneurship education in universities. It utilizes students' evaluation indexes as input vectors and determines the number of hidden layer neurons. Experimental results serve as output vectors. The BPNN method proves reasonable and feasible for vocational education…
Descriptors: Partnerships in Education, School Business Relationship, College Students, Vocational Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  50