Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 4 |
Computer Security | 3 |
Clinical Diagnosis | 2 |
Computer Science | 2 |
Computer Science Education | 2 |
Computers | 2 |
Data Processing | 2 |
Genetics | 2 |
Internet | 2 |
Mathematics | 2 |
Safety | 2 |
More ▼ |
Source
Online Submission | 4 |
Author
Dixit, R. K. | 2 |
Durkin, Sarah S. | 1 |
Ercan, Tuncay | 1 |
Fees, Rachel E. | 1 |
Moran, Angela L. | 1 |
Murray, Mark M. | 1 |
Sahin, Yasar Guneri | 1 |
da Rosa, Jennifer A. | 1 |
Publication Type
Collected Works - Serial | 2 |
Reports - Descriptive | 2 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Audience
Location
Maryland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Ercan, Tuncay; Sahin, Yasar Guneri – Online Submission, 2007
Course descriptions prepared by the lecturers in the beginning of the academic year do not get any feed back from the students enrolled it. These syllabuses are not only used for the future semesters, but also used by the other lecturers without even making any changes. This causes a negative effect on the student education since many of the…
Descriptors: Knowledge Level, Measures (Individuals), Course Descriptions, Computer Networks
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software