NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Azeta, A. A.; Oyelami M. O. – Online Submission, 2008
With the vast development of various technologies, learning today is no longer confined to classrooms with lecture delivery as the only method of conveying knowledge, rather, an electronic means of learning has continued to evolve. Electronic learning (e-Learning), which facilitates education using communications networks, has made learning…
Descriptors: Computer Uses in Education, Computer Software, Computer Networks, Computer Mediated Communication
Abouserie, Hossam Eldin Mohamed Refaat – Online Submission, 2007
The purpose of this study was to explore and investigate the ways faculty at the Graduate School of Library and Information Science at the University of Illinois at Urbana-Champaign use Networked Information Sources and Services to support their research task. Library and Information Sciences faculty at the University of Illinois were chosen as…
Descriptors: Information Science Education, Search Engines, Questionnaires, Directories
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks