Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
ProQuest LLC | 12 |
Author
Arnold, Bradley A. | 1 |
Arnold, Erik P. | 1 |
Benjamin L. Edelman | 1 |
Duhainy, Robert | 1 |
Elhindi, Mohamed A. | 1 |
Ferguson, Jason W. | 1 |
Islam, Muhammad Faysal | 1 |
Johnson, Kenneth T. | 1 |
Ouyang, Ye | 1 |
Perez, Jerry F. | 1 |
Pisano, Mark | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 12 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Adult Education | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Minnesota | 1 |
Texas | 1 |
Texas (Dallas) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Benjamin L. Edelman – ProQuest LLC, 2024
This dissertation is about a particular style of research. The philosophy of this style is that in order to scientifically understand deep learning, it is fruitful to investigate what happens when neural networks are trained on simple, mathematically well-defined tasks. Even though the training data is simple, the training algorithm can end up…
Descriptors: Learning Processes, Research Methodology, Algorithms, Models
Pisano, Mark – ProQuest LLC, 2017
Universities and Higher Education Institutions spend large sums of money to maintain and build network infrastructures. Current research and discussions in this area revolve around providing large amounts of bandwidth to students who live in a residence hall. However, there is a lack of information showing what is being used to support research…
Descriptors: Higher Education, Computer Networks, Educational Technology, Technology Uses in Education
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Arnold, Bradley A. – ProQuest LLC, 2018
The purpose of this qualitative case study was to develop descriptions of how teenage students remain engaged in learning while using mobile technology. Developments in technology have expanded learning contexts and provided learners with improved capacities to connect with others to exchange, gain, and construct knowledge. Developments in…
Descriptors: Middle School Students, Telecommunications, Learning Activities, Qualitative Research
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Roble, Amanda Jean – ProQuest LLC, 2015
The use of formative assessment can increase student achievement (Black & Wiliam, 1998a). However, some of the challenges of incorporating formative assessment into instruction include the length of time needed to collect, assess and provide feedback to all students and dealing with students misunderstandings and incorrect answers that are…
Descriptors: Formative Evaluation, Evaluation Methods, Secondary School Teachers, Mathematics Teachers
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Arnold, Erik P. – ProQuest LLC, 2014
A multiple-case qualitative study of five school districts that had implemented various large-scale technology initiatives was conducted to describe what superintendents do to gain acceptance of those initiatives. The large-scale technology initiatives in the five participating districts included 1:1 District-Provided Device laptop and tablet…
Descriptors: Superintendents, Case Studies, Qualitative Research, School Districts
Ouyang, Ye – ProQuest LLC, 2011
Rapid changes in mobile techniques have always been evolutionary, and the deployment of 4G Long Term Evolution (LTE) networks will be the same. It will be another transition from Third Generation (3G) to Fourth Generation (4G) over a period of several years, as is the case still with the transition from Second Generation (2G) to 3G. As a result,…
Descriptors: Telecommunications, Handheld Devices, Computer Networks, Planning
Duhainy, Robert – ProQuest LLC, 2010
The use of radio frequency identification (RFID) technology is increasingly common. Its use for specific applications has been mandated by a number of major retailers, as well as by the U.S. government; however, core RFID technologies and networks lack consistent approaches to maximize the efficiency and security of RFID applications. The purpose…
Descriptors: Patients, Social Change, Internet, Technology
Ferguson, Jason W. – ProQuest LLC, 2010
In this dissertation, the author examined the capabilities of virtual private networks (VPNs) in supporting teleworking environments for small businesses in the food marketing sector. The goal of this research was to develop an implementation model for small businesses in the food marketing sector that use a VPN solution to support teleworker…
Descriptors: Teleworking, Small Businesses, Participant Observation, Marketing
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems