NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Jill Manczka – ProQuest LLC, 2024
Throughout history, artificial intelligence (AI) has impacted various aspects of human life and professional industries, including the field of education, by mimicking human behaviors and tasks to increase productivity and efficiency (Grudin et al., 2023; Haenlein & Kaplan, 2019). Generative AI is a form of AI using deep learning to quickly…
Descriptors: Teacher Attitudes, Artificial Intelligence, Computer Software, Technology Uses in Education
Johnson-Huber, Cariann – ProQuest LLC, 2021
Background: Today's healthcare organizations face financial and educational challenges of sustaining electronic medical record (EMR) advancements and regulatory reporting mandates. One such mandate is providing EMR education in the Operating Room (OR) setting to support reporting compliance and patient safety. Local Problem: At a multi-state…
Descriptors: Accuracy, Video Technology, Medical Education, Nursing Education
Yusuf Adam Marafa – ProQuest LLC, 2022
Higher education is rapidly changing, and instructors are striving to match the needs of 21st-century digital learners. There is a growing demand and shift from traditional classes to the online mode of instruction for most post-secondary learning institutions. Additionally, with the recent pandemic (COVID-19), post-secondary institutions had to…
Descriptors: Higher Education, College Faculty, COVID-19, Pandemics
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software