NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Dorothy Daniels – ProQuest LLC, 2021
In the United States the number of English Language Learner students is steadily increasing. Many ELLs speak and understand limited English, resulting in achievement that lags far behind that of their classmates (Thomas, 2015). Recruiting the support of educators who come in contact with ELL students on a daily basis promoted a solution to this…
Descriptors: Middle Schools, English Language Learners, Assistive Technology, Artificial Intelligence
Brown, Robert L. – ProQuest LLC, 2014
A problem in computer security is identification of attack signatures in network packets. An attack signature is a pattern of bits that characterizes a particular attack. Because there are many kinds of attacks, there are potentially many attack signatures. Furthermore, attackers may seek to avoid detection by altering the attack mechanism so that…
Descriptors: Computer Security, Identification, Automation, Programming
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Sun, Shaohui – ProQuest LLC, 2013
Urban reconstruction, with an emphasis on man-made structure modeling, is an active research area with broad impact on several potential applications. Urban reconstruction combines photogrammetry, remote sensing, computer vision, and computer graphics. Even though there is a huge volume of work that has been done, many problems still remain…
Descriptors: Automation, Visual Aids, Models, Buildings
Diaz, Felix – ProQuest LLC, 2014
Orthopedically impaired (OI) students face a formidable challenge during the writing process due to their limited or non-existing ability to use their hands to hold a pen or pencil or even to press the keys on a keyboard. While they may have a clear mental picture of what they want to write, the biggest hurdle comes well before having to tackle…
Descriptors: Computer Software, Automation, Identification, Audio Equipment
Brennan, Michael – ProQuest LLC, 2012
Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…
Descriptors: Discourse Analysis, Electronic Learning, Social Networks, Authors