NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Students1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 26 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mark Monnin; Lori L. Sussman – Journal of Cybersecurity Education, Research and Practice, 2024
Data transfer between isolated clusters is imperative for cybersecurity education, research, and testing. Such techniques facilitate hands-on cybersecurity learning in isolated clusters, allow cybersecurity students to practice with various hacking tools, and develop professional cybersecurity technical skills. Educators often use these remote…
Descriptors: Computer Science Education, Computer Security, Computer Software, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Bordewieck, Martin; Elson, Malte – Applied Cognitive Psychology, 2021
Troubleshooting is a particular problem-solving process comprising error detection, fault diagnosis, and system restoration. Since automation of systems has become increasingly complex and ubiquitous, troubleshooting skills are crucial to maintain safety and security in a variety of contexts. The planned study aims at examining troubleshooting…
Descriptors: Problem Solving, Error Patterns, Visual Aids, Cognitive Style
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
K. Kavitha; V. P. Joshith – Journal of Pedagogical Research, 2024
Artificial intelligence (AI) technologies continue to revolutionize various sectors, including their incorporation into education, particularly in K-12 science education, which has become evidently significant. This paper presents a bibliometric analysis and systematic review that examines the incorporation of AI technologies in K-12 science…
Descriptors: Artificial Intelligence, Science Education, Elementary School Science, Secondary School Science
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Sangpetch, Akkarit – ProQuest LLC, 2013
Large-scale enterprise applications are deployed as distributed applications. These applications consist of many inter-connected components with heterogeneous roles and complex dependencies. Each component typically consumes 5-15% of the server capacity. Deploying each component as a separate virtual machine (VM) allows us to consolidate the…
Descriptors: Computer Networks, Computer Oriented Programs, Reaction Time, Automation
Yu, Chao – ProQuest LLC, 2013
In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…
Descriptors: Engineering, Computer Networks, Networks, Electronic Equipment
Herrera-Ruiz, Octavio – ProQuest LLC, 2012
Peer-to-Peer (P2P) technology has emerged as an important alternative to the traditional client-server communication paradigm to build large-scale distributed systems. P2P enables the creation, dissemination and access to information at low cost and without the need of dedicated coordinating entities. However, existing P2P systems fail to provide…
Descriptors: Information Technology, Client Server Architecture, Computer Networks, Automation
Laney, Christine Marie – ProQuest LLC, 2013
Ecosystem health is deteriorating in many parts of the world due to direct and indirect anthropogenic pressures. Generating accurate, useful, and impactful models of past, current, and future states of ecosystem structure and function is a complex endeavor that often requires vast amounts of data from multiple sources and knowledge from…
Descriptors: Ecology, Information Management, Data Collection, Automation
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
Warschauer, Mark; Liaw, Meei-Ling – National Institute for Literacy, 2010
Although information and communication technologies have become an integral part of life in the United States, they have not yet been adequately integrated into adult language and literacy programs. This raises concerns because of the potential value of technology for enhancing learning and because of the vital role of technological proficiency as…
Descriptors: Technological Advancement, Information Technology, Technology Uses in Education, Adult Literacy
Tunckan, Ergun – Online Submission, 2007
The Open Education Faculty Students Centers have been offering many services to students in Turkey since 1982. Building up bridges between students and faculties, student centers have had technological improvements since 1998 and thereafter quality of services have been increased and services given to students at the student center have been…
Descriptors: Open Education, Open Universities, Foreign Countries, Computer Networks
Peer reviewed Peer reviewed
Saiedina, Hossein; Awad, Mahmoud – Internet Research, 1994
Describes a proposed Multimedia On-Demand (MMOD) system architecture that will support MMOD network services and will have the ability to solve presentation synchronization problems caused by either transmission line delay or any mismatch between the data transmission rates or the different parts of the system. (Contains nine references.)…
Descriptors: Automation, Computer Networks, Electronic Control, Information Networks
Ewart, R. W. – International Journal of Institutional Management in Higher Education, 1988
As new information technology options are made available, office automation systems are being introduced and along with campus networks, and management information service requirements are evolving. Eight common strategies found in 10 American institutions are reported. (Author/MLW)
Descriptors: Automation, College Administration, Computer Networks, Data Processing
Previous Page | Next Page ยป
Pages: 1  |  2