NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Melkonyan, Arsen – ProQuest LLC, 2013
Location technologies constitute an essential component of systems design for autonomous operations and control. The Global Positioning System (GPS) works well in outdoor areas, but the satellite signals are not strong enough to penetrate inside most indoor environments. As a result, a new strain of indoor positioning technologies that make use of…
Descriptors: Computer Networks, Telecommunications, Educational Technology, Handheld Devices
Koc, Levent – ProQuest LLC, 2013
With increasing Internet connectivity and traffic volume, recent intrusion incidents have reemphasized the importance of network intrusion detection systems for combating increasingly sophisticated network attacks. Techniques such as pattern recognition and the data mining of network events are often used by intrusion detection systems to classify…
Descriptors: Bayesian Statistics, Computer Security, Computer Networks, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Magney, Troy; Eitel, Karla; Eitel, Jan; Jansen, Vincent; Schon, Jenny; Rittenburg, Rebecca; Vierling, Lee – Science Teacher, 2013
Many students probably take pictures daily. Whether snapshots of their friends at a Justin Bieber concert or of their latest skateboard trick, these images document changes in a student's life. Digital cameras can do more, however, than record memories to post on Facebook. They can also help students examine changes in their environment. This…
Descriptors: Photography, Handheld Devices, Environmental Interpretation, Plants (Botany)
Peer reviewed Peer reviewed
Direct linkDirect link
Nihalani, Priya K.; Mayrath, Michael; Robinson, Daniel H. – Journal of Educational Psychology, 2011
We investigated the effects of feedback and collaboration on undergraduates' transfer performance when using a computer networking training simulation. In Experiment 1, 65 computer science "novices" worked through an instructional protocol individually (control), individually with feedback, or collaboratively with feedback. Unexpectedly,…
Descriptors: Expertise, Feedback (Response), Computer Simulation, Prior Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Dawy, Z.; Husseini, A.; Yaacoub, E.; Al-Kanj, L. – IEEE Transactions on Education, 2010
The field of radio network planning and optimization (RNPO) is central for wireless cellular network design, deployment, and enhancement. Wireless cellular operators invest huge sums of capital on deploying, launching, and maintaining their networks in order to ensure competitive performance and high user satisfaction. This work presents a lab…
Descriptors: User Satisfaction (Information), Measurement Equipment, Radio, Telecommunications
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Kwon, Homin; Berisha, V.; Atti, V.; Spanias, A. – IEEE Transactions on Education, 2009
Distributed wireless sensor networks (WSNs) are being proposed for various applications including defense, security, and smart stages. The introduction of hardware wireless sensors in a signal processing education setting can serve as a paradigm for data acquisition, collaborative signal processing, or simply as a platform for obtaining,…
Descriptors: Undergraduate Students, Programming Languages, Computer Software, Programming
Ho, Shuyuan Mary – ProQuest LLC, 2009
This study examines perceptions of human "trustworthiness" as a key component in countering insider threats. The term "insider threat" refers to situations where a critical member of an organization behaves against the interests of the organization, in an illegal and/or unethical manner. Identifying and detecting how an individual's behavior…
Descriptors: Computer Networks, Credibility, Perception, Organizations (Groups)
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Jie Chi; Lin, Yi Lung – Educational Technology & Society, 2010
When using mobile devices in support of learning activities, students gain mobility, but problems arise when group members share information. The small size of the mobile device screen becomes problematic when it is being used by two or more students to share and exchange information. This problem affects interactions among group members. To…
Descriptors: Electronic Learning, Student Attitudes, Pretests Posttests, Achievement Tests