Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 28 |
Descriptor
Computer Networks | 36 |
Mathematics | 36 |
Telecommunications | 17 |
Models | 9 |
Computer Science | 8 |
Computer Software | 7 |
Computer Security | 6 |
Information Technology | 6 |
Programming | 6 |
Case Studies | 5 |
Computers | 5 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Teachers | 1 |
Location
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Finland | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Elmekki, Ouchker; Maizate, Abderrahim; Ouzzif, Mohammed – International Journal of Web-Based Learning and Teaching Technologies, 2021
Wireless sensor networks (WSN) are an ad hoc network consisting of miniaturized autonomous sensors that communicate with each other over a radio link. In this paper, the authors' contribution is a cross-layer approach. To achieve this approach, the authors proposed in the first part an improvement of LEACH algorithm named WEIGHTED_LEACH. This…
Descriptors: Computer Networks, Telecommunications, Mathematics, Energy Conservation
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
Ma, Xiao – ProQuest LLC, 2018
Current network design problems can be solved by offline or online methods. Offline methods are criticized for their complexity and in flexibility, whereas online methods lack guaranteed optimality. Non-blocking properties, which are typically studied in switching structures, could be used to evaluate the capability of a switching structure to…
Descriptors: Computer Networks, Design, Graphs, Mathematics
White, Tobin – International Journal of Computer-Supported Collaborative Learning, 2018
Classroom activity traditionally takes one of three forms, variously oriented toward the levels of individual students, small groups, or the whole class. CSCL systems, however, may enable novel ways to facilitate instruction within or sequence activity across these different levels. Drawing on theoretical accounts of learning at and across…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Class Activities, Computer Networks
Liu, Yaoqing – ProQuest LLC, 2013
The fast growth of global routing table size has been causing concerns that the Forwarding Information Base (FIB) will not be able to fit in existing routers' expensive line-card memory, and upgrades will lead to a higher cost for network operators and customers. FIB Aggregation, a technique that merges multiple FIB entries into one, is probably…
Descriptors: Computers, Computer Networks, Mathematics
Xiang, Qiao – ProQuest LLC, 2014
As wireless cyber-physical systems (WCPS) are increasingly being deployed in mission-critical applications, it becomes imperative that we consider application QoS requirements in in-network processing (INP). In this dissertation, we explore the potentials of two INP methods, packet packing and network coding, on improving network performance while…
Descriptors: Computer Networks, Telecommunications, Efficiency, Reliability
Kamal, Ahmed Tashrif – ProQuest LLC, 2013
Due to their high fault-tolerance, ease of installation and scalability to large networks, distributed algorithms have recently gained immense popularity in the sensor networks community, especially in computer vision. Multi-target tracking in a camera network is one of the fundamental problems in this domain. Distributed estimation algorithms…
Descriptors: Computer Networks, Mathematics, Computation, Information Transfer
Ray, Loye Lynn – ProQuest LLC, 2014
The need for detecting malicious behavior on a computer networks continued to be important to maintaining a safe and secure environment. The purpose of this study was to determine the relationship of multilayer feed forward neural network architecture to the ability of detecting abnormal behavior in networks. This involved building, training, and…
Descriptors: Computer Networks, Computer Security, Safety, Artificial Intelligence
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Gendreau, Audrey – ProQuest LLC, 2014
Efficient self-organizing virtual clusterheads that supervise data collection based on their wireless connectivity, risk, and overhead costs, are an important element of Wireless Sensor Networks (WSNs). This function is especially critical during deployment when system resources are allocated to a subsequent application. In the presented research,…
Descriptors: Computer Simulation, Computer Networks, Costs, Risk
Peacock, Christopher – ProQuest LLC, 2012
The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…
Descriptors: Computer Networks, Telecommunications, Models, Simulation
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
He, Jing – ProQuest LLC, 2012
Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…
Descriptors: Computer Networks, Telecommunications, Topology, Energy Conservation
Danielson, Christopher; Meyer, Dan – Mathematics Teacher, 2016
For many the phrase "teaching math online" evokes a vision of teaching and learning that is not based in physical classrooms. Perhaps teachers and students are even interacting asynchronously. In math classrooms in the United States, the increasing availability of devices (e.g. laptops, Chromebooks™, smartphones, and tablets) and…
Descriptors: Internet, Handheld Devices, Telecommunications, Mathematics
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities