NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Goals 20002
Assessments and Surveys
Study Process Questionnaire1
What Works Clearinghouse Rating
Showing 1 to 15 of 236 results Save | Export
Benjamin L. Edelman – ProQuest LLC, 2024
This dissertation is about a particular style of research. The philosophy of this style is that in order to scientifically understand deep learning, it is fruitful to investigate what happens when neural networks are trained on simple, mathematically well-defined tasks. Even though the training data is simple, the training algorithm can end up…
Descriptors: Learning Processes, Research Methodology, Algorithms, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Peer reviewed Peer reviewed
Direct linkDirect link
Ayadi, Mohamed Issam; Maizate, Abderrahim; Ouzzif, Mohammed; Mahmoudi, Charif – International Journal of Web-Based Learning and Teaching Technologies, 2021
In this paper, the authors propose a novel forwarding strategy based on deep learning that can adaptively route interests/data packets through ethernet links without relying on the FIB table. The experiment was conducted as a proof of concept. They developed an approach and an algorithm that leverage existing intelligent forwarding approaches in…
Descriptors: Computer Networks, Artificial Intelligence, Mathematics, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Muthukumar, N.; Srinivasan, Seshadhri; Subathra, B.; Ramkumar, K. – IEEE Transactions on Education, 2021
Contribution: This article explores how the Industrial Internet of Things (IIoT) could be leveraged to enhance the teaching/learning experience of advanced control techniques [e.g., model-predictive control (MPC)] for complex systems (nonlinear and multivariable) for undergraduate students. Background: The IIoTs' features, such as ubiquitous…
Descriptors: Undergraduate Students, College Science, Science Instruction, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chen, Li; Xu, Yaqian – Canadian Journal of Learning and Technology, 2022
Connectivism, a learning theory that reveals a new learning in the Internet environment, has become a popular academic topic at the forefront of online learning. The MOOC Research Team at the Distance Education Research Centre at Beijing Normal University designed and developed the first massive open online course in China, adapting a connectivist…
Descriptors: Foreign Countries, Learning Theories, Educational Innovation, Internet
European Commission, 2019
The second objective of the '2nd Survey of Schools: ICT in Education' designs a conceptual model for a 'highly equipped and connected classroom' (HECC), defines three scenarios of a HECC and estimates the costs to equip and connect an average EU classroom with advanced components of the HECC model. The entry level scenario outlines the minimum and…
Descriptors: Computer Uses in Education, Technology Integration, Costs, Faculty Development
Forrest J. Bowlick; Karen K. Kemp; Shana Crosson; Eric Shook – Geography Teacher, 2024
Cyberinfrastructure (CI) empowers the foundational computation resources underlying data analytics, spatial modeling, and many other domains serving the growing knowledge economy in the United States. In every part of these interactions with CI, questions of how to seamlessly integrate CI training into educational programs exist. In this article,…
Descriptors: Knowledge Economy, Global Approach, World Problems, Multiple Literacies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zabasta, Anatolijs; Peuteman, Joan; Kunicina, Nadezda; Kazymyr, Volodymyr; Hvesenya, Sergey; Hnatov, Andrii; Paliyeva, Tatsiana; Ribickis, Leonids – Education Sciences, 2020
The increasing importance of continuingly complex Cyber-Physical Systems (CPS) challenges and encourages universities worldwide to organize up-to-date CPS oriented educational programs. The Erasmus+ project "CybPhys" aims to support CPS oriented educational programs in Belarus and Ukraine. We put forward a hypothesis that the educational…
Descriptors: Foreign Countries, Geographic Regions, Cultural Differences, Higher Education
Chen, Haoming – ProQuest LLC, 2016
Video compression and communication has been an important field over the past decades and critical for many applications, e.g., video on demand, video-conferencing, and remote education. In many applications, providing low-delay and error-resilient video transmission and increasing the coding efficiency are two major challenges. Low-delay and…
Descriptors: Video Technology, Telecommunications, Information Technology, Coding
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bathon, Justin; van Rooyan, Jean W.; Jobert, Rika – Research in Educational Administration & Leadership, 2018
This article presents a review of the development of platform network models that rely on partnership contracts to implement comprehensive school reform. The literature from the previous three decades of development of school networks, emerging largely from the United States of America, is reviewed. The recent development of similar network models…
Descriptors: Educational Change, Partnerships in Education, Contracts, Program Implementation
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C. – Journal of Education for Business, 2019
There is an increasing recognition of cybersecurity's importance to organizations, and business schools are in a unique position to meet industry's demand for cybersecurity professionals. Using MSIS 2016 and National Centers of Academic Excellence Cyber Defense Education standards, the author investigates cybersecurity master's programs in U.S.…
Descriptors: Computer Security, Information Security, Computer Science Education, Masters Programs
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Johnson, Kenneth T. – ProQuest LLC, 2017
Increased internal and external training approaches are elements senior leaders need to know before creating a training plan for security professionals to protect sensitive information. The purpose of this qualitative case study was to explore training strategies telecommunication industry leaders use to ensure security professionals can protect…
Descriptors: Information Security, Corporations, Telecommunications, Industry
Alomari, Firas – ProQuest LLC, 2013
The back-end databases of multi-tiered applications are a major data security concern for enterprises. The abundance of these systems and the emergence of new and different threats require multiple and overlapping security mechanisms. Therefore, providing multiple and diverse database intrusion detection and prevention systems (IDPS) is a critical…
Descriptors: Information Security, Information Systems, Databases, Models
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  16