NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)9
Since 2006 (last 20 years)25
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 38 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Jevremovic, Aleksandar; Shimic, Goran; Veinovic, Mladen; Ristic, Nenad – IEEE Transactions on Learning Technologies, 2017
The case study presented in this paper describes the pedagogical aspects and experience gathered while using an e-learning tool named IPA-PBL. Its main purpose is to provide additional motivation for adopting theoretical principles and procedures in a computer networks course. In the proposed model, the sequencing of activities of the learning…
Descriptors: Problem Based Learning, Computer Networks, Case Studies, Electronic Learning
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Kumari, Neeraj – Journal of Educational Technology, 2019
The objective of the study is to examine the current education system present in private technical education universities in Haryana from the faculty members' perspective. It is a descriptive research. The data has been collected with the help of Questionnaire Based Survey. The sample size is 180 comprising of the faculty respondents. The sample…
Descriptors: Statistical Analysis, Computer Software, Educational Quality, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Su, Chiu Hung; Tzeng, Gwo-Hshiung; Hu, Shu-Kung – Interactive Learning Environments, 2016
The purpose of this study was to address this problem by applying a new hybrid fuzzy multiple criteria decision-making model including (a) using the fuzzy decision-making trial and evaluation laboratory (DEMATEL) technique to construct the fuzzy scope influential network relationship map (FSINRM) and determine the fuzzy influential weights of the…
Descriptors: Electronic Learning, Decision Making, Feedback (Response), Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kern, Cindy L.; Crippen, Kent J. – Journal of Science Education and Technology, 2017
Scientific inscriptions--graphs, diagrams, and data--and argumentation are integral to learning and communicating science and are common elements in cyberlearning environments--those involving the use of networked learning technologies. However, previous research has indicated that learners struggle to use inscriptions and when they engage in…
Descriptors: Scaffolding (Teaching Technique), Internet, Electronic Learning, Web Based Instruction
Islam, Muhammad Faysal – ProQuest LLC, 2013
Cloud computing offers the advantage of on-demand, reliable and cost efficient computing solutions without the capital investment and management resources to build and maintain in-house data centers and network infrastructures. Scalability of cloud solutions enable consumers to upgrade or downsize their services as needed. In a cloud environment,…
Descriptors: Risk Assessment, Statistical Analysis, Reliability, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Lan-Ting; Lee, Kun-Chou – Turkish Online Journal of Educational Technology - TOJET, 2014
The vision plays an important role in educational technologies because it can produce and communicate quite important functions in teaching and learning. In this paper, learners' preference for the visual complexity on small screens of mobile computers is studied by neural networks. The visual complexity in this study is divided into five…
Descriptors: Preferences, Educational Technology, Visual Acuity, Visual Literacy
Perez, Jerry F. – ProQuest LLC, 2013
The goal of the dissertation study was to evaluate the existing DG scheduling algorithm. The evaluation was developed through previously explored simulated analyses of DGs performed by researchers in the field of DG scheduling optimization and to improve the current RT framework of the DG at TTU. The author analyzed the RT of an actual DG, thereby…
Descriptors: Computer Science, Scheduling, Mathematics, Universities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sadik, Alaa – Journal of Educational Technology, 2014
This paper describes the technology and methodology used in the development and evaluation of an online network to help the instructors to produce and share video presentations in a new and innovative way. The network offers an application and platform for recording and sharing video presentations. The application allows instructors to narrate and…
Descriptors: Video Technology, Computer Networks, Computer Uses in Education, Usability
Liao, Yuan – ProQuest LLC, 2011
The virtualization of computing resources, as represented by the sustained growth of cloud computing, continues to thrive. Information Technology departments are building their private clouds due to the perception of significant cost savings by managing all physical computing resources from a single point and assigning them to applications or…
Descriptors: Telecommunications, Computers, Statistical Analysis, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Uysal, Murat Pasa – Interactive Learning Environments, 2016
Various methods and tools have been proposed to overcome the learning obstacles for Object-Oriented Programming (OOP). However, it remains difficult especially for novice learners. The problem may be not only adopting an instructional method, but also an Integrated Development Environment (IDE). Learners employ IDEs as a means to solve programming…
Descriptors: Evaluation, Educational Environment, Cognitive Processes, Difficulty Level
Shambare, Narcissus – ProQuest LLC, 2013
The problem examined in the proposed study was the underutilization of the intranet portals (IP) by faculty in institutions of higher education (IHE). Despite the time and investment allocated to the IP, the technology remains underutilized to improve productivity, efficiency, and justify its investment yet there is lack of understanding of why…
Descriptors: Computer Networks, Computer Uses in Education, College Faculty, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chawinga, Winner Dominic – E-Learning and Digital Media, 2016
It is understood that microblogging (tweeting) which is a form of Web 2.0, has been a centre of attraction in some institutions of higher education. However, despite its hype and pomp as reported by some scholars in developed countries, integration of Twitter in a classroom environment in developing countries is just beginning to flourish. In…
Descriptors: Social Media, Electronic Publishing, Course Content, Foreign Countries
Previous Page | Next Page »
Pages: 1  |  2  |  3