NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 17 results Save | Export
Jessy Hsieh – ProQuest LLC, 2024
This dissertation proposes a strategy, or set of decision-making principles, for the education of adults. It explores two related questions: What is the purpose of andragogy and why does this work matter? This philosophical inquiry is situated within a broader context of the automation of knowledge work. As advances in information and…
Descriptors: Adult Education, Andragogy, Decision Making, Information Technology
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Ziwei Zhou – ProQuest LLC, 2020
In light of the ever-increasing capability of computer technology and advancement in speech and natural language processing techniques, automated speech scoring of constructed responses is gaining popularity in many high-stakes assessment and low-stakes educational settings. Automated scoring is a highly interdisciplinary and complex subject, and…
Descriptors: Certification, Speech Skills, Automation, Scoring
Ruiqi Shen – ProQuest LLC, 2021
With the large demand for technology workers all around the world, more people are learning programming. Studies show that human tutoring is the most effective way to learn for novice programmers. However, problems such as the inaccessibility to physical classes, prohibitive costs, and the lack of educators may limit students' opportunities to…
Descriptors: MOOCs, Online Systems, Interactive Video, Computer Assisted Instruction
Ippoliti, Dennis – ProQuest LLC, 2014
Anomaly detection is a challenging problem that has been researched within a variety of application domains. In network intrusion detection, anomaly based techniques are particularly attractive because of their ability to identify previously unknown attacks without the need to be programmed with the specific signatures of every possible attack.…
Descriptors: Computer Security, Information Technology, Computer Networks, Identification
Demiralp, Burcu – ProQuest LLC, 2022
One of the challenges humans face is making collective decisions with regards to controversial issues related to science, namely socio-scientific issues (SSIs). Genetic modification, nuclear energy, experimental drugs, 5G technology are a few examples of SSIs. Some of the concerns posed by such issues are compromise to privacy and identity, threat…
Descriptors: Scientific Attitudes, Decision Making, News Reporting, Genetics
Sun, Shaohui – ProQuest LLC, 2013
Urban reconstruction, with an emphasis on man-made structure modeling, is an active research area with broad impact on several potential applications. Urban reconstruction combines photogrammetry, remote sensing, computer vision, and computer graphics. Even though there is a huge volume of work that has been done, many problems still remain…
Descriptors: Automation, Visual Aids, Models, Buildings
Al-Bulushi, Yaqoob Dur Mohammed – ProQuest LLC, 2017
The Oman government developed a vision to transform the nation into a sustainable knowledge society by supporting information and communication technologies to improve government services (ITA, n.d.). According to a United Nations (2012) report, Oman ranks 64th worldwide in e-government readiness, the lowest compared to other countries in the…
Descriptors: Foreign Countries, Leadership Role, Public Service, Qualitative Research
Allen, Ronald Timothy – ProQuest LLC, 2014
Automated Logistics Environment (ALE) is a new term used by Navy and aerospace industry executives to describe the aggregate of logistics-related information systems that support modern aircraft weapon systems. The development of logistics information systems is not always well coordinated among programs, often resulting in solutions that cannot…
Descriptors: Administrators, Experience, Automation, Information Systems
Herrera-Ruiz, Octavio – ProQuest LLC, 2012
Peer-to-Peer (P2P) technology has emerged as an important alternative to the traditional client-server communication paradigm to build large-scale distributed systems. P2P enables the creation, dissemination and access to information at low cost and without the need of dedicated coordinating entities. However, existing P2P systems fail to provide…
Descriptors: Information Technology, Client Server Architecture, Computer Networks, Automation
Sturm, John Andrew – ProQuest LLC, 2011
The recent White House (2011) policy paper for the Smart Grid that was released on June 13, 2011, "A Policy Framework for the 21st Century Grid: Enabling Our Secure Energy Future," defines four major problems to be solved and the one that is addressed in this dissertation is Securing the Grid. Securing the Grid is referred to as one of…
Descriptors: Energy, Communications, Information Technology, Automation
Spaulding, Trent Joseph – ProQuest LLC, 2011
The objective of this research is to understand how a set of systems, as defined by the business process, creates value. The three studies contained in this work develop the model of process-based automation. The model states that complementarities among systems are specified by handoffs in the business process. The model also provides theory to…
Descriptors: Automation, Hospitals, Medicine, Drug Therapy
Kitzmiller, Rebecca Rutherford – ProQuest LLC, 2012
Background: Hospital adoption of health information technology (HIT) systems is promoted as essential to decreasing medical error and their associated 44,000 annual deaths and $17 billion in healthcare costs (Institute of Medicine, 2001; Kohn, Corrigan, & Donaldson, 1999). Leading national healthcare groups, such as the Institute of Medicine,…
Descriptors: Information Technology, Hospitals, Health Services, Database Management Systems
Jabba Molinares, Daladier – ProQuest LLC, 2009
Communication underwater is challenging because of the inherent characteristics of the media. First, common radio frequency (RF) signals utilized in wireless communications cannot be used under water. RF signals are attenuated in such as way that RF communication underwater is restricted to very few meters. As a result, acoustic-based…
Descriptors: Acoustics, Internet, Telecommunications, Information Technology
Hillison, Derek William – ProQuest LLC, 2009
Boundary units of an organization uniquely experience the tension between adaptation to environmental variation and maintaining stable outcomes for the rest of the organization. In our world of just-in-time supply chain systems, lot-sizes of one, lean manufacturing and an increasing focus on services, traditional forms of buffering such as queuing…
Descriptors: Organizational Change, Computer System Design, Influence of Technology, Information Technology
Previous Page | Next Page ยป
Pages: 1  |  2