NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 811 to 825 of 2,008 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mohamad Ali, Ahmad Zamzuri; Samsudin, Khairulanuar; Hassan, Mohamad; Sidek, Salman Firdaus – Turkish Online Journal of Educational Technology - TOJET, 2011
The aim of this study was to investigate the effects of screencast with narration and without narration in enhancing learning performance. A series of screencast teaching Flash animation software was developed using screen capture software for the purpose of this research. The screencast series were uploaded to specialized channels created in…
Descriptors: Video Technology, Research Design, Computer Software, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Bowers, Janet; Bezuk, Nadine; Aguilar, Karen – International Journal of Mathematical Education in Science and Technology, 2011
Designing didactic objects involves imagining how students can conceive of specific mathematical topics and then imagining what types of classroom discussions could support these mental constructions. This study investigated whether it was possible to design Java applets that might serve as didactic objects to support online learning where…
Descriptors: Electronic Learning, Online Courses, Mathematics, Models
Vee, Annette – ProQuest LLC, 2010
This dissertation looks at computer programming through the lens of literacy studies, building from the concept of code as a written text with expressive and rhetorical power. I focus on the intersecting technological and social factors of computer code writing as a literacy--a practice I call "proceduracy". Like literacy, proceduracy is a human…
Descriptors: Computer Software, Computers, Programming, Foreign Countries
Kupcu, Alptekin – ProQuest LLC, 2010
Peer-to-peer (P2P) systems, and client-server type storage and computation outsourcing constitute some of the major applications that the next generation cloud schemes will address. Since these applications are just emerging, it is the perfect time to design them with security and privacy in mind. Furthermore, considering the high-churn…
Descriptors: Internet, Computer Software, Computer Science, Computers
Neal, Maxwell Lewis – ProQuest LLC, 2010
Biosimulation models are valuable, versatile tools used for hypothesis generation and testing, codification of biological theory, education, and patient-specific modeling. Driven by recent advances in computational power and the accumulation of systems-level experimental data, modelers today are creating models with an unprecedented level of…
Descriptors: Semantics, Measures (Individuals), Semiotics, Computer Software
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Floreno, Jeff; Keil, Brad – Campus Law Enforcement Journal, 2010
The challenges associated with securing schools from both on- and off-campus threats create constant pressure for law enforcement, campus security professionals, and administrators. And while security technology choices are plentiful, many colleges and universities are operating with limited dollars and information needed to select and integrate…
Descriptors: School Security, Law Enforcement, Information Technology, Technology Uses in Education
Buechley, Leah, Ed.; Peppler, Kylie, Ed.; Eisenberg, Michael, Ed.; Yasmin, Kafai, Ed. – Peter Lang Publishing Group, 2013
"Textile Messages" focuses on the emerging field of electronic textiles, or e-textiles--computers that can be soft, colorful, approachable, and beautiful. E-textiles are articles of clothing, home furnishings, or architectures that include embedded computational and electronic elements. This book introduces a collection of tools that…
Descriptors: Textiles Instruction, Computers, Clothing, Furniture
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Valavicius, Eugenijus; Babravicius, Kestutis – Informatics in Education, 2012
The paper analyses the results of the computer literacy survey conducted among the 11th and 12th form students in gymnasiums and secondary schools in Lithuania. The basis for the questionnaire was taken from previous surveys carried out in Vilnius Pedagogical University. The questionnaire is divided into five topics, such as computer hardware and…
Descriptors: Foreign Countries, Computer Literacy, Student Surveys, Grade 11
Peer reviewed Peer reviewed
Direct linkDirect link
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Ling; Liu, Yang; Gallagher, Marcus; Pailthorpe, Bernard; Sadiq, Shazia; Shen, Heng Tao; Li, Xue – Journal of Information Systems Education, 2012
The demand for graduates with exposure in Cloud Computing is on the rise. For many educational institutions, the challenge is to decide on how to incorporate appropriate cloud-based technologies into their curricula. In this paper, we describe our design and experiences of integrating Cloud Computing components into seven third/fourth-year…
Descriptors: Computers, Schools, Foreign Countries, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Chow, Meyrick; Chan, Lawrence – Computers & Education, 2010
Information technology (IT) has the potential to improve the clinical learning environment. The extent to which IT enhances or detracts from healthcare professionals' role performance can be expected to affect both student learning and patient outcomes. This study evaluated nursing students' satisfaction with a novel compartmental Picture…
Descriptors: Nursing Students, Nursing Education, Visualization, Biomedicine
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
Biometrics has been making its way into school districts for the past decade. Biometric tools draw information from a person's identifying physical components, providing a virtually fail-safe level of protection for K-12 schools. In addition to their security uses, biometric systems are currently used in schools for cafeteria purchases, library…
Descriptors: Elementary Secondary Education, Computers, Internet, Information Technology
Pages: 1  |  ...  |  51  |  52  |  53  |  54  |  55  |  56  |  57  |  58  |  59  |  ...  |  134