NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Elmekki, Ouchker; Maizate, Abderrahim; Ouzzif, Mohammed – International Journal of Web-Based Learning and Teaching Technologies, 2021
Wireless sensor networks (WSN) are an ad hoc network consisting of miniaturized autonomous sensors that communicate with each other over a radio link. In this paper, the authors' contribution is a cross-layer approach. To achieve this approach, the authors proposed in the first part an improvement of LEACH algorithm named WEIGHTED_LEACH. This…
Descriptors: Computer Networks, Telecommunications, Mathematics, Energy Conservation
Xiang, Qiao – ProQuest LLC, 2014
As wireless cyber-physical systems (WCPS) are increasingly being deployed in mission-critical applications, it becomes imperative that we consider application QoS requirements in in-network processing (INP). In this dissertation, we explore the potentials of two INP methods, packet packing and network coding, on improving network performance while…
Descriptors: Computer Networks, Telecommunications, Efficiency, Reliability
Zhou, Shan – ProQuest LLC, 2013
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different…
Descriptors: Computer Networks, Telecommunications, Information Technology, Mathematics
Peacock, Christopher – ProQuest LLC, 2012
The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…
Descriptors: Computer Networks, Telecommunications, Models, Simulation
He, Jing – ProQuest LLC, 2012
Wireless Sensor Networks (WSNs) are now widely used for monitoring and controlling of systems where human intervention is not desirable or possible. Connected Dominating Sets (CDSs) based topology control in WSNs is one kind of hierarchical method to ensure sufficient coverage while reducing redundant connections in a relatively crowded network.…
Descriptors: Computer Networks, Telecommunications, Topology, Energy Conservation
Peer reviewed Peer reviewed
Direct linkDirect link
Danielson, Christopher; Meyer, Dan – Mathematics Teacher, 2016
For many the phrase "teaching math online" evokes a vision of teaching and learning that is not based in physical classrooms. Perhaps teachers and students are even interacting asynchronously. In math classrooms in the United States, the increasing availability of devices (e.g. laptops, Chromebooks™, smartphones, and tablets) and…
Descriptors: Internet, Handheld Devices, Telecommunications, Mathematics
Giordano, Eugenio – ProQuest LLC, 2011
Many of the devices we interact with on a daily basis are currently equipped with wireless connectivity. Soon this will be extended to the vehicles we drive/ride every day. Wirelessly connected vehicles will form a new kind of network that will enable a wide set of innovative applications ranging from enhanced safety to entertainment. To…
Descriptors: Telecommunications, Computer Networks, Motor Vehicles, Mobility
Solis Robles, Roberto – ProQuest LLC, 2009
In wireless sensor networks, more so generally than in other types of distributed systems, clock synchronization is crucial since by having this service available, several applications such as media access protocols, object tracking, or data fusion, would improve their performance. In this dissertation, we propose a set of algorithms to achieve…
Descriptors: Computer Networks, Telecommunications, Time, Accuracy
Ouyang, Ye – ProQuest LLC, 2011
Rapid changes in mobile techniques have always been evolutionary, and the deployment of 4G Long Term Evolution (LTE) networks will be the same. It will be another transition from Third Generation (3G) to Fourth Generation (4G) over a period of several years, as is the case still with the transition from Second Generation (2G) to 3G. As a result,…
Descriptors: Telecommunications, Handheld Devices, Computer Networks, Planning
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Xu, Yiliang – ProQuest LLC, 2011
The development of telerobotic systems has evolved from Single Operator Single Robot (SOSR) systems to Multiple Operator Multiple Robot (MOMR) systems. The relationship between human operators and robots follows the master-slave control architecture and the requests for controlling robot actuation are completely generated by human operators. …
Descriptors: Resource Allocation, Mathematics, Animals, Robotics
Peer reviewed Peer reviewed
Direct linkDirect link
Sherrell, Linda; Krishna, Bhagavathy; Velaga, Natasha; Vejandla, Pavan; Satharla, Mahesh – Journal of Computers in Mathematics and Science Teaching, 2010
Agile methodologies have become increasingly popular among software developers as evidenced by industrial participation at related conferences. The popularity of agile practices over traditional techniques partly stems from the fact that these practices provide for more customer involvement and better accommodate rapidly changing requirements,…
Descriptors: Computer Software, Methods, Independent Study, Graduate Students
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Surakka, Sami; Malmi, Lauri – Computer Science Education, 2005
This case study considered the syllabus of the first and second year studies in computer science. The aim of the study was to reveal which topics covered in the syllabi were really needed during the following years of study or in working life. The program that was assessed in the study was a Masters program in computer science and engineering at a…
Descriptors: Masters Programs, Computer Science, Engineering Education, Foreign Countries
Previous Page | Next Page »
Pages: 1  |  2