NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 256 to 270 of 4,568 results Save | Export
Iqbal, Hammad A. – ProQuest LLC, 2012
Management of large enterprise and Internet service provider networks is a complex, error-prone, and costly challenge. It is widely accepted that the key contributors to this complexity are the bundling of control and data forwarding in traditional routers and the use of fully distributed protocols for network control. To address these…
Descriptors: Computer Networks, Centralization, Administration, Planning
Zhang, Guyu – ProQuest LLC, 2013
This dissertation presents a study of an Unmanned Ground Vehicle (UGV) navigation and coverage hole patching in coordinate-free and localization-free Wireless Sensor Networks (WSNs). Navigation and coverage maintenance are related problems since coverage hole patching requires effective navigation in the sensor network environment. A…
Descriptors: Engineering Technology, Transportation, Navigation (Information Systems), Computer Networks
Alsmirat, Mohammad Abdullah – ProQuest LLC, 2013
Video streaming has recently grown dramatically in popularity over the Internet, Cable TV, and wire-less networks. Because of the resource demanding nature of video streaming applications, maximizing resource utilization in any video streaming system is a key factor to increase the scalability and decrease the cost of the system. Resources to…
Descriptors: Video Technology, Internet, Equipment Utilization, Time
Yu, Chao – ProQuest LLC, 2013
In this thesis, we consider estimation, coding, and sensor scheduling for energy efficient operation of wireless visual sensor networks (VSN), which consist of battery-powered wireless sensors with sensing (imaging), computation, and communication capabilities. The competing requirements for applications of these wireless sensor networks (WSN)…
Descriptors: Engineering, Computer Networks, Networks, Electronic Equipment
Peer reviewed Peer reviewed
Direct linkDirect link
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Craig, Scotty D. – Advanced Distributed Learning Initiative, 2021
The dynamic and high-stakes nature of education and training requires reliance on evidence-based practices and policies to make decisions about technology adoption and implementation. In the report, "Science of Learning and Readiness (SoLaR) Recommendation Report: Science of Learning Practices for Distributed Online Environments"…
Descriptors: Science Education, Learning Readiness, Evidence Based Practice, Check Lists
Peer reviewed Peer reviewed
Direct linkDirect link
Ogbah, Enovwor Laura – International Journal of Information and Communication Technology Education, 2014
This study is an assessment of Information Provision Services of Libraries in the 21st century in some selected academic libraries in Delta State. A descriptive survey was adopted in carrying out the research. The questionnaire was the instrument for data collection of which 62 were retrieved. Based on the findings of the study, it was recommended…
Descriptors: Academic Libraries, Questionnaires, Foreign Countries, Librarians
Peer reviewed Peer reviewed
Direct linkDirect link
Kern, Cindy L.; Crippen, Kent J. – Journal of Science Education and Technology, 2017
Scientific inscriptions--graphs, diagrams, and data--and argumentation are integral to learning and communicating science and are common elements in cyberlearning environments--those involving the use of networked learning technologies. However, previous research has indicated that learners struggle to use inscriptions and when they engage in…
Descriptors: Scaffolding (Teaching Technique), Internet, Electronic Learning, Web Based Instruction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
VanderClock, William – Information Systems Education Journal, 2015
Most freshmen taking required, introductory information systems courses do not understand why they are required to take such courses and can't imagine that they will learn anything they don't already know. This paper presents an exercise that will excite and enthuse students about their computers and Information Systems in general. Every freshman…
Descriptors: College Freshmen, Computer Literacy, Information Systems, Technological Literacy
Xu, Yun – ProQuest LLC, 2013
Since information theory was developed by Claude E. Shannon, in addition to its primary role in communications and networking, it has broadened to find applications in many other areas of science and technology, such as microeconomics, statistics, and neuroscience. This thesis investigates the application of information theoretic viewpoints to two…
Descriptors: Microeconomics, Information Theory, Social Networks, Computer Networks
Avci, Serhat Nazim – ProQuest LLC, 2013
Link failures in wide area networks are common and cause significant data losses. Mesh-based protection schemes offer high capacity efficiency but they are slow, require complex signaling, and instable. Diversity coding is a proactive coding-based recovery technique which offers near-hitless (sub-ms) restoration with a competitive spare capacity…
Descriptors: Computer Networks, Failure, Coding, Database Management Systems
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Peacock, Christopher – ProQuest LLC, 2012
The purpose of this research effort was to develop a model that provides repeatable Location Management (LM) testing using a network simulation tool, QualNet version 5.1 (2011). The model will provide current and future protocol developers a framework to simulate stable protocol environments for development. This study used the Design Science…
Descriptors: Computer Networks, Telecommunications, Models, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Barbosa, Jorge Luis Victória; Barbosa, Débora Nice Ferrari; Rigo, Sandro José; de Oliveira, Jezer Machado; Rabello, Solon Andrade, Jr. – International Journal of Information and Communication Technology Education, 2014
The application of ubiquitous technologies in the improvement of education strategies is called Ubiquitous Learning. This article proposes the integration between two models dedicated to support ubiquitous learning environments, called Global and CoolEdu. CoolEdu is a generic collaboration model for decentralized environments. Global is an…
Descriptors: Educational Strategies, Educational Technology, Models, Educational Environment
Pages: 1  |  ...  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  ...  |  305