NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 391 to 405 of 4,568 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Tech Directions, 2011
One of the hottest areas in technology is invisible. Wireless communications allow people to transmit voice messages, data, and other signals through the air without physically connecting senders to receivers with cables or wires. And the technology is spreading at lightning speed. Cellular phones, personal digital assistants, and wireless…
Descriptors: Internet, Telecommunications, Skill Analysis, Job Skills
Tran, Dung Trung – ProQuest LLC, 2010
The recent evolution of wireless technology makes wireless devices ever more powerful and intelligent. One trend is that wireless devices are becoming more inexpensive and more diverse. As a result, new technologies make it possible to equip wireless nodes with several radio transmitters/receivers. Each radio may support multiple channels which…
Descriptors: Game Theory, Energy Conservation, Interests, Topology
Du, Ye – ProQuest LLC, 2010
This dissertation examines the economic value of online storage resources that could be traded and shared as potential commodities and the consequential investments and deployment of such resources. The value proposition of emergent business models such as Akamai and Amazon S3 in online storage grids is capacity provision and content delivery at…
Descriptors: Resources, Administration, Information Storage, Risk Management
Yang, Yinying – ProQuest LLC, 2010
Sensors are used to monitor and control the physical environment. A Wireless Sensor Network (WSN) is composed of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it [18][5]. Sensor nodes measure various parameters of the environment and transmit data collected to one or more sinks, using…
Descriptors: Energy Conservation, Physical Environment, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Rienzo, Thomas F.; Athappilly, Kuriakose K. – Decision Sciences Journal of Innovative Education, 2012
Business students taking data mining classes are often introduced to artificial neural networks (ANN) through point and click navigation exercises in application software. Even if correct outcomes are obtained, students frequently do not obtain a thorough understanding of ANN processes. This spreadsheet model was created to illuminate the roles of…
Descriptors: Spreadsheets, Artificial Intelligence, Teaching Methods, Educational Practices
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jou, Min; Shiau, Jaw-Kuen – Turkish Online Journal of Educational Technology - TOJET, 2012
One obstacle to industrial technology education is that the difficulties or problems students encounter during experiments are not easy to detect. Students are often unaware of their flaws, and some will not notify the teacher of these flaws even if they are aware of them. Consequently, many opportunities to rectify these flaws and improve…
Descriptors: Computer Uses in Education, Reflection, Technology Education, Electronic Learning
Ohler, Jason – Education Digest: Essential Readings Condensed for Quick Review, 2012
The reality of students' cyber lives has thrust upon educators a new approach: creating character education programs tuned to digital youth that are proactive and aggressive. This will help integrate students' digital activities within the context of the communities in which they live, both local and digital. The digital age beckons a new era of…
Descriptors: Virtual Classrooms, Caring, Ethics, Personality
Peer reviewed Peer reviewed
Direct linkDirect link
Hamblen, J. O.; van Bekkum, G. M. E. – IEEE Transactions on Education, 2013
This paper describes a new approach for a course and laboratory designed to allow students to develop low-cost prototypes of robotic and other embedded devices that feature Internet connectivity, I/O, networking, a real-time operating system (RTOS), and object-oriented C/C++. The application programming interface (API) libraries provided permit…
Descriptors: Robotics, Engineering Education, Computer Science Education, Internet
Lampi, Evans – ProQuest LLC, 2013
The effectiveness of using virtual labs to train students in computer networking skills, when real equipment is limited or unavailable, is uncertain. The purpose of this study was to determine the effectiveness of using virtual labs to train students in the acquisition of computer network configuration and troubleshooting skills. The study was…
Descriptors: Foreign Countries, Simulated Environment, Computer Simulation, Teaching Methods
Dutt, Abhijit – ProQuest LLC, 2013
Improvements in Information Technology (IT) infrastructure and standardization of interoperability standards among heterogeneous Information System (IS) applications have brought a paradigm shift in the way an IS application could be used and delivered. Not only an IS application can be built using standardized component but also parts of it can…
Descriptors: Essays, Economic Factors, Information Technology, Technology Integration
Hayajneh, Thaier Saleh – ProQuest LLC, 2009
Wireless ad hoc networks are suitable and sometimes the only solution for several applications. Many applications, particularly those in military and critical civilian domains (such as battlefield surveillance and emergency rescue) require that ad hoc networks be secure and stable. In fact, security is one of the main barriers to the extensive use…
Descriptors: Computer Networks, Telecommunications, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Valdés Aguirre, Benjamín; Ramírez Uresti, Jorge A.; du Boulay, Benedict – International Journal of Artificial Intelligence in Education, 2016
Sharing user information between systems is an area of interest for every field involving personalization. Recommender Systems are more advanced in this aspect than Intelligent Tutoring Systems (ITSs) and Intelligent Learning Environments (ILEs). A reason for this is that the user models of Intelligent Tutoring Systems and Intelligent Learning…
Descriptors: Intelligent Tutoring Systems, Models, Open Source Technology, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Peer reviewed Peer reviewed
Direct linkDirect link
Xu, Le; Huang, Dijiang; Tsai, Wei-Tek – IEEE Transactions on Education, 2014
Hands-on experiments are essential for computer network security education. Existing laboratory solutions usually require significant effort to build, configure, and maintain and often do not support reconfigurability, flexibility, and scalability. This paper presents a cloud-based virtual laboratory education platform called V-Lab that provides a…
Descriptors: Computer Networks, Computer Security, Educational Technology, Technology Uses in Education
Pages: 1  |  ...  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  ...  |  305