NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 436 to 450 of 4,561 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dawy, Z.; Husseini, A.; Yaacoub, E.; Al-Kanj, L. – IEEE Transactions on Education, 2010
The field of radio network planning and optimization (RNPO) is central for wireless cellular network design, deployment, and enhancement. Wireless cellular operators invest huge sums of capital on deploying, launching, and maintaining their networks in order to ensure competitive performance and high user satisfaction. This work presents a lab…
Descriptors: User Satisfaction (Information), Measurement Equipment, Radio, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Stokes, Alison; Collins, Trevor; Maskall, John; Lea, John; Lunt, Paul; Davies, Sarah – Journal of Geography in Higher Education, 2012
This study considers the pedagogical effectiveness of remote access to fieldwork locations. Forty-one students from across the GEES disciplines (geography, earth and environmental sciences) undertook a fieldwork exercise, supported by two lecturers. Twenty students accessed the field site directly and the remainder accessed the site remotely using…
Descriptors: Field Instruction, Student Attitudes, Computer Networks, Geography Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Sivakumar, Paramasivan Sethuraman; Parasar, Bibudha; Das, Raghu Nath; Anantharaman, Mathevanpillai – Journal of Agricultural Education and Extension, 2014
Purpose: Information technology (IT) has tremendous potential for fostering grassroots development and the Indian government has created various capital-intensive computer networks to promote agricultural development. However, research studies have shown that information technology investments are not always translated into productivity gains due…
Descriptors: Foreign Countries, Information Technology, Computer Networks, Agriculture
Peer reviewed Peer reviewed
Direct linkDirect link
Todhunter, Barrie – Distance Education, 2013
The thesis of this paper is that the open and distance education sector is based on a framework of terminology that is typologically inconsistent and which lacks clarity, and open and distance education teaching and learning models are examined to explore these concerns. The findings of this analysis are then used to assist in the articulation of…
Descriptors: Foreign Countries, Open Education, Blended Learning, Electronic Learning
Tusch, Erich G. – Education Digest: Essential Readings Condensed for Quick Review, 2012
In 2004, prior to the launch of their 1-to-1 laptop program, the superintendent expressed some anxiety about the prospect of radically changing teaching and learning by issuing a laptop computer to every student and teacher. Although the concept was exciting, it carried big risks and would take time and thorough planning to execute well. Even with…
Descriptors: Computer Networks, Educational Technology, Public Support, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Delialioglu, Omer – Educational Technology & Society, 2012
This study investigates how blending of different instructional approaches with technology affects students' engagement. A computer networks course was designed and implemented for the first eight weeks of the semester as a lecture-based blended learning environment and for the second eight weeks of the semester as a problem-based blended learning…
Descriptors: Learner Engagement, Educational Environment, Time on Task, Computer Networks
Tusch, Erich G. – School Administrator, 2012
The prospect of radically changing teaching and learning by issuing a laptop computer to every student and teacher is an exciting one, but it carried big risks and would take time and thorough planning to execute well. But even thorough planning can't prevent the unanticipated. In this article, the author counts six major surprises during his time…
Descriptors: Computer Uses in Education, Laptop Computers, Educational Technology, Teaching Methods
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Werner, Laurie A.; Frank, Charles E. – Information Systems Education Journal, 2010
Teaching a computer security course which includes network administration and protection software is especially challenging because textbook tools are out of date by the time the text is published. In an effort to use lab activities that work effectively, we turned to the internet. This paper describes several resources for teaching computer…
Descriptors: Information Security, Information Science Education, Video Technology, Computer Security
Nitinawarat, Sirin – ProQuest LLC, 2010
This dissertation deals with a multiterminal source model for secret key generation by multiple network terminals with prior and privileged access to a set of correlated signals complemented by public discussion among themselves. Emphasis is placed on a characterization of secret key capacity, i.e., the largest rate of an achievable secret key,…
Descriptors: Information Theory, Telecommunications, Mathematics, Computer Networks
Reyes Alamo, Jose M. – ProQuest LLC, 2010
The Service Oriented Computing (SOC) paradigm, defines services as software artifacts whose implementations are separated from their specifications. Application developers rely on services to simplify the design, reduce the development time and cost. Within the SOC paradigm, different Service Oriented Architectures (SOAs) have been developed.…
Descriptors: Models, Safety, Computer Software, Programming Languages
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Sekar, J. M. Arul; Rajendran, K. K. – Online Submission, 2010
Network technology provides access to various sources of information from across the world. Network technology allows the higher education system to bring the lab to the classroom, rather than making students move to separate classrooms when they need to use computers. It, therefore, saves cost and makes students more productive. Students and…
Descriptors: Computer Networks, Technology Uses in Education, Higher Education, Internet
Jarrett, Kevin; Devine, Mary Ann – Education Digest: Essential Readings Condensed for Quick Review, 2010
Student engagement--it's what every educator strives for. When a lesson includes showing a movie and involving students in a discussion about it, it's even harder to get--and keep--students engaged. What if there was a free, easy way to engage one's students during lessons like this, meeting them "where they live" with technology, effortlessly…
Descriptors: Feedback (Response), Elementary Secondary Education, Thinking Skills, Learner Engagement
Pages: 1  |  ...  |  26  |  27  |  28  |  29  |  30  |  31  |  32  |  33  |  34  |  ...  |  305