Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Networks | 4 |
| Computer Security | 4 |
| Clinical Diagnosis | 2 |
| Computer Science | 2 |
| Computers | 2 |
| Data Processing | 2 |
| Databases | 2 |
| Genetics | 2 |
| Information Technology | 2 |
| Internet | 2 |
| Mathematics | 2 |
| More ▼ | |
Source
| Online Submission | 4 |
Author
| Dixit, R. K. | 2 |
| Durkin, Sarah S. | 1 |
| Fees, Rachel E. | 1 |
| Liu, Shijie | 1 |
| Moran, Angela L. | 1 |
| Murray, Mark M. | 1 |
| Ren, Zhanying | 1 |
| da Rosa, Jennifer A. | 1 |
Publication Type
| Collected Works - Serial | 2 |
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fees, Rachel E.; da Rosa, Jennifer A.; Durkin, Sarah S.; Murray, Mark M.; Moran, Angela L. – Online Submission, 2018
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to…
Descriptors: Computer Science Education, STEM Education, Computer Security, Experiential Learning
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks


