Publication Date
In 2025 | 1 |
Since 2024 | 9 |
Since 2021 (last 5 years) | 22 |
Since 2016 (last 10 years) | 50 |
Since 2006 (last 20 years) | 112 |
Descriptor
Identification | 112 |
Simulation | 79 |
Computer Simulation | 34 |
Models | 28 |
Comparative Analysis | 19 |
Evaluation Methods | 16 |
Statistical Analysis | 15 |
Computation | 12 |
Decision Making | 12 |
Cognitive Processes | 11 |
Teaching Methods | 11 |
More ▼ |
Source
Author
Brewer, Neil | 3 |
Fletcher, Jack M. | 3 |
Stuebing, Karla K. | 3 |
Boccaccini, Marcus T. | 2 |
Francis, David J. | 2 |
Harry May | 2 |
Hong Zhang | 2 |
Miciak, Jeremy | 2 |
Saijun Zhao | 2 |
Schlauch, Robert S. | 2 |
Sinharay, Sandip | 2 |
More ▼ |
Publication Type
Education Level
Audience
Location
Florida | 2 |
Morocco | 2 |
Ohio | 2 |
Spain | 2 |
Turkey | 2 |
United Kingdom (England) | 2 |
Albania | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Colombia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Cognitive Assessment System | 1 |
Embedded Figures Test | 1 |
Wechsler Individual… | 1 |
Wechsler Intelligence Scale… | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Baldassari, Mario J.; Moore, Kara N.; Hyman, Ira E., Jr.; Hope, Lorraine; Mah, Eric Y.; Lindsay, D. Stephen; Mansour, Jamal; Saraiva, Renan; Horry, Ruth; Rath, Hannah; Kelly, Lauren; Jones, Rosie; Vale, Shannan; Lawson, Bethany; Pedretti, Josh; Palma, Tomás A.; Cruz, Francisco; Quarenta, Joana; Van der Cruyssen, Ine; Mileva, Mila; Allen, Jessica; Jeye, Brittany; Wiechert, Sara – Cognitive Research: Principles and Implications, 2023
Research on eyewitness identification often involves exposing participants to a simulated crime and later testing memory using a lineup. We conducted a systematic review showing that pre-event instructions, instructions given before event exposure, are rarely reported and those that are reported vary in the extent to which they warn participants…
Descriptors: Memory, Audiences, Attention, Observation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Sarker Monojit Asish – ProQuest LLC, 2023
Virtual Reality (VR) has been found useful to improve engagement and retention level of students, for some topics, compared to traditional learning tools such as books, and videos. However, a student could still get distracted and disengaged due to a variety of factors including stress, mind-wandering, unwanted noise, external alerts, and internal…
Descriptors: Students, Attention Control, Computer Simulation, Artificial Intelligence
Teague R. Henry; Zachary F. Fisher; Kenneth A. Bollen – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Model-Implied Instrumental Variable Two-Stage Least Squares (MIIV-2SLS) is a limited information, equation-by-equation, noniterative estimator for latent variable models. Associated with this estimator are equation-specific tests of model misspecification. One issue with equation-specific tests is that they lack specificity, in that they indicate…
Descriptors: Bayesian Statistics, Least Squares Statistics, Structural Equation Models, Equations (Mathematics)
Zsuzsa Bakk – Structural Equation Modeling: A Multidisciplinary Journal, 2024
A standard assumption of latent class (LC) analysis is conditional independence, that is the items of the LC are independent of the covariates given the LCs. Several approaches have been proposed for identifying violations of this assumption. The recently proposed likelihood ratio approach is compared to residual statistics (bivariate residuals…
Descriptors: Goodness of Fit, Error of Measurement, Comparative Analysis, Models
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Grantee Submission, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Lim, Hwanggyu; Choe, Edison M.; Han, Kyung T. – Journal of Educational Measurement, 2022
Differential item functioning (DIF) of test items should be evaluated using practical methods that can produce accurate and useful results. Among a plethora of DIF detection techniques, we introduce the new "Residual DIF" (RDIF) framework, which stands out for its accessibility without sacrificing efficacy. This framework consists of…
Descriptors: Test Items, Item Response Theory, Identification, Robustness (Statistics)
Ruoxuan Li; Lijuan Wang – Grantee Submission, 2024
Causal-formative indicators are often used in social science research. To achieve identification in causal-formative indicator modeling, constraints need to be applied. A conventional method is to constrain the weight of a formative indicator to be 1. The selection of which indicator to have the fixed weight, however, may influence statistical…
Descriptors: Social Science Research, Causal Models, Formative Evaluation, Measurement
Kellen, David; McAdoo, Ryan M. – Cognitive Research: Principles and Implications, 2022
Sequential lineups are one of the most commonly used procedures in police departments across the USA. Although this procedure has been the target of much experimental research, there has been comparatively little work formally modeling it, especially the sequential nature of the judgments that it elicits. There are also important gaps in our…
Descriptors: Guidelines, Comparative Analysis, Police, Law Enforcement
Aaron Y. Zhao; Joseph Collins; Joel B. Floyd Jr.; Xianming Tan; David S. Lawrence – Journal of Chemical Education, 2023
A variety of strategies have been introduced to tackle the issue of laboratory safety in academic settings. These strategies include innovative educational tools as students transition from the classroom into the laboratory, the introduction of policies designed to protect the researchers in the laboratory environment, and the creation of teams of…
Descriptors: Teamwork, Cooperative Learning, Chemistry, Science Laboratories
Max Kailler Smith; Amelia R. Kracinovich; Brandon J. Schrom; Timothy L. Dunn – Cognitive Research: Principles and Implications, 2025
As automation becomes increasingly integrated into complex military tasks, its role in supporting human performance under fatigue warrants careful evaluation. A specific military use case in which automatic target cuing (ATC) is integrated is undersea threat detection (UTD). These types of tasks demand sustained vigilance, accurate classification,…
Descriptors: Fatigue (Biology), Performance, Metacognition, Cues
Kucina, Talira; Sauer, James D.; Holt, Glenys A.; Brewer, Neil; Palmer, Matthew A. – Applied Cognitive Psychology, 2020
Presenting a blank line-up--containing only fillers--to witnesses prior to showing a real line-up might be useful for screening out those who pick from the blank line-up as unreliable witnesses. We show that the effectiveness of this procedure varies depending on instructions given to witnesses. Participants (N = 462) viewed a simulated crime and…
Descriptors: Recognition (Psychology), Simulation, Crime, Identification
Tracking the Identity of Moving Words: Stimulus Complexity and Familiarity Affects Tracking Accuracy
Hyönä, Jukka; Oksama, Lauri; Rantanen, Esa – Applied Cognitive Psychology, 2020
In two experiments, participants tracked the identity and location of moving words. The task bears resemblance to one performed by air traffic controllers who track multiple moving aircraft, where they are identified with relatively complex alphanumeric call signs. In Experiment 1, stimulus familiarity was manipulated by comparing the tracking of…
Descriptors: Identification, Word Recognition, Eye Movements, Air Transportation