Publication Date
In 2025 | 2 |
Since 2024 | 9 |
Since 2021 (last 5 years) | 20 |
Since 2016 (last 10 years) | 41 |
Since 2006 (last 20 years) | 92 |
Descriptor
Identification | 124 |
Simulation | 88 |
Computer Simulation | 37 |
Models | 29 |
Comparative Analysis | 23 |
Test Items | 22 |
Item Response Theory | 18 |
Evaluation Methods | 17 |
Item Bias | 14 |
Statistical Analysis | 14 |
Cognitive Processes | 12 |
More ▼ |
Source
Author
Brewer, Neil | 3 |
Fletcher, Jack M. | 3 |
Stuebing, Karla K. | 3 |
Boccaccini, Marcus T. | 2 |
Cohen, Allan S. | 2 |
Francis, David J. | 2 |
Harry May | 2 |
Hong Zhang | 2 |
Meijer, Rob R. | 2 |
Miciak, Jeremy | 2 |
Miller, Timothy R. | 2 |
More ▼ |
Publication Type
Journal Articles | 124 |
Reports - Research | 74 |
Reports - Evaluative | 32 |
Reports - Descriptive | 14 |
Speeches/Meeting Papers | 6 |
Information Analyses | 2 |
Opinion Papers | 2 |
Guides - Classroom - Teacher | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 16 |
Postsecondary Education | 11 |
Adult Education | 2 |
High Schools | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 5 | 1 |
Grade 9 | 1 |
Primary Education | 1 |
Audience
Location
Florida | 1 |
Hungary (Budapest) | 1 |
Illinois | 1 |
Maryland | 1 |
Massachusetts | 1 |
Morocco | 1 |
New York | 1 |
South Africa | 1 |
Spain | 1 |
Taiwan | 1 |
United Kingdom (England) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Cognitive Assessment System | 1 |
Embedded Figures Test | 1 |
Wechsler Individual… | 1 |
Wechsler Intelligence Scale… | 1 |
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Baldassari, Mario J.; Moore, Kara N.; Hyman, Ira E., Jr.; Hope, Lorraine; Mah, Eric Y.; Lindsay, D. Stephen; Mansour, Jamal; Saraiva, Renan; Horry, Ruth; Rath, Hannah; Kelly, Lauren; Jones, Rosie; Vale, Shannan; Lawson, Bethany; Pedretti, Josh; Palma, Tomás A.; Cruz, Francisco; Quarenta, Joana; Van der Cruyssen, Ine; Mileva, Mila; Allen, Jessica; Jeye, Brittany; Wiechert, Sara – Cognitive Research: Principles and Implications, 2023
Research on eyewitness identification often involves exposing participants to a simulated crime and later testing memory using a lineup. We conducted a systematic review showing that pre-event instructions, instructions given before event exposure, are rarely reported and those that are reported vary in the extent to which they warn participants…
Descriptors: Memory, Audiences, Attention, Observation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Teague R. Henry; Zachary F. Fisher; Kenneth A. Bollen – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Model-Implied Instrumental Variable Two-Stage Least Squares (MIIV-2SLS) is a limited information, equation-by-equation, noniterative estimator for latent variable models. Associated with this estimator are equation-specific tests of model misspecification. One issue with equation-specific tests is that they lack specificity, in that they indicate…
Descriptors: Bayesian Statistics, Least Squares Statistics, Structural Equation Models, Equations (Mathematics)
Zsuzsa Bakk – Structural Equation Modeling: A Multidisciplinary Journal, 2024
A standard assumption of latent class (LC) analysis is conditional independence, that is the items of the LC are independent of the covariates given the LCs. Several approaches have been proposed for identifying violations of this assumption. The recently proposed likelihood ratio approach is compared to residual statistics (bivariate residuals…
Descriptors: Goodness of Fit, Error of Measurement, Comparative Analysis, Models
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Grantee Submission, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Saijun Zhao; Zhiyong Zhang; Hong Zhang – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Mediation analysis is widely applied in various fields of science, such as psychology, epidemiology, and sociology. In practice, many psychological and behavioral phenomena are dynamic, and the corresponding mediation effects are expected to change over time. However, most existing mediation methods assume a static mediation effect over time,…
Descriptors: Bayesian Statistics, Statistical Inference, Longitudinal Studies, Attribution Theory
Carly Oddleifson; Ishan N. Vengurlekar; Chloe Hendrix; Temma Levis; Ellen Anderson; Katie Eklund; Stephen Kilgus – School Mental Health, 2025
Schools have become a primary context for assessing and addressing social, emotional, and behavioral difficulties in response to the youth mental health crisis. However, traditional paper-based assessments are often hindered by time constraints and rater bias, limiting their effectiveness for early identification and intervention.…
Descriptors: Technology Uses in Education, Assistive Technology, Computer Simulation, Motion
Lim, Hwanggyu; Choe, Edison M.; Han, Kyung T. – Journal of Educational Measurement, 2022
Differential item functioning (DIF) of test items should be evaluated using practical methods that can produce accurate and useful results. Among a plethora of DIF detection techniques, we introduce the new "Residual DIF" (RDIF) framework, which stands out for its accessibility without sacrificing efficacy. This framework consists of…
Descriptors: Test Items, Item Response Theory, Identification, Robustness (Statistics)
Kellen, David; McAdoo, Ryan M. – Cognitive Research: Principles and Implications, 2022
Sequential lineups are one of the most commonly used procedures in police departments across the USA. Although this procedure has been the target of much experimental research, there has been comparatively little work formally modeling it, especially the sequential nature of the judgments that it elicits. There are also important gaps in our…
Descriptors: Guidelines, Comparative Analysis, Police, Law Enforcement
Aaron Y. Zhao; Joseph Collins; Joel B. Floyd Jr.; Xianming Tan; David S. Lawrence – Journal of Chemical Education, 2023
A variety of strategies have been introduced to tackle the issue of laboratory safety in academic settings. These strategies include innovative educational tools as students transition from the classroom into the laboratory, the introduction of policies designed to protect the researchers in the laboratory environment, and the creation of teams of…
Descriptors: Teamwork, Cooperative Learning, Chemistry, Science Laboratories
Max Kailler Smith; Amelia R. Kracinovich; Brandon J. Schrom; Timothy L. Dunn – Cognitive Research: Principles and Implications, 2025
As automation becomes increasingly integrated into complex military tasks, its role in supporting human performance under fatigue warrants careful evaluation. A specific military use case in which automatic target cuing (ATC) is integrated is undersea threat detection (UTD). These types of tasks demand sustained vigilance, accurate classification,…
Descriptors: Fatigue (Biology), Performance, Metacognition, Cues
Kucina, Talira; Sauer, James D.; Holt, Glenys A.; Brewer, Neil; Palmer, Matthew A. – Applied Cognitive Psychology, 2020
Presenting a blank line-up--containing only fillers--to witnesses prior to showing a real line-up might be useful for screening out those who pick from the blank line-up as unreliable witnesses. We show that the effectiveness of this procedure varies depending on instructions given to witnesses. Participants (N = 462) viewed a simulated crime and…
Descriptors: Recognition (Psychology), Simulation, Crime, Identification
Tracking the Identity of Moving Words: Stimulus Complexity and Familiarity Affects Tracking Accuracy
Hyönä, Jukka; Oksama, Lauri; Rantanen, Esa – Applied Cognitive Psychology, 2020
In two experiments, participants tracked the identity and location of moving words. The task bears resemblance to one performed by air traffic controllers who track multiple moving aircraft, where they are identified with relatively complex alphanumeric call signs. In Experiment 1, stimulus familiarity was manipulated by comparing the tracking of…
Descriptors: Identification, Word Recognition, Eye Movements, Air Transportation
Cheng, Ying; Shao, Can – Educational and Psychological Measurement, 2022
Computer-based and web-based testing have become increasingly popular in recent years. Their popularity has dramatically expanded the availability of response time data. Compared to the conventional item response data that are often dichotomous or polytomous, response time has the advantage of being continuous and can be collected in an…
Descriptors: Reaction Time, Test Wiseness, Computer Assisted Testing, Simulation