Publication Date
In 2025 | 1 |
Since 2024 | 21 |
Descriptor
Source
Author
Alana Hoare | 1 |
Allison S. Theobold | 1 |
Andrew Pilsch | 1 |
Brenda Mak | 1 |
Catharine Dishke Hondzel | 1 |
Cindy Wells | 1 |
David DeLiema | 1 |
David P. Bunde | 1 |
Eileen M. Glavey | 1 |
Elizabeth Bogumil | 1 |
Hanli Geyser | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 21 |
Journal Articles | 20 |
Books | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Elementary Education | 2 |
Grade 10 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Grade 7 | 1 |
Grade 8 | 1 |
Grade 9 | 1 |
High Schools | 1 |
Intermediate Grades | 1 |
More ▼ |
Audience
Teachers | 4 |
Researchers | 1 |
Location
Pennsylvania | 1 |
Texas | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Victoria Reyes; Elizabeth Bogumil; Levin Elias Welch – Sociological Methods & Research, 2024
Transparency is once again a central issue of debate across types of qualitative research. Work on how to conduct qualitative data analysis, on the other hand, walks us through the step-by-step process on how to code and understand the data we've collected. Although there are a few exceptions, less focus is on transparency regarding…
Descriptors: Qualitative Research, Data Analysis, Guides, Databases
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Stephanie J. Gardiner-Walsh; Karla Giese – Journal of Deaf Studies and Deaf Education, 2024
Cued Speech is a system that manually codes the phonemic patterns of spoken languages for visual accessibility. Since its inception, this system has transitioned from a support for speech reading to the current use of home language and literacy development. While controversial in some sectors within the field of Deaf education and the Deaf…
Descriptors: Native Language, Cued Speech, Literacy, Deafness
Oscar Karnalim; Hapnes Toba; Meliana Christianti Johan – Education and Information Technologies, 2024
Artificial Intelligence (AI) can foster education but can also be misused to breach academic integrity. Large language models like ChatGPT are able to generate solutions for individual assessments that are expected to be completed independently. There are a number of automated detectors for AI assisted work. However, most of them are not dedicated…
Descriptors: Artificial Intelligence, Academic Achievement, Integrity, Introductory Courses
Representing DNA for Machine Learning Algorithms: A Primer on One-Hot, Binary, and Integer Encodings
Yash Munnalal Gupta; Satwika Nindya Kirana; Somjit Homchan – Biochemistry and Molecular Biology Education, 2025
This short paper presents an educational approach to teaching three popular methods for encoding DNA sequences: one-hot encoding, binary encoding, and integer encoding. Aimed at bioinformatics and computational biology students, our learning intervention focuses on developing practical skills in implementing these essential techniques for…
Descriptors: Science Instruction, Teaching Methods, Genetics, Molecular Biology
Martina Blecic – Journal of Biological Education, 2024
In this paper I suggest a pragmatic model for the notion of 'information' used in molecular biology in the description of protein synthesis. Discarding any ontological commitments of the term 'information', I propose a view of information based on an analogy with communication. This view could at least supplement the existing information-metaphor…
Descriptors: Genetics, Molecular Biology, Figurative Language, Communication (Thought Transfer)
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Sarah Hensley; Janet Fox; Missy Cummins; Meggan Franks; Marianne Bird; Cindy Wells; JoLynn Miller – Journal of Extension, 2024
Cooperative Extension professionals utilize proven qualitative techniques to collect and analyze information to make data-driven decisions that guide program direction and determine impact. While the process may not always look the same, it is indeed essential to ensure findings are credible and reflective of the data. A codebook is a valuable…
Descriptors: Youth Clubs, Nonprofit Organizations, Extension Education, Data Use
Mark Johnson; Rafiq Saleh – Interactive Learning Environments, 2024
Educational assessment is inherently uncertain, where physiological, psychological and social factors play an important role in establishing judgements which are assumed to be "absolute". AI and other algorithmic approaches to grading of student work strip-out uncertainty, leading to a lack of inspectability in machine judgement and…
Descriptors: Artificial Intelligence, Evaluation Methods, Technology Uses in Education, Man Machine Systems
Alana Hoare; Shannon Wagner; Catharine Dishke Hondzel – Educational Planning, 2024
Post-secondary institutions are required to complete a variety of quality assurance activities including external program review, a process of inviting external reviewers from outside the institution to provide constructive feedback on all aspects of an academic program. While external program reviews have been completed for decades, there has…
Descriptors: Educational Planning, Program Evaluation, Educational Quality, Quality Assurance
W. Paige Hall; Kevin Cantrell – Journal of Chemical Education, 2024
Human-driven carbon emissions have resulted in increased levels of dissolved carbon dioxide in the Earth's oceans. This dissolved carbon dioxide reacts with water to form carbonic acid, which impacts ocean acidity as well as the solubility of carbonate-containing compounds, with far-reaching impacts on marine ecosystems and the human communities…
Descriptors: Programming Languages, Computer Science Education, Chemistry, Marine Biology
Allison S. Theobold; Megan H. Wickstrom; Stacey A. Hancock – Journal of Statistics and Data Science Education, 2024
Despite the elevated importance of Data Science in Statistics, there exists limited research investigating how students learn the computing concepts and skills necessary for carrying out data science tasks. Computer Science educators have investigated how students debug their own code and how students reason through foreign code. While these…
Descriptors: Computer Science Education, Coding, Data Science, Statistics Education
Previous Page | Next Page ยป
Pages: 1 | 2