NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Joel S. Steele; Kevin J. Grimm – Structural Equation Modeling: A Multidisciplinary Journal, 2024
Structural Equation Modeling (SEM) continues to grow in popularity with numerous articles, books, courses, and workshops available to help researchers become proficient with SEM quickly. However, few resources are available to help users gain a deep understanding of the analytic steps involved in SEM, with even fewer providing reproducible syntax…
Descriptors: Structural Equation Models, Programming, Orthographic Symbols, Syntax
Peer reviewed Peer reviewed
Direct linkDirect link
Bagley, James R.; Galpin, Andrew J. – Biochemistry and Molecular Biology Education, 2015
Interdisciplinary exploration is vital to education in the 21st century. This manuscript outlines an innovative laboratory-based teaching method that combines elements of biochemistry/molecular biology, kinesiology/health science, computer science, and manufacturing engineering to give students the ability to better conceptualize complex…
Descriptors: Human Body, Cytology, Interdisciplinary Approach, Visual Aids
Mozelius, Peter; Hettiarachchi, Enosha – European Journal of Open, Distance and E-Learning, 2012
This paper describes the iterative development process of a Learning Object Repository (LOR), named eNOSHA. Discussions on a project for a LOR started at the e-Learning Centre (eLC) at The University of Colombo, School of Computing (UCSC) in 2007. The eLC has during the last decade been developing learning content for a nationwide e-learning…
Descriptors: Foreign Countries, Integrated Learning Systems, Resource Units, Instructional Design
Peer reviewed Peer reviewed
Direct linkDirect link
Shumba, Rose – Journal on Educational Resources in Computing, 2006
In the summer of 2003, a project to augment and improve the teaching of information assurance courses was started at IUP. Thus far, ten hands-on exercises have been developed. The exercises described in this article, and presented in the appendix, are based on actions required to secure a Linux host. Publicly available resources were used to…
Descriptors: Computer Security, Experiential Learning, Computer Software, Open Source Technology