Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Algorithms | 7 |
Training Methods | 7 |
Instructional Design | 3 |
Problem Solving | 3 |
Flow Charts | 2 |
Teaching Methods | 2 |
Artificial Intelligence | 1 |
Audiovisual Aids | 1 |
Behavior Patterns | 1 |
Bibliographies | 1 |
Computation | 1 |
More ▼ |
Source
Education and Information… | 1 |
IEEE Transactions on Education | 1 |
Journal of Educational… | 1 |
NSPI Journal | 1 |
Author
Bliss, Leonard B. | 1 |
Braby, Richard | 1 |
Cantor, Jeffrey A. | 1 |
Chuan Xiao | 1 |
Huizhong Liu | 1 |
Jakub Rudolf Mlynárik | 1 |
Karolína Dockalová Burská | 1 |
Merrill, Paul F. | 1 |
Radek Ošlejšek | 1 |
Zengqing Wu | 1 |
Publication Type
Reports - Research | 7 |
Journal Articles | 4 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Researchers | 2 |
Location
Virgin Islands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Iowa Tests of Basic Skills | 1 |
What Works Clearinghouse Rating
Zengqing Wu; Huizhong Liu; Chuan Xiao – IEEE Transactions on Education, 2024
Contribution: This research illuminates information entropy's efficacy as a pivotal educational tool in programming, enabling the precise quantification of algorithmic complexity and student abstraction levels for solving problems. This approach can provide students quantitative, comparative insights into the differences between optimal and…
Descriptors: Information Theory, Student Evaluation, Thinking Skills, Algorithms
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods

Cantor, Jeffrey A. – Journal of Educational Technology Systems, 1988
Describes the Training Effectiveness Algorithm, a systematic procedure for identifying the cause of reported training problems which was developed for use in the U.S. Navy. A two-step review by subject matter experts is explained, and applications of the algorithm to other organizations and training systems are discussed. (Author/LRW)
Descriptors: Algorithms, Flow Charts, Formative Evaluation, Management Systems
Merrill, Paul F. – NSPI Journal, 1980
Describes ways in which algorithms which refer to underlying procedures should be represented in order to improve communication in educational and/or training materials. Representations of linear procedures, decision rule procedures, and complex procedures are provided. (MER)
Descriptors: Algorithms, Bibliographies, Decision Making Skills, Flow Charts
Mid-Continent Regional Educational Lab., Inc., Kansas City, MO. – 1985
In order to determine the extent to which the LOGO programming language can be used as a reinforcer for general problem solving ability, this field study used a production theory approach to problem solving as a conceptual model, and then translated the model into a LOGO oriented framework. The methodology tested the use of an algorithm in a…
Descriptors: Algorithms, Elementary Education, Field Tests, Problem Solving
Bliss, Leonard B. – 1981
The aim of this study was to show that the superiority of corrected-for-guessing scores over number right scores as true score estimates depends on the ability of examinees to recognize situations where they can eliminate one or more alternatives as incorrect and to omit items where they would only be guessing randomly. Previous investigations…
Descriptors: Algorithms, Guessing (Tests), Intermediate Grades, Multiple Choice Tests
Braby, Richard; And Others – 1975
The Training Effectiveness, Cost Effectiveness Technique for choosing instructional delivery systems for proposed training programs during conceptual design phase is outlined, in three steps. Training objectives are classified and organized into groups, appropriate learning strategies are identified, and the costs of alternative forms of training…
Descriptors: Algorithms, Audiovisual Aids, Cost Effectiveness, Delivery Systems