NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 622 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Seitidis, Georgios; Tsokani, Sofia; Christogiannis, Christos; Kontouli, Katerina-Maria; Fyraridis, Alexandros; Nikolakopoulos, Stavros; Veroniki, Areti Angeliki; Mavridis, Dimitris – Research Synthesis Methods, 2023
Network meta-analysis (NMA) is an established method for assessing the comparative efficacy and safety of competing interventions. It is often the case that we deal with interventions that consist of multiple, possibly interacting, components. Examples of interventions' components include characteristics of the intervention, mode (face-to-face,…
Descriptors: Networks, Network Analysis, Meta Analysis, Intervention
Peer reviewed Peer reviewed
Direct linkDirect link
Hanqiang Liu; Xiao Chen; Feng Zhao – Education and Information Technologies, 2024
Massive open online courses (MOOCs) have become one of the most popular ways of learning in recent years due to their flexibility and convenience. However, high dropout rate has become a prominent problem that hinders the further development of MOOCs. Therefore, the prediction of student dropouts is the key to further enhance the MOOCs platform.…
Descriptors: MOOCs, Video Technology, Behavior Patterns, Prediction
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Meara; Imma Miralpeix – Vocabulary Learning and Instruction, 2024
This paper is part 4 in a series of workshops that examine the properties of some simple models of vocabulary networks. This Workshop explores how the overall activity level of a vocabulary network can be altered by changing the connections in the network (i.e., by implementing relinking events). The Workshop is linked to an online practice room…
Descriptors: Vocabulary Development, Models, Simulation, Workshops
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Cheng; Butts, Carter T.; Hipp, John; Lakon, Cynthia M. – Sociological Methods & Research, 2022
The recent popularity of models that capture the dynamic coevolution of both network structure and behavior has driven the need for summary indices to assess the adequacy of these models to reproduce dynamic properties of scientific or practical importance. Whereas there are several existing indices for assessing the ability of the model to…
Descriptors: Models, Goodness of Fit, Comparative Analysis, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Koster, Jeremy; Leckie, George; Aven, Brandy – Field Methods, 2020
The multilevel social relations model (SRM) is a commonly used statistical method for the analysis of social networks. In this article and accompanying supplemental materials, we demonstrate the estimation and interpretation of the SRM using Stat-JR software. Multiple software templates permit the analysis of different response types, including…
Descriptors: Statistical Analysis, Computer Software, Hierarchical Linear Modeling, Social Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marcel R. Haas; Colin Caprani; Benji T. van Beurden – Journal of Learning Analytics, 2023
We present an innovative modelling technique that simultaneously constrains student performance, course difficulty, and the sensitivity with which a course can differentiate between students by means of grades. Grade lists are the only necessary ingredient. Networks of courses will be constructed where the edges are populations of students that…
Descriptors: Bayesian Statistics, Computer Software, Learning Analytics, Grades (Scholastic)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Meara; Imma Miralpeix – Vocabulary Learning and Instruction, 2022
The idea that a vocabulary is a network of words is one that has become a common theme of the second language (L2) vocabulary research literature. However, not many people have considered the wider implications of this powerful metaphor. This paper is the first in a series of workshops that examines some of these implications. In this first…
Descriptors: Second Language Learning, Vocabulary Development, Workshops, Models
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Meara; Imma Miralpeix – Vocabulary Learning and Instruction, 2025
This paper is part 5 of a series of workshops that examines the properties of some simple models of vocabulary networks. While previous workshops dealt with activating words in the network, this workshop focuses on vocabulary loss. We will simulate two possible ways of modelling attrition: (a) explicitly turning active words OFF, and (b) raising…
Descriptors: Vocabulary Development, Workshops, Models, Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Mukherjee, Kuntal; Maurya, Sudhanshu; Mandal, Ranjan Kumar; Thakur, Mukul; Khatoon, Farzana – International Journal of Web-Based Learning and Teaching Technologies, 2022
The cutting-edge technology, namely Cloud of Things (CoT) has shaped the existing business process into a new orientation in terms of performance, usability, and reliability. Among different business processes, online education is one of the prime areas where CoT can be used to make it more agile in the context of performance and usability. In…
Descriptors: Internet, Computer Software, Information Management, Information Storage
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Paul Meara; Imma Miralpeix – Vocabulary Learning and Instruction, 2023
This paper is part 3 of a series of workshops that examine the properties of some simple models vocabulary networks. This Workshop focusses on how the vocabulary network responds when words become easier to activate. The Workshop is linked to an on-line practice room where readers can explore these processes for themselves.
Descriptors: Vocabulary Development, Psycholinguistics, Language Processing, Workshops
Peer reviewed Peer reviewed
Direct linkDirect link
Eva A. Alfoldi – Journal of Education for Business, 2024
In the COVID-19 era, "Yellowdig" (an online discussion board with social media-like features) has increasingly risen to prominence in higher education. Reflecting on a multi-year experiment involving 14 international business and marketing courses, I argue that Yellowdig remains a valuable tool for learning even after returning to…
Descriptors: Learner Engagement, Interpersonal Relationship, Discussion Groups, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Frydenberg, Mark – Information Systems Education Journal, 2023
The Internet of Things (IoT) is a network of objects that can exchange data with other devices also connected to the Internet. One of the most common consumer examples of IoT is home automation, as a variety of smart devices, including doorbells, lightbulbs, thermostats, and refrigerators are now available which users can control remotely using…
Descriptors: Internet, Computer Software, Automation, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Dolowitz, Annetta; Collier, Jessica; Hayes, Aleshia; Kumsal, Cem – TechTrends: Linking Research and Practice to Improve Learning, 2023
This case study details microlearning content development, testing, and implementation of the NATO Headquarters Supreme Allied Command Transformation (HQ SACT) e-Learning Networking App (NeNA) conducted by an AECT microlearning consulting team. NeNA was designed to provide microlearning "just-in-time" content, to create socialization…
Descriptors: Case Studies, Computer Software, Armed Forces, International Organizations
Peer reviewed Peer reviewed
Direct linkDirect link
Huse, Collin; Brusco, Michael J. – INFORMS Transactions on Education, 2021
Problems associated with time-cost trade-offs in project networks, which are commonly referred to as crashing problems, date back nearly 60 years. Many prominent management science textbooks provide a traditional linear programming (LP) formulation for a classic project crashing problem, in which the time-cost trade-off for each activity is…
Descriptors: Programming, Computer Science Education, Decision Making, Time Management
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  42