NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 32 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jehanzeb Rashid Cheema – Journal of Education in Muslim Societies, 2024
This study explores the relationship between the Spiral Dynamics and the 3H (head, heart, hands) models of human growth and development, using constructs such as empathy, moral reasoning, forgiveness, and community mindedness that have been shown to have implications for education. The specific research question is, "Can a combination of…
Descriptors: Correlation, Factor Analysis, Computer Software, Moral Values
Peer reviewed Peer reviewed
Direct linkDirect link
Shaheen, Muhammad – Interactive Learning Environments, 2023
Outcome-based education (OBE) is uniquely adapted by most of the educators across the world for objective processing, evaluation and assessment of computing programs and its students. However, the extraction of knowledge from OBE in common is a challenging task because of the scattered nature of the data obtained through Program Educational…
Descriptors: Undergraduate Students, Programming, Computer Science Education, Educational Objectives
Liceralde, Van Rynald T. – ProQuest LLC, 2021
When we read, errors in oculomotor programming can cause the eyes to land and fixate on different words from what the mind intended. Previous work suggests that these "mislocated fixations" form 10-30% of first-pass fixations in reading eye movement data, which presents theoretical and analytic issues for eyetracking-while-reading…
Descriptors: Eye Movements, Reading Processes, Error Patterns, Psychomotor Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Saatcioglu, Fatima Munevver; Atar, Hakan Yavuz – International Journal of Assessment Tools in Education, 2022
This study aims to examine the effects of mixture item response theory (IRT) models on item parameter estimation and classification accuracy under different conditions. The manipulated variables of the simulation study are set as mixture IRT models (Rasch, 2PL, 3PL); sample size (600, 1000); the number of items (10, 30); the number of latent…
Descriptors: Accuracy, Classification, Item Response Theory, Programming Languages
Peer reviewed Peer reviewed
Direct linkDirect link
Gao, Ming; Zhang, Jingjing; Lu, Yu; Kahn, Ken; Winters, Niall – Journal of Computer Assisted Learning, 2023
Background: As a non-cognitive trait, grit plays an important role in human learning. Although students higher in grit are more likely to perform well on tests, how they learn in the process has been underexamined. Objectives: This study attempted to explore how students with different levels of grit behave and learn in an exploratory learning…
Descriptors: Resilience (Psychology), Academic Persistence, Personality Traits, Usability
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Romadiah, Hikmah; Dayurni, Popi; Fajari, Laksmi Evasufi Widi – Online Submission, 2022
This research is motivated by the increasing number of users of android-based learning media it impacts the learning outcomes obtained. This study aims to determine the effect of android-based learning media on improving student learning outcomes. This research is a meta-analysis study. Data collection techniques are taken from indexing databases…
Descriptors: Meta Analysis, Handheld Devices, Telecommunications, Computer Assisted Instruction
Peer reviewed Peer reviewed
Direct linkDirect link
Chung, Seungwon; Houts, Carrie – Measurement: Interdisciplinary Research and Perspectives, 2020
Advanced modeling of item response data through the item response theory (IRT) or item factor analysis frameworks is becoming increasingly popular. In the social and behavioral sciences, the underlying structure of tests/assessments is often multidimensional (i.e., more than 1 latent variable/construct is represented in the items). This review…
Descriptors: Item Response Theory, Evaluation Methods, Models, Factor Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
McCall, Davin; Kölling, Michael – ACM Transactions on Computing Education, 2019
The types of programming errors that novice programmers make and struggle to resolve have long been of interest to researchers. Various past studies have analyzed the frequency of compiler diagnostic messages. This information, however, does not have a direct correlation to the types of errors students make, due to the inaccuracy and imprecision…
Descriptors: Computer Software, Programming, Error Patterns, Novices
Peer reviewed Peer reviewed
Direct linkDirect link
Raj, Gaurav; Mahajan, Manish; Singh, Dheerendra – International Journal of Web-Based Learning and Teaching Technologies, 2020
In secure web application development, the role of web services will not continue if it is not trustworthy. Retaining customers with applications is one of the major challenges if the services are not reliable and trustworthy. This article proposes a trust evaluation and decision model where the authors have defined indirect attribute, trust,…
Descriptors: Trust (Psychology), Models, Decision Making, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
D'Mello, Sidney K.; Southwell, Rosy; Gregg, Julie – Discourse Processes: A Multidisciplinary Journal, 2020
We propose that machine-learned computational models (MLCMs), in which the model parameters and perhaps even structure are learned from data, can complement extant approaches to the study of text and discourse. Such models are particularly useful when theoretical understanding is insufficient, when the data are rife with nonlinearities and…
Descriptors: Discourse Analysis, Computer Software, Intervention, Computational Linguistics
Peer reviewed Peer reviewed
Direct linkDirect link
Sidou, Lais Feltrin; Borges, Endler Marcel – Journal of Chemical Education, 2020
Principal component analysis (PCA) is one of the most important and powerful methods in chemometrics as well as in a wealth of other areas. Running a PCA results in two main elements, the score plot and the loading plot; the score plot provides the location of the samples, and the loading plot indicates correlations among variables, the trends in…
Descriptors: Factor Analysis, Chemistry, Science Instruction, Teaching Methods
Peer reviewed Peer reviewed
Direct linkDirect link
Gelsomini, Federico; Kanev, Kamen; Barneva, Reneta P.; Walters, Lisa – Journal of Educational Technology Systems, 2020
Memorization is essential when new knowledge is based on association with existing knowledge. It is key in acquiring logographic languages, such as Chinese and Japanese. Such languages present challenges to students possessed of alphabet-based mother tongues. To meet these challenges, we discuss a technology-enhanced learning method to address the…
Descriptors: Second Language Learning, Second Language Instruction, Orthographic Symbols, Memorization
Peer reviewed Peer reviewed
Direct linkDirect link
Al-Samarraie, Hosam; Ahmad, Yusof – Journal of Educational Computing Research, 2016
User interface (UI) design patterns for mobile applications provide a solution to design problems and can improve the usage experience for users. However, there is a lack of research categorizing the uses of design patterns according to users' hand dominance in a learning-based mobile UI. We classified the main design patterns for mobile…
Descriptors: Handedness, Questionnaires, Multivariate Analysis, Profiles
Peer reviewed Peer reviewed
Direct linkDirect link
Pizard, Sebastián; Vallespir, Diego – European Journal of Engineering Education, 2017
Software engineering is the discipline that develops all the aspects of the production of software. Although there are guidelines about what topics to include in a software engineering curricula, it is usually unclear which are the best methods to teach them. In any science discipline the construction of a classification schema is a common…
Descriptors: Computer Science Education, Computer Software, Engineering Education, Taxonomy
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Previous Page | Next Page »
Pages: 1  |  2  |  3