Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Electronic Learning | 3 |
Probability | 3 |
Statistical Inference | 3 |
Foreign Countries | 2 |
Bayesian Statistics | 1 |
Behavior Patterns | 1 |
COVID-19 | 1 |
Computer Security | 1 |
Constructivism (Learning) | 1 |
Control Groups | 1 |
Data Processing | 1 |
More ▼ |
Author
Beckmann, Nadin | 1 |
Cai, Chaoli | 1 |
Cooper, Darren | 1 |
Higgins, Steve | 1 |
Lugo-Armenta, Jesús Guadalupe | 1 |
Pino-Fan, Luis Roberto | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lugo-Armenta, Jesús Guadalupe; Pino-Fan, Luis Roberto – Education Sciences, 2021
The COVID-19 pandemic generated a new scenario in education, where technological resources mediate teaching and learning processes. This paper presents the development of a virtual teacher training experience aimed at promoting inferential reasoning in practicing and prospective mathematics teachers using inference problems on the Chi-square…
Descriptors: Statistics Education, Statistical Inference, Probability, Thinking Skills
Cooper, Darren; Higgins, Steve; Beckmann, Nadin – Journal of Educational Technology Systems, 2017
Online instructional videos are becoming increasingly common within education. This study adopts a quasi-experimental 2 × 2 crossover design (control and experimental groups) to evaluate the efficacy of instructional videos to teach practical rehabilitation skills. The students performed practical sessions in class and were formatively assessed by…
Descriptors: Video Technology, Educational Technology, Teaching Methods, Supplementary Education
Cai, Chaoli – ProQuest LLC, 2009
Anomaly detection is an important and indispensable aspect of any computer security mechanism. Ad hoc and mobile networks consist of a number of peer mobile nodes that are capable of communicating with each other absent a fixed infrastructure. Arbitrary node movements and lack of centralized control make them vulnerable to a wide variety of…
Descriptors: Energy Conservation, Testing, Computer Security, Statistical Inference