NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,861 to 4,875 of 5,844 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Berkel, Cady; Murry, Velma McBride; Roulston, Kathryn J.; Brody, Gene H. – Health Education, 2013
Purpose: The purpose of this paper is to demonstrate the importance of considering both fidelity and adaptation in assessing the implementation of evidence-based programs. Design/methodology/approach: The current study employs a multi-method strategy to understand two dimensions of implementation (fidelity and adaptation) in the Strong African…
Descriptors: Fidelity, Interviews, Media Adaptation, Teaching Methods
Kier, Meredith Weaver – ProQuest LLC, 2013
National efforts to interest students in STEM careers are intensifying around the globe, due to a shortage of professionals to fill the growing demands in these fields. Although some US studies find high interest in STEM in K-12 students, longitudinal studies show a decline in interest following middle school. Many students, particularly females…
Descriptors: STEM Education, Student Interests, Video Technology, Career Development
Jeans, Laurie M.; Santos, Rosa Milagros; Laxman, Daniel J.; McBride, Brent A.; Dyer, W. Justin – Grantee Submission, 2013
Current clinical diagnosis of Autism Spectrum Disorders (ASD) occurs between 3 and 4 years of age, but increasing evidence indicates that intervention begun earlier may improve outcomes. Using secondary analysis of the Early Childhood Longitudinal Study-Birth Cohort data set, the current study identifies early predictors prior to the diagnosis of…
Descriptors: Pervasive Developmental Disorders, Autism, Predictor Variables, Young Children
Peer reviewed Peer reviewed
Direct linkDirect link
Annetta, Leonard; Vallett, David; Fusarelli, Bonnie; Lamb, Richard; Cheng, Meng-Tzu; Holmes, Shawn; Folta, Elizabeth; Thurmond, Brandi – Journal of Computers in Mathematics and Science Teaching, 2014
The purpose of this study was to examine the effect Serious Educational Games (SEGs) had on student interest in science in a federally funded game-based learning project. It can be argued that today's students are more likely to engage in video games than they are to interact in live, face-to-face learning environments. With a keen eye on…
Descriptors: Educational Games, Science Instruction, Student Interests, Learning Activities
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Wiyun; Hypnar, Andrew J.; Mason, Steve A.; Zalmout, Sandy – Journal of Teaching in Physical Education, 2014
The purpose of this study was to examine the contribution of quality physical education (QPET) in a Comprehensive School Physical Activity Program (CSPAP) which is intended to promote physical activity (PA) behaviors in and outside of schools. Participants were nine elementary physical education teachers and their fourth- and fifth-grade students…
Descriptors: Physical Activities, Physical Activity Level, Physical Education, Student Behavior
Jakubik, Tara Lynn – ProQuest LLC, 2014
State tests, which assess reading comprehension, ask students to make inferences and connections beyond the text. The problem of practice in which this study is situated is that students are having difficulty making meaningful connections and developing inferences in relation to the material that is read aloud together in class or assigned for…
Descriptors: Cartoons, Novels, Common Core State Standards, Reading Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Kubina, Richard M., Jr.; Wolfe, Pamela; Kostewicz, Douglas E. – Analysis of Verbal Behavior, 2009
A general outcome measure (GOM) can be used to show progress towards a long-term goal. GOMs should sample domains of behavior across ages, be sensitive to change over time, be inexpensive and easy to use, and facilitate decision making. Skinner's (1957) analysis of verbal behavior may benefit from the development of GOM. To develop GOM, we…
Descriptors: Verbal Stimuli, Outcomes of Treatment, Functional Behavioral Assessment, Verbal Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Dow, Elizabeth H. – Journal of Archival Organization, 2009
In the mid 1990s, Encoded Archival Description (EAD) appeared as a revolutionary technology for publishing archival finding aids on the Web. The author explores whether or not, given the advent of Web 2.0, the archival community should abandon EAD and look for something to replace it. (Contains 18 notes.)
Descriptors: Archives, Online Catalogs, Library Automation, Metadata
Peer reviewed Peer reviewed
Direct linkDirect link
Ryan, Mary – Issues in Educational Research, 2009
Qualitative research methods require transparency to ensure the "trustworthiness" of the data analysis. The intricate processes of organising, coding and analysing the data are often rendered invisible in the presentation of the research findings, which requires a "leap of faith" for the reader. Computer assisted data analysis software can be used…
Descriptors: Qualitative Research, Research Methodology, Computer Software, Coding
Peer reviewed Peer reviewed
Direct linkDirect link
Ruder, Suzanne M.; Straumanis, Andrei R. – Journal of Chemical Education, 2009
A critical stage in the process of developing a conceptual understanding of organic chemistry is learning to use curved arrow notation. From this stems the ability to predict reaction products and mechanisms beyond the realm of memorization. Since evaluation (i.e., testing) is known to be a key driver of student learning, it follows that a new…
Descriptors: Organic Chemistry, Multiple Choice Tests, Test Construction, Feedback (Response)
Tong, Qi (Helen) – Computers in Libraries, 2009
The U.S. Geological Survey (USGS) Library, where the author serves as the digital services librarian, is increasingly challenged to make it easier for users to find information from many heterogeneous information sources. Information is scattered throughout different software applications (i.e., library catalog, federated search engine, link…
Descriptors: Search Engines, Engines, Information Sources, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
White, Tobin – Educational Studies in Mathematics, 2009
This paper introduces an applied problem-solving task, set in the context of cryptography and embedded in a network of computer-based tools. This designed learning environment engaged students in a series of collaborative problem-solving activities intended to introduce the topic of functions through a set of linked representations. In a…
Descriptors: Problem Solving, Educational Environment, Problem Based Learning, Mathematical Applications
Peer reviewed Peer reviewed
Direct linkDirect link
Bantum, Erin O'Carroll; Owen, Jason E. – Psychological Assessment, 2009
Psychological interventions provide linguistic data that are particularly useful for testing mechanisms of action and improving intervention methodologies. For this study, emotional expression in an Internet-based intervention for women with breast cancer (n = 63) was analyzed via rater coding and 2 computerized coding methods (Linguistic Inquiry…
Descriptors: Intervention, Computational Linguistics, Cancer, Validity
Peer reviewed Peer reviewed
Direct linkDirect link
Lewandowsky, Stephan; Geiger, Sonja M.; Oberauer, Klaus – Journal of Memory and Language, 2008
This article presents four experiments that tested predictions of SOB (Serial Order in a Box), an interference-based theory of short-term memory. Central to SOB is the concept of novelty-sensitive encoding, which holds that items are encoded to the extent that they differ from already-encoded information. On the additional assumption that…
Descriptors: Short Term Memory, Experiments, Memory, Interference (Language)
Peer reviewed Peer reviewed
Direct linkDirect link
McAndrew, Alasdair – International Journal of Mathematical Education in Science and Technology, 2008
The Hill cipher is the simplest example of a "block cipher," which takes a block of plaintext as input, and returns a block of ciphertext as output. Although it is insecure by modern standards, its simplicity means that it is well suited for the teaching of such concepts as encryption modes, and properties of cryptographic hash functions. Although…
Descriptors: Orthographic Symbols, Computation, Coding, Technology
Pages: 1  |  ...  |  321  |  322  |  323  |  324  |  325  |  326  |  327  |  328  |  329  |  ...  |  390