NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 4,981 to 4,995 of 10,814 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Piyayodilokchai, Hongsiri; Panjaburee, Patcharin; Laosinchai, Parames; Ketpichainarong, Watcharee; Ruenwongsa, Pintip – Educational Technology & Society, 2013
With the benefit of multimedia and the learning cycle approach in promoting effective active learning, this paper proposed a learning cycle approach-based, multimedia-supplemented instructional unit for Structured Query Language (SQL) for second-year undergraduate students with the aim of enhancing their basic knowledge of SQL and ability to apply…
Descriptors: Multimedia Instruction, Active Learning, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Jagger, Suzy – Innovations in Education and Teaching International, 2013
A commonly used teaching method to promote student engagement is the classroom debate. This study evaluates how affective characteristics, as defined in Bloom's taxonomy, were stimulated during debates that took place on a professional ethics module for first year computing undergraduates. The debates led to lively interactive group discussions…
Descriptors: Computer Science Education, Undergraduate Students, Debate, Group Discussion
Yeom, Soonja; Choi-Lundberg, Derek; Fluck, Andrew; Sale, Arthur – International Association for Development of the Information Society, 2013
Visualizing the structure and relationships in three dimensions (3D) of organs is a challenge for students of anatomy. To provide an alternative way of learning anatomy engaging multiple senses, we are developing a force-feedback (haptic) interface for manipulation of 3D virtual organs, using design research methodology, with iterations of system…
Descriptors: Electronic Learning, Educational Technology, Technology Uses in Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Chiu, Chiung-Fang; Lee, Greg C. – Computers & Education, 2009
The current practice of traditional in-class lecture for learning computer science (CS) in the high schools of Taiwan is in need of revamping. Teachers instruct on the use of commercial software instead of teaching CS concepts to students. The lack of more suitable teaching materials and limited classroom time are the main reasons for the…
Descriptors: High Schools, Computer Science, Foreign Countries, Lecture Method
Association Supporting Computer Users in Education, 2017
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Assisted Instruction, Computer Uses in Education, Computer Software, Conferences (Gatherings)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Battig, Michael E. – Information Systems Education Journal, 2010
Survey results from a two year project are presented. The survey instruments were developed through review of the literature involving similar studies of student perceptions and with the assistance of social scientists. The study includes both high school and college student perceptions of computing. The survey also contrasts student perceptions…
Descriptors: High School Students, Computer Attitudes, Computer Science, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mannila, Linda – Informatics in Education, 2010
In this paper, we analyze the errors novice students make when developing invariant based programs. In addition to presenting the general error types, we also look at what students have difficulty with when it comes to expressing invariants. The results indicate that an introductory course utilizing the invariant based approach is suitable from…
Descriptors: Novices, Error Patterns, Difficulty Level, Introductory Courses
Nitipaichit, Yuttasart – ProQuest LLC, 2010
Wireless Sensor Networks (WSNs) have unique characteristics which constrain them; including small energy stores, limited computation, and short range communication capability. Most traditional security algorithms use cryptographic primitives such as Public-key cryptography and are not optimized for energy usage. Employing these algorithms for the…
Descriptors: Networks, Computer Security, Data, Confidentiality
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bajracharya, Sushil Krishna – ProQuest LLC, 2010
Internet-Scale code retrieval deals with the representation, storage, and access of relevant source code from a large amount of source code available on the Internet. Internet-Scale code retrieval systems support common emerging practices among software developers related to finding and reusing source code. In this dissertation we focus on some…
Descriptors: Semantics, Search Engines, Engines, Measures (Individuals)
Peng, Yefei – ProQuest LLC, 2010
An ontology mapping neural network (OMNN) is proposed in order to learn and infer correspondences among ontologies. It extends the Identical Elements Neural Network (IENN)'s ability to represent and map complex relationships. The learning dynamics of simultaneous (interlaced) training of similar tasks interact at the shared connections of the…
Descriptors: Training Methods, Genealogy, Logical Thinking, Cognitive Processes
Peer reviewed Peer reviewed
Direct linkDirect link
Cheng, Y.-P.; Lin, J. M.-C. – IEEE Transactions on Education, 2010
This paper documents several years of experimentation with a new approach to organizing and managing projects in a software engineering course. The initial failure and subsequent refinements that the new approach has been through since 2004 are described herein. The "constrained and guided" approach, as it is called, has helped to reduce…
Descriptors: Foreign Countries, Student Projects, Computer Software, Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Van Name, Barry – Tech Directions, 2012
There is a battlefield where no quarter is given, no mercy shown, but not a single drop of blood is spilled. It is an arena that witnesses the bringing together of high-tech design and manufacture with the outpouring of brute force, under the remotely accessed command of some of today's brightest students. This is the world of battling robots, or…
Descriptors: Females, Engineering, Computer Assisted Design, High School Students
Ballera, Melvin; Elssaedi, Mosbah Mohamed – Association for the Advancement of Computing in Education, 2012
There is an unrealized potential in the use of socially-oriented pedagogical agent and interactive simulation in e-learning system. In this paper, we investigate the impact of having a socially oriented tutor agent and the incorporation of interactive simulation in e-learning into student performances, perceptions and experiences for non-native…
Descriptors: Simulation, Foreign Countries, Computer Science, Electronic Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Boustedt, Jonas – Computer Science Education, 2012
The software industry needs well-trained software designers and one important aspect of software design is the ability to model software designs visually and understand what visual models represent. However, previous research indicates that software design is a difficult task to many students. This article reports empirical findings from a…
Descriptors: Foreign Countries, Computer Software, Computer Science Education, Programming
Pages: 1  |  ...  |  329  |  330  |  331  |  332  |  333  |  334  |  335  |  336  |  337  |  ...  |  721