NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 5,491 to 5,505 of 5,771 results Save | Export
Peer reviewed Peer reviewed
Giberson, Karl; Brown, Laura – Science Teacher, 1997
Presents an activity that begins with a discussion that leads into the rationale behind the techniques used in the Search for Extraterrestrial Intelligence (SETI) program. Students decode a message intended for extraterrestrials and consider a number of topics related to the possible existence of extraterrestrials. (DDR)
Descriptors: Astronomy, Coding, Concept Formation, Elementary Secondary Education
Hawkins, Donald T. – Online, 1996
Describes information metering technology as a method that information providers use to provide information collections to users in encrypted form and charge them only for the parts actually used. Discusses how two current information metering systems (Wave Systems Corporation and CD-MAX) operate, the institutions using their systems, and the…
Descriptors: Coding, Data Collection, Fees, Futures (of Society)
Peer reviewed Peer reviewed
McGloin, Joe; And Others – Evaluation Review, 1996
The accuracy of a subject-generated coding system for anonymous questionnaire responses was studied using a collateral, anonymous sticker identification system as a standard. Results with 745 middle school students who took pretests and posttests show the effectiveness of the subject-generated coding system. (SLD)
Descriptors: Coding, Elementary School Students, Identification, Middle School Students
Nardini, Holly K. Grossetta; Linden, Julie; Mayman, Gillian; Reardon, Karen; Shimp, Andrew – Online, 2002
Describes the use of an outside graphic design firm to redesign the Yale University Library (New Haven, CT) Web site. Topics include division of labor; design principles and technical requirements; related Web sites at Yale; usability testing; coding that conformed to library standards; ease of use; and communication between the design firm and…
Descriptors: Academic Libraries, Coding, Communication (Thought Transfer), Computer Graphics
Peer reviewed Peer reviewed
Lorence, Daniel P.; Spink, Amanda – Information Processing & Management, 2003
Reports results from a national study into the perceived variation reported by health information managers related to the relevance-efficiency trade-offs of information classification across regions and practice settings. Findings suggest that due to major regional variation, stringent national information standards may be counterproductive for…
Descriptors: Classification, Coding, Health Services, Information Retrieval
Peer reviewed Peer reviewed
Gines, Deon J.; And Others – Mental Retardation, 1990
Ten adults with mild mental retardation used color-coded food photographs and meal code cards to plan nutritionally balanced meals. Subjects spent an average of nine minutes to plan three meals. Errors, which were primarily omissions, occurred mostly in food groups requiring four servings daily. (JDD)
Descriptors: Adults, Coding, Color, Food
Peer reviewed Peer reviewed
Sutherland, David C. – School Science and Mathematics, 1990
Discusses common error-detecting identification codes using linear algebra terminology to provide an interesting application of algebra. Presents examples from the International Standard Book Number, the Universal Product Code, bank identification numbers, and the ZIP code bar code. (YP)
Descriptors: Algebra, Coding, College Mathematics, Higher Education
Peer reviewed Peer reviewed
Schroeder, Eileen E.; Kenny, Richard F. – Canadian Journal of Educational Communication, 1995
Provides an overview of research on notetaking and two related learning strategies: outlining and concept maps. Examines the potential effectiveness of approaches to aid learning in encoding new information and current uses in interactive multimedia instruction. Offers suggestions for incorporating these strategies into future designs. (Author/AEF)
Descriptors: Coding, Futures (of Society), Instructional Design, Instructional Effectiveness
Spillman, Richard – Collegiate Microcomputer, 1992
Discusses the importance of computer security and considers criminal, national security, and personal privacy threats posed by security breakdown. Several examples are given, including incidents involving computer viruses. Objectives, content, instructional strategies, resources, and a sample examination for an experimental undergraduate computer…
Descriptors: Coding, Computer Science Education, Course Descriptions, Crime
Peer reviewed Peer reviewed
Donohoe, L. Joyce – AMATYC Review, 1992
Presents a public-key cryptosystem application to introduce students to several topics in discrete mathematics. A computer algorithms using recursive methods is presented to solve a problem in which one person wants to send a coded message to a second person while keeping the message secret from a third person. (MDH)
Descriptors: Algorithms, Coding, Computer Assisted Instruction, Mathematical Applications
Peer reviewed Peer reviewed
Zimmerman, Don H. – Research on Language and Social Interaction, 1993
Drummond and Hopper's article in this issue, "Back Channels Revisited," is argued to have decontextualized Jefferson's acknowledgement token phenomenon. The need for careful coding protocols for research on conversational practices is discussed. (eight references) (LB)
Descriptors: Coding, Contrastive Linguistics, Data Analysis, Discourse Analysis
Peer reviewed Peer reviewed
Wieder, D. Lawrence – Research on Language and Social Interaction, 1993
It is suggested that the conventional coding procedures of experimental social psychology miss critical (identifying, defining, or constitutive) features of conversation analysis' phenomena because the procedures present the analyst with two different sets of entities; i.e., they are incommensurable. (20 references) (LB)
Descriptors: Coding, Contrastive Linguistics, Discourse Analysis, Language Research
Peer reviewed Peer reviewed
Canfield, Merle L.; And Others – Journal of Consulting and Clinical Psychology, 1991
Introduces computerized coding procedure that rates words and utterances in terms of emotion, cognition, and contract, as well as contingency method of analyzing verbal interactions. Rating procedure and contingency correlation analyses using transcripts of sessions conducted by three therapists with one client found that therapists' utterances…
Descriptors: Affective Behavior, Coding, Cognitive Processes, Computers
Peer reviewed Peer reviewed
Rourke, Liam; Anderson, Terry; Garrison, D. Randy; Archer, Walter – Journal of Distance Education, 1999
Discusses computer conferencing in higher education, presents a community of inquiry model that includes benefits of computer conferencing, and discusses social presence, defined as the ability of learners to project themselves socially and affectively into a community of inquiry. Topics include teacher immediacy, coding, and content analysis of…
Descriptors: Affective Behavior, Coding, Computer Assisted Instruction, Content Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Haarhoff, Leith – Program: Electronic Library and Information Systems, 2005
Purpose: To describe the open-source solution developed by Culturenet Cymru, for the Welsh Books Council, for presenting digitised books and other printed material online. Design/methodology/approach: The challenges faced in the implementation of a pilot e-book collection of nine out-of-print books is described. Findings: The adoption of a number…
Descriptors: Pilot Projects, Foreign Countries, Books, Electronic Publishing
Pages: 1  |  ...  |  363  |  364  |  365  |  366  |  367  |  368  |  369  |  370  |  371  |  ...  |  385