NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 841 to 855 of 2,720 results Save | Export
Peer reviewed Peer reviewed
Kiers, Henk A. L.; And Others – Psychometrika, 1990
An algorithm is described for fitting the DEDICOM model (proposed by R. A. Harshman in 1978) for the analysis of asymmetric data matrices. The method modifies a procedure proposed by Y. Takane (1985) to provide guaranteed monotonic convergence. The algorithm is based on a technique known as majorization. (SLD)
Descriptors: Algorithms, Data Analysis, Generalizability Theory, Matrices
Peer reviewed Peer reviewed
van der Linden, Wim J.; Boekkooi-Timminga, Ellen – Applied Psychological Measurement, 1988
Gulliksen's matched random subtests method is a graphical method to split a test into parallel test halves, allowing maximization of coefficient alpha as a lower bound to the classical test reliability coefficient. This problem is formulated as a zero-one programing problem solvable by algorithms that already exist. (TJH)
Descriptors: Algorithms, Equations (Mathematics), Programing, Test Reliability
Peer reviewed Peer reviewed
Ozkarahan, Esen – Information Processing & Management, 1995
This study develops an integrated conceptual representation scheme for multimedia documents that are viewed to comprise an object-oriented database; the necessary abstractions for the conceptual model and extensions to the relational model used as the search structure; a retrieval model that includes associative, semantic and media-specific…
Descriptors: Algorithms, Information Retrieval, Models, Multimedia Materials
Peer reviewed Peer reviewed
Kiers, Henk A. L. – Psychometrika, 1995
Monotonically convergent algorithms are described for maximizing sums of quotients of quadratic forms. Six (constrained) functions are investigated. The general formulation of the functions and the algorithms allow for application of the algorithms in various situations in multivariate analysis. (SLD)
Descriptors: Algorithms, Equations (Mathematics), Matrices, Multivariate Analysis
Peer reviewed Peer reviewed
Markas, Tassos; Reif, John – Information Processing and Management, 1992
Presents a class of distortion controlled vector quantizers that are capable of compressing images so they comply with certain distortion requirements. Highlights include tree-structured vector quantizers; multiresolution vector quantization; error coding vector quantizer; error coding multiresolution algorithm; and Huffman coding of the quad-tree…
Descriptors: Algorithms, Coding, Information Processing, Mathematical Formulas
Peer reviewed Peer reviewed
Scheines, Richard; Spirtes, Peter; Glymour, Clark; Meek, Christopher; Richardson, Thomas – Multivariate Behavioral Research, 1998
The TETRAD for constraint-based aids to causal model specification project and related work in computer science aims to apply standards of rigor and precision to the problem of using data and background knowledge to make inferences about a model's specifications. Several algorithms that are implemented in the TETRAD II program are presented. (SLD)
Descriptors: Algorithms, Computer Science, Inferences, Models
Peer reviewed Peer reviewed
Kiers, Henk A. L.; Groenen, Patrick – Psychometrika, 1996
An iterative majorization algorithm is proposed for orthogonal congruence rotation that is guaranteed to converge from every starting point. In addition, the algorithm is easier to program than the algorithm proposed by F. B. Brokken, which is not guaranteed to converge. The derivation of the algorithm is traced in detail. (SLD)
Descriptors: Algorithms, Comparative Analysis, Matrices, Orthogonal Rotation
Peer reviewed Peer reviewed
Guerrero, Vicente P.; Moya Anegon, Felix de – Journal of the American Society for Information Science and Technology, 2001
Discusses vectors used in information retrieval and the algorithms used to manipulate them. Uses the Kohonen neural algorithm and a fuzzification model to perform a fuzzy clustering of document terms to reduce the high dimension and presents results from a test database. (Author/LRW)
Descriptors: Algorithms, Information Retrieval, Subject Index Terms
Peer reviewed Peer reviewed
Wu, Ing-Long – Journal of Educational and Behavioral Statistics, 2001
Presents two binary programming models with a special network structure that can be explored computationally for simultaneous test construction. Uses an efficient special purpose network algorithm to solve these models. An empirical study illustrates the approach. (SLD)
Descriptors: Algorithms, Computer Software, Networks, Test Construction
Peer reviewed Peer reviewed
Mihoubi, Houria; Simonet, Ana; Simonet, Michel – Information Systems, 1998
Examines how a domain ontology can be reused by different knowledge representation systems. Describes a meta-language which allows a declarative description of any model based on frames, objects, relations, or description logics. Discusses the meta-relation concept which, associated to a definition, represents the signification of the construct…
Descriptors: Algorithms, Information Systems, Knowledge Representation, Models
Peer reviewed Peer reviewed
Kolata, Gina Bari – Science, 1974
Although today's computers can perform as many as one million operations per second, there are many problems that are still too large to be solved in a straightforward manner. Recent work indicates that many approximate solutions are useful and more efficient than exact solutions. (Author/RH)
Descriptors: Algorithms, Computers, Mathematics, Prediction
Peer reviewed Peer reviewed
King, Donald R. – Journal of Library Automation, 1974
The binary vector is suggested as an alternative to the usual method of storing document pointers in an inverted index file. (Author)
Descriptors: Algorithms, Databases, Indexes, Information Retrieval
Kam, Alan C. H. – 1970
The report is a collection of internal reports dealing with the library management. The preliminary design details the anticipated system. The structure of data base reveals the implementation scheme on an IBM 2314 Disk Facility. Various algorithms are presented to document the actual system conditioned by using XPL and OS/MVT/HASP. Finally a…
Descriptors: Administration, Algorithms, Data Processing, Information Systems
Peer reviewed Peer reviewed
Gold, E. Mark; Hoffman, Paul J. – Multivariate Behavioral Research, 1976
A clustering technique is described, the objective of which is to detect deviant subpopulations which deviate from a primary subpopulation in a well defined direction. (Author/DEP)
Descriptors: Algorithms, Cluster Analysis, Cluster Grouping, Mathematical Models
Peer reviewed Peer reviewed
Hofmann, Richard J. – Educational and Psychological Measurement, 1978
A general factor analysis computer algorithm is briefly discussed. The algorithm is highly transportable with minimum limitations on the number of observations. Both singular and non-singular data can be analyzed. (Author/JKS)
Descriptors: Algorithms, Computer Programs, Factor Analysis, Transformations (Mathematics)
Pages: 1  |  ...  |  53  |  54  |  55  |  56  |  57  |  58  |  59  |  60  |  61  |  ...  |  182