Publication Date
| In 2024 | 110 |
| Since 2023 | 234 |
| Since 2020 (last 5 years) | 573 |
| Since 2015 (last 10 years) | 3193 |
| Since 2005 (last 20 years) | 5299 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Teachers | 66 |
| Practitioners | 35 |
| Researchers | 35 |
| Policymakers | 13 |
| Students | 9 |
| Administrators | 8 |
| Media Staff | 8 |
| Counselors | 6 |
| Parents | 5 |
| Support Staff | 3 |
| Community | 1 |
| More ▼ | |
Location
| Turkey | 165 |
| Australia | 160 |
| Canada | 139 |
| California | 111 |
| China | 78 |
| United Kingdom | 77 |
| United Kingdom (England) | 71 |
| United States | 68 |
| Texas | 67 |
| Germany | 66 |
| Taiwan | 61 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 1 |
| Meets WWC Standards with or without Reservations | 1 |
Xieling Chen; Di Zou; Gary Cheng; Haoran Xie – Education and Information Technologies, 2024
The rise of massive open online courses (MOOCs) brings rich opportunities for understanding learners' experiences based on analyzing learner-generated content such as course reviews. Traditionally, the unstructured textual data is analyzed qualitatively via manual coding, thus failing to offer a timely understanding of the learner's experiences.…
Descriptors: Artificial Intelligence, Semantics, Course Evaluation, MOOCs
Markus Reitenbach – PRIMUS, 2024
We describe Shamir's secret sharing scheme and explain how it can be used for secure and redundant cryptocurrency storage. We include samples of individual and group assignments that can be used in an upper-division cryptology class for students who are familiar with modular arithmetic. It takes about one class to cover Shamir's secret sharing,…
Descriptors: Technology, Coding, Monetary Systems, Privacy
Luis Vila-Henninger; Claire Dupuy; Virginie Van Ingelgom; Mauro Caprioli; Ferdinand Teuber; Damien Pennetreau; Margherita Bussi; Cal Le Gall – Sociological Methods & Research, 2024
Qualitative secondary analysis has generated heated debate regarding the epistemology of qualitative research. We argue that shifting to an abductive approach provides a fruitful avenue for qualitative secondary analysts who are oriented towards theory-building. However, the concrete implementation of abduction remains underdeveloped--especially…
Descriptors: Qualitative Research, Research Methodology, Epistemology, Theories
Per Anderhag; Niklas Salomonsson; Andre Bürgers; Cesar Estay Espinola; Birgit Fahrman; Dana Seifeddine Ehdwall; Maria Sundler – International Journal of Technology and Design Education, 2024
During a relatively short period of time, programming has been implemented in the national curriculum of the compulsory school in Sweden. Since 2018, programming is a new content in the technology subject and the research field has discussed some of the challenges teachers and students, who generally have little experiences of programming, face…
Descriptors: Learning Strategies, Programming, Robotics, Technology Education
Gus Greivel; Alexandra Newman; Maxwell Brown; Kelly Eurek – INFORMS Transactions on Education, 2024
Industrial-scale models require considerable setup time; hence, once built, they are used in myriad ways to consider closely related cases. In practice, the code for these models frequently evolves without appropriate notational choices, largely as a result of the lengthy development time of, and the number of individuals contributing to, their…
Descriptors: Models, Best Practices, Mathematical Concepts, Energy
Lichtenstein, Matty; Rucks-Ahidiana, Zawadi – Sociological Methods & Research, 2023
With the growing availability of large-scale text-based data sets, there is an increasing need for an accessible and systematic way to analyze qualitative texts. This article introduces and details the contextual text coding (CTC) method as a mixed-methods approach to large-scale qualitative data analysis. The method is particularly useful for…
Descriptors: Coding, Qualitative Research, Data Analysis, Alternative Assessment
David Shilane; Nicole Di Crecchio; Nicole L. Lorenzetti – Teaching Statistics: An International Journal for Teachers, 2024
Educational curricula in data analysis are increasingly fundamental to statistics, data science, and a wide range of disciplines. The educational literature comparing coding syntaxes for instruction in data analysis recommends utilizing a simple syntax for introductory coursework. However, there is limited prior work to assess the pedagogical…
Descriptors: Programming, Data Science, Programming Languages, Coding
Victoria Reyes; Elizabeth Bogumil; Levin Elias Welch – Sociological Methods & Research, 2024
Transparency is once again a central issue of debate across types of qualitative research. Work on how to conduct qualitative data analysis, on the other hand, walks us through the step-by-step process on how to code and understand the data we've collected. Although there are a few exceptions, less focus is on transparency regarding…
Descriptors: Qualitative Research, Data Analysis, Guides, Databases
Alain Kuzniak; Blandine Masselin – Educational Studies in Mathematics, 2024
This paper describes how the notion of the strongly didactic contract can serve to characterize the teaching adopted to implement a task in probability. It is particularly focused on the reality of mathematical work performed by students and teachers. For this research, classroom sessions were developed in an in-service teacher training course…
Descriptors: Mathematics, Learning Theories, Teaching Methods, Teacher Education
Pauline Megan Fox – Teacher Education Advancement Network Journal, 2024
Despite growing interest in spaced retrieval methods, a research gap has been discovered, with insufficient data to support best practises in year-one science. After analysing five systematic action cycles, four interrelated themes emerged: dual coding, cognitive load, peer communication, and feedback-driven metacognition. While literature…
Descriptors: Cognitive Science, Information Retrieval, Learning Processes, Short Term Memory
Stephanie A. Blanda – PRIMUS, 2024
This article describes the author's experience designing and implementing an inquiry-based learning (IBL) pedagogical approach to an upper-division undergraduate cryptology course. The author shares the course goals and how the IBL style supports their achievement. The article concludes with sample activities -- in-class exercises that touch on…
Descriptors: Technology, Undergraduate Students, Inquiry, Active Learning
Jeffrey Ehme – PRIMUS, 2024
The Miller-Rabin test is a useful probabilistic method for finding large primes. In this paper, we explain the method in detail and give three variations on this test. These variations were originally developed as student projects to supplement a course in error correcting codes and cryptography.
Descriptors: Probability, Numbers, Coding, Algorithms
Peer reviewedPriti Oli; Rabin Banjade; Jeevan Chapagain; Vasile Rus – Grantee Submission, 2024
Assessing students' answers and in particular natural language answers is a crucial challenge in the field of education. Advances in transformer-based models such as Large Language Models (LLMs), have led to significant progress in various natural language tasks. Nevertheless, amidst the growing trend of evaluating LLMs across diverse tasks,…
Descriptors: Student Evaluation, Computer Assisted Testing, Artificial Intelligence, Comprehension
Abdullahi Yusuf; Norah Md Noor – Smart Learning Environments, 2024
In recent years, programming education has gained recognition at various educational levels due to its increasing importance. As the need for problem-solving skills becomes more vital, researchers have emphasized the significance of developing algorithmic thinking (AT) skills to help students in program development and error debugging. Despite the…
Descriptors: Students, Programming, Algorithms, Problem Solving
Jeremy Jon Bro – ProQuest LLC, 2023
Secure Code Education (SCE) is the compliance requirement for many organizations in the U.S. Consequently, many U.S. companies spend large sums on programs and tooling to meet this requirement and to upskill their developers. This tooling is largely underutilized. Classes beyond the bare required minimum are often not taken advantage of, leaving…
Descriptors: Coding, Gamification, Vignettes, Programming

Direct link
