Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 12 |
Descriptor
| Coding | 18 |
| Data Processing | 18 |
| Computer Software | 7 |
| Data Analysis | 5 |
| Evaluation | 4 |
| Evaluation Methods | 4 |
| Information Storage | 4 |
| Mathematics Education | 4 |
| Models | 4 |
| Case Studies | 3 |
| Classification | 3 |
| More ▼ | |
Source
Author
| Ascher, Marcia | 1 |
| Calders, Toon | 1 |
| Chuang, Fu-Tai | 1 |
| Conati, Cristina | 1 |
| Constantinescu, Cornel | 1 |
| Culik, Karel II | 1 |
| Dixit, R. K. | 1 |
| Duraiswamy, K. | 1 |
| Edwards, Richard | 1 |
| Fenwick, Tara | 1 |
| Gamon Savatsomboon | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 2 |
| Teachers | 2 |
| Students | 1 |
Location
| Finland | 1 |
| France | 1 |
| Michigan | 1 |
| Netherlands | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| National Assessment of… | 1 |
| Program for International… | 1 |
What Works Clearinghouse Rating
Gamon Savatsomboon; Prasert Ruannakarn; Phamornpun Yurayat; Ong-art Chanprasitchai; Jibon Kumar Sharma Leihaothabam – European Journal of Psychology and Educational Research, 2024
Using R to conduct univariate meta-analyses is becoming common for publication. However, R can also conduct multivariate meta-analysis (MMA). However, newcomers to both R and MMA may find using R to conduct MMA daunting. Given that, R may not be easy for those unfamiliar with coding. Likewise, MMA is a topic of advanced statistics. Thus, it may be…
Descriptors: Educational Psychology, Multivariate Analysis, Evaluation Methods, Data Processing
Lindgren, Chris Aaron – Written Communication, 2021
Coding has typically been understood as an engineering practice, where the meaning of code has discrete boundaries as a technology that does precisely what it says. Multidisciplinary code studies reframed this technological perspective by positing code as the latest form of writing, where code's meaning is always partial and dependent on…
Descriptors: Coding, Data Processing, Data Analysis, Programming
P. Janelle McFeetors – Sage Research Methods Cases, 2016
This case study describes an experience of using constructivist grounded theory to analyze data. The project investigated how high school students improved their approaches to learning mathematics. Over 4 months, students participated in processes which supported their learning while simultaneously generating data, including interactive writing,…
Descriptors: High School Students, Mathematics Education, Data Analysis, Data Interpretation
Edwards, Richard; Fenwick, Tara – Studies in Continuing Education, 2016
In a wide range of fields, professional practice is being transformed by the increasing influence of digital analytics: the massive volumes of big data, and software algorithms that are collecting, comparing and calculating that data to make predictions and even decisions. Researchers in a number of social sciences have been calling attention to…
Descriptors: Professional Education, Data Processing, Professionalism, Educational Practices
Lee, Sang Yun – ProQuest LLC, 2013
This thesis describes a notation for rapid specification of information visualization, which can be used as a theoretical framework of integrating various types of information visualization, and its applications at a conceptual level. The notation is devised to codify the major characteristics of data/visual structures in conventionally-used…
Descriptors: Visualization, Data Processing, Coding, Systems Development
Neal, Jennifer Watling; Neal, Zachary P.; VanDyke, Erika; Kornbluh, Mariah – American Journal of Evaluation, 2015
Qualitative data offer advantages to evaluators, including rich information about stakeholders' perspectives and experiences. However, qualitative data analysis is labor-intensive and slow, conflicting with evaluators' needs to provide punctual feedback to their clients. In this method note, we contribute to the literature on rapid evaluation and…
Descriptors: Qualitative Research, Data Analysis, Evaluation, Evaluation Methods
Nord, C.; Hicks, L.; Hoover, K.; Jones, M.; Lin, A.; Lyons, M.; Perkins, R.; Roey, S.; Rust, K.; Sickles, D. – National Center for Education Statistics, 2011
This user's guide documents the procedures used to collect, process, and summarize data from the 2009 High School Transcript Study (HSTS 2009). Chapters detail the sampling of schools and graduates (chapters 2 and 3), data collection procedures (chapter 4), data processing procedures (chapter 5), and weighting procedures (chapter 6). Chapter 7…
Descriptors: High School Graduates, Academic Records, National Competency Tests, Questionnaires
Gomathi, C.; Moorthi, M.; Duraiswamy, K. – International Education Studies, 2008
Web Access Pattern (WAP), which is the sequence of accesses pursued by users frequently, is a kind of interesting and useful knowledge in practice. Sequential Pattern mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of…
Descriptors: Database Design, Database Management Systems, Coding, Computer System Design
Lin, Fu-Ren; Hsieh, Lu-Shih; Chuang, Fu-Tai – Computers & Education, 2009
As course management systems (CMS) gain popularity in facilitating teaching. A forum is a key component to facilitate the interactions among students and teachers. Content analysis is the most popular way to study a discussion forum. But content analysis is a human labor intensity process; for example, the coding process relies heavily on manual…
Descriptors: Secondary School Science, Online Courses, Earth Science, Classification
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Peer reviewedConstantinescu, Cornel; Storer, James A. – Information Processing & Management, 1994
Presents a new image compression algorithm that employs some of the most successful approaches to adaptive lossless compression to perform adaptive online (single pass) vector quantization with variable size codebook entries. Results of tests of the algorithm's effectiveness on standard test images are given. (12 references) (KRN)
Descriptors: Algorithms, Coding, Data Processing, Evaluation
Peer reviewedMoffat, Alistair; And Others – Information Processing & Management, 1994
Evaluates the performance of different methods of data compression coding in several situations. Huffman's code, arithmetic coding, fixed codes, fast approximations to arithmetic coding, and splay coding are discussed in terms of their speed, memory requirements, and proximity to optimal performance. Recommendations for the best methods of…
Descriptors: Coding, Data Processing, Evaluation, Experiments
Peer reviewedCulik, Karel II; Kari, Jarkko – Information Processing & Management, 1994
Presents an inference algorithm that produces a weighted finite automata (WFA), in particular, the grayness functions of graytone images. Image-data compression results based on the new inference algorithm produces a WFA with a relatively small number of edges. Image-data compression results alone and in combination with wavelets are discussed.…
Descriptors: Algorithms, Coding, Comparative Analysis, Data Processing
Peer reviewedAscher, Marcia – Mathematics Magazine, 1992
Discusses two mathematical ideas that come from the Incan and Mayan cultures: (1) the quipus, an Incan recordkeeping tool that encoded data via a logical-numerical system on spatial arrays of colored, knotted cords; and (2) the link between recording time and counting in the Mayan culture. (MDH)
Descriptors: Coding, Data Processing, Foreign Culture, Higher Education
Peer reviewedWright, Marie A. – Mathematics Teacher, 1993
Cryptography is the science that renders data unintelligible to prevent its unauthorized disclosure or modification. Presents an application of matrices used in linear transformations to illustrate a cryptographic system. An example is provided. (17 references) (MDH)
Descriptors: Coding, Cryptography, Data Processing, Enrichment Activities
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
