NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 13,921 to 13,935 of 28,052 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Palmer, Rebecca; Enderby, Pam; Hawley, Mark – International Journal of Language & Communication Disorders, 2007
Background: In clinical practice, it is common for speech and language therapists to discontinue dysarthria treatment when a plateau in spontaneous recovery is reached. However, there is some evidence from single-case research studies that people with chronic dysarthria can improve their speech with intervention several years after the onset of…
Descriptors: Computer Software, Speech Therapy, Feedback, Etiology
Aboelela, Sally W.; Merrill, Jacqueline A.; Carley, Kathleen M.; Larson, Elaine – Journal of Research Administration, 2007
We sought to examine the growth of an interdisciplinary center using social network analysis techniques. Specific aims were to examine the patterns of growth and interdisciplinary connectedness of the Center and to identify the social network characteristics of its productive members. The setting for this study was The Center for Interdisciplinary…
Descriptors: Teamwork, Cooperation, Network Analysis, Social Networks
Briggs, Linda L. – Campus Technology, 2007
Using the material of others without permission or attribution has always tempted students, but the internet has fed the flames by making an unlimited amount of content easily available for copying. While there are various approaches that instructors can take to combat illegal copying, studies show that when students are aware that…
Descriptors: Plagiarism, Prevention, Search Engines, Databases
Panettieri, Joseph C. – Campus Technology, 2007
Imagine showing cops and robbers the blueprints to the campus. Then, letting them keep the detailed blueprints to review--over and over again--at their leisure. The robbers would memorize every nuance of the campus layout, and at some point, they'd likely plan a break-in. But on the flip side, the cops would identify security weaknesses--and help…
Descriptors: Campuses, Computer Software, Participative Decision Making, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Archibald, J. K.; Fife, W. S. – Computer Science Education, 2007
Embedded systems are increasingly pervasive, and the creation of reliable controlling software offers unique challenges. Embedded software must interact directly with hardware, it must respond to events in a time-critical fashion, and it typically employs concurrency to meet response time requirements. This paper describes an innovative course…
Descriptors: Computer Software, Troubleshooting, Undergraduate Students, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Burk, William J.; Steglich, Christian E. G.; Snijders, Tom A. B. – International Journal of Behavioral Development, 2007
Actor-oriented models are described as a longitudinal strategy for examining the co-evolution of social networks and individual behaviors. We argue that these models provide advantages over conventional approaches due to their ability to account for inherent dependencies between individuals embedded in a social network (i.e., reciprocity,…
Descriptors: Delinquency, Friendship, Adolescents, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Sola, Christopher L.; Bostwick, J. Michael; Sampson, Shirlene – Academic Psychiatry, 2007
Objective: The authors determined the efficiency of electronic documentation in consultation-liaison psychiatry. METHOD: An electronic note system was customized for a psychiatric consultation note. Specific attention given to common diagnoses permitted rapid documentation. Results: Residents learned the system quickly. The standardized nature of…
Descriptors: Psychiatry, Documentation, Clinical Diagnosis, Handwriting
Peer reviewed Peer reviewed
Direct linkDirect link
Dadashzadeh, Mohammad – Journal of Information Systems Education, 2007
Semantic integrity constraints are business-specific rules that limit the permissible values in a database. For example, a university rule dictating that an "incomplete" grade cannot be changed to an A constrains the possible states of the database. To maintain database integrity, business rules should be identified in the course of database…
Descriptors: Semantics, Integrity, Database Management Systems, Database Design
Peer reviewed Peer reviewed
Direct linkDirect link
Abisdris, Gil; Phaneuf, Alain – Science Teacher, 2007
To illustrate how a digital video camera can be used to analyze various types of motion, this simple activity analyzes the motion and measures the acceleration due to gravity of a basketball in free fall. Although many excellent commercially available data loggers and software can accomplish this task, this activity requires almost no financial…
Descriptors: Photography, Computer Software, Videotape Recordings, Motion
Murphy, Patti – Exceptional Parent, 2007
Frequently linked to sophisticated speech communication devices resembling laptop computers, augmentative and alternative communication (AAC) encompasses a spectrum of tools and strategies ranging from pointing, writing, gestures, and facial expressions to sign language, manual alphabet boards, picture symbols, and photographs used to convey…
Descriptors: Speech Communication, Augmentative and Alternative Communication, Assistive Technology, Computer Software Selection
Jackson, Gregory A. – Chronicle of Higher Education, 2007
In this article, the author asserts that technology is not the answer to digital piracy at colleges and universities. Citing the three most common explanations given for copyright infringement--that students cannot always get what they want, cannot always use what they can get, or think the price of what they can get is unfair--he asserts that the…
Descriptors: Copyrights, Computer Software, Intellectual Property, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ribbens, Eric – Journal of College Science Teaching, 2007
For those of you unfamiliar with clicker personal response systems, a clicker is a handheld remote that students use to enter their responses to multiple choice questions. The question is displayed on the classroom overhead screen, usually within a Power Point presentation, and a receiver connected to a computer at the front of the room collects…
Descriptors: Biology, Science Instruction, Computer Software, Multiple Choice Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Sik-Yum; Song, Xin-Yuan; Tang, Nian-Sheng – Structural Equation Modeling: A Multidisciplinary Journal, 2007
The analysis of interaction among latent variables has received much attention. This article introduces a Bayesian approach to analyze a general structural equation model that accommodates the general nonlinear terms of latent variables and covariates. This approach produces a Bayesian estimate that has the same statistical optimal properties as a…
Descriptors: Interaction, Structural Equation Models, Bayesian Statistics, Computation
Peer reviewed Peer reviewed
Direct linkDirect link
Gill, Sharon Ruth – Reading Teacher, 2007
Knowing the meanings of common root words, prefixes, and suffixes may help students read and spell the longer words they begin to run into in the upper elementary grades. This article describes how students can use the Kidspiration computer program to quickly and easily create word webs that illustrate the meanings of common root words and…
Descriptors: Computer Software, Vocabulary Development, Reading Instruction, Morphemes
Peer reviewed Peer reviewed
Direct linkDirect link
Glasser, Leslie – Journal of Chemical Education, 2007
Least-squares linear regression is the best of statistics and it is the worst of statistics. The reasons for this paradoxical claim, arising from possible inapplicability of the method and the excessive influence of "outliers", are discussed and substitute regression methods based on median selection, which is both robust and resistant, are…
Descriptors: Regression (Statistics), Least Squares Statistics, Computer Software, Graduate Students
Pages: 1  |  ...  |  925  |  926  |  927  |  928  |  929  |  930  |  931  |  932  |  933  |  ...  |  1871