368,912 results
Search Results
2. The State of the Field of Computational Thinking in Early Childhood Education. OECD Education Working Papers. No. 274
- Author
-
Organisation for Economic Cooperation and Development (OECD) (France), Bers, Marina Umaschi, Strawhacker, Amanda, and Sullivan, Amanda
- Abstract
Computer programming and associated Computational Thinking (CT) skills are essential to thriving in today's academic and professional world. There has been a growing focus globally on fostering CT skills as well as on introducing computer programming concepts and languages beginning as early as kindergarten and pre-primary school. Tools, curriculum, and frameworks to promote CT in the early years must be designed and implemented in ways that engage children who cannot yet read and write, who learn through play, and who have a short attention span and limited working memory but also strong natural curiosity. This review summarises empirical and theoretical literature on the state of the field of CT as it relates to early learning and development, a time when young children are being introduced to foundational skills, such as literacy and numeracy, which can carefully be complemented by an exploration of CT.
- Published
- 2022
- Full Text
- View/download PDF
3. Annual Proceedings of Selected Research and Development Papers Presented at the Annual Convention of the Association for Educational Communications and Technology (40th, Jacksonville, Florida, 2017). Volume 1
- Author
-
Association for Educational Communications and Technology, Simonson, Michael, and Seepersaud, Deborah
- Abstract
For the fortieth time, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the annual AECT Convention in Jacksonville, Florida. The Proceedings of AECT's Convention are published in two volumes. Volume 1 contains 19 papers dealing primarily with research and development topics. Fourteen papers dealing with the practice of instructional technology including instruction and training issues are contained in Volume 2. Volume 1 contains the following 19 papers: (1) Gamification for Change: A New Approach to Investigate Students' Attitudes toward Educational Gamification in Online Learning Environments (Sumayah Abu-Dawood); (2) Facilitating Higher Levels of Thinking and Deeper Cognitive Processing of Course Text Using Reciprocal Teaching Strategies in Asynchronous Discussion Forums (Jenifer R. Marquis and Ginger S. Watson); (3) Online Learning Design and Implementation Models: A Model Validation Study Using Expert Instructional Designers (Ann Armstrong and Albert Gale); (4) Tracking the Design and Development of a Six Module miniMOOC for Quality Graduate Supervision (Hawazen Alharbi and Michele Jacobsen); (5) Diversity Training in Organization Settings: Effective and Ethical Approaches for Change Leaders (Ashley McArthur and Nancy B. Hastings); (6) Hey, Want to Play? "Kahooting" to Win the Learning Game (Papia Bawa); (7) An Examination of Prior Knowledge and Cueing Effects in an Animation (Ismahan Arslan-Ari); (8) Teacher Perceptions of the Adaptation of the New Computer Science (CS) Curriculum: An Evaluation of CS Curriculum Implementation (Suhkyung Shin, Jongpil Cheon, and Sungwon Shin); (9) Multimedia Video Resolution, Camera Angle, and the Impact on Instructor Credibility and Immediacy (Miguel Ramlatchan and Ginger S. Watson); (10) The Effects of Visible-Annotation Tool on the Learning Process and Learning Outcome in CSCL (Yoonhee Shin, Jaewon Jung, and Dongsik Kim); (11) Pre-Service ICT Teachers' Recommendations for School Internet Safety (Sanser Bulu, Melike Kavuk-Kalender, and Hafize Keser); (12) Turkish Schools' Readiness for Preventing Cyberbullying (Melike Kavuk-Kalender, Hafize Keser, and Sanser Bulu); (13) Examining Technology Integration Decision-Making Processes and Identifying Professional Development Needs of International Teachers (Medha Dalal, Leanna Archambault, and Catharyn Shelton); (14) Integrating Learning Analytics into Workforce Education to Develop Self-Assessment Competency (Lin Zhong); (15) Ensuring Academic Integrity in Online Courses: A Case Analysis in Three Testing Environments (Berhane Teclehaimanot, Sue Ann Hochberg, Diana Franz, Mingli Xiao, and Jiyu You); (16) Changing Student Performance and Perceptions through Productive Failure: Active Learning for Applied Chemistry in Pharmaceutics (Dan Cernusca and Sanku Mallik); (17) The Construction of Sentiment Lexicon in Educational Field Based on Word2vec (Xiang Feng and Longhui Qiu); (18) Blended Instruction by Using Simulation Method Teaching to Enhance Digital Literacy for Student Teachers in Thailand (Sumalee Chuachai); and (19) Social Network Use Preferences of Pre-Service ICT Teachers (Omer Faruk Islim and Nese Sevim Cirak). (Individual papers contain references.) [For Volume 2, see ED580817.]
- Published
- 2017
4. Inter part 2 Computer Science Guess Papers 2024 Punjab boards
- Subjects
Computer science ,General interest ,News, opinion and commentary - Abstract
Intermediate annual exams under BISE Lahore and other Punjab boards are underway. The following is a suggested guess paper for the 2024 final board exams in Computer Science, applicable to [...]
- Published
- 2024
5. Case Study: Creation of a Degree Program in Computer Security. White Paper.
- Author
-
Belon, Barbara and Wright, Marie
- Abstract
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an Associate of Applied Science in Network Technology degree and focuses heavily on computer networks and operating systems, containing courses that prepare individuals for careers on corporate security teams. The majority of computer security and information security training is offered in master's and doctoral-level programs. The paper proposes Norwalk Community College (NCC) in Norwalk, Connecticut, develop a new degree program at NCC. It also details the process of developing the degree program, starting with advisory committee members' development of a knowledge and skills list for entry-level computer security professionals, identification of the components that could be taught in a formal program of study, and the packaging of knowledge and skills components into logical course delivery units. The paper argues for development of similar programs at other community colleges. (NB)
- Published
- 2002
6. Could AI help you to write your next paper?
- Author
-
Hutson, Matthew
- Published
- 2022
- Full Text
- View/download PDF
7. Reference publication year spectroscopy (RPYS) of computer science papers from Eastern Europe
- Author
-
Fiala, Dalibor and Bornmann, Lutz
- Published
- 2020
- Full Text
- View/download PDF
8. An analysis of retracted papers in Computer Science.
- Author
-
Shepperd, Martin and Yousefi, Leila
- Subjects
COMPUTER science ,DATABASES ,RETRACTORS (Surgery) ,SECONDARY analysis ,SCIENTIFIC community - Abstract
Context: The retraction of research papers, for whatever reason, is a growing phenomenon. However, although retracted paper information is publicly available via publishers, it is somewhat distributed and inconsistent. Objective: The aim is to assess: (i) the extent and nature of retracted research in Computer Science (CS) (ii) the post-retraction citation behaviour of retracted works and (iii) the potential impact upon systematic reviews and mapping studies. Method: We analyse the Retraction Watch database and take citation information from the Web of Science and Google scholar. Results: We find that of the 33,955 entries in the Retraction watch database (16 May 2022), 2,816 are classified as CS, i.e., ≈ 8%. For CS, 56% of retracted papers provide little or no information as to the reasons. This contrasts with 26% for other disciplines. There is also some disparity between different publishers, a tendency for multiple versions of a retracted paper to be available beyond the Version of Record (VoR), and for new citations long after a paper is officially retracted (median = 3; maximum = 18). Systematic reviews are also impacted with ≈ 30% of the retracted papers having one or more citations from a review. Conclusions: Unfortunately, retraction seems to be a sufficiently common outcome for a scientific paper that we as a research community need to take it more seriously, e.g., standardising procedures and taxonomies across publishers and the provision of appropriate research tools. Finally, we recommend particular caution when undertaking secondary analyses and meta-analyses which are at risk of becoming contaminated by these problem primary studies. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
9. Differences between journal and conference in computer science: a bibliometric view based on Bayesian network.
- Author
-
Sun, Mingyue, Yue, Mingliang, and Ma, Tingcan
- Subjects
BAYESIAN analysis ,COMPUTER science conferences ,COMPUTER science ,CONFERENCE papers ,ACADEMIC conferences ,BIBLIOMETRICS - Abstract
This paper aims to investigate the differences between conference papers and journal papers in the field of computer science based on Bayesian network. This paper investigated the differences between conference papers and journal papers in the field of computer science based on Bayesian network, a knowledge-representative framework that can model relationships among all variables in the network. We defined the variables required for Bayesian networks modeling, calculated the values of each variable based Aminer dataset (a literature data set in the field of computer science), learned the Bayesian network and derived some findings based on network inference. The study found that conferences are more attractive to senior scholars, the academic impact of conference papers is slightly higher than journal papers, and it is uncertain whether conference papers are more innovative than journal papers. The study was limited to the field of computer science and employed Aminer dataset as the sample. Further studies involving more diverse datasets and different fields could provide a more complete picture of the matter. By demonstrating that Bayesian networks can effectively analyze issues in Scientometrics, the study offers valuable insights that may enhance researchers' understanding of the differences between journal and conference in computer science. Academic conferences play a crucial role in facilitating scholarly exchange and knowledge dissemination within the field of computer science. Several studies have been conducted to examine the distinctions between conference papers and journal papers in terms of various factors, such as authors, citations, h-index and others. Those studies were carried out from different (independent) perspectives, lacking a systematic examination of the connections and interactions between multiple perspectives. This paper supplements this deficiency based on Bayesian network modeling. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
10. Seeking Solution: High-Performance Computing for Science. Background Paper.
- Author
-
Congress of the U.S., Washington, DC. Office of Technology Assessment.
- Abstract
This is the second publication from the Office of Technology Assessment's assessment on information technology and research, which was requested by the House Committee on Science and Technology and the Senate Committee on Commerce, Science, and Transportation. The first background paper, "High Performance Computing & Networking for Science," published in 1989, framed the outstanding issues; this background paper focuses on the federal role in supporting a national high-performance computing initiative. Chapter 1, "High-Performance Computing and Information Infrastructure for Science and Engineering," discusses the goals of the initiative, the government's role, the structure of federal policy, major strategic concerns, and long-range planning needs. Chapter 2, "Policy Considerations for High-Performance Computing," describes the difficulties and barriers to advancing computer technology, providing access to resources, and expanding and improving usage. The purposes of these centers are also discussed in this section. Chapter 3, "High-Performance Computers: Technology and Challenges," discusses the research and development process and the evolution of computer technology. Brief descriptions of national and other high-performance computer facilities are appended. (KR)
- Published
- 1991
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.