The Research Ninja

Search This Blog

Navigation

  • Home
  • Research Reviews
  • _Cyber Security
  • _Edu Tech
  • Knowledge Reviews
  • _Cyber Security
  • __TCP/IP Protocol Suite
  • __Network Infrastructure
  • __Linux OS
  • __Cryptography Intro
  • __Network Attacks
  • __Data Analysis
  • __Windows OS
  • __SecOps
  • _Sec DevOps
  • __Software Engineering
  • __Sw Sec Fundamentals
  • __Software Testing
  • __Software Security 1
  • __Software Security 2
  • __Software Attack Techniques
  • _Data Science
  • _Splunk
  • Projects
  • _CEH v10 case study
  • _Challenges with SDN/ML security
  • _White Wolf
  • Misc
  • _Conferences and Travel
  • Store

The Research Ninja

Labels

Cyber Security Edu Tech featured Leadership Psychology Research Resources

Search This Blog

Navigation Mobile

  • Home
  • Styles
  • _Content Style
  • __Grid
  • __List
  • __Altternate
  • _Featured Style
  • __Featured
  • __Featured 1
  • __Featured 2
  • short code
  • Static page
  • 404
  • buy now

Harvard Research Writing Tips

byThe Research Ninja -

Constraint-Based Tutors: A Success Story

byThe Research Ninja -

TheWolf of Name Street: Hijacking Domains Through Their Name servers

byThe Research Ninja -

ZMap: Fast Internet-Wide Scanning and its Security Applications

byThe Research Ninja -

Intelligent tutoring systems with conversational dialogue

byThe Research Ninja -

Presentation, expectations, and experience: Sources of student perceptions of automated writing evaluation

byThe Research Ninja -

Active Learning through Game Play in a Data Structures Course

byThe Research Ninja -

Modeling how incoming knowledge, persistence, affective states, and in-game progress influence student learning from an educational game

byThe Research Ninja -

Scaffolding Collaborative Learning Opportunities Integrating Microworld Use and Argumentation File

byThe Research Ninja -

CSTutor: a pen-based tutor for data structure visualization

byThe Research Ninja -

Who Prophets From Big Data in Education File

byThe Research Ninja -

The Future of Big Data & Analytics in K-12 Education File

byThe Research Ninja -

Knowledge tracing: Modeling the acquisition of procedural knowledge

byThe Research Ninja -

Improving Stealth Assessment in Game-based Learning with LSTM-based Analytics

byThe Research Ninja -

Predicting Quitting in Students Playing a Learning Game

byThe Research Ninja -

Panorama of Recommender Systems to Support Learning

byThe Research Ninja -

Anchored Annotation to Support Collaborative Knowledge Construction

byThe Research Ninja -

To Tutor the Tutor: Adaptive Domain Support for Peer Tutoring

byThe Research Ninja -

CTSiM: A Computational Thinking Environment for Learning Science through Simulation and Modeling

byThe Research Ninja -

When learning about the real world is better done virtually: A study of substituting computer simulations for laboratory equipment

byThe Research Ninja -

New Potentials for Data-Driven Intelligent Tutoring System Development and Optimization

byThe Research Ninja -

Opening the Door to Non-Programmers: Authoring Intelligent Tutor Behavior by Demonstration

byThe Research Ninja -

The Behavior of Tutoring Systems

byThe Research Ninja -

My digital hand: A tool for scaling up one-To-one peer teaching in support of computer science learning

byThe Research Ninja -

Saving time or innovating practice: Investigating perceptions and uses of Learning Management Systems

byThe Research Ninja -

MOOC Learner Behaviors by Country and Culture; an Exploratory Analysis

byThe Research Ninja -

New Models of Open and Distributed Learning

byThe Research Ninja -

A Pedagogical Analysis of Online Coding Tutorials

byThe Research Ninja -
Newer Posts Home Older Posts

Categories

  • Cyber Security (22)
  • Edu Tech (26)
  • featured (6)
  • Leadership (1)
  • Psychology (12)
  • Research Resources (2)

Blog Archive

  • ►  2019 (21)
    • ►  November (1)
    • ►  October (3)
    • ►  September (4)
    • ►  August (1)
    • ►  May (1)
    • ►  April (4)
    • ►  March (3)
    • ►  February (2)
    • ►  January (2)
  • ▼  2018 (43)
    • ▼  August (1)
      • Harvard Research Writing Tips
    • ►  July (5)
      • Constraint-Based Tutors: A Success Story
      • TheWolf of Name Street: Hijacking Domains Through ...
      • ZMap: Fast Internet-Wide Scanning and its Security...
      • Intelligent tutoring systems with conversational d...
      • Presentation, expectations, and experience: Source...
    • ►  June (5)
      • Active Learning through Game Play in a Data Struct...
      • Modeling how incoming knowledge, persistence, affe...
      • Scaffolding Collaborative Learning Opportunities I...
      • CSTutor: a pen-based tutor for data structure visu...
      • Who Prophets From Big Data in Education File
    • ►  May (6)
      • The Future of Big Data & Analytics in K-12 Educati...
      • Knowledge tracing: Modeling the acquisition of pro...
      • Improving Stealth Assessment in Game-based Learnin...
      • Predicting Quitting in Students Playing a Learning...
      • Panorama of Recommender Systems to Support Learning
      • Anchored Annotation to Support Collaborative Knowl...
    • ►  April (7)
      • To Tutor the Tutor: Adaptive Domain Support for Pe...
      • CTSiM: A Computational Thinking Environment for Le...
      • When learning about the real world is better done ...
      • New Potentials for Data-Driven Intelligent Tutorin...
      • Opening the Door to Non-Programmers: Authoring Int...
      • The Behavior of Tutoring Systems
      • My digital hand: A tool for scaling up one-To-one ...
    • ►  March (8)
      • Saving time or innovating practice: Investigating ...
      • MOOC Learner Behaviors by Country and Culture; an ...
      • New Models of Open and Distributed Learning
      • A Pedagogical Analysis of Online Coding Tutorials
    • ►  February (7)
    • ►  January (4)

Loading...

Contact Me

Name

Email *

Message *

Copyright © 2019 The Research Ninja - All rights reserved.
Top