º» ¿¬±¸ÀÇ ¸ñÀûÀº ÄÄÇ»ÅÍÀûÀÀ°Ë»ç º¸¾ÈÀ» °³¼±Çϱâ À§ÇÑ ´Ù¾çÇÑ ¹®Ç×¼±ÅÃ¾Ë°í¸®ÁòÀÇ È¿°ú¸¦ ºñ±³ÇÏ´Â °ÍÀÌ´Ù. º¸¾ÈÀ» °ÈÇϱâ À§ÇÑ ´ë¾ÈÀûÀÎ ¹®Ç×¼±ÅÃ¾Ë°í¸®ÁòÀÇ Çϳª°¡ Zhang & Chang(2005)ÀÌ ¼Ò°³ÇÑ ´ÙºÐ¹®Ç×ÀºÇàÀ» ÀÌ¿ëÇÏ´Â °ÍÀÌ´Ù. ±×µéÀÇ ´ÙºÐ¹®Ç×ÀºÇà ¿©·¯°³ÀÇ ¹®Ç×ÀºÇàÀ» »ç¿ëÇÏ¿© ¹®Ç×À» °ãÄ¡´Â ¹®Ç×ÀºÇà°ú °ãÄ¡Áö ¾Ê´Â ¹®Ç×ÀºÇà°£ÀÈ ¹®Ç׳ëÃâÀ²À» ÀÚµ¿ÀûÀ¸·Î ...
The purpose of this study is to compare item selection algorithms that are designed to improve test security in
computerized adaptive testing and explore the effectiveness of those item selection alg...
¥°. Simulation Studies
¥±. Results
¥². Conclusion and Discussion
Compterized adaptive testing, test security , simulation study , item exposre rate , maximum information item selection method , -stratified multi stage method , Sympson-Hetter method , multiple item pools ÄÄÇ»ÅÍ ÀûÀÀ°Ë»ç , ÄÄÇ»ÅÍ ÀûÀÀ°Ë»çÀÇ º¸¾È , ½Ã¹Ä·¹ÀÌ¼Ç ¿¬±¸ , ¹®Ç× ³ëÃâ·ü , ÃÖ´ë¹®Ç×Á¤º¸¼±Åùý , -´ÙÃþÈ ¹æ¹ý , ½É½¼-ÇØÅÍ ¹æ¹ý , ´ÙºÐ¹®Ç×ÀºÇà
¤ý°æÇâÁ¡¼ö ÃßÁ¤ ¸ðÇü¿¡ µû¸¥ ¸ÅĪ ¹× ÀΰúÈ¿°ú °ËÁ¤ °á°ú ºñ±³
¤ýÀÎÁöÁø´Ü¸ðÇü QÇà·Ä Ÿ´çÈ ¹æ¹ý °£ÀÇ È¸º¹·ü ºñ±³
¤ý»çȸ¼±Åà Åë°è¸ðÇüÀÇ ¹æ¹ý·ÐÀû Ư¼º°ú p2¿Í p*¸ðÇüÀ» Ȱ¿ëÇÑ ³²ÀÚ°íµîÇлýÀÇ ¿µ¾îµµ¿ò ³×Æ®¿öÅ© ºÐ¼®
¤ýRasch ÃøÁ¤ ¸ðÇüÀ» ÀÌ¿ëÇÑ Ã»¼Ò³â ÀÎÅÍ³Ý Áßµ¶ ôµµÀÇ Å¸´çÈ
¤ýRasch ÃøÁ¤¸ðÇüÀ» »ç¿ëÇÑ ¹ü¹ý û¼Ò³â ´ë»ó PAI-A °ø°Ý¼º ôµµ Ÿ´çÈ
¤ý´ÙÁßóġÀÇ ¼±ÅÃÆíÀǸ¦ Á¶Á¤ÇÑ EBS ¼ö´É°ÀÇ È¿°ú ºÐ¼®
¤ý±³À° ºÐ¾ß ¸ÞŸºÐ¼®À» À§ÇÑ 50°³ Çʼö º¸°í Ç׸ñ
¤ý±³»çÀÇ ¼÷Á¦ Çǵå¹éÀÌ ÇлýÀÇ ÀÚ±âÁ¶ÀýÇнÀ, °úÁ¦°¡Ä¡, ÇнÀŵµ ¹× Çо÷¼ºÃëµµ¿¡ ¹ÌÄ¡´Â ¿µÇâ
¤ýÀÚ±âȸ±Í±³Â÷Áö¿¬¸ðÇü°ú ÀáÀ缺Àå¸ðÇüÀ» ÀÌ¿ëÇÑ ÀÚ±âÈ¿´É°¨ÀÌ ¼ö¾÷ÀÌÇØµµ¿¡ ¹ÌÄ¡´Â Á¾´ÜÀû °ü°è ºÐ¼®
¤ý´ëÇÐ ±¸Á¶ °³Çõ Æò°¡ÀÇ ¹è°æ, ÀïÁ¡ ¹× ´ë¾È
¤ýComparison of item selection algorithms for test security in computerized adaptive testing
¤ýInvestigation of Minimum Sample Size Requirements for Equipercentile Equating of Mixed-Format Tests
¤ýExamining the Co-evolution of Friendship Networks and Students¡¯ Bullying Behaviors in Elementary School