±³º¸¹®°í SCHOLAR ½ºÄݶó
ÀÌ ÀÚ·á´Â ±¹°¡Áö½Ä ¿¬°è±â°ü°úÀÇ Çù¾à¿¡ µû¶ó ¹«·á·Î Á¦°øµË´Ï´Ù.
¿ø¹®À» ÀÌ¿ëÇϽñâ À§Çؼ­´Â ¿¬°è±â°üÀÇ Á¤Ã¥À» µû¸£°í ÀÖÀ¸´Ï
±Ã±ÝÇϽŠ»çÇ×Àº ¿¬°è±â°üÀ» ÅëÇØ ¹®ÀÇÇϽñ⠹ٶø´Ï´Ù.
°ð ¿¬°è±â°üÀ¸·Î À̵¿ÇÕ´Ï´Ù
º»¹®³»¿ë ¹Ù·Î°¡±â
Ȩ > Çѱ¹±³À°Æò°¡ÇÐȸ > ±³À°Æò°¡¿¬±¸
³í¹® Ç¥Áö

Comparison of item selection algorithms for test security in computerized adaptive testing

¿ø¹®º¸±â ¿ø¹®ÀúÀå ÀοëÁ¤º¸º¹»ç ±¸¸Å 6,160¿ø

±¹¹® ÃÊ·Ï

º» ¿¬±¸ÀÇ ¸ñÀûÀº ÄÄÇ»ÅÍÀûÀÀ°Ë»ç º¸¾ÈÀ» °³¼±Çϱâ À§ÇÑ ´Ù¾çÇÑ ¹®Ç×¼±ÅÃ¾Ë°í¸®ÁòÀÇ È¿°ú¸¦ ºñ±³ÇÏ´Â °ÍÀÌ´Ù. º¸¾ÈÀ» °­È­Çϱâ À§ÇÑ ´ë¾ÈÀûÀÎ ¹®Ç×¼±ÅÃ¾Ë°í¸®ÁòÀÇ Çϳª°¡ Zhang & Chang(2005)ÀÌ ¼Ò°³ÇÑ ´ÙºÐ¹®Ç×ÀºÇàÀ» ÀÌ¿ëÇÏ´Â °ÍÀÌ´Ù. ±×µéÀÇ ´ÙºÐ¹®Ç×ÀºÇà ¿©·¯°³ÀÇ ¹®Ç×ÀºÇàÀ» »ç¿ëÇÏ¿© ¹®Ç×À» °ãÄ¡´Â ¹®Ç×ÀºÇà°ú °ãÄ¡Áö ¾Ê´Â ¹®Ç×ÀºÇà°£ÀÈ ¹®Ç׳ëÃâÀ²À» ÀÚµ¿ÀûÀ¸·Î ...

[´õº¸±â]

¿µ¹® ÃÊ·Ï

The purpose of this study is to compare item selection algorithms that are designed to improve test security in
computerized adaptive testing and explore the effectiveness of those item selection alg...

[´õº¸±â]

¸ñÂ÷

¥°. Simulation Studies
¥±. Results
¥². Conclusion and Discussion

ÇØ´ç °£Ç๰ ¼ö·Ï ³í¹®

¤ý°æÇâÁ¡¼ö ÃßÁ¤ ¸ðÇü¿¡ µû¸¥ ¸ÅĪ ¹× ÀΰúÈ¿°ú °ËÁ¤ °á°ú ºñ±³
¤ýÀÎÁöÁø´Ü¸ðÇü QÇà·Ä Ÿ´çÈ­ ¹æ¹ý °£ÀÇ È¸º¹·ü ºñ±³
¤ý»çȸ¼±Åà Åë°è¸ðÇüÀÇ ¹æ¹ý·ÐÀû Ư¼º°ú p2¿Í p*¸ðÇüÀ» Ȱ¿ëÇÑ ³²ÀÚ°íµîÇлýÀÇ ¿µ¾îµµ¿ò ³×Æ®¿öÅ© ºÐ¼®
¤ýRasch ÃøÁ¤ ¸ðÇüÀ» ÀÌ¿ëÇÑ Ã»¼Ò³â ÀÎÅÍ³Ý Áßµ¶ ôµµÀÇ Å¸´çÈ­
¤ýRasch ÃøÁ¤¸ðÇüÀ» »ç¿ëÇÑ ¹ü¹ý û¼Ò³â ´ë»ó PAI-A °ø°Ý¼º ôµµ Ÿ´çÈ­
¤ý´ÙÁßóġÀÇ ¼±ÅÃÆíÀǸ¦ Á¶Á¤ÇÑ EBS ¼ö´É°­ÀÇ È¿°ú ºÐ¼®
¤ý±³À° ºÐ¾ß ¸ÞŸºÐ¼®À» À§ÇÑ 50°³ Çʼö º¸°í Ç׸ñ
¤ý±³»çÀÇ ¼÷Á¦ Çǵå¹éÀÌ ÇлýÀÇ ÀÚ±âÁ¶ÀýÇнÀ, °úÁ¦°¡Ä¡, ÇнÀŵµ ¹× Çо÷¼ºÃëµµ¿¡ ¹ÌÄ¡´Â ¿µÇâ
¤ýÀÚ±âȸ±Í±³Â÷Áö¿¬¸ðÇü°ú ÀáÀ缺Àå¸ðÇüÀ» ÀÌ¿ëÇÑ ÀÚ±âÈ¿´É°¨ÀÌ ¼ö¾÷ÀÌÇØµµ¿¡ ¹ÌÄ¡´Â Á¾´ÜÀû °ü°è ºÐ¼®
¤ý´ëÇÐ ±¸Á¶ °³Çõ Æò°¡ÀÇ ¹è°æ, ÀïÁ¡ ¹× ´ë¾È
¤ýComparison of item selection algorithms for test security in computerized adaptive testing
¤ýInvestigation of Minimum Sample Size Requirements for Equipercentile Equating of Mixed-Format Tests
¤ýExamining the Co-evolution of Friendship Networks and Students¡¯ Bullying Behaviors in Elementary School