
Product
Rust Support Now in Beta
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
@geekie/irt
Advanced tools
@geekie/irt
IRT tools in JavaScript
This library contains JavaScript implementations of functions related to Item Response Theory logistic models.
itemResponseFunction(zeta: Zeta, theta: number)
Calculates the probability that a person with the given ability level theta will answer correctly an item.
zeta
is an object with the 3 parameters: {a, b, c}
information(zeta: Zeta, theta: number)
| information(zetaArray: Array<Zeta>, theta: number)
Calculates how much information an item (or an array of items) contributes for a given ability level theta.
estimateAbilityEAP(answers: Array<0 | 1>, zetaArray: Array<Zeta>)
Estimate a person's ability using the EAP method (reference).
answers
is an array of 0
or 1
representing if the answer given is correct, related to the items of zetaArray
. 1
means the answers is correct.
Example: answers[0]
represents if the person answered the item related to zetaArray[0]
.
FAQs
IRT tools in JavaScript
We found that @geekie/irt demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Socket's Rust support is moving to Beta: all users can scan Cargo projects and generate SBOMs, including Cargo.toml-only crates, with Rust-aware supply chain checks.
Product
Socket Fix 2.0 brings targeted CVE remediation, smarter upgrade planning, and broader ecosystem support to help developers get to zero alerts.
Security News
Socket CEO Feross Aboukhadijeh joins Risky Business Weekly to unpack recent npm phishing attacks, their limited impact, and the risks if attackers get smarter.