نتایج جستجو برای: authentic video
تعداد نتایج: 185337 فیلتر نتایج به سال:
Based on the seamless learning approach (Wong, 2012), this paper illustrates how media competence can be developed, what didactic design is necessary, and what features this design possesses for teaching media competence at university. The ‘Natural History Museum Berlin project’ is considered as an example of this. In this project, during the 2009 summer term, students at the Carl von Ossietzky...
the present research investigated the effect of self-regulatory approach (with two components of self-checking and self-efficacy) on pre-intermediate iranian learners' lexical segmentation in listening comprehension via authentic listening comprehension texts. to achieve this purpose, the investigators administered an oxford placement test (2007) to ninety-eight students of two girls’ priv...
Discussions about the possibilities and limitations of the various approaches to the development of intelligent systems are too often based on vague concepts and assumptions. Intelligence is usually considered only in terms of behaviour; we point out that no behaviour can be considered "really intelligent" independently of its motivations. In this context, we introduce the concepts of authentic...
Abstract Introduction: Organizational citizenship behavior is considered as a worker's attitude and passion as a driver for work in service organizations. One of the factors affecting the creation and promotion of transcendental behaviors, such as organizational citizenship behavior and job Engagement for service organizations, are ethical leadership styles in the organizations that pay attent...
Ethnicity has been defined primarily by the physical appearance of pedagogical agents. Research has shown that shared ethnicity between the agent and the user reflects in a positive perception of the agent's capabilities and provides motivation for learning tasks for students of color (Baylor, 2005; Nass et al., 2000). However, research has failed to examine what kinds of implementations of ped...
Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public data networks is an expensive proposition. This is, in part, due to the difficulty of building and ...
An innate deficiency of the Internet is its susceptibility to IP spoofing. Whereas a router uses a forwarding table to determine where it should send a packet, previous research has found that a router can similarly employ an incoming table to verify where a packet should come from, thereby detecting IP spoofing. Based on a previous protocol for building incoming tables, SAVE, this paper introd...
Image authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of the original image might exist. In addition, intermediaries might tamper with the contents. Distinguishing legitimate diversity from malicious manipulations is the challenge addressed in this dissertation. We propose an approach using ...
Digital technology and its use within democratic pedagogy has been an under-researched area in physical education (PE) higher (HE). Furthermore, we know little about how assessment methods are experienced by students HE. As such, this article explores student perceptions experiences of practices through video narratives HE PE these allowed to demonstrate their learning. Using responses from e-q...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید