Making A Difference: 'Tell Me Again' Core Skills DVD
This DVD offers clear and insightful guidance on performing basic core skills for garment construction with professional techniques. Examples include a step-by-step demo on making a hem and making a variety of seams. It also covers repetitive tasks as threading the machine, and winding the bobbin. The sections are approximately 2 minutes long with a voice over to illuminate the demonstrations. The video was made through CLIP/CETL as a learning resource only for London College of Fashion and Univ
Sources of Finance and the Canons of Good Lending - Raw Materials
Raw Materials - A learning activity about sources of finance and how lenders analyse lending proposals
Solving Radical Equations - Yay Math
The video demonstrates techniques for solving radical equations. White board in a class setting, some interaction, engaging, several examples of increasing complexity. The discussion is clear and understandable. Produced by Robert Ahdoot, yaymath.org
Lecture 23 - 11/15/2010
A Design Approach to Research in Technology Enhanced Mathematics Education
This thesis explores the prospect of a design science of technology enhanced mathematics education (TEME), on three levels: epistemological, methodological and pedagogical. Its primary domain is the identification of scientific tools for design research in TEME. The outputs of this enquiry are evaluated by a demonstrator study in the domain of secondary school mathematics. A review of existing literature establishes a need for a design perspective in TEME research, but at the same time suggests
Components Based Software Design
The objectives of the course are: To understand and learn the meaning, techniques, problems and needs of the Components based Software Design. To learn General fundaments of Components, Components Based Software Engineering, Object Models, Interface Models, What are Code Components, Executable Components , Patterns To develop your capacities of Developing software based on Components, Solving integration problems
The objective of this course is to give an overview of different cipher and security techniques as well as their applications to computer networks and telematic services. The student will have to know both symmetric and asymmetric encryption techniques, hash functions, cryptographic checksums, authentication protocols, digital signature, digital certificates and applications of all of them.
You've Got to See It to Believe It!
Students develop an understanding of visible air pollutants with an incomplete combustion demonstration, a "smog in a jar" demonstration, building simple particulate matter collectors, and exploration of engineering roles related to air pollution. In an associated literacy activity, students learn basic marketing concepts and techniques, and the principles of comparative analysis, while creating an advertisement for a hybrid vehicle. Note: You may want to set up the activities for Air Pollution
Intimate Partner Violence on Campus: A Test of Social Learning Theory
The current study sought to examine the theoretical field of intimate partner and domestic violence research. The research focused on integrated social learning, power-control, and fundamental components of intergenerational transmission and male-support theories. The use of the Conflict Tactic Scale (CTS 2), Seller’s (2003) social learning subscale, and a combination of measures of power-control theory were used to determine the relative strength of learning, power, and male social networks i
Modeling of the research and education strategy in Faculty of Mathematics and Informatics, Sofia Uni
The efficient and effective university education system is a huge benefit for individuals and for the community. The competences, innovation, and creativity developed through academic education are a major factor in the success in creating jobs and in our prosperity. As Bulgaria join EU community, it has the opportunity to act on the competition challenges and set the economy on a higher growth path. EC and World Bank proposes a strong reform agenda focused on five areas to narrow the income, pr
This instructional video details the seven modes that can be derived from a major scale and gives insight regarding their proper usage. Run time 06:30.
Interfacing adaptive solutions with corporate training systems
not available,Research report of the ProLearn Network of Excellence (IST 507310), Deliverable 1.9
SelMa - Self-guided Learning in Teaching Mathematics
In the project ``Self-guided Learning in Teaching Mathematics - SEC II'' (SelMa), five authoring schools are working out scenarios, media and materials for phases of self-guided learning, which will be tested systematically by 10 trial schools with regard to their everyday suitability. In this paper three approaches to such learning arrangements (independent learning centre, jigsaw classroom and learning at stations) are being outlined and relevant experiences are being made available. Learning
Virtual Learning Environments as a Supplement to Traditional Teaching
Many factors influence teaching nowadays. Numbers of students are increasing, some students pay for studies and require more flexible teaching, more students have access to Internet, the learning material is changing rapidly (especially of subjects, related to information technologies), publishing industry is slow and expensive. All that stimulates usage of modern technologies in education. Virtual Learning Environments (VLEs) is one of the forms of e-learning. They open new ways of teaching and
1.264J Database, Internet, and Systems Integration Technologies (MIT)
This course addresses information technology fundamentals, including project management and software processes, data modeling, UML, relational databases and SQL. Topics covered include internet technologies, such as XML, web services, and service-oriented architectures. This course provides an introduction to security and presents the fundamentals of telecommunications and includes a project that involves requirements / design, data model, database implementation, website, security and data netw
Infantile Multimedia Environment - An Early Digital Inclusion
Children are recognized as individuals with rights, constituted by multiple human dimensions that can be excited by several activities and several Medias (books, videos, computers, etc.). And the Medias are understood as the tools to qualitatively contribute to the childrens development, giving them opportunity to improve their creativity and imagination, enriching their cultural repertoire. This paper aims to describe the results of a special project implemented in a public day-care centre in
Fundamentals of Program Evaluation
Fundamentals of Program Evaluation familiarizes students in different types of program evaluation, including needs assessment, formative research, process evaluation, monitoring of outputs and outcomes, impact assessment, and cost analysis.
Radiation Terror 101
Introduces you to general radiation principles, radiation safety and protection, and the basic types of radiological terror, and also provides practical guidance on acute response techniques and general countermeasures.
Managed Care and Health Insurance
Presents an overview of major issues related to the design, function, management, regulation, and evaluation of health insurance and managed care plans.
Introduction to Methods for Health Service Research and Evaluation
Introduction to Methods for Health Services Research and Evaluation provides an introduction to basic methods for undertaking research and program evaluation within health services organizations and systems.