Results 261 to 270 of about 331,923 (300)
Some of the next articles are maybe not open access.
Authentic Tasks in a Standards-Based World
The Mathematics Teacher, 2012The Meeting for Lunch problem exemplifies how standards provide more than an outline of daily activities for an entire school year.
Michael Todd Edwards +2 more
openaire +1 more source
Reimagining Authentic Mathematical Tasks for Non-STEM Majors
Canadian Journal of Science, Mathematics and Technology Education, 2020While the culture of many mathematics departments inflects strongly towards STEM, most mathematics departments also offer a significant number of introductory courses intended for both STEM and non-STEM majors. We are a group of mathematicians who, in this work, examine the intent and goals of a university mathematics education for the non-STEM student.
Fok-Shuen Leung +2 more
openaire +1 more source
TASK-INDEPENDENT EEG-BASED AUTHENTICATION
Abstract This paper introduces a cutting-edge approach to Electroencephalography (EEG) based authentication that transcends traditional task-specific requirements, significantly enhancing user experience and authentication accuracy. By employing a convolutional neural network (CNN) to develop a deep learning model, the study successfully extracts ...ABOOTHAR MAHMOOD SHAKIR +1 more
openaire +1 more source
Enhancing Student Learning in Negotiation Skills: Using Authentic and In-Authentic Assessment Tasks
SSRN Electronic Journal, 2012The literature on teaching/learning of negotiation skills presents two assumptions. First, planning for negotiations – or improving one’s planning – best predicts more effective negotiation practice. This suggests the need to tie planning to assessment, particularly as developing negotiation plans is the most ‘authentic’ assessment task a student can ...
Peter Sheldon +2 more
openaire +1 more source
Anti-trojan security module for biometric authentication tasks
38th Annual 2004 International Carnahan Conference on Security Technology, 2004., 2005When implementing biometric authentication systems, several problems related to security should be faced. These problems are mostly derived from the high sensibility of biometric data, and the feeling of governmental control when central databases are used.
R. Sanchez-Reillo +3 more
openaire +1 more source
Assessing Authentic Intellectual Work in Mathematics Tasks
2017This paper reports an analysis of the tasks included in the Mathematical Challenges book. The analysis was based on the proposals of the Authentic Intellectual Work (AIW). The purpose of the study focuses on assessing the potential of the mathematical challenges to promote in-depth and meaningful learning through the connection with different contexts,
Lesly Yahaira Rodríguez Martínez +2 more
openaire +1 more source
Fixed Tasks for Continuous Authentication via Smartphone
Proceedings of the 12th International Conference on Pattern Recognition Applications and Methods, 2023Vincenzo Gattulli +3 more
openaire +1 more source
Two Task-focused Pillars of Authentic Conversations
2018Craig was about to start a performance conversation with Mary, one of his supervisors . He had arranged to meet Mary in a quiet, comfortable room away from his office.
openaire +1 more source
Integrating authentic assessment tasks in work integrated learning hospitality internships
Journal of Vocational Education and Training, 2023Julie Nyanjom +2 more
exaly

