|
|
|
Anderson Rodrigo Quoos, Eda Cristina Benkendorf, Cleston Alexandre dos Santos, Silvana Anita Walter
Pág. 217 - 240
El presente estudio se diferencia por incluir el lente teórico del aprendizaje cooperativo para minimizar las posibles diferencias de rendimiento entre los estilos de aprendizaje de los alumnos del curso de Ciencias Contables. El objetivo fue verificar l...
ver más
|
|
|
|
|
|
|
Yunia Ikawati, M. Udin Harun Al Rasyid, Idris Winarno
Pág. 92 - 106
Learning styles are very important to know so that students can learn effectively. By understanding the learning style, students will learn about their needs in the learning process. One of the famous learning management systems is called Moodle. Moodle ...
ver más
|
|
|
|
|
|
|
Jonah Rosenthal, Nicole Haderlein, Matthew Silverman, Austin Scholp and Jack Jiang
Straw phonation has a long history of being a successful vocal therapy technique. However, not much is known about the mechanics of phonation with a straw, nor the best combination of phoneme and straw dimensions to be used. A significant limitation in r...
ver más
|
|
|
|
|
|
|
Isabella Silverman, Blaze Engelman, Alexa Leone, Michael Rothenbucher, Allison Munch, Josph Sorrentino, Brandon Markiewicz, Chris Pearson, Chris Baxter, Craig Swanson, George Tsiatas and Malcolm Spaulding
Under the STORMTOOLS initiative, maps of the impact of sea level rise (SLR) (0 to 12 ft), nuisance flooding (1?10 yr), 25, 50, and 100 yr storms, and hindcasts of the four top ranked tropical storms have been developed for the coastal waters of Rhode Isl...
ver más
|
|
|
|
|
|
|
Aisha Y Alsobhi,Khaled H Alyoubi
Pág. pp. 25 - 43
Learning is a fundamental element of people?s everyday lives. Learning experiences can take the form of our interactions with others, through attending an educational establishment, etc. Not everyone learns in the same way, and even people who are consid...
ver más
|
|
|
|
|
|
|
Jheng-Jia Huang, Yi-Fan Tseng, Qi-Liang Yang and Chun-I Fan
Authentication has been adopted in many areas, but most of these authentication schemes are built using traditional cryptographic primitives. It is widely believed that such primitives are not resistant to quantum algorithms. To deal with those quantum a...
ver más
|
|
|
|
|
|
|
Li Yin and Robert Mark Silverman
-
|
|
|
|
|
|
|
Munir Shuib,Amelia Abdullah,Siti Norbaya Azizan,Thenmolli Gunasegaran
Pág. pp. 41 - 46
English is the most important second language in most non-English speaking countries, including Malaysia. A good English proficiency comes from good grasp of grammar. To conquer the problems of low English proficiency among Malaysians, it is important to...
ver más
|
|
|
|
|
|
|
John M. de Figueiredo andBrian S. Silverman
Pág. 1632 - 1650
|
|
|
|
|
|
|
Nicola Persico, José C. R. Pueblita, Dan Silverman
Pág. 242 - 288
|
|
|
|