scholarly journals SCHOOL ASSESSMENT: TRAINING, HELP, AUTONOMY

2021 ◽  
Vol 03 (07) ◽  
pp. 288-293
Author(s):  
Naouel BOUBIR

In this paper, we would like to present our evaluation methodology called Accompanied Assessment Learning. Assessment is part of the teacher’s task. In the school context, this activity improves learning. Divided into three stages, our assessment method is first based on training to do a task within a group of cooperative learners accompanied by a teacher. In the second step, based on the help and assistance of peers in the same group, the teacher assesses the proper course of the task by observing the reasoning and work of each group. After the measures taken by the teacher in the previous steps, the learner becomes more autonomous by performing the task individually.

2020 ◽  
Vol 4 (3) ◽  
pp. 531-538
Author(s):  
Restu ◽  
Mandiyo Priyo

Women as agents of change are expected to have an active role in disaster risk reduction (DRR) activities, mainly to defend themselves and their families from the effects of disasters. This dedication activity is a preparedness level assessment of the members of PKK RT. 05 RW. 08, Banyuraden village, Gamping Sleman DIY. It is an academic involvement to support the village program in realization a disaster-resilient village (Destana) and to solute the partner's problem. The assessment method uses a framework developed by the Indonesian Institute of Sciences (LIPI) in collaboration with The United Nations Educational, Scientific and Cultural Organization (UNESCO) and International Strategy for Disaster Reduction (ISDR) in 2006. There are three stages of assessment, i.e. a survey for collecting data using a questionnaire, analyzing the preparedness index, and determining the preparedness level. Because the activities were carried out during the Covid-19 pandemic, the questionnaire was conducted using Google forms to implement the physical distancing program. This dedication activity found a description that the members of PKK RT. 05. RW. 08 Banyuraden village, Gamping Sleman DIY has a moderate of preparedness rate, with an index of 62.07%.  The aspect of disaster knowledge was classified as good, but the emergency response plan and resource mobilization are not yet. The implementation of the Destana program in the Banyuraden village, Sleman district, especially in RT.05 RW.08 might be aligned with the results of this dedication activity. Further dedication activities can also be carried out, such as drafting emergency response plans and organizing preparedness training for families to improve the community preparedness of RT. 05 RW. 08, Banyuraden, Gamping Sleman DIY.


2018 ◽  
Vol 43 (4) ◽  
pp. 16-24
Author(s):  
M. Bekar ◽  
M Var

From past to present, Istanbul has witnessed many empires and historical events. This accumulation has made Istanbul one of the most important cities in Turkey. The architecture and historic potential of the city dates back to centuries ago. Palace architecture is the most important cultural inventories of the city. Over time, technological developments and the industrial revolution brought the “western influence” to Turkey. This effect is observed on planning character and on the planting design. The main material of the work is Topkapı Palace, Beylerbeyi Palace and Dolmabahçe Palace. In this context, this paper consist of three stages. Literature studies have been carried out in the first stage. “Western effect” on the palaces has been investigated after the second step consisting of the field study and mapping. As result of the examinations, western influence was studied in three stages as general planning character, structural material and plant material. As a result of the study, results were obtained for each title. Suggestions were made for rehabilitation and palace gardens planning.


Author(s):  
Márcio J. Mantau ◽  
Marcos H. Kimura ◽  
Isabela Gasparini ◽  
Carla D. M. Berkenbrock ◽  
Avanilde Kemczinski

The issue of privacy in social networks is a hot topic today, because of the growing amount of information shared among users, who are connected to social media every moment and by different devices and displays. This chapter presents a usability evaluation of the privacy features of Facebook's social network. The authors carry out an evaluation composed by three approaches, executed in three stages: first by the analysis and inspection of system's features related to privacy, available for both systems (Web-based systems and mobile-based systems, e.g. app). The second step is a heuristic evaluation led by three experts, and finally, the third step is a questionnaire with 605 users to compare the results between specialists and real users. This chapter aims to present the problems associated with these privacy settings, and it also wants to contribute for improving the user interaction with this social network.


Author(s):  
Leandro Ferreira De Melo ◽  
Tatiane Clair Da Silva ◽  
Denise De Micheli

A compreensão docente sobre os significados e prática da avaliação da aprendizagem é de suma importância para o processo de ensinoaprendizagem. Neste sentido, esta pesquisa teve como objetivo entender as percepções de 30 docentes do Ensino Fundamental II e Médio sobre a avaliação da aprendizagem. Os levantamentos de dados foram realizados com a aplicação de um questionário composto por três questões que os professores responderam descritivamente, manifestando assim suas percepções sobre o conceito de avaliação da aprendizagem. As análises dos dados foram feitas a partir da técnica de Análise de Conteúdo. As discussões tiveram como fundamentações teóricas autores que discutem avaliação da aprendizagem a partir de vertentes críticas. Os resultados demonstraram que os docentes entendem que a função da avaliação é de “diagnosticar e sinalizar caminhos para o aprimoramento do processo de ensino-aprendizagem”, todavia, apontaram que há dificultadores, que atrapalham a efetivação desta, por exemplo: excesso de aulas, turmas para lecionar e avaliar; tempo insuficiente para planejar e refletir sobre as avaliações aplicadas e seus resultados. O acúmulo de cargos foi destacado como um fator que atrapalha a efetivação da avaliação qualitativa. Em síntese, as falas  dos professores manifestaram que para exceder os paradigmas avaliativos tradicionais, faz-se necessário colocar em prática ações políticas e estruturais no contexto escolar, como a Lei do Piso (Lei nº 11.738/2008), para que, desse modo, tenham mais tempo para reflexão-ação em prol da efetivação da avaliação formativa.Palavras-chave: Avaliação. Ensino-Aprendizagem. Docentes-Discentes.AbstractTeaching comprehension about the meanings and practice of learning assessment is of paramount importance to the teaching-learning process. Therefore, the objective of this research was to understand the perceptions of 30 teachers from Middle and High School about learning assessment. The data were collected through the application of a questionnaire composed of three questions that the teachers answered descriptively, thus manifesting their perceptions about the concept of learning evaluation. Data analysis was performed using the Content Analysis technique. The discussions were based on theoretical authors who discuss evaluation of learning starting of critical aspects. The results showed that the teachers understand that the function of the evaluation is to “diagnose and signal ways to improve the teachinglearning process”, however, they pointed out that there are difficulties that disturbs the effectiveness of the same , for example:  surplus of classes to be taught and evaluated ; insufficient time to plan and reflect about the evaluations applied and their results. The accumulation of positions was highlighted as a factor that hinders the effectiveness of the qualitative evaluation. In summary, the teachers stated that to in order to exceed the traditional evaluative paradigms, it is necessary to put into practice political and structural actions in the school context, such as Lei do Piso (11.738 / 2008), so that they have more time for reflection-action in favor of the effectiveness of formative evaluation.Keywords: Evaluation. Teaching-Learning. Teachers-Students.


2008 ◽  
Vol 273-276 ◽  
pp. 204-209
Author(s):  
Sayed Hamid Reza Fatemi Nayeri ◽  
Jalil Vahdati Khaki ◽  
Mohammad Reza Aboutalebi

A mechanism for the combustion synthesis of TiC+Al2O3 was proposed in a mechanically activated TiO2-Al-C system. As-milled powder mixture was analyzed using XRD and TEM techniques where no chemical reaction and/or inter-particle diffusion were identified. The results obtained from DTA tests on unmilled powder revealed that the combustion synthesis occurred in a single step at 962 °C while the synthesis of mechanically activated powder mixture occurred in three different stages. The XRD analysis on the synthesized samples of 8 hour premilled powder at different temperatures showed that the three stages were as follows: First the reaction between Al and TiO2 takes place forming Al3Ti, Ti2O3, and Al2O3 at 700 °C. In the second step, Ti-rich titanium aluminides (AlTi, AlTi2, and AlTi3) and TiO, are formed at 923 °C, and finally the formation of TiC+Al2O3 is completed at 1329 °C.


2018 ◽  
Vol 16 (3) ◽  
pp. 389
Author(s):  
Marcelo De Castro Orefice ◽  
Pedro L. Valls Pereira

In this paper, we discuss the practice of portfolio pumping in Brazil. Although the topic is recurrent in other countries, few studies provide this analysis for the Brazilian case. The statistical study is elaborated in three stages: first, we considered Brazilian investment funds' shares for the period from September 2011 to June 2016, estimating daily excess returns of those funds based on the Ibovespa, considering and not considering the adjusted beta of the portfolios of those funds. Our results suggest that the practice of portfolio pumping is more frequent at the end of months ex-semester than at the end of semesters. When we consider the beta adjusted to calculate abnormal returns of the funds, we found a greater significance for the existence of this practice. In the second step, the funds were ordered based on their performance in the previous period (by month, semester, and year), which resulted in few relevant results for the analysis of the topic, despite what is proposed by the principal-agent problem literature. In the last step, we analyzed the practice of portfolio pumping in stocks traded on B3, ordering them by their participation in the portfolios and by their Market Cap. The results indicated that the stocks with greater presence in the portfolios of the investment funds have higher excess returns at the end of the periods, reinforcing the thesis that this increase in stock prices in those moments may be a consequence of a deliberate action taken by the managers of those funds.


2019 ◽  
Vol 2 (1) ◽  
pp. 1
Author(s):  
Ali Geno

<p>Money Laundering is an attempt to hide or disguise the origin of money or assets resulting from a criminal act through various financial transactions so that the money or assets appear as if they came from legal activities. There are three stages taken to " purification" the proceeds of crime in laundring money. First, the money generated from a crime activity is changed into a form that does not or does not arouse suspicion through placement in the financial system in various ways (placement). The second step is to conduct financial transactions that are complex, layered and anonymous with the aim of separating the proceeds of crime from various sources so that it is difficult to trace the origin of the fund which in other words hides or disguises the origin of the proceeds of crime (layering). The last step is the stage where the actor re-enters funds that have escaped their origins into Assets that appear legitimate both to be enjoyed directly, invested in various forms of material and financial assets, used to finance legitimate business activities or to refinance activities criminal act (integration).</p>


MADRASAH ◽  
2012 ◽  
Author(s):  
Athok Fu’adi

This study aimed to describe the implementation of active learning, creative, effective and fun at MI Partners PGMI STAIN Ponorogo which include: 1) preparation PAKEM learning, 2) implementation PAKEM learning, 3) PAKEM learning assessment, and 4) factors inhibiting and supporting learning PAKEM. This research is a qualitative research subject was a teacher at MI Partners Ma'arif Polorejo and Setono. Research instrument is the researcher himself. Data were collected through interviews, observation, documentation. The validity of data obtained by performing triangulation and constant observation. Data analysis was performed since the data were collected using an interactive model that consists of three stages, namely data reduction, data entry, and conclusion. The results showed that the preparation of learning PAKEM, found some teachers had not made in accordance with the characteristics of RPP PAKEM, this is because the model was still hung up on previous learning. Implementation of the learning PAKEM already running but not fully performed by all classes, only a few classes. Implementation of assessment, and classroom-based assessment using 3 domains, cognitive, affective and psychomotor, but to apply all that trouble. Barriers and support in learning PAKEM, obstacle lies in the teachers themselves and infrastructure facilities in the form of instructional media, while support from all stakeholders.<br /><br />Keywords: active, creative, and effective learning (PAKEM), Madrasah<br /><br />


Information ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 233 ◽  
Author(s):  
Nadja Schömig ◽  
Katharina Wiedemann ◽  
Sebastian Hergeth ◽  
Yannick Forster ◽  
Jeffrey Muttart ◽  
...  

Within a workshop on evaluation methods for automated vehicles (AVs) at the Driving Assessment 2019 symposium in Santa Fe; New Mexico, a heuristic evaluation methodology that aims at supporting the development of human–machine interfaces (HMIs) for AVs was presented. The goal of the workshop was to bring together members of the human factors community to discuss the method and to further promote the development of HMI guidelines and assessment methods for the design of HMIs of automated driving systems (ADSs). The workshop included hands-on experience of rented series production partially automated vehicles, the application of the heuristic assessment method using a checklist, and intensive discussions about possible revisions of the checklist and the method itself. The aim of the paper is to summarize the results of the workshop, which will be used to further improve the checklist method and make the process available to the scientific community. The participants all had previous experience in HMI design of driver assistance systems, as well as development and evaluation methods. They brought valuable ideas into the discussion with regard to the overall value of the tool against the background of the intended application, concrete improvements of the checklist (e.g., categorization of items; checklist items that are currently perceived as missing or redundant in the checklist), when in the design process the tool should be applied, and improvements for the usability of the checklist.


2018 ◽  
Vol 2018 ◽  
pp. 1-11 ◽  
Author(s):  
Jiwei Tian ◽  
Buhong Wang ◽  
Xia Li

Recent researches on data-driven and low-sparsity data injection attacks have been presented, respectively. To combine the two main goals (data-driven and low-sparsity) of research, this paper presents a data-driven and low-sparsity false data injection attack strategy. The proposed attacking strategy (EID: Eliminate-Infer-Determine) is divided into three stages. In the first step, the intercepted data is preprocessed by sparse optimization techniques to eliminate the outliers. The recovered data is then exploited to learn about the system matrix based on the parallel factorization algorithm in the second step. In the third step, the approximated system matrix is applied for the design of sparse attack vector based on the convex optimization. The simulation results show that the EID attack strategy achieves a better performance than the improved ICA-based attack strategy in constructing perfect sparse attack vectors. What is more, data-driven implementation of the proposed strategy is also presented which ensures attack performance even without the prior information of the system.


Sign in / Sign up

Export Citation Format

Share Document