Preprint has been published in a journal as an article
Preprint / Version 1

The Effect of Value Clarification Technique on the Characteristics of the Pancasila Student Profile in Class IV


Pengaruh Value Clarification Technique terhadap Karakteristik Profil Pelajar Pancasila Kelas IV

##article.authors##

DOI:

https://doi.org/10.21070/ups.4534

Keywords:

Pancasila, Pancasila Students profile, Characteristics, Value Clarification Technique

Abstract

This study aims to determine the effect of the Value Clarifiacation Technique learning model in Pancasila subjectson the characteristics of the Pancasila student profile of class IV SDN Bareng Krajan II Krian. This type of research is a quasi-experimental research with a non-equivalent post test onlycontrol group design. The samples of this study were class IV-A as the experimental group and class IV-B students as the control group. Data regarding students' characteristics were collected through a character instrument in the formof a questionnaire Data on student character was collected through a character instrument in the form of aquestionnaire consisting of 25 statements. Data analysis was conducted using descriptive analysis approach as wellas inferential statistical analysis through independent sample t-test. The resultsimply a significant influence on the characteristics of the Pancasila learner profile between two groups of studentswho follow two different learning models, namely Value Clarification Technique and conventional learning models.

Downloads

Download data is not yet available.

References

W.-K. Chen, Linear Networks and Systems. Belmont, CA: Wadsworth, 1993, pp. 123-135.

R. Hayes, G. Pisano, D. Upton, and S. Wheelwright, Operations, Strategy, and Technology: Pursuing the competitive edge. Hoboken, NJ: Wiley, 2005.

The Oxford Dictionary of Computing, 5th ed. Oxford: Oxford University Press, 2003.

A. Rezi and M. Allam, "Techniques in array processing by means of transformations, " in Control and Dynamic Systems, Vol. 69, Multidemsional Systems, C. T. Leondes, Ed. San Diego: Academic Press, 1995, pp. 133-180

O. B. R. Strimpel, "Computer graphics," in McGraw-Hill Encyclopedia of Science and Technology, 8th ed., Vol. 4. New York: McGraw-Hill, 1997, pp. 279-283.

H. Ayasso and A. Mohammad-Djafari, "Joint NDT Image Restoration and Segmentation Using Gauss–Markov– Potts Prior Models and Variational Bayesian Computation," IEEE Transactions on Image Processing, vol. 19, no. 9, pp. 2265-77, 2010. [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed Sept. 10, 2010].

A. Altun, "Understanding hypertext in the context of reading on the web: Language learners' experience," Current Issues in Education, vol. 6, no. 12, July 2003. [Online]. Available: http://cie.ed.asu.edu/volume6/number12/. [Accessed Dec. 2, 2004].

H. Imron, R. R. Isnanto and E. D. Widianto, "Perancangan Sistem Kendali pada Alat Listrik Rumah Tangga Menggunakan Media Pesan Singkat (SMS)". Jurnal Teknologi dan Sistem Komputer, vol.4, no. 3, pp. 454-462, Agustus 2016. [Online]. doi: http://dx.doi.org/10.14710/.4.3.2016.454-462. [Diakses 4 September 2016].

J. R. Beveridge and E. M. Riseman, "How easy is matching 2D line models using local search?" IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 19, pp. 564-579, June 1997.

E. H. Miller, "A note on reflector arrays," IEEE Transactions on Antennas and Propagation, to be published.

L. Liu and H. Miao, "A specification based approach to testing polymorphic attributes," in Formal Methods and Software Engineering: Proc.of the 6th Int. Conf. on Formal Engineering Methods, ICFEM 2004, Seattle, WA, USA, November 8-12, 2004, J. Davies, W. Schulte, M. Barnett, Eds. Berlin: Springer, 2004. pp. 306-19.

J. Lach, "SBFS: Steganography based file system," in Proc. of the 2008 1st Int. Conf. on Information Technology, IT 2008, 19-21 May 2008, Gdansk, Poland [Online]. Available: IEEE Xplore, http://www.ieee.org. [Accessed: 10 Sept. 2010].

H. A. Nimr, "Defuzzification of the outputs of fuzzy controllers," presented at 5th Int. Conf. on Fuzzy Systems, 1996, Cairo, Egypt. 1996.

T. J. van Weert and R. K. Munro, Eds., Informatics and the Digital Society: Social, ethical and cognitive issues: IFIP TC3/WG3.1&3.2 Open Conf. on Social, Ethical and Cognitive Issues of Informatics and ICT, July 22-26, 2002, Dortmund, Germany. Boston: Kluwer Academic, 2003.

R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842,

Sept. 16, 1997.

European Telecommunications Standards Institute, “Digital Video Broadcasting (DVB): Implementation

guidelines for DVB terrestrial services; transmission aspects,” European Telecommunications Standards

Institute, ETSI TR-101-190, 1997. [Online]. Available: http://www.etsi.org. [Accessed: Aug. 17, 1998].

“A ‘layman’s’ explanation of Ultra Narrow Band technology,” Oct. 3, 2003. [Online]. Available: http://www.vmsk.org/Layman.pdf. [Accessed: Dec. 3, 2003].

G. Sussman, "Home page - Dr. Gerald Sussman," July 2002. [Online]. Available: http://www.comm.pdx.edu/faculty/Sussman/sussmanpage.htm. [Accessed: Sept. 12, 2004].

FLEXChip Signal Processor (MC68175/D), Motorola, 1996.

A. Karnik, “Performance of TCP congestion control with rate feedback: TCP/ABR and rate adaptive TCP/IP,” M. Eng. thesis, Indian Institute of Science, Bangalore, India, Jan. 1999.

F. Sudweeks, Development and Leadership in Computer-Mediated Collaborative Groups. PhD [Dissertation]. Murdoch, WA: Murdoch Univ., 2007. [Online]. Available: Australasian Digital Theses Program.

J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,”Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.

Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Std. 802.11, 1997

Posted

2024-04-27