115 resultados para mobile social learning network


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In 2009, Deakin University and the Chinese University of Hong Kong trailed the use of Web 2.0 technologies to enhance learning outcomes in a third-year architectural design studio that was modelled on the virtual design studios (VDSs) of the past decades. The studio developed the VDS further by integrating a social learning environment into the blended learning experience. The Web 2.0 VDS utilized the social networking site Ning.com, YouTube, Skype and various three-dimensional modelling, video and image processing, and chat software to deliver lectures, communicate learning goals, disseminate learning resources, submitting, providing feedback and comments to various design works, and assessing of students’ outcomes. This research centres on issues of learning and teaching associated with the development of a social network VDS.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Now days, the online social networks (OSN) have gained considerable popularity. More and more people use OSN to share their interests and make friends, also the OSN helps users overcome the geographical barriers. With the development of OSN, there is an important problem users have to face that is trust evaluation. Before user makes friends with a stranger, the user need to consider the following issues: Can a stranger be trusted? How much the stranger can be trusted? How to measure the trust of a stranger? In this paper, we take two factors, Degree and Contact Interval into consideration, which produce a new trust evaluation model (T-OSN). T-OSN is aimed to solve how to evaluate the trust value of an OSN user, also which is more efficient, more reliable and easy to implement. Base on our research, this model can be used in wide range, such as online social network (OSN) trust evaluation, mobile network message forwarding, ad hoc wireless networking, routing message on Internet and peer-to-peer file sharing network. The T-OSN model has following obvious advantages compare to other trust evaluate methods. First of all, it is not base on features of traditional social network, such as, distance and shortest path. We choose the special features of OSN to build up the model, that is including numbers of friends(Degree) and contact frequency(Contact Interval). These species features makes our model more suitable to evaluate OSN users trust value. Second, the formulations of our model are quite simple but effective. That means, to calculate the result by using our formulations will not cost too much resources. Last but not least, our model is easy to implement for an OSN website, because of the features that we used in our model, such as numbers of friends and contact frequency are easy to obtain. To sum up, our model is using a few resources to obtain a valuable trust value that can help OSN users to solve an important security problem, we believe that will be big step - or development of OSN.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is now time for teachers as well as colleges to make a place for mobile learning within the classroom setting. Teachers should be encouraged to integrate mobile phones for teaching and learning within the classroom, as they can be seen as an effective learning tool for students of all ages. We believe that mobile phone bans in colleges should be reviewed and reconsidered. This paper draws on some important aspects which mobile phones can bring into the classroom; it illustrates how mobile phones can fit seamlessly in a normal classroom environment; and the advantages that they provide. A possible integration method which encourages collaboration among students and teacher will be discussed and proposed.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 21st century has seen renewed interest in issues relating to social justice, campaigning and social change globally. This paper considers the educational nature of activists’ learning as they engage in progressive social change within and against the state. A great deal has been written on learning in the workplace in recent years, it is widely believed that adults learn throughout all of their lives and that a majority of this learning occurs in the workplace. Drawing on current research, this paper argues that learning of a similar nature takes place in the unpaid work of social and political activists, through social learning. It is argued that activists’ learning is holistic and embodied, that is, they use cognition, the emotions and the physical body to learn. This paper explores the significance of learning associated with the processes and practices of activism; learning that has only recently been recognised in Australia as ‘real’ adult education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The 21st century has seen renewed interest in issues relating to social justice, campaigning and social change globally. This paper considers the educational nature of activists’ learning as they engage in progressive social change within and against the state. A great deal has been written on learning in the workplace in recent years, it is widely believed that adults learn throughout all of their lives and that a majority of this learning occurs in the workplace. Drawing on current research, this paper argues that learning of a similar nature takes place in the unpaid work of social and political activists, through social learning. It is argued that activists’ learning is holistic and embodied, that is, they use cognition, the emotions and the physical body to learn. This paper explores the significance of learning associated with the processes and practices of activism; learning that has only recently been recognised in Australia as ‘real’ adult education.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article discusses the design of social networking sites created through a PhD action research study. Social and participatory media was used as an active, flexible and motivating learning management system. The study investigated ways in which a social learning framework could be designed for students aged 13 to 16 and aimed to encourage student knowledge growth through peer-to-peer interaction while supporting both formal and informal learning. New literacies and multimodality were infused into the design. It was found that the practitioner-researcher’s cycles of planning, acting, observing and reflecting, action research, provided a mechanism for scaffolding the redesign of curriculum content and instruction. Social media in education can be dynamic, interactive and appreciated (SMEDIA) by the students.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

BACKGROUND: While most young people who smoke want to quit, few access cessation support services. Mobile phone-based cessation programs are ideal for young people: mobile phones are the most common means of peer communication, and messages can be delivered in an anonymous manner, anywhere, anytime. Following the success of our text messaging smoking cessation program, we developed an innovative multimedia mobile phone smoking cessation intervention.

OBJECTIVE: The aim of the study was to develop and pilot test a youth-oriented multimedia smoking cessation intervention delivered solely by mobile phone.

METHODS: Development included creating content and building the technology platform. Content development was overseen by an expert group who advised on youth development principles, observational learning (from social cognitive theory), effective smoking cessation interventions, and social marketing. Young people participated in three content development phases (consultation via focus groups and an online survey, content pre-testing, and selection of role models). Video and text messages were then developed, incorporating the findings from this research. Information technology systems were established to support the delivery of the multimedia messages by mobile phone. A pilot study using an abbreviated 4-week program of video and text content tested the reliability of the systems and the acceptability of the intervention.

RESULTS: Approximately 180 young people participated in the consultation phase. There was a high priority placed on music for relaxation (75%) and an interest in interacting with others in the program (40% would read messages, 36% would read a blog). Findings from the pre-testing phase (n = 41) included the importance of selecting "real" and "honest" role models with believable stories, and an interest in animations (37%). Of the 15 participants who took part in the pilot study, 13 (87%) were available for follow-up interviews at 4 weeks: 12 participants liked the program or liked it most of the time and found the role model to be believable; 7 liked the role model video messages (5 were unsure); 8 used the extra assistance for cravings; and 9 were happy with two messages per day. Nine participants (60%) stopped smoking during the program. Some technical challenges were encountered during the pilot study.

CONCLUSIONS: A multimedia mobile phone smoking cessation program is technically feasible, and the content developed is appropriate for this medium and is acceptable to our target population. These results have informed the design of a 6-month intervention currently being evaluated for its effectiveness in increasing smoking cessation rates in young people.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A number of central precepts of flexible delivery of workplace training are challenged by research showing that vocational learners are typically non-verbal, and prefer structured and social learning environments. That research is reviewed, together with a number of strategies that will assist flexible delivery to these learners. These strategies are largely amenable to
computer-mediated communication.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In engineering, distance/off-campus study is an essential element of access to education for those in remote locations and/or seeking to upgrade their qualifications via the lifelong learning route whilst employed. Internationally, engineering education accrediting bodies have moved toward outcomes-based assessment of graduate competency, but are still struggling to relinquish their historical attachment to the measurement of inputs. A genuinely outcomes-based accreditation system based on the demonstrated individual student attainment of appropriate graduate attributes (which might be delivered/gained by a range of means) offers the best way forward for an equitable, representative and socially just undergraduate engineering education system that encourages suitably qualified candidates from a range of social, employment, educational, gender, age and geographic circumstances to aspire to the professional sphere of the engineering workforce. Until outcomes-based education becomes the norm in engineering, it is likely that distance learners in engineering will face significant difficulties.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The thesis reviews the literature relating to girls and computing within a framework which is structured around three specific questions. First, are there differences between girls and boys in their participation in class computing activities and/or in non-class computing activities? Second, do these differences in participation in computing activities have broader implications which justify the growing concern about the under-representation of girls? Third, wahy are girls under-represented in these activities? Although the available literature is predominantly descriptive, the underlying implicit theoretical model is essentially a social learning model. Girl's differential participation is attributed to learned attitudes towards computing rathan to differences between girls and boys in general ability. These attitudes, which stress the masculine, mathematical, technological aspects of computing are developed through modelling, direct experience, intrinsic and extrinsic reinforcement and generalisation from pre-existing, attitudes to related curriculum areas. In the literature it is implicitly assumed that these attitudes underlie girl's decisions to self-select out of computing activities. In this thesis predictions from a social learning model are complemented by predictions derived from expectancy-value, cognitive dissonance and self-perception theories. These are tested in three separate studies. Study one provides data from a pretest-posttest study of 24 children in a year four class learning BASIC. It examines pre- and posttest differences between girls and boys in computing experience, knowledge and achievement as well as the factors relating to computing achievement. Study two uses a pretest-posttest control group design to study the gender differences in the impact of the introduction of Logo into years 1, 3, 5 and 7 in both a coeducational and single-sex setting using a sample of 222 children from three schools. Study three utilises a larger sample of 1176 students, drawn from three secondary schools and five primary schools, enabling an evaluation of gender differences in relation to a wide range of class computing experiences and in a broader range of school contexts. The overall results are consistent across the three studies, supporting the contention that social factors, rather than ability differences influence girls' participation and achievement in computing. The more global theoretical framework, drawing on social learning, expectancy-value, cognitive dissonance and self-perception theories, provides a more adequate explanation of gender differences in participation than does any one of these models.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Optimizing broadcasting process in mobile ad hoc network (MANET) is considered as a main challenge due to many problems, such as Broadcast Storm problem and high complexity in finding the optimal tree resulting in an NP-hard problem. Straight forward techniques like simple flooding give rise to Broadcast Storm problem with a high probability. In this work, genetic algorithm (GA) that searches over a population that represents a distinguishable ‘structure’ is adopted innovatively to suit MANETs. The novelty of the GA technique adopted here to provide the means to tackle this MANET problem lies mainly on the proposed method of searching for a structure of a suitable spanning tree that can be optimized, in order to meet the performance indices related to the broadcasting problem. In other words, the proposed genetic model (GM) evolves with the structure of random trees (individuals) ‘genetically’ generated using rules that are devised specifically to capture MANET behaviour in order to arrive at a minimal spanning tree that satisfies certain fitness function. Also, the model has the ability to give different solutions depending on the main factors specified such as, ‘time’ (or speed) in certain situations and ‘reachability’ in certain others.