848 resultados para personal learning networks
Resumo:
Quand le E-learning a émergé il ya 20 ans, cela consistait simplement en un texte affiché sur un écran d'ordinateur, comme un livre. Avec les changements et les progrès dans la technologie, le E-learning a parcouru un long chemin, maintenant offrant un matériel éducatif personnalisé, interactif et riche en contenu. Aujourd'hui, le E-learning se transforme de nouveau. En effet, avec la prolifération des systèmes d'apprentissage électronique et des outils d'édition de contenu éducatif, ainsi que les normes établies, c’est devenu plus facile de partager et de réutiliser le contenu d'apprentissage. En outre, avec le passage à des méthodes d'enseignement centrées sur l'apprenant, en plus de l'effet des techniques et technologies Web2.0, les apprenants ne sont plus seulement les récipiendaires du contenu d'apprentissage, mais peuvent jouer un rôle plus actif dans l'enrichissement de ce contenu. Par ailleurs, avec la quantité d'informations que les systèmes E-learning peuvent accumuler sur les apprenants, et l'impact que cela peut avoir sur leur vie privée, des préoccupations sont soulevées afin de protéger la vie privée des apprenants. Au meilleur de nos connaissances, il n'existe pas de solutions existantes qui prennent en charge les différents problèmes soulevés par ces changements. Dans ce travail, nous abordons ces questions en présentant Cadmus, SHAREK, et le E-learning préservant la vie privée. Plus précisément, Cadmus est une plateforme web, conforme au standard IMS QTI, offrant un cadre et des outils adéquats pour permettre à des tuteurs de créer et partager des questions de tests et des examens. Plus précisément, Cadmus fournit des modules telles que EQRS (Exam Question Recommender System) pour aider les tuteurs à localiser des questions appropriées pour leur examens, ICE (Identification of Conflits in Exams) pour aider à résoudre les conflits entre les questions contenu dans un même examen, et le Topic Tree, conçu pour aider les tuteurs à mieux organiser leurs questions d'examen et à assurer facilement la couverture des différent sujets contenus dans les examens. D'autre part, SHAREK (Sharing REsources and Knowledge) fournit un cadre pour pouvoir profiter du meilleur des deux mondes : la solidité des systèmes E-learning et la flexibilité de PLE (Personal Learning Environment) tout en permettant aux apprenants d'enrichir le contenu d'apprentissage, et les aider à localiser nouvelles ressources d'apprentissage. Plus précisément, SHAREK combine un système recommandation multicritères, ainsi que des techniques et des technologies Web2.0, tels que le RSS et le web social, pour promouvoir de nouvelles ressources d'apprentissage et aider les apprenants à localiser du contenu adapté. Finalement, afin de répondre aux divers besoins de la vie privée dans le E-learning, nous proposons un cadre avec quatre niveaux de vie privée, ainsi que quatre niveaux de traçabilité. De plus, nous présentons ACES (Anonymous Credentials for E-learning Systems), un ensemble de protocoles, basés sur des techniques cryptographiques bien établies, afin d'aider les apprenants à atteindre leur niveau de vie privée désiré.
Resumo:
Resumen basado en el de la publicación
Resumo:
Resumen tomado de la publicación
Resumo:
A self study course for learning to program using the C programming language has been developed. A Learning Object approach was used in the design of the course. One of the benefits of the Learning Object approach is that the learning material can be reused for different purposes. 'Me course developed is designed so that learners can choose the pedagogical approach most suited to their personal learning requirements. For all learning approaches a set of common Assessment Learning Objects (ALOs or tests) have been created. The design of formative assessments with ALOs can be carried out by the Instructional Designer grouping ALOs to correspond to a specific assessment intention. The course is non-credit earning, so there is no summative assessment, all assessment is formative. In this paper examples of ALOs and their uses is presented together with their uses as decided by the Instructional Designer and learner. Personalisation of the formative assessment of skills can be decided by the Instructional Designer or the learner using a repository of pre-designed ALOs. The process of combining ALOs can be carried out manually or in a semi-automated way using metadata that describes the ALO and the skill it is designed to assess.
Resumo:
With the rapid development of information technology, learners demand effective personalised learning support, which imposes a new learning paradigm in learning content management. Standards as well as best practice in industry and research community have taken place to address the paradigm shift. With respect to this trend, it is recognised that finding learning content which meet personal learning requirements remains challenging. This paper describes a model of e-learning services provision which integrates the best practice in e-learning and Web services technology so that learning content management is capable of supporting applications of learning services.
Resumo:
Pattern separation is a new technique in digital learning networks which can be used to detect state conflicts. This letter describes pattern separation in a simple single-layer network, and an application of the technique in networks with feedback.
Resumo:
This study examines the question of how language teachers in a highly technologyfriendly university environment view machine translation and the implications that this has for the personal learning environments of students. It brings an activity-theory perspective to the question, examining the ways that the introduction of new tools can disrupt the relationship between different elements in an activity system. This perspective opens up for an investigation of the ways that new tools have the potential to fundamentally alter traditional learning activities. In questionnaires and group discussions, respondents showed general agreement that although use of machine translation by students could be considered cheating, students are bound to use it anyway, and suggested that teachers focus on the kinds of skills students would need when using machine translation and design assignments and exams to practice and assess these skills. The results of the empirical study are used to reflect upon questions of what the roles of teachers and students are in a context where many of the skills that a person needs to be able to interact in a foreign language increasingly can be outsourced to laptops and smartphones.
Resumo:
This study examines the question of how language teachers in a highly technology-friendly university environment view machine translation and the implications that this has for the personal learning environments of students. It brings an activity-theory perspective to the question, examining the ways that the introduction of new tools can disrupt the relationship between different elements in an activity system. This perspective opens up for an investigation of the ways that new tools have the potential to fundamentally alter traditional learning activities. In questionnaires and group discussions, respondents showed general agreement that although use of machine translation by students could be considered cheating, students are bound to use it anyway, and suggested that teachers focus on the kinds of skills students would need when using machine translation and design assignments and exams to practice and assess these skills. The results of the empirical study are used to reflect upon questions of what the roles of teachers and students are in a context where many of the skills that a person needs to be able to interact in a foreign language increasingly can be outsourced to laptops and smartphones.
Resumo:
Over the last decades, the digital inclusion public policies have significantly invested in the purchase of hardwares and softwares in order to offer technology to the Brazilian public teaching institutions, specifically computers and broadband Internet. However, the teachers education to handle these artefacts is put away, even though there is some demand from the information society. With that, this dissertation chooses as an object of study the digital literacy practices performed by 38 (thirty-eight) teachers in initial and continuous education by means of the extension course Literacies and technologies: portuguese language teaching and cyberculture demands. In this direction, we aim at investigating the digital literacy practices of developing teachers in three specific moments: before, while and after this extension action with the intent to (i) delineate the digital literacy practices performed by the collaborators before the formative action; (ii) to narrate the literacy events made possible by the extension course; (iii) to investigate the contributions of the education course to the collaborators teaching practice. We sought theoretical contributions in the literacy studies (BAYNHAM, 1995; KLEIMAN, 1995; HAMILTON; BARTON; IVANIC, 2000), specifically when it comes to digital literacy (COPE, KALANTZIS, 2000; BUZATO, 2001, 2007, 2009; SNYDER, 2002, 2008; LANKSHEAR & KNOBEL, 2002, 2008) and teacher education (PERRENOUD, 2000; SILVA, 2001). Methodologically, this virtual ethnography study (KOZINETS, 1997; HINE, 2000) is inserted into the field of Applied Linguistics and adopts a quali-quantitative research approach (NUNAN, 1992; DÖRNYEI, 2006). The data analysis permitted to evidentiate that (i) before the course, the digital literacy practices focused on the personal and academic dimensions of their realities at the expense of the professional dimension; (ii) during the extension action, the teachers collaboratively took part in the hybrid study sessions, which had a pedagogical focus on the use of ICTs, accomplishing the use of digital literacy practices - unknown before that; (iii) after the course, the attitude of the collaborator teachers concerning the use of ICTs on their regular professional basis had changed, once those teachers started to effectively make use of them, promoting social visibility to what was produced in the school. We also observed that teachers in initial education acted as more experienced peers in collaborative learning process, offering support scaffolding (VYGOTSKY, 1978; BRUNER, 1985) to teachers in continuous education. This occurred because of the undergraduates actualize digital literacy practices were more sophisticated, besides the fact being integrate generation Y (PRENSKY, 2001)
Resumo:
Over the last decades, the digital inclusion public policies have significantly invested in the purchase of hardwares and softwares in order to offer technology to the Brazilian public teaching institutions, specifically computers and broadband Internet. However, the teachers education to handle these artefacts is put away, even though there is some demand from the information society. With that, this dissertation chooses as an object of study the digital literacy practices performed by 38 (thirty-eight) teachers in initial and continuous education by means of the extension course Literacies and technologies: portuguese language teaching and cyberculture demands. In this direction, we aim at investigating the digital literacy practices of developing teachers in three specific moments: before, while and after this extension action with the intent to (i) delineate the digital literacy practices performed by the collaborators before the formative action; (ii) to narrate the literacy events made possible by the extension course; (iii) to investigate the contributions of the education course to the collaborators teaching practice. We sought theoretical contributions in the literacy studies (BAYNHAM, 1995; KLEIMAN, 1995; HAMILTON; BARTON; IVANIC, 2000), specifically when it comes to digital literacy (COPE, KALANTZIS, 2000; BUZATO, 2001, 2007, 2009; SNYDER, 2002, 2008; LANKSHEAR & KNOBEL, 2002, 2008) and teacher education (PERRENOUD, 2000; SILVA, 2001). Methodologically, this virtual ethnography study (KOZINETS, 1997; HINE, 2000) is inserted into the field of Applied Linguistics and adopts a quali-quantitative research approach (NUNAN, 1992; DÖRNYEI, 2006). The data analysis permitted to evidentiate that (i) before the course, the digital literacy practices focused on the personal and academic dimensions of their realities at the expense of the professional dimension; (ii) during the extension action, the teachers collaboratively took part in the hybrid study sessions, which had a pedagogical focus on the use of ICTs, accomplishing the use of digital literacy practices - unknown before that; (iii) after the course, the attitude of the collaborator teachers concerning the use of ICTs on their regular professional basis had changed, once those teachers started to effectively make use of them, promoting social visibility to what was produced in the school. We also observed that teachers in initial education acted as more experienced peers in collaborative learning process, offering support scaffolding (VYGOTSKY, 1978; BRUNER, 1985) to teachers in continuous education. This occurred because of the undergraduates actualize digital literacy practices were more sophisticated, besides the fact being integrate generation Y (PRENSKY, 2001)
Resumo:
To interconnect a wireless sensor network (WSN) to the Internet, we propose to use TCP/IP as the standard protocol for all network entities. We present a cross layer designed communication architecture, which contains a MAC protocol, IP, a new protocol called Hop-to-Hop Reliability (H2HR) protocol, and the TCP Support for Sensor Nodes (TSS) protocol. The MAC protocol implements the MAC layer of beacon-less personal area networks (PANs) as defined in IEEE 802.15.4. H2HR implements hop-to-hop reliability mechanisms. Two acknowledgment mechanisms, explicit and implicit ACK are supported. TSS optimizes using TCP in WSNs by implementing local retransmission of TCP data packets, local TCP ACK regeneration, aggressive TCP ACK recovery, congestion and flow control algorithms. We show that H2HR increases the performance of UDP, TCP, and RMST in WSNs significantly. The throughput is increased and the packet loss ratio is decreased. As a result, WSNs can be operated and managed using TCP/IP.
Resumo:
Social software tools have become an integral part of students? personal lives and their primary communication medium. Likewise, these tools are increasingly entering the enterprise world (within the recent trend known as Enterprise 2.0) and becoming a part of everyday work routines. Aiming to keep the pace with the job requirements and also to position learning as an integral part of students? life, the field of education is challenged to embrace social software. Personal Learning Environments (PLEs) emerged as a concept that makes use of social software to facilitate collaboration, knowledge sharing, group formation around common interests, active participation and reflective thinking in online learning settings. Furthermore, social software allows for establishing and maintaining one?s presence in the online world. By being aware of a student's online presence, a PLE is better able to personalize the learning settings, e.g., through recommendation of content to use or people to collaborate with. Aiming to explore the potentials of online presence for the provision of recommendations in PLEs, in the scope of the OP4L project, we have develop a software solution that is based on a synergy of Semantic Web technologies, online presence and socially-oriented learning theories. In this paper we present the current results of this research work.
Resumo:
Conscientes de las posibilidades pedagógicas, participativas y de colaboración científica de la Web 2.0, los autores del presente artículo se plantean la detección de las necesidades y expectativas hacia la creación de una plataforma virtual delimitada por un espacio interactivo o red social para la Historia de la Educación y el Patrimonio Histórico-educativo. Gracias a la evaluación mediante un cuestionario en el que han participado un grupo de expertos docentes e investigadores de Historia de la Educación, se han obtenido una serie de conclusiones a tener en cuenta respecto a determinados aspectos (conocimiento y uso, expectativas, componentes, etc.) que orientarán la construcción ad hoc de dicha plataforma. Es relevante el poco conocimiento y uso de las redes sociales tanto genéricas como específicas, así como otro tipo de aplicaciones web. Destaca, por otro lado, que la edad de los participantes no ha condicionado la importancia percibida sobre las capacidades de las TIC para el desarrollo en la docencia y la investigación.
Resumo:
Using various extracts from the reflective commentaries of MSc students, this article explores how transdisciplinarity and reflective practice operate in the programme. It shows how learners managed the uncertainties of sustainable development through regular critical and evaluative reflections. Students were able to apprehend the several worlds making up the sustainable development project and their own personal learning journey through the various competing, complementary and occasionally contradictory perspectives, modes of learning, sources of knowledge and information. One conceptual device facilitating this process was offering an understanding of sustainable development as constituting a ‘dialogue of values’, an approach that effectively invites students to square the metaphorical circle - i.e. broadly reconciling (ecological) sustainability with (economic) development.
Resumo:
IEEE 802.15.4 standard has been proposed for low power wireless personal area networks. It can be used as an important component in machine to machine (M2M) networks for data collection, monitoring and controlling functions. With an increasing number of machine devices enabled by M2M technology and equipped with 802.15.4 radios, it is likely that multiple 802.15.4 networks may be deployed closely, for example, to collect data for smart metering at residential or enterprise areas. In such scenarios, supporting reliable communications for monitoring and controlling applications is a big challenge. The problem becomes more severe due to the potential hidden terminals when the operations of multiple 802.15.4 networks are uncoordinated. In this paper, we investigate this problem from three typical scenarios and propose an analytic model to reveal how performance of coexisting 802.15.4 networks may be affected by uncoordinated operations under these scenarios. Simulations will be used to validate the analytic model. It is observed that uncoordinated operations may lead to a significant degradation of system performance in M2M applications. With the proposed analytic model, we also investigate the performance limits of the 802.15.4 networks, and the conditions under which coordinated operations may be required to support M2M applications. © 2012 Springer Science + Business Media, LLC.