Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...
Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ... Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...
4.3 EHP-Information 4 HEAT process is not the aim of this work and should be addressed at the potential edu- cational institution where the HEAT is used. 4.3.2 Technical aspects The technical implementation of the EHP-information is done similarly to the implementation of the EHP. A class was defined which holds all the necessary elements and methods needed. The needed elements and methods will now be presented in table 6. The table illustrates which elements were designed and used. For every element set-methods and get-methods were implemented to guarantee data modification. Element Information area DomainInformation Domain Age Adaptation Previous knowledge Adaptation Learning Preferences Adaptation Gender Adaptation Grouplevel Adaptation URL Physical Mediatype Physical Preferred application Physical Language Additional Keyset Additional Author Additional Authoring date Additional Table 6: Elements and methods of the EHP-information Finally, it is important to state that every single element within the EHP-information- layer is technically implemented as an EHP. This technique allows the later mod- ification of even the tiniest piece of information within an EHP-information of an EHP by the author. 102
4.4 TLS-Layer 4 HEAT 4.4 TLS-Layer The second layer of the EFTECS works with the identified teaching and learning strategies. The implementation firstly has to address the creation of the specific EHPs within a TLS and secondly the creation, modification, removal and linking of the different TLSs within an EM. 4.4.1 Design aspects • Creation During the creation of a new TLS within an EM it is important that the EHP-information of the EM can be inherited. This inheritance sets the EHP- information of the TLS and all its EHPs to the same values that the EHP- information of the EM has, for example if the author has edited the domain information of the EM, he can inherit this information for every TLS he creates and therefore can save some work. Additionally, all the necessary EHPs for the selected TLS need to be generated. Finally, the presentation style of the educational content must be set. A possible adaptation of the presentation style is not an issue at this point, but must be addressed during the presentation phase. • Modification The modification of the TLS allows the changes of everything within the TLS. This means that all the EHPs of the TLS, the presentation style can be edited. The only exception is the selected TLS-form, which cannot be changed at this point. • Removal The removal of a created TLS from the EM is possible at any given time. However, the linking to and from the TLS is lost as well as the content of the EHPs within the TLS. • Linking The linking of the TLSs is extremely important for the EM and the later navigation of the student through the material. The linking is realised by 103
- Page 51 and 52: 2.6 Teaching and learning strategie
- Page 53 and 54: 2.7 E-learning and meta-data projec
- Page 55 and 56: 2.7 E-learning and meta-data projec
- Page 57 and 58: 2.8 Knowledge and learning objects
- Page 59 and 60: 2.9 Project management and e-learni
- Page 61 and 62: 2.9 Project management and e-learni
- Page 63 and 64: 2.10 Reuse of material 2 LITERATURE
- Page 65 and 66: 2.11 Adaptive Hypermedia System 2 L
- Page 67 and 68: 2.11 Adaptive Hypermedia System 2 L
- Page 69 and 70: 2.12 Technology 2 LITERATURE REVIEW
- Page 71 and 72: 2.12 Technology 2 LITERATURE REVIEW
- Page 73 and 74: 2.13 Research objectives 2 LITERATU
- Page 75 and 76: 3.1 Theoretical approach 3 EFTECS p
- Page 77 and 78: 3.1 Theoretical approach 3 EFTECS A
- Page 79 and 80: 3.2 EFTECS at EM-Layer 3 EFTECS mat
- Page 81 and 82: 3.3 EFTECS at TLS-Layer 3 EFTECS
- Page 83 and 84: 3.3 EFTECS at TLS-Layer 3 EFTECS Fo
- Page 85 and 86: 3.4 EFTECS at EHP-Layer 3 EFTECS 3.
- Page 87 and 88: 3.4 EFTECS at EHP-Layer 3 EFTECS 3.
- Page 89 and 90: 3.6 Common meta-information 3 EFTEC
- Page 91 and 92: 3.8 The complete EFTECS 3 EFTECS 3.
- Page 93 and 94: 3.9 The eXtensible Educational Mark
- Page 95 and 96: 4.1 General approach 4 HEAT 4.1.1 T
- Page 97 and 98: 4.1 General approach 4 HEAT the dif
- Page 99 and 100: 4.2 EHP-Layer 4 HEAT 4.2.2 Technica
- Page 101: 4.3 EHP-Information 4 HEAT 4.3 EHP-
- Page 105 and 106: 4.4 TLS-Layer 4 HEAT Element Type x
- Page 107 and 108: 4.5 EM-Layer 4 HEAT The important f
- Page 109 and 110: 4.6 Content space 4 HEAT It was def
- Page 111 and 112: 4.7 Material delivery 4 HEAT concep
- Page 113 and 114: 4.8 Detailed example 4 HEAT • Add
- Page 115 and 116: 4.8 Detailed example 4 HEAT Figure
- Page 117 and 118: 4.8 Detailed example 4 HEAT Figure
- Page 119 and 120: 4.8 Detailed example 4 HEAT Figure
- Page 121 and 122: 4.8 Detailed example 4 HEAT Figure
- Page 123 and 124: 4.8 Detailed example 4 HEAT Figure
- Page 125 and 126: 4.8 Detailed example 4 HEAT the aut
- Page 127 and 128: 5 Evaluation methodology 5 EVALUATI
- Page 129 and 130: 5.1 Analysis of alternative approac
- Page 131 and 132: 5.2 Design of the interview evaluat
- Page 133 and 134: 5.2 Design of the interview evaluat
- Page 135 and 136: 5.2 Design of the interview evaluat
- Page 137 and 138: 5.2 Design of the interview evaluat
- Page 139 and 140: 5.2 Design of the interview evaluat
- Page 141 and 142: 5.2 Design of the interview evaluat
- Page 143 and 144: 5.3 Design of the practical evaluat
- Page 145 and 146: 6 Interview evaluation 6 INTERVIEW
- Page 147 and 148: 6.1 Analysis of the pre-test interv
- Page 149 and 150: 6.1 Analysis of the pre-test interv
- Page 151 and 152: 6.2 Analysis of the manual markup t
4.4 TLS-Layer 4 HEAT<br />
4.4 TLS-Layer<br />
The second layer <strong>of</strong> the EFTECS works with the identified teaching and learning<br />
strategies. The implementation firstly has to address the creation <strong>of</strong> the specific<br />
EHPs within a TLS and secondly the creation, modification, removal and linking<br />
<strong>of</strong> the different TLSs within an EM.<br />
4.4.1 Design aspects<br />
• Creation<br />
During the creation <strong>of</strong> a new TLS within an EM it is important that the<br />
EHP-information <strong>of</strong> the EM can be inherited. This inheritance sets the EHP-<br />
information <strong>of</strong> the TLS and all its EHPs to the same values that the EHP-<br />
information <strong>of</strong> the EM has, for example if the author has edited the domain<br />
information <strong>of</strong> the EM, he can inherit this information for every TLS he<br />
creates and therefore can save some work. Additionally, all the necessary<br />
EHPs for the selected TLS need to be generated. Finally, the presentation<br />
style <strong>of</strong> the educational content must be set. A possible adaptation <strong>of</strong> the<br />
presentation style is not an issue at this point, but must be addressed during<br />
the presentation phase.<br />
• Modification<br />
The modification <strong>of</strong> the TLS allows the changes <strong>of</strong> everything within the<br />
TLS. This means that all the EHPs <strong>of</strong> the TLS, the presentation style can<br />
be edited. The only exception is the selected TLS-form, which cannot be<br />
changed at this point.<br />
• Removal<br />
The removal <strong>of</strong> a created TLS from the EM is possible at any given time.<br />
However, the linking to and from the TLS is lost as well as the content <strong>of</strong><br />
the EHPs within the TLS.<br />
• Linking<br />
The linking <strong>of</strong> the TLSs is extremely important for the EM and the later<br />
navigation <strong>of</strong> the student through the material. The linking is realised by<br />
103