Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ... Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

dspace1.isd.glam.ac.uk
from dspace1.isd.glam.ac.uk More from this publisher
25.10.2012 Views

4.3 EHP-Information 4 HEAT process is not the aim of this work and should be addressed at the potential edu- cational institution where the HEAT is used. 4.3.2 Technical aspects The technical implementation of the EHP-information is done similarly to the implementation of the EHP. A class was defined which holds all the necessary elements and methods needed. The needed elements and methods will now be presented in table 6. The table illustrates which elements were designed and used. For every element set-methods and get-methods were implemented to guarantee data modification. Element Information area DomainInformation Domain Age Adaptation Previous knowledge Adaptation Learning Preferences Adaptation Gender Adaptation Grouplevel Adaptation URL Physical Mediatype Physical Preferred application Physical Language Additional Keyset Additional Author Additional Authoring date Additional Table 6: Elements and methods of the EHP-information Finally, it is important to state that every single element within the EHP-information- layer is technically implemented as an EHP. This technique allows the later mod- ification of even the tiniest piece of information within an EHP-information of an EHP by the author. 102

4.4 TLS-Layer 4 HEAT 4.4 TLS-Layer The second layer of the EFTECS works with the identified teaching and learning strategies. The implementation firstly has to address the creation of the specific EHPs within a TLS and secondly the creation, modification, removal and linking of the different TLSs within an EM. 4.4.1 Design aspects • Creation During the creation of a new TLS within an EM it is important that the EHP-information of the EM can be inherited. This inheritance sets the EHP- information of the TLS and all its EHPs to the same values that the EHP- information of the EM has, for example if the author has edited the domain information of the EM, he can inherit this information for every TLS he creates and therefore can save some work. Additionally, all the necessary EHPs for the selected TLS need to be generated. Finally, the presentation style of the educational content must be set. A possible adaptation of the presentation style is not an issue at this point, but must be addressed during the presentation phase. • Modification The modification of the TLS allows the changes of everything within the TLS. This means that all the EHPs of the TLS, the presentation style can be edited. The only exception is the selected TLS-form, which cannot be changed at this point. • Removal The removal of a created TLS from the EM is possible at any given time. However, the linking to and from the TLS is lost as well as the content of the EHPs within the TLS. • Linking The linking of the TLSs is extremely important for the EM and the later navigation of the student through the material. The linking is realised by 103

4.4 TLS-Layer 4 HEAT<br />

4.4 TLS-Layer<br />

The second layer <strong>of</strong> the EFTECS works with the identified teaching and learning<br />

strategies. The implementation firstly has to address the creation <strong>of</strong> the specific<br />

EHPs within a TLS and secondly the creation, modification, removal and linking<br />

<strong>of</strong> the different TLSs within an EM.<br />

4.4.1 Design aspects<br />

• Creation<br />

During the creation <strong>of</strong> a new TLS within an EM it is important that the<br />

EHP-information <strong>of</strong> the EM can be inherited. This inheritance sets the EHP-<br />

information <strong>of</strong> the TLS and all its EHPs to the same values that the EHP-<br />

information <strong>of</strong> the EM has, for example if the author has edited the domain<br />

information <strong>of</strong> the EM, he can inherit this information for every TLS he<br />

creates and therefore can save some work. Additionally, all the necessary<br />

EHPs for the selected TLS need to be generated. Finally, the presentation<br />

style <strong>of</strong> the educational content must be set. A possible adaptation <strong>of</strong> the<br />

presentation style is not an issue at this point, but must be addressed during<br />

the presentation phase.<br />

• Modification<br />

The modification <strong>of</strong> the TLS allows the changes <strong>of</strong> everything within the<br />

TLS. This means that all the EHPs <strong>of</strong> the TLS, the presentation style can<br />

be edited. The only exception is the selected TLS-form, which cannot be<br />

changed at this point.<br />

• Removal<br />

The removal <strong>of</strong> a created TLS from the EM is possible at any given time.<br />

However, the linking to and from the TLS is lost as well as the content <strong>of</strong><br />

the EHPs within the TLS.<br />

• Linking<br />

The linking <strong>of</strong> the TLSs is extremely important for the EM and the later<br />

navigation <strong>of</strong> the student through the material. The linking is realised by<br />

103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!