Full Citation
Transcription
Full Citation
International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Analysis of DQT and DHT in JPEG Files Nor Amira Nor Azhan Department of Computer System and Communications Faculty of Computing, Universiti Teknologi Malaysia Skudai, Johor Bahru [email protected] Ikuesan R. Adeyemi Department of Computer System and Communications Faculty of Computing, Universiti Teknologi Malaysia Skudai, Johor Bahru [email protected] Shukor Abd Razak Department of Computer System and Communications Faculty of Computing, Universiti Teknologi Malaysia Skudai, Johor Bahru [email protected] Abstract : JPEG files are the most popular image format that is commonly analysed in image forensics research areas. The compositions of these files are prominent to help accomplish the problem of source identification, content classification, forgery detection, steganography, encryption, and file recovery. The purpose of this paper is to present the overview of JPEG file format, as well as identifying important characteristics of its content, which are related to signature and compression features. For analysis purposes, we used about 80 JPEG files produced from several digital devices to examine their contents. The results show that it is possible to differentiate images among JPEG files and from other file types, by examining specific content of JPEG files. Keywords-component; JPEG file; signature; compression I. Introduction JPEG file standard, a file developed by the Joint Photographic Expert Group, is the commonly used image file format found in most electronic and storage devices [2-6]. Additionally, JPEG files are usually the default image format in almost all of digital cameras. Statistics reveals by global camera industries revealed that over $55 billion digital camera sales on 2010 , while the figure is projected to increase to over $65 billion by 2015 [7], thus making JPEG files the order of the digital world of photography. 80% to 90% of the criminal cases today have some kind of digital evidence [8] and one of such evidence is digital image file. Details analysis of JPEG content is critically required for image forensic research areas, since it is the widely used image format. The process of determining the device-source of an image is called image source identification. Image content classification and forgery detection are two sides of the forensic process. Image content classification analyzes image files for specific purpose, such as cyber pornography. On the other hand, image forgery detection field determines whether the images have been manipulated and altered. Image steganography is a technique that can be used to hide secret information in This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 1…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) image files while image encryption is a technique used to prevent the possible interpretation of an image file, so as to render such file unreadable to unintended audience. However, file recovery methods are needed to recover JPEG files that has been deleted or corrupted. Without the understanding of the underlying file structure, and bit positioning, it is almost impossible to recover a deleted or corrupted file irrespective of total or partial deletion process. This proves that the detail studies of JPEG file inner content’s is necessary in order to help and solve specific research problems. This paper discusses the basic information of JPEG files with special consideration on deep analysis of their internal structure. The next section begins with the discussions of basic information of JPEG files, their content and available tools that can be used with this file type. Furthermore, the paper details experiment and result of this process in Section 3, clarifying the important component contained in JPEG files. Concise conclusion elaborating current research challenges related to JPEG file image content analysis is also presented. II. Background of Study JPEG was created as a standard format to store photographic images. It only specifies how component values are stored but not the way colours need to be represented. JPEG File Interchange Format (JFIF), another acronym for JPEG, was introduced to allow images to be created and exchanged among different applications [9]. Usually, JPEG file has the extension of .jpg, .JPG, .jpeg or .JPEG. Generally, JPEG file uses lossy compression methods that excludes some bits string (which is not detectable by the human eyes), before images are stored so as to minimize storage space as well as reduce file transmission time. For instance, to store 1 MB Windows BMP file, it requires only 50 KB with JPEG file [2]. There are four steps involve in compressing (or encoding) the JPEG file which are sampling, Discrete Cosine Transform, quantization and entropy coding. The reverse process is also true -decompression (or decoding). Miano (1999) elaborates more on Compressed Image File Format. JPEG files are defined by four compression modes which are; hierarchical, progressive, sequential, and lossless. For file interchange process, the sequential compression method with Huffman baseline encoding [10] is strongly recommended to be used [9]. In sequential mode, images are encoded from top to bottom. Throughout this paper, discussions will focus more on baseline JPEG file. A. State of the Art of JPEG File The specification of JPEG file format or specifically markers can be in three different formats, which are JFIF (Figure 1), JFIF Exif (Figure 2) Exif (Figure 3). JFIF Exif is non-standard format in which both JFIF and Exif markers can be found in one image file [11]. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 2…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) SOI SOI APP₀ APP₀ *APP₀ Extension *APP₀ Extension DQT DQT SOF SOF DHT DRI SOS DHT Scan SOS 1 EOI Scan 1 SOI *Thumbnail SOI APP₁ SOI APP₀ *APP₂ DQT Exif DQT DHT EOF DHT SOF *DRI SOS SOF Scan SOS EOI Figure 1(a) DRI Scan DHT EOI SOS n Figure 2. JFIF Exif Format *optional Figure 3. Exif Format [1] Scan n EOI *optional Figure 1(b). [2] Figure 1. JFIF Format Figure 1, 2 and 3 shows JPEG markers contained in the file. Markers are used to specify the location of component in a file. ‘Scan’ in the figures signifies a compressed data in the file. JFIF format can be identified with APP₀ marker as shown in Figure 1(b). However, most of the JFIF file do not use the DRI marker, thus the format in Figure 1(a) is often used. Exif format can be identified with APP₁ marker and sometimes with APP₂ marker (FlashPix extension data). Most of the Exif files are created with thumbnail image, usually without the DRI marker as shown in Figure 3. On the other hand, the JFIF Exif format contains two or three markers, APP₀, APP₁ and APP₂ which are incompatible as shown in Figure 2. In this case, the APP₀ marker comes without their extension and use the same Exif format. This specification is not realized by many applications and therefore working with this format might be a bit difficult. Exif specifications allow one or two thumbnails to be embedded in the JPEG file [12]. Exif image specification is described in Figure 4. It shows that the locations of DQT (Define Quantization Table) and DHT (Define Huffman Table), are may be switched with each other depending on the devices that produced such image. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 3…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 4. Image with Thumbnail/s Specifications B. Tools Exif format contain metadata or Exif data that describes the digital image itself. Basically, information like camera model used, creation time and date are usable for investigation purposes. For the sake of metadata viewer, there are several available tools that can be used as provided in Graphic Software web site [13]. Additionally, there are also approaches on how to identify only the JFIF header based on their markers [14-16]. Besides that, WinHex [17] and Hexeditor [18] are other tools that displays the actual content of JPEG files in hexadecimal form. III. Analysis, Result and Discussions of JPEG Tables DQT and DHT are important tables in JPEG files that allows the process of compression and decompression. There are several works done to display the contents of DQT and DHT. However, no significant exploration have been presented partaining to the analyses of JPEG Metadata. JPEG Metadata Viewer [11] and JPEGsnoop [19] as open source tool that can be used for such purpose. These softwares synoptically displays the common information about the JPEG tables including markers, length of data and marker locations in a file. This section will start with introduction of DQT and DHT, followed by examination of their contents. For analysis purposes, we used total of 80 JPEG files, in which each 40 files are generated from 20 digital cameras and mobile cameras. Each file was renamed from 1 to 80 names and the list of their associated devices is shown in Table 1. The files are image collection that has not undergone any modification. However, two images of every four images from each device (in no particular sequence), are rotated in order to obtain the proper display of images. In some cases, these rotated images exhibits some variance with the original image. This will be discussed further in next sub sections. TABLE I. DISTRIBUTION OF DEVICES USED IN EXPERIMENT Digital Cameras Device Mobile Devices File Name Device (.JPG/.jpg) File Name (.JPG/.jpg) 1. Canon EOS 450D 1-4 11. Samsung GT-I9300 41-44 2. Nikon Coolpix L16 5-8 12. Sony Ericsson K770i 45-48 This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 4…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) 3. Nikon D90 9-12 13. Sony Ericsson K850i 49-52 4. Olympus T105, T100, X36 13-16 14. Sony Ericsson W660i 53-56 5. Panasonic DMC-F2 17-20 15. Sony Ericsson W705 57-60 6. Ricoh R50 21-24 16. LG Electronics 61-64 7. Samsung ES60/SL105/ES63 25-28 8. Samsung S630 29-32 17. Nokia N73 69-72 9. Sony Cybershot 33-36 18. Nokia 1234 73-76 37-40 19. Nokia 5320 77-80 10. Sony DSC-W570 GW520 65-68 20. Nokia 6233 A. DQT Quantization is a sort of matrices used by JPEG to control image compression. Every digital device and graphical application that produces JPEG files will have their own quantization table as implied in device setting. For instance, image can be set by low, medium or high quality and this mean users can choose the quality level to save the image. Figure 5. Image Pixels Image is a collection of information about very small dots or represented as pixel. In the first step of JPEG encoding, each pixel data is grouped into 8x8 blocks as shown in Figure 5. Each component is then converted from RGB (Red, Green, Blue) to YCbCr (Y: luminance, CbCr: chrominance) colorspace. Luminance represent brightness of the pixels, chrominance Cb specified blueness while chrominance Cr specified redness. In the second step of JPEG encoding, DCT is used to transform each 8x8 block into a set of 64 DCT coefficients. The first value represents the DC coefficient and remaining 63 values are called AC coefficients. The third phase of JPEG encoding is to quantize the DCT coefficients by using 64 quantization values provided in DQT. Thus, the results will be used in the next encoding phase, which is entropy encoding. Figure 6 shows the parameter specification of DQT. Basically, the value of length is calculated start with length field until the end of quantization values. From 40 images together with the 46 thumbnails of digital cameras, we found that 67 of them use 67-byte size of DQT, 54 of them use 132-byte size of DQT, and 4 of them use 197-byte size of DQT. From 40 images together with the 40 thumbnails of mobile cameras, we found that 80 of them use 67-byte size of DQT and 36 of them use 132-byte size of DQT. It shows that majority of the images use 67-byte size of DQT. A luminance table can be identified by 00 value while chrominance with 01 value. The quantization values are stored in zigzag order in JPEG files. Hexeditor tool is used to view the content of DQTs of one selected image as shown in Figure 7. Each DQT starts with FFDB marker and it shows that this image contains two DQTs. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 5…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Marker Length Y or CbCr Table Quantization Values FF DB 00 43 00 or 01 .......... 2-byte 2-byte 1-byte 64-byte Figure 6. DQT Specification Figure 7. DQTs in JPEG File The actual reordering of quantization values are obtained by converting the zigzag order as shown in Figure 8 by using JPEGsnoop [19]. Figure 8. Actual Ordering of Quantization Values Refer to Figure 8, the precisions 8 bit represent the 8-bit per pixel sample luminance and chrominance. Quantization tables consist of luminance and chrominance matrices value. This means that the value of image brightness, blueness and redness have their compression ratio. JPEG may consists of two (one for Y, one for CbCr) or three DQTs (each for Y, Cb, Cr). Basically, luminance table become the first location of DQT, but there is a case where it becomes the second location of DQT. Table 2 shows the number of DQTs in 80 JPEG files. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 6…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) TABLE II. Image NUMBER OF DQTS IN JPEG FILES #Camera #Mobile Images Images YCbCr 2 3 Y with default CbCr - 1 14 16 - - - 5 16 11 - - 3 2 1 - 4 2 - - - - 40 40 Image with 1 Image: YCbCr Thumbnail Thumbnail: YCbCr Image: YCbCr Thumbnail: Y with default CbCr Image: Y with default CbCr Thumbnail: YCbCr Image: Y with default CbCr Thumbnail: Y with default CbCr Image with 2 Image: YCbCr Thumbnails 1st Thumbnail: YCbCr nd 2 Thumbnail: YCbCr Image: YCbCr 1st Thumbnail: YCbCr nd 2 Thumbnail: Y with default CbCr Image: YCbCr 1st Thumbnail: Y with default CbCr 2nd Thumbnail: Y with default CbCr Image: Y with default CbCr 1st Thumbnail: Y with default CbCr nd 2 Thumbnail: Y with default CbCr Image: Y with default CbCr 1st Thumbnail: Y with default CbCr nd 2 Thumbnail: YCbCr Image: Y with default CbCr 1st Thumbnail: YCbCr 2nd Thumbnail: YCbCr Total: Result in Table 2 shows that only five images do not have thumbnail and the rest of images may contain either one or two thumbnails. Majority of images (14 images from cameras, 16 from mobile) are provided with luminance and chrominance DQT tables. In the second highest number of images (16 images from cameras, 11 from mobile), whenever luminance table is provided, the default chrominance table is used. The default table values are different depending on the devices and thus give the various quality levels of images. In this study, JPEG was saved at 90%, with 10% of the data has loss. Although the quality values has been identified for several digital cameras [20], the quantization table in images may not match that quality values. Therefore, the last quality saved in the JPEG can be identified by approximating the quality value based on DQT. The following figures shows the result of approximated quality value for 80 JPEG files by using a method developed by Neal Krawetz [21]. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 7…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Average Quality (%) Digital Camera 100 98 98 98 97 95 93 98 88 90 82 80 70 1 3 5 7 9 11 13 15 17 19 21 23 25 27 29 31 33 35 37 39 File Name (.JPG/.jpg) Average Quality (%) Figure 9. Approximated Quality Value for Digital Camera Images Mobile Camera 150 100 50 0 96 83 77 94 81 86 88 76 41 43 45 47 49 51 53 55 57 59 61 63 65 67 69 71 73 75 77 79 File Name (.JPG/.jpg) Figure 10. Approximated Quality Value for Mobile Camera Images Most of mobile devices produce the same quality value for images compared to digital cameras with different quality level. This is due to various quality setting provided by the cameras. The average quality value is quite high for most images that generated from digital cameras compared to mobile cameras. Most of the images have the quality value more than 90% while below 90% for the mobile cameras. This shows that images produced mobile camera will throw out more information and thus the quality of the images are lower. Results from experiment shows that even if DQT is missing and there is requirement to view the images, it is possible to use DQT from other available image [4]. As a result, the quality of the image will be different, either higher or lower, but image still can be viewed. However, even if one byte data from DQT is modified and changed, the image become corrupted file and cannot be viewed. This type of error can be found in one of dataset available in the Internet [22], in which one byte of DQT length field has been changed in a JPEG file. B. DHT Other mechanism to control JPEG compression is entropy encoding. There are two standard ways to compress JPEG file either by using Huffman encoding or arithmetic coding. DHT is important to obtain successful decoding and it is provided to eliminate the zero numbers in 64 quantized coefficients by applying variable length codes. Thus, shorter codes will be assigned to more frequently used bits. Figure 11 shows the parameter specification of DHT. Marker DHT Length Table Class This papers was presented at 2 nd Table Destination Huffman Code Values of Huffman code International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 8…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) FF C4 .......... 0 or 1 0 or 1 ………. ………. 2-byte 2-byte 4-bit 4-bit 16-byte No fix length Figure 11. DHT Specification Refer to Figure 11, again, the value of length is calculated start with length field until the end of Huffman code values. From 80 images being analyzed, it shows that all of the Y-DC table use either 31-byte or 418-byte size of DHT, Y-AC and CbCr-AC table use 181-byte size of DHT, CbCr-DC table use 31-byte size of DHT. Hexeditor tool is used to view the content of DHTs of one selected image as shown in Figure 12. Each DHT in that image starts with FFC4 marker and thus this image contains four DHTs. Figure 12. DHTs in JPEG File There are four DHT tables that specified in table class and definition field. They are Y-DC, Y-AC, CbCr-DC and CbCr-AC tables. DQTs and DHTs are related with each other in order to further compress the data. The observation shows that: - If either images or thumbnails are using DQT of Y with default CbCr, then they are using DHT of 2 DC tables - If either images or thumbnails are using DQT of YCbCr, then they are using DHT of 2 DC and 2 AC tables Refer to Table 2, it shows that there are higher number of images that use DQT of Y with default CbCr (27 images) and DQT of YCbCr (30 images). Thus, the two situations described above are quite important, since a total of 57 out of 80 images matches with this situation. As a result, there are also higher number of images that consist of 2 DC tables, and images with 2 DC and AC tables. On the other hand, emphasizing on JFIF files, 100 of this type of files uses 2 DC and AC tables [23]. Additionally, emphasizing on Exif files, 69 out of 76 files uses 2 DC tables [24]. IV. Discussion There are several tools/approaches for viewing the important components (DQT and DHT) in JPEG file, from which valuable forensic information can be extracted. Considering DQT for instance, the image quality value can be estimated, while number of information about the used device can also be revealed. The analysis presented in this paper, shows that some devices produce similar image quality value. However, they also exhibit some characteristics which can be used to highlight the default quality level of the device. If the default quality levels for the images are known, then the number of resaved image can be determined. This This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 9…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) findings therefore provides useful insight for image modification analysis, as well as to image source identification. As shown in the analysis in section 3, the number of DQT is related to DHT. Thus, images can be concluded to use 2 DC tables if they are using DQT of Y with default CbCr; otherwise, 2 DC and 2 AC tables, if they use DQT of CbCr. Thus, from this result, the length of the DHT can be estimated to depend on the DQTs that constitute the image. However, the length cannot be estimated with accurate number because the Huffman code values are not fixed. However, with this study of specific format of DQT and DHT, it is useful in differentiating JPEG file from other file types. Additionally, in comparison with previous research works, this research focuses on one type of JPEG file comprising various JPEG formats such as Exif and JFIF Exif. It is worthwhile to mention that the JFIF Exif format is not recognized as standard JPEG format. However, this format is usually ignored by most of the research work, while we found that most of the rotated images used this type of format. From the analysis, we found that, due to the effect of image rotation, for both digital and mobile cameras, the un-rotated image (original image form) uses Exif specification, while rotated images uses JFIF Exif specification. V. Conclusion This paper discussed an overview of JPEG file format, as well as identifying important characteristic of JPEG files. While being an important component for compression and decompression, valuable information (evidence) can also be extracted from DQT and DHT. We used about 40 JPEG files from digital cameras and 40 JPEG files from mobile cameras to examine the image content. From the examination of DQT, the approximated quality value of images can be calculated depending on various devices that are used to produce JPEG files. On the other hand, the relation between DQT and DHT can be used to differentiate between JPEG files from other file types as well as differentiating between JPEG files themselves. REFERENCES [1] JEIDA, "Digital Still Camera Image File Format Standard (Exif) Version 1.0," 1995. [2] J. Miano, Compressed Image File Formats: JPEG, PNG, GIF, XBM, BMP: Association for Computing Machinery, Inc. (ACM), 1999. [3] M. I. Cohen, "Title," unpublished|. [4] H. T. Sencar and N. Memon, "Identification and Recovery of JPEG Files with Missing Fragments," presented at the Digital Forensic Research Workshop, 2009. [5] M. Xu and S. Dong. 2009, Reassembling the Fragmented JPEG Images Based on Sequential Pixel Prediction. [6] J. v. d. Bos and T. v. d. Storm, "Bringing Domain-Specific Languages to Digital Forensics," ICSE ’11, 2011. [7] reportlinker.com. 2012, Market Research Reports. Available: http://www.reportlinker.com/ci02061/Camera.html [8] K. Medaris and R. Mislan. 2008, Expert: Digital evidence just as important as dna in solving crimes. Available: http://news.uns.purdue.edu/x/2008a/080425T-MislanPhones.html [9] E. Hamilton, "JPEG File Interchange Format Version 1.02 " 1992. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 10…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [10] D. A. Huffman, "A Method for the Construction of Minimum-Redundancy Codes," Proceedings of the I.R.E, pp. 1098–1102, 1952. [11] K. M. Mohamad and M. M. Deris, "Visualization of JPEG Metadata," IVIC 2009, LNCS 5857, pp. 543– 550, 2009. [12] M. M. Deris, et al., "Carving JPEG Images and Thumbnails Using Image Pattern Matching," 2011 IEEE Symposium on Computers & Informatics, pp. 78-83, 2011. [13] About.com. 2013, Graphics Software. Available: http://graphicssoft.about.com/od/exifsoftware/EXIF_IPTC_XMP [14] K. M. Mohamad and M. M. Deris, "Single-byte-marker for Detecting JPEG JFIF Header using FORIMAGE-JPEG," 2009 Fifth International Joint Conference on INC, IMS and IDC, pp. 1693-1698, 2009. [15] K. M. Mohamad, et al., "Dual-Byte-Marker Algorithm for Detecting JFIF Header," ISA 2010, CCIS 76, pp. 17 – 26, 2010. [16] K. M. Mohamad, et al., "Detecting JFIF Header using FORHEADER," International Journal of Security and Its Applications, vol. 5, pp. 23-36, 2011. [17] X.-W. S. T. AG, "WinHex," 2012. [18] M. Horz, "Hexeditor," 2009. [19] C. Hass. 2012, JPEGsnoop. Available: www.impulseadventure.com/photo/ [20] C. Hass. 2008, Comparing JPEG Quality. Available: http://www.impulseadventure.com/photo/jpegquality.html [21] N. Krawetz. 2005, jpegquality.c. Available: http://www.hackerfactor.com/src/jpegquality.c [22] B. Carrier. 2005, Digital Forensics Tool Testing Images Available: http://dftt.sourceforge.net/ [23] K. M. Mohamad and M. M. Deris. 2009, Fragmentation Point Detection of JPEG Images at DHT Using Validator. 173-180. [24] M. Karresand and N. Shahmehri, "Reassembly of Fragmented JPEG Images Containing Restart Markers," presented at the European Conference on Computer Network Defense, 2008. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 11…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) An Analysis of User Requirements for Virtual Classroom/Collaboration Software Jin Tan Information Services Cardiff University, Cardiff, UK [email protected] Abstract: This article aims to present an analysis of user requirements for virtual classroom/collaboration software (VCCS) in learning and teaching. It collates and priorities existing user requirements in Cardiff University, reviews tools in the market, and recommends good tools that meet these requirements. Keywords-component: virtual classroom, user requirements, learning activities I. Introduction Virtual Classroom is not a completely innovate term to educators. In the early 1990s, educators have started to see the value of computer-mediated communication (CMC), for instance, Hiltz and Turoff [1] described communication structures in their designed online environment for teaching and learning, named EIES 2. This could be seen as an example of the prototype of virtual classroom using in distance education. In a recent study conducted by McBrien, Jones and Cheng [2], it discussed student-perceived strengths and weakness of using a synchronous online learning platform - Elluminate Live1. The study concluded that most students had a positive online experience using synchronous learning technology but it closely related to how the instructors control communication and interaction over online classes on both technological aspects and pedagogical aspects. It is hardly doubt that with the rapid improvement of information technologies, new trends continue to impact on the higher education. For example, Howell, Williams and Lindsay [3] stated six trends: (1) the increasing percentage of adult learners and international students, (2) institutions are becoming more learnercentered, non-linear, and self-directed, (3) a huge growth in Internet usage andtechnological fluency,(4) lifelong learning is becoming a competitive necessity, (5) more courses, degrees, and universities are becoming available through distance-education programs, and(6)the growing needs for effective course-management systems and web services. Without exception, Cardiff University is one of the universities facing the impact too. The Learning Technology Team, Information Services in the university received increasingly requirements for supporting virtual classroom and collaboration software (VCCS) in 2012. This analysis therefore collated and clarified the user requirements for the VCCS in learning and teaching, reviewed VCCS in the market and further recommended good tools that meet the user requirements. To avoid misunderstanding of the topic, we provided a definition of Virtual Classroom: A virtual classroom is an online service to support both synchronous and asynchronous e-learning activities. It may involve overlapping scopes of interaction such as virtual courses, online meeting, and online presentation. It supports activities and interactions through functionalities such as video, voice, chat, screen sharing, webinar, whiteboard, threaded discussion boards and so on. This article presents the conduction of this study and its findings. It intends to contribute to the knowledge of understanding user needs for the VCCS. 1 Elluminate Live had been purchased by Blackboard Inc. in 2010 and is named as Blackboard Collaborate. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 12…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) I. METHODS AND DATA COLLECTION This analysis intended to gather opinion-related qualitative information rather than look to measure data quantitatively. Considering that a VCCS provides many features and it is time consuming to ask participant’s opinion about each feature, an online questionnaire was designed to collect user requirements for functionalities of the VCCS. The questions about features of a VCCS were referred to two types of resources. One was the evaluation documents from the known application websites, such as Blackboard Collaboration generic vendor evaluation worksheet (e.g., [4]), Adobe Connect product comparison whitepapers [5] and TeamViewer benchmark ([6]). The other was the academic papers and research studies about the VCCS (e.g., [7], [8], [9]). The questionnaire covered all features relating to online educational activities. Table I shows an example of the designed questions for collecting user requirements. Figure I shows an example of questions in the survey. There were 14 categories in the “Teaching and Learning Feature” theme and 12 categories in the “Administration” theme. TABLE I. Themes AN EXAMPLE OF FEATURES IN VCCS Categories Features Live Video & Audio • Test your audio locally Streaming • Adjust individual user volume • Audio/webcam setup wizard • Drag & Drop reordering • Play multimedia file (video, audio, Flash, QuickTime, mpg, Teaching m4v, etc.) and • Play slides Learning Features • Resize videos • Full Screen Video Capture/ record/ playback • Moderators can control of sessions can be recorded, stored, exported or printed • Moderators can determine if a session/content can be accessed/ played back Remote support • Stand phone lines • VoIP • Installation required Administration • Remote control • Support SSL Encryption Security • Server software can be hosted securely behind a firewall Following the online questionnaire, the participant was invited to a one-to-one semi-structured interview (40-60 minutes) to discuss more details of their requirements according to their responses to the questions in the survey. The interviewing questions were open-ended and aimed to collect background and extensive information related to particular requirements from the participant. It focused on the aspects as follows: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 13…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) • To understand the participant’s purposes of using the VCCS; • To know what teaching and learning activities are involved in the use of the VCCS; • To know who are the target users of the VCCS; • To know what are essential features of the VCCS for the participant; • To know how urgent the requirement is for the VCCS is; • To understand more specific subject-related requirements for the VCCS; • To clarify any doubts about the questions in the survey; • To give the participant an opportunity to interpret their requirements in detail. Figure 1. An example of survey questions about user requirements for the VCCS features Twenty-three faculties were invited to participate in this investigation by a recruiting email sending to domain administrators of the university e-learning system users. Fifteen volunteers from eleven faculties have participated in the study. Six out of fifteen participants have experience of using VCCS, and nine participants stated that they are planning to use a VCCS tool in learning and teaching activities. The collection of available VCCS products in the market was based on four groups: (1) tools that we have already known, (2) tools recommended by e-learning professional interest groups and organizations (e.g., JISC funded projects [10]), (3) tools recommended in research papers and academic journal articles in education settings (e.g., [11], [12]), and (4) reliable awards for learning technology products (e.g., [13]). It included 46 VCCS tools on the list. Based on the availability, the VCCS products were categorized into three groups: 16 free register version tools, 17 free trial version tools and 9 commercial version tools. The nine commercial version tools were not tested because of one of the reasons: (1) did not provide a trial version, (2) requested to register credit card information to try a trial version, (3) requested certain membership. The findings were based on evaluating tools in the group of free register version software and the group of free trial version software. The evaluation of the VCCS products is not comprehensive on the following aspects considering limitations of the availability of testing facilities, testing members and the investigation duration: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 14…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) • Using mobile devices to access the VCCS was not tested; • The VCCS running on Windows XP SP3 and Mac OS X 10.6.8 was tested; • The VCCS running on web browsers (Firefox 13.0.1, Firefox 12, Safari 5.1.7, Google Chrome 20, IE 8) was tested; • A large group of attendees (over 10) synchronously joining in a live session was not tested. • It did not test every feature of a VCCS product but focused on testing the features required by participants; • Some VCCS applications (e.g., Voluxionhttp://www.voluxion.com/; Zoho Meeting https://www.zoho.com/meeting/) were dismissed because they either did not provide a free trial version or needed credit card information to register. It does not say this type of applications is not good. II. FINDINGS A. User requirements for the VCCS The data showed that the participants have a positive view about the use of VCCS. Six key aspects of requirements relating to the use of the VCCS were emerged: (1) supporting online training and tutoring, (2) supporting online lecture presentation, (3) supporting virtual meetings, (4) enhancing flexible learning opportunities, (5) providing flexible teaching approaches, and (6) supporting subjects and special needs learners related e-learning. The core theory occurred here is Flexible Learning. According to Collis and Moonen [14], the theory is reflected on three dimensions from the data. At first, users required for flexible access learning content. Some participants mentioned that more and more students (including campus-based students) asked whether the teaching sessions could be available online for them to access later. Secondly, users expected flexible learning style regarding to time and location. Participants stated that distance learners who take online courses need to join a live session or access to various online resources from different locations and time zones at the same time. Hence, as the third point, schools want e-learning systems to support online learning activities, and teaching staff want more flexible approaches to delivering e-learning courses. Without doubt, the requirements for the VCCS are learner-centered. People want a flexible learning environment cross the traditional classroom so that teaching and learning can fit into their lifestyle. Figure 2 presents an overview of user requirements for the VCCS. It shows the main uses of the VCCS in schools/departments, the priority of the requirements in each use, and the fundamental features in relation to a use of the VCCS. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 15…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 2. An overview of user requirements for the VCCS There are three distinct requirements particularly in relation to learning and teaching activities. The first is supporting online training and tutoring. This is the most urgent requirement. This group of users was from libraries, the lifelong learning centre, and schools that run e-learning courses. The requirements represent on (1) having an easier approach for learners to join in a training session no matter their locations, (2) a live training session can be recorded by moderators, (3) recorded training sessions are accessible for learners, (4) the presenter is able to share screen and application, and (5) easily organizing group work or group discussions in a live session. This type of requirements was categorized according to common required factors as follows: • Small numbers of attendees (maximum 20 attendees); • Learners who are unable to attend a session on the site and/or at a specific date/time can join in a session no matter their locations and their time (e.g., distance learning students, business or the individual who have limited time); • Learners may be at different levels (e.g., different language background in a language training course, different levels of literacy skills in a library databases searching course); • 1-2 moderators may lead a session; • A variety of learning activities to engage learners (e.g., play presentation slides, quizzes, access to external web resources, play a video); • Supporting group work and discussions; • One-to-one, one-to-many or many-to-many interactions (e.g., allow attendees to chat to each other). Table 2 displays an example of the essential features in the VCCS if it is used for the purpose of supporting small group online training or tutoring (NB: the listed information is not integral). In the table, the first column refers to the key requirements stated by participants; the second column lists the functionalities in a VCCS tool; and the third column shows the category that we used to design the questionnaire (see Table I, the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 16…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) second column). The VCCS features such as supporting interaction and a variety of ways to engage users, recording, chat, video/audio, screen/application sharing are crucial. TABLE II. AN EXAMPLE OF USER KEY REQUIREMENTS FOR THE VCCS IN THE USE OF SUPPORTING ONLINE TRAINING/TUTORING Key requirements Required VCCS features Feature categories Be able to schedule Upload files (e.g., presentation slides, quizzes, File transfer sessions documents, multimedia files) Email attendees and guests to a scheduled Communication session Allow group work Breakout rooms Breakout rooms Whiteboard Whiteboard Textual public messaging Communication Textual private messaging Audio/video Be able to play File transfer File transfer Support various types of multimedia files Live multimedia files Be able to see/show video & Audio streaming Screen sharing or Remote control Application/Screen sharing Sessions recording Capture/record/playback a attendee’s screen Be able to record the training session Secondly, supporting online lecture presentations is a fairly urgent requirement. This group of users need the VCCS features such as supporting a large number of attendees connected synchronously, recording, playing high-quality presentations. It is related to the user who encountered issues such as it is difficult to check students’ attendance, the shortage of big lecture theatres in the university, and the lack of flexible learning opportunities for students. This group of users is from schools that run e-learning courses and that deliver lectures to a large group of students. In particular, the schools run e-learning courses to distance students need a better VCCS solution urgently. This type of requirements was categorized based on the factors as follows: • Large numbers of attendees (minimum 50 attendees, normally over 100 attendees); • Live video presentations to geographically dispersed learners; • High quality presentations; • Record live sessions and edit it before publishing for on-demand access; • The lecturer/presenter leads a session and moderators moderate in due time; • Using learning activities to engage learners during the session (e.g., quizzes, polling, survey); • One-to-many or a few-to-many interactions (in a lecture, it has little time for group discussions). Thirdly, supporting virtual meetings was asked by participants too. The users expected the VCCS allows anyone, anywhere to share their desktop and ideas with others instantly. This use is not as urgent as the above two This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 17…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) required uses. Features such as supporting file transferring, recording, host meetings, chat, video/audio, screen sharing are important. This type of requirements was categorized based on the factors as follows: • Attendees are at different locations and/or time zones; • Attendees communicate through audio; • Multiparty video (e.g., attendees can see each other); • Play presentation slides; • Whiteboard and/or screen/application sharing; • Many-to-many style of interaction. In addition to the above, there are three fundamental requirements at the pedagogical level. The three requirements are intrinsically linked in relation to the main uses of the VCCS. They are equally important in a use of the VCCS. In a specific learning and teaching activity, participants expected the use of the VCCS to “enhance the students learning opportunities”, for example, • The features allow students to attend a session from different locations and/or time zones, • Allow students customise the screen size/font/colour, • Online chat, • Communicate through video/audio, • Use whiteboard, • Play quizzes, and • Allow users to access from mobile devices. They also expected that the VCCS provide features to support flexible teaching approaches, such as • allowing educators to invite external people into a session, • having different levels of controls, • easily managing online sessions, • tracking and assessing students’ learning outcomes, and • easily working with an existing virtual learning system. Regarding to a specific subject or a specific need learner’s requirement, users expected the VCCS is able to support an extensible architecture that allows the addition of new tools to meet these specific needs, for example, allowing users to key in complex mathematics symbols or allowing learners with dyslexia to listen to an audio recording of a session. B. Reviewing of the VCCS After reviewing thirty-three available tools in market, it found that three free VCCS applications: Any Meeting (http://www.anymeeting.com/), Team Viewer (http://www.teamviewer.com), Wiggio This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 18…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) (http://wiggio.com/) and five commercial applications: Adobe Connect (http://www.adobe.com/uk/products/adobeconnect.html), Blackboard Collaborate (http://www.blackboard.com/platforms/collaborate/overview.aspx), Microsoft Lync (http://lync.microsoft.com/en-gb/launch/Pages/launch.aspx), om Novia (http://www.omnovia.com/), WizIQ (http://www.wiziq.com/) meet most user requirements. In general, they are easy to use, run on all supported operating systems and web browsers, and provide reliable service and flexible features. Considering to support online training and tutoring, all eight applications have “the most needed” features, although each lacks of some features. For example, • Any Meeting does not allow attendees to upload/download files and does not have breakout rooms. • Team Viewer does not have breakout rooms, polling, quizzes, and action icons (e.g., hands-up) to support interaction. • Wiggio has a problem of recording/playing back in the current free version. • omNovia does not support Mac users. • WizIQ does not have quizzes and application sharing. • Adobe Connect is unable to export polling results and not allow attendees to resize video. • Microsoft Lync does not support breakout rooms. • Blackboard Collaborate does not allow attendees to customise font colour, but its features as a whole are slightly better than those features in Microsoft Lync. In relation to supporting online lecture presentations, Any Meeting is the only free application that supports a large group of attendees (up to 200 attendees). Both Blackboard Collaborate and Microsoft Lync provide many required features. Blackboard Collaborate supports additional tools (e.g., complex mathematics symbols) and more types of multimedia files than Microsoft Lync. In relation to supporting virtual meetings, as a free tool, Team Viewer provides all key features the users required. Wiggio is good at supporting work in groups and collaboration. For the commercial tools, Adobe Connect, Blackboard Collaborate and Microsoft Lync all satisfy the user current requirements. In accordance with pedagogical support, to provide flexible learning opportunities and teaching approaches, Any Meeting is better than Team Viewer and Wiggio on the aspects of supporting web tour, polling, recording and tracking students’ learning outcomes. However, if the user is trying to use iPad/iPhone, Team Viewer as a whole service provides more useful features than Wiggio. OmNovia and WizIQ are not as good as the other three commercial applications. Adobe Connect is not as good as Blackboard Collaborate because it lacks of some flexible features such as allowing attendees to customize chat font type and video size, and allowing the user to export polling results. Reviewing the application as a complete service, both Blackboard Collaborate and Microsoft Lync provide many flexible and useful features. However, Microsoft Lync is not as good as Blackboard Collaborate in its component tools such as supporting breakout rooms, supporting tracking reports and assessing students’ This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 19…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) learning outcomes, supporting extensible tools for specific needs learner and subjects, supporting multimedia file types, supporting multiple language interfaces, and providing a solution of integrating with the existing Learning Management System (LMS). Compared to Blackboard Collaborate, Microsoft Lync is a proper option for general collaborative requirements within an organization, but is not the best software option for supporting learning and teaching activities specifically. Figure 3 displays the recommended VCCS applications regarding to user requirements. Figure 3. An overview of good VCCS tools and user requirements III. CONCLUSIONS It is apparent that no single application meets all user requirements. In accordance with different subjects and learning activities, there are different aspects and degrees of requirements for the VCCS features. One application may be more suitable than the other in relation to one or two particular requirements for the VCCS in the school. Based on the analysis, recommendations provided for users include: • The users need to be aware that each tool has some weakness. When choose a VCCS application, they need to clear the most essential features in the VCCS in relation to their learning activities. • In the short term, the schools that urgently need the VCCS (such as supporting tutorials or online trainings for a small group of distance students) should adopt a free application such as AnyMeeting until a centrally supported solution can be put in place. • For the users who want to use the VCCS to run virtual meetings or support communication and collaboration, TeamViewer is a good choice and Wiggio satisfies the users who particularly need the VCCS for supporting work in groups. • For the schools that run e-learning courses for distance students (especially a large group of learners) or want to apply the VCCS to support lecture presentations, they may use AnyMeeting to support learning and teaching activities before a centrally supported solution is available. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 20…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) • Where there is a specific requirement to support specific subjects or specific needs of learners and providing a flexible learning environment, Blackboard Collaborate clearly meets more user requirements than Microsoft Lync. • Schools that have prepared funding for purchasing a VCCS tool should consider Blackboard Collaborate. • Should any schools use Microsoft Lync or Blackboard Collaborate in the short term then their experience should be closely monitored to provide a comparison between the two applications. Overall, it is hoped that this article helps people better understand the user requirements for the VCCS and further provides a sound in the support strategic decisions where it pertains to these technologies. ACKNOWLEDGMENT I would like to express my special gratitude to the contribution of participants. REFERENCES [1] S.R. Hiltz and M. Turoff, “Video plus virtual classroom for distance education: experience with graduate courses”. The Distance Education in DoD Invitational Research Conference, National Defense University, Washington DC, USA, 11-12 February 1993. Invited paper. [2] J.L. McBrien, P. Jones, and R. Cheng , “Virtual spaces: employing a synchronous online classroom to facilitate student engagement in online learning”. International Review of Research in Open and Distance Learning, vol. 10, no. 3. 2009. [3] S. Howell, P. Williams, and N. Lindsay, ‘Thirty-two trends affecting distance education: an informed foundation for strategic planning”. The Online Journal of Distance Learning Administration, vol. VI, no. III, Fall 2003, pp. 23-26. [4] “Virtual classroom evaluation 2011”. IT Services at UQ, The University of Queensland, Australia, 2011, Web. Accessed 15 July 2012.http://www.its.uq.edu.au/index.html?page=169750&pid=144707 [5] “Competitive comparisons”. GetConnect, Adobe Connect partner, 2011. Web. Accessed 3 April 2012. http://www.getconnect.com/resources/competitiveprodcompare/ [6] “Evaluation-Benchmark”. TeamViewer, [n.d.]. Web. Accessed 3 April 2012. http://www.teamviewer.com/en/res/excel/TeamViewer-Benchmark-en.xls [7] F.C. Serce and S. Yildirim, “A web-based synchronous collaborative review tool: a case study of an on-line graduate course”. Educational Technology & Society, vol. 9, no. 2, 2006, pp. 166-177. [8] R.E. Griffin, D.M. Friedman, and J.S. Miko, “Discover how virtual classroom software (VCS) can revolutionize your distance education classroom”. Proceedings of the EDUCAUSE Mid-Atlantic Regional Conference, Baltimore, Maryland , 17-19 January 2007. [9] S. Sharma and S. Gupta, “The virtual classroom: the role of ICT in open and distance learning”. International Journal of Computer, Communication and Emerging Technology (IJCCET), vol. 1, no. 1, pp. 8-12, April 2012. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 21…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [10] P. Chatterton, “Designing for participant engagement with Blackboard Collaborate: a good practice guide to using Blackboard Collaborate to support teaching, learning & assessment, co-operative working and conferences”. The Joint Integrated Information Environment Committee (JISC). Web. Accessed 19 May 2012. http://www.jisc.ac.uk/whatwedo/programmes/elearning/collaborateguidance.aspx [11] K. Michael, “Virtual classroom: reflections of online learning”. Campus-Wide Information Systems, vol. 29, no. 3, 2012, pp. 156-165. [12] P. Jones, M. Kolloff, and F. Kolloff, “Using web conferencing to promote learning in online courses: resources, tools, and methods,” in Proceedings of Society for Information Technology & Teacher Education International Conference 2012, 5 March 2012, Austin, Texas, USA, P. Resta, Ed., Chesapeake, VA: AACE, 2012, pp. 481-486. [13] “Global e-Learning Awards”, Learn Tech Conference & Exhibition, Web. Accessed 26 July 2012. http://worldeducationcongress.com/learntech/Awards_Categories.html [14] B. Collis and J. Moonen, Flexible Learning in a Digital World, 2nd ed., London: Routledge and Falmer, 2004. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 22…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The use of learning technologies to facilitate engagement in an online course Dilani S. P. Gedera TEMS Education Research Centre The University of Waikato, New Zealand [email protected] P. John Williams TEMS Education Research Centre The University of Waikato, New Zealand [email protected] Abstract: E-learning is becoming increasingly popular in many countries for its flexibility in terms of time, place and pace. Research affirms that learning technologies support interaction and collaboration among learners and improve learning outcomes. However, current practices of e-learning are not without constraints and there is a need for empirical research to assist practitioners in determining the best uses of learning technologies. This paper seeks to develop an understanding of students’ experiences and their perspectives of learning with the educational technologies of ‘Adobe virtual classroom’ and ‘Moodle’ that facilitated activities in a university course. The study was conducted using a case study method over a period of one semester. With Activity Theory as its research framework, the research methods of this study include individual interviews, online observation and document analysis. This paper includes some of the initial findings of the research and a brief discussion on how the educational technologies facilitated students’ engagement in this course. This may inform practitioners of the pragmatic constraints and affordances of existing technologies, learning activities and strategies used in online learning environments. Keywords-component; learning technologie; engagement; e-learning; affordances; constraints; Activity Theory I. INTRODUCTION E-learning is becoming increasingly popular in many countries for its flexibility in terms of time, place and pace. Research affirms that learning technologies support interaction and collaboration among learners and improve learning outcomes. Studies that examine how technology can be used in educational contexts have focused on potential benefits of learning technologies in relation to teaching and learning. For instance, Holmes and Gardner [2] assert that e-learning offers unique opportunities for teachers and learners to enhance their teaching and learning experiences via virtual environments that help not only in delivery but also in the application of knowledge. In addition to the pedagogical potential of e-learning, some researchers have focused on the changes that are taking place with the emergence of e-learning. The shift from teacher-centred learning to studentcentred learning in various contexts [1][7] and also the way students learn and interact in learning environments [6] are some of these changes. For instance, access to information regardless of time and place enables learners This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 23…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) to ‘explore education’ and communicate with peers and the outside world through various media ranging from print to video [6]. In the context of New Zealand, The Ministry of Education stresses the importance of e-learning in education. According to NZCER [7] “E-learning can improve understanding and encourage deeper learning, if there is careful course design and choice of technology in relation to learning objectives that aim to encourage deeper learning”. As suggested by the e-learning Advisory Group [3], technology does not offer a complete solution for a transformative education; rather the practitioners should focus on the potentials of learning technologies that can enhance students’ learning experience and performance as well as the constraints of these technologies that inhibit their performance. These affordances and constraints of technologies in education should be thoroughly considered for a successful implementation of e-learning. This paper seeks to develop an understanding of students’ experiences and their perspectives of learning with the technologies –Adobe virtual classroom and Moodle that facilitated activities, and how these technologies facilitated students’ engagement in a fully online university course. This study defines learner engagement as students’ active participation in e-learning activities such as discussion forums and virtual classroom activity in achieving learning goals in an online environment. II. RESEARCH CONTEXT AND RESEARCH QUESTIONS This paper is based on a case study focused on a fully online course that was offered in the first semester of 2012 academic year. A total of seven participants that comprised six students and their lecturer participated in this study. The research questions that guided the data collection and analysis of this research were: • What were students’ perspectives on their experiences of learning with Adobe virtual classroom and Moodle learning technologies that facilitated activities in a fully online university paper? • How did the educational technologies affect students’ participation in e-learning activities? III. RESEARCH FRAMEWORK, METHODS AND DATA ANALYSIS This study was carried out as a case study over a period of one semester and the methods of data collection included individual interviews, observation of online activities and document analysis. The online learning activity was the focus of data gathering and Engeström’s [10] Activity Theory was used as the research framework. Activity Theory is derived from socio-cultural and socio-historical theories and can be considered as a philosophical framework that is used to study practices and processes of human beings [4]. Particularly, Engeström’s activity systems analysis enables researchers to observe the interactions that take place among individuals and the environment and how each affects one another [5]. The elements of an activity system include subject, object and other mediators such as tools, rules, community and division of labour. In capturing participants’ views on how these educational technologies facilitated students’ engagement, particular attention was given to the tool mediation principle of Activity Theory- that is human activity is mediated by several tools [9]. These tools can be physical—a computer or a book, conceptual– a mental model, a plan or a strategy, abstract— a language, or even a virtual tool— functions of a website. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 24…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Mediation of tools plays an important role in shaping how human beings act and interact with the world [8]. Focusing on the tool mediation tenet of Activity Theory, the sub-themes that emerged under the element Tools were mainly considered for the analysis. In the case of this paper, tool mediation refers to the use of Adobe virtual classroom that facilitated a synchronous activity in which students presented their research to the members of the class, and the Moodle learning management system that facilitated an asynchronous online forum activity in this course. In coding data, relevant units from transcribed interview texts, observational notes and documents (i.e. course outline) were identified and categorized according to the elements of Activity theory as a method of typology. In categorizing these codes according to the elements of Activity Theory, Nvivo was used as a data management tool. IV. FINDINGS AND DISCUSSION The activities observed and used in the analysis of data included Adobe virtual class that facilitated a synchronous activity and Moodle that facilitated asynchronous forum discussions as well as the design and the delivery of the contents of the course. Thus, the findings that are related to these educational technologies and other tools that mediated students’ engagement in activities in this course are illustrated in the following sections. A. The Adobe virtual classroom The Adobe Connect Pro virtual classroom that was used as the tool in facilitating the collaborative synchronous activity in this class was a web-based technology. This activity was carried out as an individual assignment and represented 30% of the student assessments. In order for students to access it, a unique URL and a password was provided by the lecturer. In placing the Adobe virtual classroom activity in Activity Theory framework, the subject represents the student(s) who are the focus of this study. The object is the purpose of an activity which can be a motive or a problem space. In this case, the students’ purpose was to present their research to an audience (other members of the class). The mediating tools that were used in this activity in order to transform students’ object include physical tools- computers, mental tools- learning strategies, models and virtual tools- functions that were available on Adobe virtual classroom. The rules for this activity included the duration of the presentation (10 minutes), relevant literature and references (following APA format) and a written script or notes (1500 words). The community of this activity includes the facilitator who is also the lecturer of this course and the members of the class. Division of labourdefines the students’ responsibilities. As part of their responsibilities, one peer had to review the allocated student’s presentation and the notes before the actual activity and also the peer was to raise three questions to be discussed after the presentation. The findings suggest that the students’ experiences of learning with Adobe virtual classroom were associated mainly with the affordances and constraints of this learning technology. As pointed out by the participants, the affordances of the Adobe virtual class allowed them to interact in real time. Denoting the value of synchronous tools that enable them to see and hear each other in real time and the immediate responses they receive when they engage in collaborative activities, Alex suggested that: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 25…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) I would like to see more synchronous. Only because I like seeing people when I’m talking to them and stuff like that. I like that backwards and forwards that can happen very easily in that environment (Alex, interview 2) Students also pointed out that the visual images are important in communication and without them, they probably find it quite hard to feel like they belonged to a learning community. Another feature of virtual classroom that supported students’ engagement was the ability to have an oral discussion in real time right after each presentation. It was observed that having a discussion after each presentation allowed the students to clarify the issues related to the topic immediately, as well as provide some instant peer feedback. When Alex was asked what he thought about the reviewing of notes and facilitating a discussion after each presentation, he stated that “I think it caused us slightly deeper interaction with what the others have done. I thought that was quite useful”(Alex, interview 2). As a group, students could also support each other by giving words of encouragement after their presentations, for example “very interesting”, “welldone”and “excellent presentation”. These video and audio features facilitated two way communications among the students and thereby created a sense of belonging to a learning community. Apart from the video and audio functions, Adobe virtual class also allowed the students to have a textbased chat during this activity. This was particularly useful when they had questions to ask from a particular person in private or in public as well as to have a chat before the facilitator (lecturer) joined the group. An example of a text-based chat is shown below. Debbie: Why am I coming up as guest? Debbie: you must have heard me Alex: Hi Debbie - you've come in as Guest, if you close out and come back in you should get the chance to put in your name. I'm backing you, so I hope your nervousness isn't too bad Alex: All the different styles make it interesting :) imagine if they were all the same :( Alex: Hi Debbie - not sure why that didn't work... I'll investigate Debbie: I’ve just tried coming in again but I don’t see a guest tag now Alex: It has remembered you and brought you back in as Guest again - maybe Garry can tell you how to fix that Richard: Debbie - quit your browser and re-enter with your name and not guest Alex: Hi Debbie - did you hear that Debbie: Yes (7 May observation) On the other hand, students also felt that there were limitations with the Adobe virtual classroom. Students mentioned that they were attracted to this course for its flexibility, as it was fully online and enabled them to have flexibility in terms of time, place and pace. However, as Richard, the lecturer pointed out, the inclusion of synchronous activities like the research presentations using Adobe virtual classroom needs careful planning in terms of time, as some of the students come from different countries and when the time zones are different, it is hard to coordinate synchronous activities. On that particular day and at that particular time if the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 26…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) internet connection is not stable, the students may not be able to participate in the activity. This was evident in the case of Gail who participated from a Middle Eastern country. Due to slow speed internet connection that was caused by an unstable political situation in the country, Gail couldn’t hear what the others were saying and also she couldn’t do her presentation or facilitate and join discussions. Although Richard gave her a one-to-one session to present her research via Skype the next day, it was a disappointing and frustrating experience for her. Richard described that: I had her notes and I had her PowerPoint slides and I also had a Skype conversation with it. The issue was there, the bombs are going outside the window and probably it had something to do with it, but from her point of view, it was frustrating because she had prepared and she did a good job (Richard, interview 2). This suggests that although online courses provide more flexibility to learners and the ability to interact with each other in real time, synchronous activities like Adobe virtual classroom need careful planning in its implementation especially with back up plans, as unexpected situations like weather conditions and technical issues can hinder the execution of activities. The findings indicated another significant limitation of this tool is that if the number of students is high, it gets harder to allocate time slots. As Richard said, “the more students you have the harder it is. Also how many times you have to do it” (interview 2). Considering the constraints of Adobe virtual classroom Richard appeared to be unsure of its best use and he mentioned that “in using Virtual classroom as I’m using it more ….as I go along…….I am still little bit unsure about its best use (Richard, interview 1). Participants’ views also suggested that having limited capacity for only one speaker to talk at a time, discussions take a longer time and also the participants may have to repeat their utterances many times if two people talk at the same time. However, it was interesting to find out that students still preferred more synchronous activities despite its limitations because the students could have more “human interactions” where they could use “a lot of cues” (Alex, interview 2) like facial expressions as well, as it allowed the participants to interact with each other in real time that enabled them to have a two way communication. In Eddy’s point of view “if there was a little more any form of synchronous…it may have helped get to know one another earlier on (Eddy, interview 2). Alex pointed out that although the virtual classroom “wasn’t flowing more like we can talk like we would be sitting in front of each other just in person….but when face to face is not possible, it’s better than not having it. (Alex, interview 2). B. Moodle This fully online course was delivered via the university learning management system—Moodle. Therefore, in designing this course, the lecturer used several strategies that were facilitated by Moodle. The findings suggest that these strategies as conceptual tools facilitated students’ engagement in this course. As explained by the lecturer it is vital for online courses to be well structured with a similar pattern in each week or module. The uniformity of the course allows the learners to have a positive experience of learning with learning technologies, as the students did not have to struggle to find materials and resources in separate folders. As one of the strategies, all the resources that included reading materials, YouTube clips, helpful tips and guidelines for writing and assignments were embedded in the texts or hyperlinks on the course Moodle page. As Richard said: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 27…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) There are no boxes or folders full of papers for students to work their way through, but all are embedded within the texts or hyperlinks and everything follows a logical progression (interview 1) This strategy seemed to make students’ access to information as easy as possible, as they didn’t “have to wrestle with the interface or finding resources to be able to learn”(Richard, interview 1). The importance of a structured course was also highlighted by the students and they appreciated that the lecturer “has been a very good coordinator and his work is structured”(Christine). Students also described that all the information is there and they can read in their own time. Another strategy the lecturer used in the design of this course was creating several spaces for students to interact and communicate. These spaces comprised class news and notices, private and public communication spaces, sharing spaces, peer support spaces and Q and A spaces for each module. By creating several spaces for communication, the students were given a choice to suit their needs. In the lecturer’s point of view, these strategies should be deliberately implemented and one strategy that suits one group may not work for another; therefore, it is important to consider the needs of that particular learning group in designing online courses. As pointed out by a student, these spaces were helpful when they needed help with their assignments. In situations where they needed assistance, more capable peers came in and guided them through the process. I sent out a question on the public Question place. Alex came in and sent me an email how to do it. To me, it was little bit like a miracle because I had no knowledge of how to do either of those the Movie maker or the YouTube. And without instructions that Alex emailed, I couldn’t have done it (Christine, interview 2) In this case, Christine was struggling with one assignment where she had to create a 3-4 minute presentation to be uploaded to YouTube (or equivalent online multimedia tool). Alex, having the technical knowledge, offered help. Other general questions that were shared and answered on the public question space included questions on internet speed requirements, editing functions of Moodle discussions, assignment due dates, reference styles and computer brands. well used space in this course was the sharing space. This space was continuously filled with information about software—PDF reader, screen capture, as well as information on embedding audio into postings, using shortcuts, uploading URLs and docking blocks. Students acknowledged that sharing of ideas among peers about technology that can help them in their teaching and learning is particularly useful in their jobs although they are not tech savvy. Debbie stated: These are wonderful little instruments that everybody else knows and I don’t…so we share things that might be helpful and it’s a great advantage. I’m never going to be brilliant at technology, but I might be able to make it useful to me in my job little bit more I think (interview 2) The participants’ views suggested that the sharing of information and ideas helped them to get connected to each other as a learning community and increase their engagement with learning. Overall, the strategies that were used in the design of this course, as a conceptual tool, allowed the students to interact and communicate with each other in public or in private, choosing the method that suits them best. The question and answer space was in use to get help when students needed assistance with their assignments. The sharing space helped them to interact with each other while providing information on useful instruments that can be used in teaching and learning. As a conceptual tool, these structural strategies created by the lecturer acted as a mediator This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 28…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) in making close connections among students allowing them to have a sense of belonging to a learning community. In terms of the asynchronous forum discussion activity that was facilitated by Moodle, student participants reported both positive and negative opinions. One common idea shared by the students was that forum discussions as an asynchronous activity gives more time for them to reflect especially if students are shy or have problems with English as a second language. In Alex’s opinion, those second language speakers, when they are put on the spot it’s a challenge, but on forums they? have time to reflect and be prepared (Alex, interview 1). Debbie described that as a shy person she never talked in face-to-face tutorials during her first degree, as she thought whatever she says has already been said by other students and it’s not going to add any value. She believed that in forum discussions everybody says something , and online forums are an excellent method for discussions. However, students felt that the forum discussions in this course were rather “official” and it is slow to get to know people, as they do not get to see people in forum discussions. As explained by Richard, humour plays an important role in online discussions. He explained: Because I’ll be nervous…..as they are...you’ve got to make them see you as a person who they can talk with …and identify the person with it. Humour is part of that...and as you go along…they know when you pull their leg and you know...that’s really important…so they feel comfortable and relaxed to be able to interact with me and others. And responding to those every day (Richard, interview 1) He believes that humour helps students to lessen nervousness and increase interactions among students. However, Alex emphasized that in forum discussions, it is hard to have a sense of humour without physical cues. I’m thinking of a couple of discussions we’ve had where I haven’t quite been sure what perspective the person was coming from whereas you see them saying it, you can often judge a bit more from some of the physical cues. I mean when I write, I write in some ways with the tone I have in my mind, but it can be sometimes sarcastic. You can make it come out, but that doesn’t fully come out with the intonation and the timing and everything (Alex, interview 2) As a learning experience, students did not fully enjoy the discussions, as they thought that physical cues were missing. Moodle as a virtual tool allowed the lecturer to embed resources within texts as well as design a well-structured Moodle page for this course. C. Language In this case, Fiona who is a second language English speaker seemed to have issues, as at times she could not understand what the others were talking about. I think sometimes I feel that I’m lost in discussions. Actually in this paper, I don’t participate much because as I said I’m lost in this conversation. I need time (interview 1) Since Fiona could not follow them she mentioned that she only read the discussions. When she was asked for the reasons why she couldn’t follow them, she said that, “When they used slang I didn’t understand. I try to understand the general meaning. Sometimes they use short forms like letters. Sometimes even Richard This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 29…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) uses this” (interview 2). She also had difficulties in doing assignments, as she found it hard to understand what exactly needed to be done, but she managed to clarify things with the help of her fellow classmates. She mentioned that “I found difficulties in doing assignments because I didn’t understand, but I asked the others and the things became clearer” (interview 2). When Fiona was participating in Adobe virtual classroom activity, she had some difficulties with grammar and pronunciation (7 May observation). She seemed to be reading from her slides and she mentioned that she was wondering whether her peers could understand her presentation. As part of the Adobe virtual classroom activity, students reviewed one of their peer’s presentation notes and facilitated a discussion by asking three questions from the presenter right after their presentation. Providing her views regarding this process and how language became an issue in this case, Debbie described that: Well from my point of view the person who asked me questions, that was Fiona. Fiona has issues with English as a second language and the questions she asked me were not exactly around my presentation. They were more about who I was and what I was doing, so I didn’t find her questions particularly useful (interview 2) The findings suggested that Fiona appeared to be struggling with English as a second language in this course. In terms of tool mediation, it is apparent that language as an abstract tool mediated Fiona’s engagement in both forum discussions and Adobe virtual Classroom activities. However, in her view since the course was fully online she had an advantage, as she had more time to think and reflect. Fiona compared her online learning experience with a face-to-face class and emphasized that “because of language, it is better to learn online because I have my time to read” (Fiona, interview 1). V. CONCLUSION This paper highlighted students’ experiences and their perspectives of learning with technologies – Adobe virtual classroom and Moodle that facilitated activities, and their influence on students’ engagement in a fully online university course. In this context, the affordances of the synchronous Adobe virtual classroom, as a virtual tool, facilitated collaboration and helped students in creating a sense of belonging to a learning community particularly with the video and audio features. However, the data also suggested that when interacting in real time some practical issues such as time zones need to be considered in using synchronous learning technologies. In terms of the asynchronous forum discussion activity that was facilitated by Moodle, participants’ views comprised both positive and negative opinions. Moodle discussions as an asynchronous activity, gave students more time to reflect. However, in forum discussions it seemed that it takes time to get to know people and also it is hard to have a sense of humour without physical cues. In terms of the design of the course, Moodle as a virtual tool allowed the lecturer to create a well-structured course where all the resources, video files and other documents were embedded in texts and hyperlinks and organized according to a logical progression that enabled the students to have a positive experience of learning with learning technologies. Students’ voices indicated overall satisfaction in learning with learning technologies and achieving their learning goals in this course. References [1] B. C. Lee, J. Yoon, and I. Lee, “Learners’ acceptance of e-learning in South Korea: Theories and results,” Computers and Education vol. 53, pp. 1320-1329, 2009. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 30…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [2] B. Holmes and J. Gardner, E-learning: concepts and practice, United Kingdom: SAGE, 2006. [3] E-learning Advisory Group, Highways and pathways: Exploring New Zealand's e-learning opportunities, Wellington: Ministry of Education, 2002. [4] K. Kuutti, “Activity theory as a potential framework for human computer interaction research,” In Context and consciousness: Activity theory and human computer interaction, B. Nardi, Ed. Cambridge: MIT Press, 1995, pp. 17-44. [5] L. C. Yamagata-Lynch, “Activity systems analysis methods: Understanding complex learning environments,” New York: Springer, 2010. [6] M. S. Desai, J. Hart, and T. C. Richards, “E-learning: paradigm shift in education,” Education, vol. 129, no. 2, pp. 327-334, 2008. [7] New Zealand Council for Education Research, Statistical profile of Maori in tertiary level education and engagement in e-learning, Wellington: New Zealand, 2004. [8] V. Kaptelinin, B. Nardi, and C. Macaulay, “The activity checklist: A tool for representing the space of context,” Interactions, vol.6, no. 4, pp. 27-39, 1999. [9] V. Kaptelinin,. “Activity theory: Implications for human-computer interaction,” Context and Consciousness: Activity Theory and human-computer interaction, B. Nardi, Ed. Cambridge, MA: The MIT Press, 1996, pp. 103-116. [10] Y. Engeström, “Learning by expanding: An activity-theoretical approach to developmental research,” Helsinki: Orienta-Konsultit, 1987. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 31…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Using Activity Theory to understand contradictions in an online university course facilitated by Moodle Dilani S. P. Gedera TEMS Education Research Centre The University of Waikato, New Zealand [email protected] P. John Williams TEMS Education Research Centre The University of Waikato, New Zealand [email protected] Abstract: Activity Theory can offer insights into learning processes that are facilitated by Learning Management Systems. Contradictions, as a basic principle of Activity Theory, assist in identifying the tensions and conflicts that emerge in systems of online learning environments. Using Activity Theory as its research framework, this study focuses on the contradictions that emerged in the form of tensions, frustrations, misunderstandings and miscommunication in a fully online university course in New Zealand. The data collection methods of this case study included individual interviews, online activity observation and documents analysis. Outlining some of the findings of the study, this paper will discuss how students’ participation in learning activities facilitated by Moodle was affected by these contradictions. Keywords-Component ; Moodle; contradictions; Activity Theory; Learning Management Systems I. INTRODUCTION Technological advancements in education have provided students with flexible and collaborative learning opportunities. For example, Learning Management Systems (LMS) have the ability to facilitate synchronous and asynchronous activities in which students have flexibility in participating in learning activities in terms of time, place and place.These systems also enable collaboration and interaction among students. LMSs are also known as “learning platforms”, “course management systems”, “instructional management systems” and “distributed learning systems” [1], and some of the common LMSs are Moodle, Blackboard, Oncourse, Angel andSakai. These systems are used to enhance face-to-face university courses as well as fully online courses. LMSs generally provide various tools for course administration and delivery and some of these functions include synchronous and asynchronous communication (chat and discussion forums), development and delivery of content (links to the internet resources), assessment (submission of assignments, quizzes), and management of students and class (enrolment, class list) [1]. Although LMSs are considered a powerful technology that can handle a range of aspects of learning processes with its functions, there are limitations that hinder its potential [2]. Furthermore, Beer, Clark and Jones [3] state that it is not clear to what extent LMSs affect students’ participation in activities in universities. These limitations can come in the form of conflicts, contradictions, miscommunication and misunderstanding in learning systems that can affect students’ participation in e-learning activities. With this focus, using Activity Theory as its research framework, this study This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 32…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) focuses on the contradictions that emerged in the form of tensions, frustrations, misunderstandings and miscommunication in a fully online university course in New Zealand.The paper includes some of the findings of this case study and a discussion ssion on how students’ participation in learning activities facilitated by Moodle was affected by these contradictions. II. RESEARCH CONTEXT AND RESEARCH QUESTIONS The course which was the focus of this case study was one of the papers of the Graduate diploma of Teaching and was taught fully online for 12 weeks in a university in New Zealand. All class interactions took place in the university LMS, Moodle, and most of of the activities carried out in this paper were asynchronous. The participants who took part in my research were three students (Irene, Hannah and Jake) and their lecturer(Laura) from one stream out of three. The lecturers of other two streams (Faye and Michelle) Michelle) also participated in my research. The lecturers of these three streams (Laura, Faye and Michelle) worked as a team but had their own ways of communicatingin their own streams. For example, the lecturer of the group under this case study,Laura, uploaded aded voice files at the end of each week as feedback to her students’ weekly discussion forums. The research questions that guided the data analysis of this research were: • What were the contradictions that emerged within an activity system of a fully online onlin university course facilitated by Moodle? • How was students’ active participation in the course affected by these contradictions? III. ACTIVITY THEORY AND ITS PRINCIPLE OF CONTRADICTIONS Activity Theory is derived from socio-cultural socio and socio-historical theories and through hrough the lens of Activity Theory, learners’ constructionof knowledge can be observed and analysed explicitly. Activity Theory can offer insights into learning processes that are facilitated by Learning Management Systems, in particular, it allows scholars to examine and document successful and unsuccessful incorporation of technologies and activities that are facilitated by LMSs in online learning environments. Engeström’s[4] Activity theory framework offers analytic tools that are appropriate for f modelling activity systems. The constituents of an activity system include subject, object, tools, rules, community and division of labour. Figure 1 shows the basic structure of Activity Theory. Figure 1: Activity Theory framework (adapted from Engeström[4]) This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 33…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Kaptelinin and Nardi [5]; Engeström [6]; Kaptelinin, Nardi and Macaulay [7] and Kaptelinin[8] have discussed the characteristics or principles of Activity Theory. Some of these basic principles of Activity Theory include object-orientedness, hierarchical structure of activity, internalization vs. externalization, mediation, development, multi-voicedness of activity systems, and contradictions as a source of change and development, which is to the focus of this paper. Contradictions, as a basic principle of Activity Theory assist in identifying the tensions and conflicts that emerge in systems of online learning environments.Contradictions are also referred to as structural tensions that may have accumulated over time. These contradictions may create conflicts, interruptions and clashes: however, through the resolution of conflicts, they can also be considered as sources of change or development. Contradictions are defined as “a misfit within elements, between them, between different activities, or between different developmental phases of a single activity” [9]. Engeström[4] proposes four levels of contradictions (1) primary, (2) secondary, (3) tertiary and (4) quaternary. The primary contradictions occur within the elements of activity systems (e.g. within the community). Secondary contradictions arise between the elements of an activity system (e.g. between the community and subject), tertiary contradictions arise when activity participants face situations where they have to use an advanced method to achieve an objective (e.g. when they are introduced a new technology), and quaternary contradictions occur between the central activity system and outside activity systems. In the context of my research, the contradictions that emerged within and between(primary and secondary) the elements of the activity system are illustrated in this paper. The following figure demonstrates a synchronous activity (forum discussion facilitated by Moodle) that is placed within the Activity Theory framework. Tools Moodle, computer, Object (critically reflect and critique the topic questions and key ideas from literature) Subject (student participants) Outcome: Applicable knowledge Division of labour (lecturer’s voice files to individual groups, Rules (APA referencing style, word limit, 3 contributions per week) Plenary voice files to all) Community (peers, lecturer) Figure 2: Asynchronous forum discussion activity system This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 34…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) IV. RESEARCH METHODS AND DATA ANALYSIS The methods used for data collection of this research included interviews, observation of online activities and document analysis (course outline) and as a data management tool, NVivo was used. For the purpose of this paper, two asynchronous learning activities: (1) PowerPoint presentation prepared for a conference and a reflection uploaded on Moodle, and (2) Weekly forum discussions that were facilitated by Moodle, were selected for the data analysis. Engestrom’s[4] Activity theory model was used to organize the findings to identify the sources of these tensions and conflicts within and between elements of activity systems. In coding the data, relevant meaningful units from transcribed interviews, observational notes and relevant documents were identified and then were coded according to the elements of Activity Theory as a method of typology. Among the sub-themes that emerged under these main themes or the elements of Activity Theory, contradictions became visible in a variety of forms. These contradictions are illustrated in the following section. V. FINDINGS AND DISCUSSION The findings revealed that several contradictions occurred within and between the elements of activity systems in this context. These contradictions include issues related to course materials as tools, grading, communication; and opinions related to ‘teacher’s presence’. A. Presentation of materials The teaching materials in this course included journal articles, You Tube clips, PowerPoint slides and Podcasts. Students’ voices indicated the way they felt about the presentation of these physical toolsin this course and these views described the tensions and frustrations they experienced in this course. Hannah pointed out that the students preferred to have the reading materials in the form of a book, as it was convenient for them to read. She mentioned that in a communication space many students raised the issue of having a book instead of several articles every week. She explained that: Everybody wanted the book for reading. We all asked for it, and then a lecturer said that we can’t have it, but afterwards she agreed because the request continued. Now she has agreed to it, but until I see it, I don’t believe it you know for the next semester. They might say they haven’t. They have to be organized enough to think of the materials 4 months in advance (interview 2) This issue was also highlighted by Irene. In her opinion, they could go back to the readings easily if they had the hard copy of a set of readings. She feels that not having a hard copy of the articles has “actually been a bit of a pain” (interview 2). However, when Michelle,who is the coordinator of the course,was asked regarding the issue of giving a printed copy of readings, she had a different view on that. She believed that by giving the articles every week to students, they could ensure the most recent publications were used. The process of putting the readings online rather than in a hard copy has worked well because as the 12 weeks have unfolded and new papers have been published that are related to play that are quite new and exciting, so we can upload and talk about them (Michelle, interview) This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 35…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Students’ voices suggested that they still preferred to have the book and if the lectures would like to give them new materials, they can upload extra materials on Moodle. Hannah also pointed out that “Many people must have printed them all, seriously it’s a lot of money. Students can’t download some stuff (interview 2.) Having to read on the screen or print articles on a weekly basis and not being able to download some of the materials was seen as frustrations that created tension in student participants. In terms of presentation of materials, Irene seemed to have difficulty following some of Laura’s Podcasts that were uploaded for theirstream. This is because as Irene mentioned, Laura’s Podcasts had background music in them and Irene, having a hearing difficulty, found it hard to follow them: One other thing is Laura’s Podcasts, they are often hard to hear because she sets the volume too low when she is recording. And I’m little bit deaf and it has to be dead quiet for me to concentrate. In one of them she had music playing in the background it was a great pain (Irene, interview 2) She also mentioned that she had some issues with downloading Podcasts in this course which affected her full participation in forum discussions. This was also acknowledged by Irene’s lecturer, Laura. She stated that she had difficulties downloading the same Podcast and she was aware that students had the same problem: The students had some difficulties I think getting into the Podcasts. Even I tried it at my home computer and it wasn’t easy and it took me hours to download that drama thing. That can really preclude full participation (Laura, interview 2) Laura’s view suggests that the students’ active participation could have been affected when the students could not download the podcasts. Jake explained why some of the students could not open some of the Podcasts uploaded in this course. In his opinion, they were recorded using different formats and some students could not download them. As a suggestion he said planning and testing should be done before the course starts for a smooth run: It seems that some of the Podcasts you could sync with iTune and you could automatically download, but then the other Podcasts were not through iTunes and it was in different formats, may be it was in an audio file or just the iTune thing and not everyone has iTune, so they should do just the audio Podcast and keep it nice and simple. I suppose it’s trying out different things and seeing what’s best. As we were told we have to be up-to-date with technology. Just realizing that it’s an evolving process, but still being aware that things have to run smoothly like there’s testing and everything, but should plan properly (interview 2) The contradictions that emerged within the element Tools in the activity system were in the form of frustrations and difficulties,and these seemed to hinder students’ participation in some ways. B. Issues on grading In their assignment one, drawing on to the discussions and the literature, students were to create a PowerPoint presentation for a conference and also write a 1000 word reflection based on a set of reflective questions given and uploaded on Moodle. However, students were not sure whether they were to include notes in the PowerPoint presentation and some of the students posted questions on the Moodle communication space asking for clarifications from their lecturer, Laura. When students got a reply from Laura to the question, the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 36…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) students realized that they had been given contradictory information.Laura asked them to include notes while Faye, the lecturer of another streamhad asked them not to include the notes in a previous conversation. In Irene’s point of view, one person should have given instructions regarding assignments: There was confusion there. Laura actually gave us wrong information. I think one person should be the person that deals with the actual sort of what is required for the assignments(Irene, interview 2) Students also seemed to be frustrated when thisassignment was marked by someone else. Laura mentioned in an interview that she did not mark the first assignment—the PowerPoint slides they prepared for a conference and the reflection on that, as she was away at a conference in the United States. She mentioned, “I didn’t in the end mark the first assignment because I was away, but I did have a look at a few and I was very pleased with it” (interview 2). However, related to the marking of assignment one, Hannah expressed her concern and stated that she is worried that someone else is marking their assignments. At this moment my frustration is I know for sure that they are not correcting my assignments. Somebody else is correcting. It’s like I got the name of somebody else who has corrected my assignment (Hannah, interview 2) When Laura was asked whether she would get help with marking students’ assignments, she assured that she was going to mark them on her own. However, the students were not informed of any of the arrangements or plans regarding the marking. These frustrations and tensions arose between the subject (students) and the community (lecturers) in this context as a result of not having thorough planning in terms of the lecturers’ roles and responsibilities (division of labour). Hannah’s worry of someone else marking her assignments could be avoided if the students were given clear information on why Laura did not mark the first assignment and an assurance that she would moderate them and would mark the rest of the assessments. C. Issues on communication Laura’s absence, and someone else marking students’ assignments, further complicated issues when students tried to communicate with Laura assuming that she was marking their assignment one. Irene described that after she submitted her assignment, she realized that she had forgotten to include references, so she sent a message to Laura in the one-to-one space on Moodle asking whether she could send the references. Since Laura was away, Michelle looked after Laura’s stream and got access to Laura’s one-to-one space. Irene was not aware of this arrangement and also the fact that someone else marked her assignment. Irene said: I sent a note on Moodle in one to one space saying could I resend the assignment and Michelle sent a reply saying yes just send it, but I don’t think Laura got it because the feedback says that it’s with incomplete references(Irene, interview 2) Irene believed that although Michelle replied giving permission to send the references, her message or references did not seem to reach Laura. This was seen as a gap in their communication link that created frustration.Prior to this incident Laura also experienced an issue that she was locked out of the one-to-one communication space. She explained how she got to know that she was not able to see students’ messages because of the way (assigned role) she was brought into the course. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 37…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The other problem I had was that in the one on one space I assumed that I hadn’t heard from any of my students in the whole course. And then, quite recently, a student emailed me and said “you haven’t answered my question on one on one space”. When I tried to go in I discovered I had been locked out of it, so I had no way of knowing….I think it was because when I was initially brought into the course I was brought in on the wrong criteria (Laura, interview 2). In relation to communication issues, Hannah also had an experience where her message was not answered for some time. Hannah wrote to her lecturer and asked for an example of an art work so that she could get an idea of exactly what she needed to do. This may be due to Laura’s issue of being locked out of the one-to-one space. Hannah mentioned that when she didn’t get a reply from them, out of frustration she started making her own art work which was quite different: I asked them to send me an example before the two week holiday because that was really a good break you know. Then I didn’t get a reply for a very long time. That was a drawback because I somehow started doing something that was completely different, but anyway thank god that there was no right or wrong, so I submitted it. But you know when we ask something…it’s not like we are desperate at least if we get that…I mean this is the least we get back from our teachers (interview 2) D. Different student-lecturer and lecturer-lecturer opinions on ‘teacher’s presence’ The lecturers in this course did not participate in weekly forum discussions, but they uploaded feedback in the form of voice files and plenary podcasts in most of the weeks. This created controversial opinions between students and lecturers as well as among lecturers. Faye attested that, “our philosophy in the program is not going to the discussions during the week because it does interrupt the flow of what people are saying” (interview 1). Michelle shared similar views regarding “teachers’ presence” and she explained that if the lecturers are there, the students may not freely express their opinions. Michelle commented: I’d much prefer that we go in at the end or beginning in the week to do the voice file…… I’m not going to intervene in the conversation because I know that would shut it down and students will respond thinking “she’s the lecturer and we better say that”. I think it allows them more opportunity to have honest discussions with each other(interview) On the other hand, students felt that they were left on their own and they were not sure whether they were on the right track without the “teacher’s presence”. The students seemed to need some kind of guidance and acknowledgement of their contributions. For example, Hannah mentioned: I did another course and the lecturer used to be part of our online discussion and lead us through it. That method is better because you feel the presence. Your teacher is there…. But here they say happy discussion and they post it…I don’t know, for example this is the end of 3rd week and I haven’t got any feedback what I have been doing, so I really don’t know whether I’m doing the right thing (interview 1). Regarding ‘teacher’s presence’ in this context, Laura had a different opinion to Faye and Michelle, as she was more keen to have a dialogue with her students than giving them a talk at the end of the week. She accentuated: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 38…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Well as I said the discussion voice files ….my voice files to the students were my way of having a genuine dialogue with them when I couldn’t go into their online space, so I think it would be best to establish a way of having that dialogue as a reciprocal exchange - not just mere responding as an end point, like a plenary (Laura, interview 2) Laura believed that two way communication is important for her, as that’s her way of having a dialogue with her students. Laura said, “Dialogue to me is not “you speak and then I respond”, it’s an on-going reciprocal thing. I think that I would like to have more of that in this course”(interview 2).She also mentioned thatthere were times in the discussions she would have quite liked to go in and steer it in a different direction. However, when Laura was asked whether she meant that the lecturers should participate in forum discussions, she was not sure whether that was what she wanted.Alternatively she suggested that if she had a choice she preferred not to grade all the discussions, but just a few of them and let the students have more free thinking: I think in a way, if it was my choice, I would prefer not to grade but instead create a kind of capacity to ‘free fall’ as I call it...free fall thinking. It’s somewhat constrained, with the grading. May be I wouldn’t grade all the discussions. I might grade perhaps the last three or various parts rather than all, but it’s not up to me (interview 2) The differing opinions on “teachers’ presence” in this context denoted clashes between students’ and lecturers’ views. Students’ views demonstrated their need to have the lecturer as part of their community while engaging in forum discussions. With lecturers’ absence in forum discussions, the findings alsoshowedan absence of reciprocal communication between the students and the lecturers that interrupted students’ participation. VI. CONCLUSION As Kuuti[9]suggests, contradictions can be “problems, ruptures, breakdowns, clashes” in activities. The contradictions that emerged within and between the elements of activity systems in this case study were seen in diverse forms such as frustrations, tensions, difficulties and contradictory opinions. Presentation of course materials that included journal articles and Podcasts as physical tools created tensions among students when they were unable to download some of them and when they had to read on the screen or print them each week. The lack of planning in terms of individual responsibilities (division of labour) also caused confusion in this context when the students were given contradictory information. As suggested by the students, lecturers’ roles as well as information provided regarding assignments and marking should have been explicit. The contradictions related to the issue of miscommunication was also due to lack of planning and communication. As a result of bringing Laura under the wrong category (assigned role) in Moodle, both the students and their lecturer were frustrated. The opposing views on lecturers’ participation in forum discussions indicated the clashes that were in this activity system that affected students’ participation in this course. Lecturers’ feedback and guidance as well as reciprocal communication in forum discussions were rather limited since the lecturers decided not to be part of the community in this context. Therefore, successful implementation of an online course that is facilitated by an LMS needs careful planning that suits the needs of students. This includes structural strategies in the design of the course. The findings from this research may help overcome tensions and contradictions when designing courses and activities in online learning environments. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 39…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) References : [1] H. Coates, J. Richard, and G. Baldwin, “A critical examination of the effects of learning management systems on university teaching and learning,” Tertiary Education Management, vol. 11, no. 1, pp. 19-36, 2005. [2] W. R. Watson, andS. L. Watson, “An argument for clarity: What are learning management systems, what are they not, and what should they become?,” TechTrends, vol. 51, no. 2, pp. 28-34, 2007. [3] C. Beer, K. Clark, and D. Jones, “Indicators of engagement,” In Curriculum, Technology and Transformation for an unknown future, C. H. Steel, M.J. Keppel, P. Gerbic and S. Housego, Eds., Sydney: Proceedings ascilite Sydney, 2010, 75-86. [4] Y.Engeström, “Learning by expanding: An activity-theoretical approach to developmental research,” Helsinki: Orienta-Konsultit, 1987. [5] V. Kaptelinin, and B. A. Nardi, “Acting with Technology,” Cambridge, MA: The MIT Press, 2006. [6] Y.Engeström, “Expansive learning at work: Toward an activity-theoretical conceptualization,” Journal of Education and Work, vol. 14,pp. 133-156, 2001. [7] V. Kaptelinin, B. A. Nardi, and C. Macaulay, “The activity checklist: A tool for representing the "space" of context,” Interactions, vol. 6, no. 4, pp. 27-39, 1999. [8] V.Kaptelinin, “Activity theory: Implications for human-computer interaction,” Context and Consciousness: Activity Theory and human-computer interaction, B. A. Nardi,Ed. Cambridge, MA: The MIT Press, 1996, pp. 103-116. [9] K.Kuutti, “Activity theory as a potential framework for human computer interaction research,” Context and consciousness: Activity theory and human computer interaction, B. A. Nardi, Ed. Cambridge: MIT Press, 1996, pp. 17-44. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 40…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Rapid Easy Authoring Platform for Serious Games A Game-based Learning System for Work Safety Training Peter Leong Singapore Polytechnic, Singapore [email protected] Teo Kim Sheng Singapore Polytechnic, Singapore [email protected] Abstract: In recent times, games-based learning has been attracting the attention of educators around the world. One of the challenges in deploying games-based learning to cover a larger proportion of the curriculum is the high costs associated with development of the games. Games development often requires specialized skills sets. Inputs from academic specialists for the learning content and pedagogy is also critical to the successful development of games-based learning. Our REAPSG platform empowers academics and trainers to create the games-based learning content on their own without the need for specialized development skills. Keywords-component; game authoring tool; reusable game components; game templates; easy authoring; game knowledge mining; game evaluation I. Introduction The rapid proliferation of computer games on the internet and on smart mobile devices have enabled computer games to become a new media for mass communications. Many students in our institutions of learning spend a significant number of waking hours playing computer games. Many educators have experimented with games-based learning in class [1][2][3] to increase student engagement and motivation in learning [4][5].However, the high-costs (commonly reported in the millions of dollars) of creating customized game content for a particular lesson and curriculum have deterred wider adoption of game-based learning [6][7]. The high-costs of creating customized games stem from the fact that you require specialized 3D artists, modelers and animators in the game creations process. Specialist 3D graphics, physics, artificial intelligence and network programmers are also involved in the game creation process. Lastly, games created for a particular curriculum or geography often have a limited market size, and hence there is an insufficient number of users to spread the costs of game development. For specific content domains such as work safety and health, the game developers need inputs for the domain experts in order to maintain the authenticity of the game setting and scenarios. Such domain experts may havelittle understanding about games technology. Hence, the frequent communications between the domain experts and game developers is necessary and this also drives up the costs of development; that is, the costs of engaging the domain experts as consultants in the project has to be included in the total project costs. Our proposed approach to address this problem of high costs of game production is to build an easy-touse set of tools such that academics and domain experts can create their own game-based learning content [12] This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 41…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) using our tools and deploy them to their students through the web browsers. The cost of creating the generic platform which we have named REAPSG (Rapid Easy Authoring Platform for Serious Games), can be factored over large number of potential users who will all use the platform to create content. The REAPSG platform will also provide some pre-configured game templates to assist the academics and lecturers in preparing the gamebased learning content for their lessons. II. Related Works A number of projects have been initiated to use games-based learning in the classroom. The project [8] in Malaysia reported successful deployment of games-based learning among secondary one students. In Singapore ,games-based learning has been used in schools [9][10][11]. In Victoria University, Australia, they have been using games-based learning for vocational training in the construction industry [12]. One source of the game based learning content for this projects have been commercial-off-the-shelf games repurposed for an educational outcome. Other projects have a customized game created specifically for their educational purpose, and end-users and trainers are not able to add to the content or modify it significantly. Some games-based learning projects make use of virtual world environments such as Second Life [13]. However, construction of new content logic within Second Life require specialized skills which are not easily picked-up by general academics and lecturers. Our approach in REAPSG is to make it more limited in functionality, but to make it very easy for any general academic or lecturer to be able to use the platform with minimal training. III. Overview of the Rapid Easy Authoring Platform for Serious Games The REAPSG architecture is based on the concept of empowering the teacher to create their own game-based content [14][15]. Teaching and engaging educators about serious games is challenging, but it is a model that can scale-up to many more courses and students with the engagement of educators in the process. Our REAPSG architecture must allow educator to create their own customized games [14][15][16], should mitigate the difficulties educators face in using game engine tools by themselves [17], provide some jump start content (prefabricated content templates to speed up the process), provide libraries of easily re-usable assets, and it should not require computers with high 3D graphics processing capability. A. Architecture The system is divided into two components: 1) the game authoring tool or game editor, and 2) the game player component. The game states during play are recorded in a database on the game server. In order for student or learner to play the game, they must use a web browser to download the browser plug-in or web player. This is done automatically when the user opens a particular URL that points to the lesson content. The game authoring tool or game editor (see figure 1) is the main tool for academics and subject matter experts to create the game content. It runs as the desktop client on the lecturer’s workstation or laptop. After the lecturer has finished editing the game-based lesson, the lecturer would save the game state and it is recorded in a database on the game server. The REAPSG provides a number of basic game templates such that the lecturer does not have to create the entire game world from the ground up if he or she wants to just modify the content to suit his own purpose. However, if the lecturer wants to create everything in the scene from a blank slate, he would also be able to do so. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 42…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The game player component for REAPSG runs in a web browser (see figure 2). In order for student or learner to play the game, they must use a web browser to download the game at a particular URL that points to the lesson content. The URL link is specially encoded with information that points only to a particular lesson. Authentication of the user can occur via normal web-based authentication schemes. If a web-based lesson management system (LMS) such as Blackboard is available, the URL based game loading mechanism can easily be integrated with the LMS content. It is the lecturer/trainer who must use the game editor tool to create the game-based learning content, and when he saves the edited work on the server, it will also generate an encoded URL which is linked to the game server content. The lecturer must copy the URL string (as generated) into the LMS (e.g. Blackboard) page. The URL mechanism is portable across all web-based LMS as it is an inherent part of the WWW cyber-infrastructure. Figure 1. Virtual construction yard created using the REAPSG game authoring tool/editor One of the concerns for 3D content is the size of the file to be down-loaded via the communications link. We have optimized the system to reduce the amount of data to be retrieved to a minimum. We actually download the 3D model, geometry and textures instead of video format of the game scene, and the rendering is done using the graphics processing capability of the user’s own laptop or workstation; this reduces the size of the data significantly. The corollary concern is the graphics processing power of the laptop or workstation and whether it will be able to render the 3D scenes with sufficient quality at an acceptable speed. Most modern laptops and workstations have basic 3D rendering capability, so if the game 3D models are kept to low-polygon count, the rendering time would be reasonable. We may not be able to support some of the 3D effects such as anti-aliasing, fog and atmosphere on machines without better 3D graphics cards. The rendering engine being used for REAPSG must be able to right-size the quality of the 3D content according to capabilities of the hardware; for example, HD quality graphics on high-end hardware but lower resolutions on lower-end hardware. We have also partitioned the content into separate asset bundles such that you only down-load the 3D graphics models you are using in the lesson instead of all available models in the entire REAPSG library. Aside from minimizing download times for the web player, such an approach will also make the system easy to expand in the future, as new assets can simply be added to the server without requiring large amounts of code changes. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 43…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 2. Player view of the construction yard within a web browser B. Implementation To enable rendering of the graphics on multiple platforms ranging from desktop computers, to web browsers and mobile computing devices, we decided to use a game middleware. We selected the Unity3D game middleware because of its wide support of different devices playback platforms. Unity3D is able to support the Flash platform, iOS, Android, Windows desktop, Mac OS desktop, Wii U, PS3 and Xbox360. The Unity3D provides the graphics rendering capability, visual effects such as fog and particle effects, and also the 3D physicsfor game objects such as friction, elasticity, acceleration, velocity and angular momentum. The game physics engine does not support a number of physics effects such as fluid flow, thermodynamics, convection, conduction and electricity. Such physics effects, if needed, must be implemented in code by the programmer in the REAPSG platform. The REAPSG supports two basic types of game formats. The first is a “Spot-the-X” format where the player has to use visual cues to distinguish items which have something amiss from the normal items in the scene. The challenge in this game format is largely based on time and ability to pick up visual cues using content knowledge about the setting of the game scene. For our REAPSG, our initial target application is construction work safety.For the “Spot the-X” format games, the safety trainees must use their knowledge about safety to indicate which conditions are hazardous in the scene. For example, a scaffolding without proper means of securing it would be hazardous. The safety trainees must be able to complete a level and spot a variable number of hazardous conditions within a time frame. The game will be played from a first-person perspective, to provide greater immersion and realism for the player as he/she navigates in the virtual worksite looking for potential hazards. The second format of games that REAPSG supports is the “Branching-Story” format. This game format represents a scenario as a tree of possible outcomes given different actions. Based on the trainee sequence of input decision, he will traverse along a different branch or path through the tree. Each different path or branch will lead to a different outcome; some successful, some partially successful, while others end in failure. The “Branching-Story” allows the trainer to capture repercussions of a series of less than optimal decisions. It is more flexible but less visually oriented compared with the “Spot-the-X” format. The REAPSG uses still images as the backdrop for the scenarios in order to create some amount of interest and to create a This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 44…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) setting for the story elements in the “Branching-Story” game. For example, instead of purely using text to describe a construction machine, we will be showing the machine in an image form with text descriptions of the scene. Figure 3. Branching stories view in the REAPSG player The lecturer or trainer uses the REAPSG game authoring tools to create both “Spot-the-X” and “Branching-Story” games. The completed game scenario is stored on the server. When a trainee launches a game on his browser, the information about the game scenario is downloaded to the web browser and displayed. Figure 4. Question & answer screen in the REAPSG player screen Our current implementation is based on broadband or LAN speeds between the game server and browser (it will not work over modems or GSM/GPRS connections). The player component on the web-browser can execute both “Spot the-X” and “Branching-Story” games. IV. User Evaluation of the Rapid Easy Authoring Platform for Serious Games Getting feedback from the lecturers and trainers who have to use the REAPSG to create games-based learning content and getting them to actually use them in their lessons is a critical success [18] factor in the whole project. Our subject matter experts in Work Safety and Health (WSH) are not very familiar with gamesbased learning. However, we have created a platform for them to share their views with the development team during the course of the project. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 45…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) To improve the brain storming process, all the game designers and developers attended a design thinking workshop prior to the actual commencement of the project. Using design thinking, we hope to achieve deep user empathy with the needs of the WSH trainers. We also used user observations as the WSH trainers used the initial prototypes of our system to gauge their reaction and to understand their viewpoint as they use such as gamesbased learning system for the first time. To aid our decision and design process, we have also created a score card [19][20] or rubric on the features of the system when it is matched against the WSH trainer voiced and unvoiced requirements (see table 1). Each trainer is allowed to have only a fixed number of vote which he can put into any cell, or put all into the same cell.The row score indicates the usefulness of including that feature in REAPSG. The column total indicates the overall number of matches in each of the mandatory, good and optional categories. The total row score is an overall score for the system, a higher value indicates we have are closer to deriving maximum value for the REAPSG system for the trainers who will be using it. TABLE I. SCORE CARD FOR REAPSG V. Conclusions The REAPSG is a system that allows subject matter experts and lecturers to create their own customized games-based learning content easily, quickly and affordably. In the future, we are planning to expand the number of game templates created and also pilot the system with a number of students in the Diploma in Work Safety and Health (WSH). We believe REAPSG will be a step forward towards more authentic learning in WSH and will lead to greater knowledge and retention by the trainees. We also believe the interactive content will increase the level of engagement and motivation of the students. ACKNOWLEDGMENT This project is made possible with funding support from the Institute of Adult Learning CET Innovation Fund. Together with subject matter expertise from The Professional & Adult Continuing Education (PACE) Academy, Singapore Polytechnic. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 46…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) REFERENCES [1] Prensky, Marc. "Digital game-based learning." Computers in Entertainment (CIE) 1, no. 1 (2003): 21-21. [2] Van Eck, Richard. "Digital game-based learning: It's not just the digital natives who are restless." EDUCAUSE review 41, no. 2 (2006): 16. [3] Papastergiou, Marina. "Digital Game-Based Learning in high school Computer Science education: Impact on educational effectiveness and student motivation." Computers & Education 52, no. 1 (2009): 1-12. [4] Ebner, Martin, and Andreas Holzinger. "Successful implementation of user-centered game based learning in higher education: An example from civil engineering." Computers & Education 49, no. 3 (2007): 873-890. [5] Foreman, Joel. "Game-Based Learning: How to Delight and Instruct in The 21st Century." Educause Review 39, no. 5 (2004). [6] Torrente, Javier, Á. Del Blanco, Eugenio J. Marchiori, Pablo Moreno-Ger, and BaltasarFernández-Manjón. ": Introducing educational games in the learning process." In Education Engineering (EDUCON), 2010 IEEE, pp. 1121-1126. IEEE, 2010. [7] Oblinger, Diana. "Games and learning." Educause Quarterly Magazine 29, no. 3 (2006): 5-7.[Online]. Available: http://www.educause.edu/ero/article/games-and-learning. [8] Eow, Yee Leng, and RoselanBaki. "Form one students’ engagement with computer games and its effect on their academic achievement in a Malaysian secondary school." Computers & Education 53, no. 4 (2009): 1082-1091.. [9] Tim Marsh, Chuang Xuejin, Li ZhiqiangNickole, Scot Osterweil, Eric Klopfer, and Jason Haas. 2011. Fun and learning: the power of narrative. In Proceedings of the 6th International Conference on Foundations of Digital Games (FDG '11). ACM, New York, NY, USA, 23-29. [10] Mark J. Chavez, Andrew Gregory, Lau Yeung, and Wang Xueli. 2009. Voyage to the age of the dinosaurs project, an experiential learning situation with undergraduates, graduates and visiting professionals. In ACM SIGGRAPH ASIA 2009 Educators Program (SIGGRAPH ASIA '09). ACM, New York, NY, USA, , Article 6 , 4 pages. [11] Henry Been-Lirn Duh and Vivian Hsueh-Hua Chen. 2010. Fantasies in narration: narrating the requirements of children in mobile gaming design. In Proceedings of the 7th International Conference on Advances in Computer Entertainment Technology (ACE '10). ACM, New York, NY, USA, 3-6. [12] O'Rourke, Mark, Juanita Custance, and TasPapasimeon. "Developing a Vocational Training Computer Game Workplace Simulator: The Vocational Game Project." (2008). [Online]. Available: http://vuir.vu.edu.au/15867/1/mark_orourke_vocgame.pdf [13] Tassawar Iqbal, Klaus Hammermüller, and A. Min Tjoa. 2010. Second life for illiterates: a 3D virtual world platform for adult basic education. In Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services (iiWAS '10). ACM, New York, NY, USA, 373-380. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 47…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [14] Becker, Katrin. "Digital game‐based learning once removed: Teaching teachers." British Journal of Educational Technology 38, no. 3 (2007): 478-488. [15] Becker, Katrin. "Teaching Teachers about Serious Games." In World Conference on Educational Multimedia, Hypermedia and Telecommunications, vol. 2007, no. 1, pp. 2389-2396. 2007. [16] Squire, Kurt, Levi Giovanetto, Ben Devane, and Shree Durga. "From users to designers: Building a selforganizing game-based learning environment." TechTrends 49, no. 5 (2005): 34-42. [17] Dickey, Michele D. "Ninja Looting for instructional design: the design challenges of creating a game-based learning environment." In ACM SIGGRAPH 2006 Educators program, p. 17. ACM, 2006. [18] Blunt, Richard. "Does game-based learning work? Results from three recent studies." In The Interservice/Industry Training, Simulation & Education Conference (I/ITSEC), vol. 2007, no. -1. National Training Systems Association, 2007. [19] De Freitas, Sara, and Martin Oliver. "How can exploratory learning with games and simulations within the curriculum be most effectively evaluated?." Computers & Education 46, no. 3 (2006): 249-264 [20] Dondi, Claudio, and MichelaMoretti. "A methodological proposal for learning games selection and quality assessment." British Journal of Educational Technology 38, no. 3 (2007): 502-512. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 48…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The Impact of Web Project-Based Learning on Elementary School Students’ Development of Van Hiele’s Geometric Thought in Taiwan Tzu-Hua, Huang Department of Education, Taipei Munipical University of Education, Taipei, Taiwan [email protected] Yuan-Chen Liu Graduate School of Curriculum and Instruction, and Communications and Technology, National Taipei University of Education, Taipei, Taiwan [email protected] Ru-Fen, Kuo Graduate School of Curriculum and Instruction, and Communications and Technology, National Taipei University of Education, Taipei, Taiwan [email protected] Abstract The Dutch mathematics educators Van Hiele couple in 1957 proposed a model of theory described how children develop geometric theorems, which consisted of five levels of understanding: visualization, analysis, informal deduction, formal deduction and rigor. The development of the levels is more dependent on the instruction received than on children’ age of maturity. Learners advanced from basic level (visualization) to the highest level (rigor) through instruction and learning experience. Therefore, whether students can achieve high level of understandings, curriculum design and teaching methodology are the significant factors. Project-based learning enhances students’ learning motivation, high-end level of problem-solving and thinking skills, which is one of the systematic teaching methods. Students involve in activities that integrated knowledge and learning skills through the process of exploring complex authentic- questions and carefully designed tasks. With the development of technology, project-based learning gradually tends to be web-based. The study adopted Web project-based learning to fifth to sixth grade students in elementary school to explore their learning effectiveness and development level in Van Hiele’s geometric theory. The result revealed that students’ performance through Web project-based learning has improved on level one and level two of Van Hiele model. Keywords:Web project-based learning, Development of geometric thought, Geometric concept I. Introduction A married couple of Dutch mathematics educators, Pierre van Hiele and his wife, published companion dissertations in 1957, describing a concept that there were five levels or stages of Geometric Thought that any one student could be at, and the level of development was related to teaching factors, it was not influenced by the children's age and maturity; having an appropriate teaching process provided by the teachers, students would sequentially experience these five levels (level 0-4) [13]. Additionally, Crowley also pointed out that van Hiele This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 49…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) believed that the growth occurred at various levels was primarily subjected to the "teaching", rather than the maturity along with an individual's age, therefore, the organization and methods of teaching, the selection and use of text books was very important [11]. Therefore, teachers needed to constantly seek the innovative teaching methods to motivate their students in order to improve learning outcomes for all students [17] [12]. In the past, it used to focus on specialized mathematical knowledge and structure, basic computing skills, and learning to solve routine mathematical problems etc. and it had now turned to emphasize the concept that students must actively construct mathematical knowledge [5]. The Buck Institute for Education located in the Northern California, United States, continuously promotes the Project-Based Learning(PBL) as their organization's objectives, and they define PBL as "A systematic teaching method, through the complex and real problems combining with a carefully designed mission exploring process, which can make students to be integrated into the knowledge and skill learning activities”. Over the years, many research literatures showed that PBL indeed had many positive educational outcomes [9] [2], in particular, it could contribute to improve the students’ learning motivation, high-level problem-solving skills and the ability to think, enhancing the professional knowledge, as well as creating a positive classroom atmosphere, improving cooperation skills, so as to drive the students to actively learn for themselves and learning interests, and hence to enhance the students' knowledge, skills and affective and problem-solving ability. Thus, the Project-Based Learning(PBL)combining with Internet Technology is a successful teaching model, it will not only increase students' interest in learning, but also it can activate the students' critical thinking skills, therefore, the purpose of this study is planning to utilize the Web-based and PLB S system combining with the geometry course in existing mathematical textbooks to design the teaching methods, and to explore students' growth and change in the levels of geometric thought. II. Literature Review Van Hiele’s Geometric Thought In 1957, a married couple of Dutch mathematics educators, Pierre van Hiele and his wife, proposed a concept that there were five levels or stages of geometric thought that any one student could be at, and the level of development was related to teaching factors, it was not influenced by the children's age and maturity; having an appropriate teaching process provided by the teachers, students would sequentially experience these five levels, which comprised: Visualization, Analysis, Informal Deduction, Formal Deduction, and Rigor [7]. According to these theories, the construction of geometric knowledge would sequentially go through five levels and each level had its own very unique characteristics [7]. According to Crowley, the van Hiele’s levels of geometric thought had contained five characteristics, which comprised sequential, advancement, intrinsic and extrinsic, linguistics as well as mismatch [11]. Van Hiele insisted that students' learning progress between all levels should rely on the organization and methods of teaching as well as the selection and use of textbooks, instead of relying on the maturity levels of the students [11]. Therefore, when moving forward from one level to the next level, teaching activities played a very important role, and the correct teaching activities would get better grades more easily[1]. The van Hieles defined five phases in the learning process for guiding students from one level to another on a given topic, comprising the following sequence: Information, Guided Orientation, Explication, Free orientation, and Integration [13]. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 50…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Project-Based Learning PBL was firstly advocated by Kilpatrick, the primary purpose was to stimulate the students' selflearning interest, it believed that such kind of learning method could not only improve the students’ learning efficiency, but also it could activate the abilities associated with all other aspects[17].Actually, PBL was a kind of project-organized learning method, it was a type of learning method that had been developed using a constructivist philosophy, which aimed to prevent the development of an ossified model of knowledge, going through a series of exploration actions in connection with cooperative learning situations, so that students not only could learn the problem-solving knowledge and skills, but also could understand how knowledge could be applied in daily life [8]. In the aspect of areas, the project-based learning was more suitable for using in the field of mathematics, physics or engineering [14], which allowed students to learn through reflection on doing, that is, "Learning-by-doing", and be able to learn from their own experiences, a systematic learning method was being integrated into the learning process in which the students were responsible for their own learning outcomes, so that learners could have a better understanding of "how to learn" [10]. When combining the PBL with internet technology, it would be able to make PBL to be even more effective [3]. The Web- and Project-Based Learning (also known as Web PBL, WPBL) is to learn via the auxiliary functions of digital learning websites on the internet in order to achieve the goal of PBL. Krajcik, Czerniak& Berger proposed a Project-based Learning Model (PBL) that asking teachers must make every teaching element contained in a project to be interconnected, so as to establish the goals of assessment for students, wherein, the stages for designing a PBL teaching plan were as follows: 1. Identifying concepts, specifying learning performances, and matching to curriculum objectives;2.Develop the driving question;3.Develop benchmark lessons;4.Develop investigations;5.Develop assessments; and6.Develop a calendar[6]. These six stages are an iterative process, many procedures will have been carried out repeatedly, until it reaches the end of special events or problem is resolved. This study will construct a teaching and learning website based on the Project-based Development Model proposed by Krajcik, et al., wherein, teachers will design the interface process in accordance with six elements of the project-based development model, which allows teachers to enter the information required by relevant courses; as to the students, they will start to study the course contents provided by the teachers, according to seven stage of the project-based learning introduced by Krajcik, et al., in which, students will be conducted from the stage of question guiding to move forward progressively from one point to another on the way to the formal project-based learning[6]. The students will conduct the stages of PBL are as follows: 1.Messing about; 2.Finding information; 3.Asking and refining questions; 4.Planning and designing; 5.Conducting the experimental work; 6.Making sense of data; 7.Sharing your ideas. The experimental group planned the overall curriculum activities, where teachers and students are still linked to each other; while doing a project, teachers will assist the students to clarify the basic concepts related to course objectives by guiding the questions, and students will start from the exploration activities, collecting information, integrating, analyzing, and the final stage of learning process is to integrate the whole works. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 51…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) III. Methods I. Participants For concerning about the convenience sampling, the present study chose students from two 5th–grade classes of one elementary school in Taipei, Taiwan to participate in the research, wherein, one class was the experimental group, the other was the control group, and the experimental group consisted of 31 students from one class, the control group consisted of 29 students. This school adopted the normal class grouping, so there was no significant difference in learning ability level of the students in each class; as for the school curriculum, the computer education was conducted at least once a weeks in the third grade, all students in the experimental group had learned the basic skills of using computers, such as, typing, learning to run many Windows applications, word processing, computer graphics, internet access and information collection etc. II. Research Design 1) Independent variables a. Experimental group: WPBL + teachers used an interactive whiteboard (IWB) combining with websites to teach students + students explored questions while learning through PBL with computers; and b. Control group: using van Hiele’s five-stage learning method + teachers used an interactive whiteboard (IWB) combining with websites to teach students + students learned the specific subject matter with computers. 2) Dependent variables Differences between geometric thinking levels. 3) Control variables a. Starting point for learning behavior b. Teaching hours c. Teaching schedule d. Teaching materials e. Instructors f. Teachers’ teaching tools g. Students’ learning tools III. Research tools, the reliability and validity 1) PBL-Online website The present study designed the website with reference to the development of project-based teaching model disclosed by Krajcik, Czerniak and Berger, wherein, teachers designed the interface process in accordance with six elements of the project-based development model, which allowed teachers to enter the information required by relevant courses; as to the students, they could start to study the course contents provided by the teachers, according to seven stage of the project-based learning introduced by Krajcik, et al., in which, students would be conducted from the stage of question guiding to move forward progressively from one This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 52…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) point to another on the way to the formal project-based learning[6]. The overall curricular activities were coordinated with the process of student learning topics, while doing a project, teachers could assist the students to clarify the basic concepts related to course objectives by guiding the questions, and students would conduct the exploration activities, collecting information, integrating, analyzing, and the finally to integrate the complete works, so students could share and discuss the questions in their classroom, teachers and peers could instantly provide feedback at the same time. 2) Van Hiele geometric concept test The van Hiele’s geometry concept test was adopted by this study with reference to “Wu-Shey’s van Hiele Geometry Test for Elementary School Students” proposed by Wu, and it had been modified in a way to be the pre-test and post-test tools [1]. The tests involved the first three levels of van Hiele theory of geometric thought, wherein, each level consisted of three basic geometry concepts which comprised the triangle, square and circle. This quiz consisted of a total of 70 multiple-choice questions (which each have 4answers to choose from),in which, there were 25 questions for the first van Hiele level, 20 questions for the second van Hiele level, and 25 questions for the third van Hiele level. As to the expert validity, two course instructors who taught the experimental group and the control group respectively were invited to participate in this study, and the results were reviewed and amended by the advising professor. In the aspect of reliability, the reliability was assessed using the Cronbach's alpha value (pre-test and post-test was .829 and .807), therefore, these results indicated good reliability. 3) Reflective journals on the teaching activities After conducting each teaching activity, the researchers would write a reflective journal to record the teaching activities, which can act as a teaching reference for the second class; according to the experimental teaching method adopted by this study, the experimental group and control groups were arranged to learn one specific subject matter on the same day, hence, when applying project-based learning in the classroom, it needed to comprehensively reflect the teaching- learning situation so the experimental group and the control group, and to verify whether students should have different reactions subject to different teaching methods. The encoding method consisted of the first portion of character, whereas the alphabet "R" representing the data category was the “reflective journal on teaching activities”, and the second portion of number, whereas there were four numbers representing the month and day, for example: R0330, indicating that it was a reflective journal to record teaching activities conducted on March 30th. IV. Data analyses The present research designed the questions of van Hiele’s geometry concept test by referring to “WuShey’s van Hiele Geometry Test for Elementary School Students” proposed by Wu, D. B., and the test questions involving the first three levels of van Hiele theory of geometric thought, wherein, each level consisted of 25 questions for the first level, 20 questions for the second level, and 25 questions for the third level[1].The scoring method was that a score of 1 for a correct answer and 0 for an incorrect answer. All participants received a score for each van Hiele level according to Usiskin’s grading system; the criterion for success at any given level was three or four out of five correct responses[15]. For the student who complied with the Level-N, but had not reached the criterion of Level-N+1, would be assigned to the Level-N. If a student who complied with the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 53…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Level-N, but had not passed the criterion of previous Level-N-1, that is, a jumping level, and could be considered as unqualified. Any student, who did not comply with the criterion of any given level, could be classified at level 0.The criterion for success at any given level adopted by this study was four out of five correct responses. Meanwhile, an independent-samples t-test was conducted to compare the pre-test scores of students for two groups in order to evaluate whether there was difference between two groups of students. After completing the teaching experiment, another independent-samples t-test would be conducted to compare the post-test scores of students for two groups so as to evaluate whether there was difference between two groups of student in levels of geometric thought subject to different teaching methods. V. Course Design In this study, the course design was performed with reference to general mathematics textbooks sold on the market. The teaching method for the experimental group adopted was PBL proposed by Krajcik, Czerniak& Berger, and teachers designed the courses in accordance with six-stage teaching process revealed by Krajcik, Czerniak& Berger [6]. The course design for the control group was performed based on the five stages of learning model introduced by van Hiele [13]. a) Teaching contents The teaching contents used in this study contained ten themes;the course ran for 10 weeks with one theme per week, wherein, each theme unit was asfollows:Theme1: Preview plus warm-up; Theme2: Triangle; Theme3: Parallelogram; Theme 4: Trapezoid; Theme5: Kite; Theme6: Rhombus; Theme7: Circle and sector; Theme8: Thematic integration; Theme9: Presentation; Theme10: Summary and review. b) Project theme The project theme used in this study was “Park planning and design”. Thematic contents were as follows Taipei City Government has a piece of land, in which, there is a rectangular block planning to be used for a park, although the length, width has not yet been determined, but it is within a range of 1000meterss. The park is expected to have a small stream, a small bunker, a play yard and a skating rink for children to play, wherein, it must also contain at least two pedestrian walkways and a gardening area. But it should not end up designing a dull park area, only one area can have a rectangular shape, and the remaining areas in the park must be either polygon or circle except a rectangle. The design team should have the talent to come up with creative ideas. Please draw a design drawing and clearly marked the side length, angle, and area of each region to facilitate the project construction. At the end of their studies, students must complete the specific project and make presentations for their works. IV. Results and Discussion 1) Average number of people who passed the pre-test and post-test of van Hiele’s Levels of Geometric Thought and its passing rate According to the results of van Hiele’s geometry test, and when exploring the assessment criterion which considering the criterion for success at any given level could be four out of five correct responses ,in addition, this study compared the differences in number of people who passed the test for each level of van This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 54…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Hiele’s geometric thought and its passing rate. Thus, the number of people who passed the test for each level of van Hiele’s geometric thought and its passing rate for the experimental group and the control group were as shown in Table 1. Table 1: Number of people who passed the test for each level of van Hiele’s geometric thought and its passing rate for the experimental group and the control group With reference to Table 1, it can be found that, in the experimental group, the numbers of people who passed level 1 had increased from 22 to 28, the numbers of people who passed level 2 had increased from 17 to 28, and the numbers of people who passed level 3 had increased from 0 to 1. It was shown that the students had a god performance at level 1, the passing rate was quite high, up to 71% for pre-test, and for post-test, it had reached to 90%; as to the performance at level 2, the passing rate was 55%, and for post-test, it had significantly improved to 90%, meaning that most of students had met the criterion for level 2; as for level 3, the passing rate was very low, the passing rate for pre-test was 0%, and for the post-test, it was 3% only. In the aspect of the control group, the numbers of people who passed level 1 had increased from 21 to 25, the numbers of people who passed level 2 had increased from 15 to 21, and the numbers of people who passed level 3 had increased from 0 to 3. It was shown that the students had a god performance at level 1, the passing rate was quite high, up to 75% for pre-test, and for post-test, it had reached to 89%; as to the performance at level 2, the passing rate was 54%, and for post-test, it had improved to 75%, although the improvement was significant, but if comparing to the experimental group, i.e. improved from 55% to 90%, it can be found that due to WPBL the performance of level 2 of van Hiele’s geometry test for the experimental group was significantly superior to that of control group which had the five stages of learning model introduced by van Hiele; as to the performance as level 3, the passing rates were very low, wherein, 0% for pre-test and 11% for post-test. Comparing with the numbers of passers for pre-test and post-test in the experimental group and the control group, although the numbers of passers were increasing at all levels, however, the experimental group made significant greater improvement than the control group, in light of the above results, WPBL used in this study indeed has big advantage to improve students’ level of the geometric thought. Level 1 of van Hiele’s geometric thought emphasized that children were capable of distinguishing graphics by observing the contours of specific things and the second level of van Hiele’s geometric thought emphasized that school children would be able to distinguish the characteristics of graphics by observing the constituent elements of the graphics and relationship between these elements. According to the reflective journal This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 55…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) to record teaching activities, when students in the experimental group encountered a potential problem derived from a task assigned by the executive team leader, they always could find a way of solve this problem, such as: looking for information online, discussing problems with other team members...etc. to solve the problems; and in the problem-solving process, they could also learn more about the graphics features, so that they might having superior capability to explain each graphics feature by means of observation of various graphics (R0402, R0416). The students assigned to the control group were becoming more dependent on the teacher's examples and answers, students seemed to expect the teachers to explain the whole problem-solving process, but when they encountered a similar problem next time, they might be still raising hands to ask questions (R0327, R0403). It can be found that, with reference to above results, the teaching method of PBL adopted in the experimental group can indeed stimulate students' thinking as well as problem-solving skills, thus, it will contribute to improve students' geometric thinking levels. 2) T-Test to evaluate the pre-test and post-test scores of experimental group and control group According to the results of pre-test, this study conducted an independent-samples t-test to analyze whether there were differences in the starting point for learning behavior and each level of geometric thinking between two groups of students, the statistical analysis results were presented in Table 2. The results showed that there were no differences in the starting point for learning behavior of two groups. After conducting the relevant experiments, the results relating to the influence on each level of geometric thinking was shown in Table 3. It has been found that: the performance of the second level of geometric thinking for the experimental group was significantly superior to that of the control group; however, the differences for first level and the third level of geometric thinking were not so significant. Table 2: The comparison of scores for pre-test of each level of geometric thought and total scores of the experimental group and the control group Table 3: The comparison of scores for post-test of each level of geometric thought and total scores of the experimental group and the control group This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 56…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The second level of van Hiele’s geometric thought stressed children might identify various graphics characteristics by observing the constituent elements of the graphics and relationship between these elements. It can be found according to the reflective journal to record teaching activities that the tasks of PBL assigned by the teachers had usually no fixed answers, therefore, students in the experimental group could freely develop their own creative ideas and designs, and furthermore, they even could apply the learned graphic characteristics to their everyday lives; meanwhile in the process of specific project, they would have better understanding of various graphic features and constituent elements and be able to utilize them more accurately (R0402, R0416, R0507, and R0514). Besides, most of students in the control group were taught with the examples of textbooks and exercises, although students had really learned textbooks very well, but the experimental group performed far better than the control group in the application of knowledge (R0508, R0515). It indicates that the teaching method of PBL adopted by the experimental group indeed can contribute to improve the students’ second level of van Hiele’s geometric thought. V. Conclusion According to the results of the research, it showed that: due to WPBL the performance of level 1 and 2 of van Hiele’s geometry thought had improved significantly, wherein, the experimental group was significantly superior to that of control group; as to the performance as level 3, the influence was very little. The Level 1 of van Hiele’s geometric thought emphasized that children were capable of distinguishing graphics by observing the contours of specific things and the second level of van Hiele’s geometric thought emphasized that school children would be able to distinguish the characteristics of graphics by observing the constituent elements of the graphics and relationship between these elements. The students in the experimental group were encouraged to actively construct mathematical knowledge, in which, students must slowly study about the appearance and characteristics of various graphics in the process of observation and analysis, and furthermore, they even could apply the learned graphic characteristics to their everyday lives; additionally, when encountering the difficulties or problems, students also must find a way to resolve this problem by themselves ; and in this way the high-level thinking skills will be enhanced in the process of problem finding and problem solving, again and again, hence ,it is proven that the WPBL indeed can improve the school children’s level of geometric thought. REFERENCES [1] D. B. Wu, “Elementary school students in the graphics space takes the concept of perceptual manipulated, mapping, theoretical description of the understanding of the follow-up study, “Research Project of the National Science Council of the Executive Yuan, Project No.: NSC 111 92-2521-S-142-004, 2003. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 57…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [2] D. Moursund, “Project-based learning using information technology,” Eugene, OR: International Society for Technology in Education, 2002. [3] H. Shyu, “How to use the Internet to help children become master? Network project-based learning and teaching innovation,” Taiwan's education, 607, pp. 25-34, 2001. [4] J. C. Bobango, “The van Hiele levels of geometric thought and student achievement in standard content and proof writing: The effect of phase-based instruction." (Ph.D. Dissertation, The Pennsylvania State University, 1987), UMI Publications. [5] J. P. Becker and C. Selter, “Elementary school practices. In A. J. Bishop et al. (Eds.),” International Handbook of Mathematics Education, pp. 511-564, Dordrecht: Kluwer, 1996. [6] J. S. Krajcik, C. M. Czerniak and C. F. Berger, “Teaching science in elementary and middle school classrooms: A project-based approach,” pp. 454. New York, NY: McGraw-Hill, 2003. [7] J. Shaughnessy, Michael and F. Burger. Willam, "Spadework Prior to Deduction in Geometry." Mathematics Teacher, 78, pp. 419-28, September, 1985. [8] J. W. Thomas, “A review of research on project-based learning,” 2002. Retrieved from http://www.bie.org/index.php/site/RE/pbl_research/29 [9] L. C. Chang and G. C. Lee, “A team-teaching model for practicing project-based learning in high school: Collaboration between computer and subject teachers. Computers & Education, 55(3), pp. 961-969, 2010. [10] M. Basbay and A. Ates, “The reflections of student teachers on project based learning and investigating self evaluation versus teacher evaluation,” Procedia Social and Behavioral Sciences, 1, pp. 242-247, 2009. [11] M. L. Crowley, “The Van Hiele Model of the Development of Geometric Thought. In M. M. Lindquist & A. P. Shulte (Eds.),” Learning and Teaching Geometry, K-12. 1987 Yearbook (pp. 1-16). Reston, VA: National Council of Teachers of Mathematics, 1987. [12] M. Papastergiou, “Digital Game-Based Learning in high school computer science education: Impact on educational effectiveness and student motivation,” Computers & Education, 52(1), pp. 1-12, 2009. [13] P. M. Van Hiele, “Structure and insight: A theory of mathematics education,” Orlando, FL: Academic Press, 1986. [14] R. V. Hadgraft and N. Scott, “Engineering education is problem-based or project-based learning the answer?” Australasian Journal of Engineering Education, pp. 2-14, 2003. [15] Usiskin, Z. P., “Van Hiele levels and achievement in secondary school geometry,”ERIC Reproduction Service No. ED 220 288, 1982. [16] W. Hafner and T. J. Ellis, “Project-based, asynchronous collaborative learning,” Proceedings of the 37th Hawaii International Conference on System Sciences. Piscataway, NJ: IEEE, 2004. [17] W. H. Kilpatrick, “The project method,” Teachers College Record, 19(4), pp. 319–335, 1918. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 58…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Metadata Integration for Centralized Repository using Dspace LertchaiKhongamnuaisak Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok 10330, THAILAND [email protected] NakornthipPrompoon Department of Computer Engineering Faculty of Engineering, Chulalongkorn University Bangkok 10330, THAILAND [email protected] Abstract : Nowadays, information used in any organization is usually stored in different formats and may earn frominternal and external organization. Such information may be not available for a sudden use. Thus, it is necessary to integrate them to create a central repository and provide a mechanism to present the results relevant to the user need. This research presents a method to construct a centralized repository based on Dublin Core Standard used for metadata identification and metadata structure. Also, OAI-PMH was used to import all data from different repositories. In addition, Dspace was customized and used to establish centralized repository. The centralized repository supports the retrieval of information efficiently to serve different needs. Keywords-component; Metadata Integration, Centralized Repository, Library, Dublin Core Standard, Dspace I. INTRODUCTION Information is important because it helps to present information in a variety of research areas. But because the data is collected by different repositories makes it not easy to find. The basic characteristics of the data used describe or metadata. Characterized by the different name that is in the repository, such as "Author" Some may call. "Contributor" but the same meaning so maybe misleads users. Therefore, it should be collected or integrate data from different repository to the centralized repository, so that users can find information from the centralized repository. This research proposes the integration of metadata from various repositories that are stored in the library. There pository would be designed based on the Dublin Core Standard. The integration of multiple repositories, with the help of OAI-PMH protocol [1] and Dspace [2][3], enable an access to the centralized repository for research, retrieve or display of the data. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 59…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) II. RELATED WORK A. Digital Repository Digital data storage resources are the main principle of the digital archive. Therefore, it is necessary to understand the basic elements of it. Digital data repository architecture consists of three main components: user interface, services, and digital data storage. Services are the connection between user interface and repository. Detailed in Fig 1. Figure 1. The architecture of a digital library [4]. The basic elements of digital data in the repository [4] should have the basic elements to identify and describe information in digital archives, such as detailed information, description of metadata, and collaboration. B. Dspace Dspace [5] is an open source that has been developed by the Massachusetts Institute of Technology and the Hewlett – Packard, which aimed to create a robust repository. The data structure of a Dspace is the best storage stabilization. It has powerful feature such as the right to access to information, data management and users can query data from the repository. The research of G. Pirounakis [6] presents a comparison between different tools that are used for storage as anarchive. This study compares features of five different repositories: Dspace, Fedora, Greenstone, Keystone and EPrints. The result appears that Dspace is most appropriate for use than other tools. The two most important features used in this study as 1) Metadata and digital content storage 2) Interoperability features, which has a score that is better than the other tools. Thus, We were chosen for the preparation of a centralized repository using Dspace. The five repositories were graded for each characteristic. The minimum score is 1 and the maximum is 5.Table 1. In general, DSpace has almost the highest score for every characteristic. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 60…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) TABLE I. COMPARISON OF THE FIVE REPOSITORIES. C. Large scale repositories The research of large-scale repositories [7] presents a case study of the application for the integration of data from different data sources. The methodology of the research represents used to collaborate and Interoperability. Data are imported from various repositories by using OAI-PMH. The OAI-PMH Protocol is responsible for harvesting and storing the data into the repository. This research is a study of the integration of data from various repositories. The model is proposed as a model of “cooperative and separation” of the data into the repository from various sources. Data obtained from institution A, B, and C are gathered in one place as workflow. With the help of OAI-PMH, local repository or Dspace is created for use. See Fig. 2 Figure 2. Data flow model for large repository. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 61…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) D. The OAI-PMH Protocol The OAI-PMH Protocol [8][9] can be to develop and support the interoperability between the systems. The purpose of the OAI-PMH is a performance for connection to repository. The OAI-PMH Protocol is an open system that can provide access to the information. They are also used for harvesting the metadata information in the data sources are stored in the repository. In The OAI-PMH is a key part consists of two main sections. 1) Data Providers are data or metadata into the repository. It can provide the information. 2) Service providers are harvester for metadata service is provided. E. The Dublin Core Standard The Dublin Core standard [10] is a standard for describing electronic information. The definition of the set of data defines the fundamental nature of the information. It is defined by the Committee Dublin core and a group of librarians in 1995. According to the definition, the standard explains the data in an easy and understanding way. Meanwhile, the search and retrieve are finding to complete data because this standard helps to definition data. The Dublin Core Standard consists of the basic 15 elements as follow: 1) Title 2) Author 3)Subject 4) Description 5) Publisher 6) Contributors 7) Date 8) Type 9) Format 10) Identifier 11) Source 12)Language 13) Relation 14) Coverage and 15) Right. III. METHODOLOGY The main objective of this research is to propose a method for integrating metadata to create a central repository of data sources. There are four steps: 3.1) Design standard metadata for a central repository 3.2) Gather data from various repositories using OAI-PMH 3.3) Propose an approach to design a centralized Repository and 3.4) Test and evaluate the collected data to a central repository. (see Fig. 3) Figure 3. Four steps for the integration of metadata. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 62…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) A. Design standard metadata for a central repository At this Step, the standards for central metadata are required for the centralized repository. In order to establishthe standards, metadata from various repositories need to be gathered as shown in Fig 4. Figure 4. Four steps for the integration of metadata. After metadata adata has been gathered, classification of each metadata is required to examine which metadata fields are compatible with one another or has similar semantic content. For example, data from source 2 contains all of the metadata field while data from source 1 does not have date and source. Table 2 shows how to define and design a central metadata standard. TABLE II. FOR EXAMPLE MAPPING METADATA FIELDS COMPATIBLE EACH REPOSITORY. The Metadata Standard is designed as reference to the Dublin Core standards. To define or identify a data set name, metadata fields are used as references. (see Table 3) This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 63…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) TABLE III. THE STANDARD METADATA FOR A CENTRAL REPOSITORY. B. Gathering data from various repositories using OAI-PMH OAI In the process of harvesting data from various repositories to a central repository, data are imported by amechanism OAI-PHM PHM protocol. It is necessary to have metadata integration. The main purpose of harvesting data in displayed Fig 5. Figure 5. Data are ar imported by a mechanism OAI-PHM protocol. The mechanism of OAI-PMH PMH can interoperate repositories, which means that the user can access data of one repository and exchange metadata with other harvesters. The metadata base on XML format as Fig 6. This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 64…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 6. The metadata format for repository exchange. C. Proposes an approach to design a centralized Repository This step proposes design for creating a central repository. The first step will be to setup Dspace [8] for a centralized repository and data set name name convention collections in order to customize the metadata according to the standard metadata specification. For the storage of the data obtained from the harvested data see Table 4. TABLE IV. FOR EXAMPLE, SETUP NAME A NEW CONVENTION COLLECTIONS. The next step is to customize the metadata that defines the standards metadata. Dspace can be customized into metadata as shown in Fig 7. Figure 7. Customizable metadata in Dspace. This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 65…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The final step is tuning performance OAI-PMH OAI within Dspace. Data to the metadata etadata of external data stored in a centralized repository is shown in Fig 8. Figure 8. Customizable OAI-PMH OAI in Dspace. D. Testing and Evaluation of the collected data to a central repository Data test are derived from various repositories. Researcher can search or browse in a central repository. Theresults would display on the user interface. For Example, the number of available data is shown in Table 5. TABLE V. FOR EXAMPLE, RESULTS THE AMOUNT OF METADATA METADATA INTEGRATION. The Result of metadata integration from various repositories is displayed in Dspace see Fig 9. Figure 9. For example, results the amount of data available in Dspace. A centralized repository of Dspace can display the search results of listed metadata. Find Fig 10. This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 66…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 10. The search results in Dspace. IV. FUTURE WORK AND CONCLUSIONS The results of this research will be a centralized repository that integrates data from various repositories if four steps are followed. Firstly, The designing of standard metadata for central repository is required. Secondly, data need to be gathered from various repositories using OAI-PMH. Thirdly, proposes of an approach are needed to design a centralized Repository. Finally, testing and evaluation of the collected data is required to ensure that everything is work accordingly. Therefore, users can search and display results from a centralized repository by metadata Integration using Dspace. In the future, it is possible that there would be further development of integrated data in other formats such as audio and video files in which could be helpful in other areas. REFERENCES [1] Initiative,“Open Archives Initiative Version 2.0: Reference” [Online], Available from: http://www.openarchives.org, 2008. [2] Ramachandran, “Enabling Knowledge Sharing with an Institutional Repository”, International Conference on Advanced Learning Technologies (ICALT 2007), 2007. [3] Dspace, Dspace Respository , http://www.dspace.org. [4] Ribeiro-Neto, R.B.-Y.a.B., Modern Information Retrieval. 1999, Addison Wesley. [5] Dspace, DSpace 1.7.1 System Documentation, 2011. [6] G. Pirounakis, M.N, “Comparing Open Source Digital Library Software”, 2009. [7] A. Mikeal, J.C, “Large-scale ETD repositories: A case study of a digital library application”, JCDL, June 15- June 19, 2009. [8] Hochstenbach, P, “The OAI-PMH Static Repository and Static Repository”, IEEE, 2003. [9] Society, I.C., “Search Engine Coverage of the OAI-PMH Corpus”, Mar-Apr, 2006. [10] The Dublin Core Metadata Initiative, “Dublin Core Metadata Element Set, Version 1.1: Reference Description,” [Online], Available from: http://dublincore.org/documents/dces/index.shtml, [June 2012]. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 67…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) A Conceptual Model for Chinese idioms: An OWL DL Ontology for Bilingual Learners Haitao Li Sven Hartmann Department of Informatics Clausthal University of Technology Clausthal-Zellerfeld, Germany [email protected] [email protected] Abstract : Motivated by the desire to solve the problem of automatically identifying Chinese idioms for English idioms and English description, we have tested the hypothesis that conceptual models for the language patterns can formalize the Chinese idioms domain knowledge by means of OWL DL ontology’s. Moreover, we have represented the domain knowledge including encoding frequently used Chinese idioms and distinguishing synonyms of Chinese idioms. According to ontology’s' standards, we have evaluated the novel OWL DL ontology's Tbox. In addition, we encourage that the users coin new English idioms so as to benefit the bilingual learners and researchers more by using the method of ontology’s. Keywords-TBox; OWL; Chinese idioms; conceptual model; ontology I. INTRODUCTION KR (knowledge representation ) is important not only in the trade of IT (information technologies) and Internet Technologies, but also for handing educators' knowledge down, for the deeper researches of ancient history, and for the spread of human culture. One of the reasons is that KR can standardize basic domain concepts and their relations for a community. Furthermore, the semantic web has became a more and more popular research area because of the joint efforts by those including educators, researchers and participants of industry. In addition, fruitful research results on KR (knowledge representation ) attract a lot of attention that encourage the researchers in this field to work harder in response to public demands. As a core part of the semantic web, ontologies are useful for organizing knowledge, sharing knowledge, retrieving information, and managing knowledge. In short, enhancing ontologies can improve the research on KR and the technologies of ontologies have the ability to shoulder the task of identifying concepts. Facing this trend, we try to help not only English-Chinese bilingual learners, but also the Western English speakers who would like to identify CIs (Chinese idioms) for EIs (English idioms) description, to benefit from a well-designed OWL DL ontology. Moreover, Chinese idioms ( the language or dialect of Chinese people, region ,class, etc. ) are considered as the cultural heritage and essence of China. Additionally, it is a global communication tool to use English for the world trade and economy, that is why our model is based on the English language. We propose a new ontology that CIs' concepts are represented in a clear, modelled, machine readable way. By this effort, the hypothesis of the possibility that conceptual models work in Chinese idioms domain can be explored by a substantial amount of work. We are trying to seek the common ground between CIs' concepts and EIs' descriptions, though they come from different cultural backgrounds. It is not strange that there are a lot of CIs' concepts missing corresponding EIs' descriptions, mainly due to the cultural reasons. Nevertheless, we have obtained the common This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 68…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) ground on the issue of identifying CIs' concepts for EIs description while leaving aside the differences mentioned above. As a first contribution, our research has created an OWL DL ontology which adds to knowledge in a way that links Chinese idioms to English idioms. As a second contribution, from a conceptual modelling view this research has provided a description logic knowledge base that consists of both a TBox and an ABox. As a last contribution, we have added new knowledge to KR ( knowledge representation ) area that will promote the international culture interchange. II. RELATED WORK We have summed up not only the related researches but also the relevant software systems. A. Two types of researches With regard to the related work on automated identification of idioms and / or the relevant semantic recognition researches, we have summarized two types of researches according to the difference of their emphases that are predicates and / or definitions. As the first type of the researches, it is the predicates-centered researches. They have formed our research's theoretical bases. One of the interesting papers has shown that the integration of concepts is a classification and / task [1]. Similarly, “An analysis that defines predicates for Wordnet verb classes and link them to semantic interpretation is presented.” [2] The idea is that “the meaning of the verb depends not only on its selection restrictions, but also on the syntactic relations that realize them”[2]. “For every verb in a clause, Word net provides a list of verb synsets for which we have defined predicates.”[2] “The predicate that realizes the most syntactic relations in the sentence is selected as the meaning of the verb.”[2] As one of the research results ,forty eight frequently used verbs was presented, moreover, “a model for semantic interpretation that integrates the determination of the meaning of verbs, the attachment and meaning of prepositions, and the determination of the thematic roles” was shown in [3]. Facing a common debate, the authors respond like this: “A critique that can be levelled against our approach could be that it needs the hand-crafted construction of verb predicates, which is a rather difficult and time-consuming job. The reply to this is that once the verb predicates are defined, they are defined for every natural language application. This is so because their definitions are not tied to any given application, and their selection restrictions are based on a general ontology of English. Moreover, as we have indicated in this paper the semantic interpreter can be used for automatically acquiring inference rules to be used by the knowledge acquisition system.”[4] With respect to the testing, the authors asserted that “we have conducted diverse tests and the system has been demoed in a major conference.”[5] At the same time, “The algorithms were tested to determine how successful they were in disambiguating the nominalization, and in recognizing the underlying verbal concept of the nominalization and filling its thematic roles.”[6] As the second type of the researches, it is the definitions-centered researches. They link up with our research in the way that they have provided definite clues of distinguishing Chinese idioms and / or their synonyms from each other. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 69…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) An interesting research has tested that “the extended entity-relationship modelling can provide both a well defined semantics and improved modeling elements that naturally reflect English language sentence structures.”[7] In other words, the users require more than three different types of information, the requirement 'hierarchy can be represented by higher-order object types or a directed graph. For our research, the implications of this work is the following: The description of the target database “is usually given in some natural language ,for instance in English. Conceptual design aims at transforming English sentences into a conceptual database schema. A conceptual data model should therefore possess modeling features that can represent English sentence structures.”[7] In order to meet the requirements of intelligent question-answering, an important article has triedto resolve the problem of various domains' knowledge representation in the form of ontologies [8]. The authors have set up an application scenario for mobile users that the ontologies are relevant to information services on the web. In the end the authors have concluded that it is of great importance to keep conceptual clarity .For our research's precise measure of the semantic similarity, we have analyzed the literature on the algorithms of information matching in [9], [10], [11], and [12]. B. Four kinds of software systems ( From the perspective of idioms, we have conducted a brief classification of the existing search engine tools on the web that are freely and readily accessible. ) • The major search engine such as Google as the first class of idioms identification tools. For fixed idioms and / or phrases, Google's strategies include that providing different sets of the latest example with and without quotation marks to search for idioms. But for Chinese idioms, the translate.google.com website only shows the users the corresponding Pinyin. • Some online websites like the www.phrases.netand the www.makeuseof.com/dir/idiomsite-meaningsofcommon- sayingsas the second class of idioms identification tools. They provide the service that allow the users to find out the meaning of a particular idiom and / or phrase.But they do not serve as an idiom matcher or finder to identify a Chinese idiom. Furthermore, their qualities of service is poor, at the same time, their functions are incomplete. • The retrieval systems such as OCIRS, Shunfeng, Wuyou, etc. as the third class of idioms identification tools. The authors of OCIRS claim that the system can search idioms via semantics. While we have tried and noticed that no definite retrieval results are shown. • Others. ( Including the www.talkiteasy.org, the englishpond.com , the ask.metafilter.com , the www.usingenglish.com, the www.phrases.org.uk , the www.thefreedictionary.com, the idioms.thefreedictionary.com , the englishteacherfred.com etc. ) All of them are connected to idioms, but none of them can identify Chinese idioms for English idioms and / or English description as far as we know. III. THE OWL DL ONTOLOGY The goal of this OWL DL ontology is to capture knowledge in the Chinese idioms domain. Our ontology describes the concepts of 1000 frequently used Chinese idioms and also the synonymous relationships that hold between those concepts. By using Protégé OWL, we define and describe those concepts so that we can distinguish them from each other for English idioms and descriptions. Furthermore, the logical model allows This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 70…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) that we can use the related tools to recognize which Chinese idioms fit under which definitions that are the combinations of Longman defining words. In addition, employed in our design as a sidekick, Wordnet contributes its English words' synsets for the mapping between English descriptions and Chinese idioms' definitions. The reason for using Wordnet is that our ontology 's atomic element is the English word and that the similarity between English words are computed based on Wordnet' ssynsets. The novelty of this ontology is that it allows new English idioms and new Chinese idioms to be coined if the new idiom is articulated. The first reason for that our ontology can accept and append new English and / or Chinese idioms is the following: we spare categories for possible new idioms based on Wordnet'ssynset, in other words, each word in our ontology has its own category and / or variable set preserved, and the category has a oneto -one mapping to the words in Wordnet' synset. The second reason is that each possible synonym has its own category in our ontology so that the slightest difference between the existing idioms and the foreseeable new idioms can be captured. Indeed, it is one of our ontology's features that the flexibility is realized through spared categories. The OWL DL ontology is designed to contain 12000 classes, 10 properties, 1000 individuals, and 2014axioms. With regard to the 12000 classes, 1000 of them constitute the classes of Chinese idioms; 3000 of them comprise the classes of the synonyms' distinctions; 4000 of them make up the set of the defining words; and the last 4000 of them compose the set of the defining words' merged synsets ( in accordance to the core of Wordnet ). With respect to the 10 properties, they are the following relations between the classes: hasAD; hasEID;hasDescription; distinguished-from; encodes; encoded-by; composes; is-composed-of; part-of; and haspart. Among them, the last six properties has a relationship of “inverses”; the last two properties' ( part-of and haspart) superproperties are composes and is-composed-of respectively. With respect to the 2014 axioms, 2000 of them are the “disjoint” relationship between the defining words' classes; 14 of them are the “covered by” connection to their discrete restrictions. The reason for choosing OWL DL ( description logic ) is that we determined to trade the property of fine-grained ontologies for the decidable inferencing. With respect to our ontology's storage, our design rationale trade space for time. The description logic reasoned infers sub assumption relations on the Tbox. Additionally, rule logic capture the assertions on the Abox. In this way, both inferred Chinese idioms' definitions and the original assertions of Chinese idioms can be materialized in relational database. Consequently, this kind of design can decrease the response time because the data are ready after the loading of this ontology. IV. MATERIALS AND METHODS The fundamental idea for the English descriptive ontology is the following: First, we encode each Chinese idioms into a four-word group (a verb, a subject, an object, and an adjective) consisting of the Longman defining vocabulary, which has been carefully selected. Second, we organize both the Chinese idioms and the defining words into a tree structure in Protégé-OWL. Third, for the sake of distinguishing the synonyms of Chinese idioms, we consider to add one more layer in the sub trees for the following reasons: each member in the Chinese idiom's synset (always they appear in pairs) can be differentiated from each other by the style, the attitude, and the degree. Furthermore, they have rarely the same sense in all the above ways. For example, hun2bu4shou3she4 and ru2zuo4zhen1zhan1 ( the numbers represent Chinese language's four tones ) are a pair of synonyms, the former's closest corresponding English idiom is that “to have ants in one's pants”, while the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 71…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) latter's, “like ants on a hot pan”. We can understand that the former refers to “the spirit leaves the body”, and the latter refers to “feel extreme anxiety”. We analyze from the ancient Chinese standpoint as follows: their emphasizing points are different, the degree of the latter is stronger, furthermore, from the attitude point of view, people disapprove of the former, but for the latter no disapproving. These are the causes why we can recognize between the synonyms which is which. Fourth, we decide to ask the user for a subject and an object. In fact, we hesitated before the decision for the following reasons: on the one hand, as the Chinese idioms usually have no person, no tense, and no plural, as a result, the idioms always sacrifice completeness for function; on the other hand, the whole sense of a Chinese idiom is usually centered around the predicate, furthermore, without an object we would not know the goal, and / or the aim, and / or the target of the action. After these consideration, we think that the English is rule based, therefore we decide to ask for two nouns ( a subject and an object respectively ) as the articulating of the input English idiom. For solving the ambiguity problem in Chinese idioms, we allow the users do the following selections: Pin down the attitude, the style, and the degree differences: A. People disapprove of this one. B. No disapproving attitude. C. In a special situation such as literary. D. In an ordinary situation. E. A stronger one. F. No stronger degree. Note that the pairs of (A,B) and / or (C,D) and / or (E,F) are mutual exclusive. The idea is a combination of a verb, a subject, an object and an adjective that is organized systematically in aTbox of the ontology for each Chinese Idiom. In this way, to reach the goal of identifying a sole Chinese idiom, you simply walk down the tree with at least four layers. In the first layer, it is the root of ideas. In the second layer, the defining words of verbs in the Longman defining vocabulary are arranged as the first step for deriving a Chinese idiom. In the third layer, we combine the previous verb and a subject. In the fourth layer, it is the combination of the previous verb, the previous subject and an object that play the role of the expressing a Chinese idiom's sense, the reason is that a Chinese idiom is often centered around the predicate, and the reason for that only two nouns will suffice is the following: the particular action in a Chinese idiom is described by the verb in the second layer, and these nouns are often the cause and the result to express an idea. In the fifth layer, it is the adjectives' turn which always can determine the degrees of the previous action and / or results. More strict scholars may ask that why no adverb? The reasons for this phenomenon is the following: the underlying reason isthat an adjective can transmit the information of an adverb in ancient Chinese language, furthermore, for most of the Chinese idioms there is no person, even no tense in the concise way of expression. Therefore, we can achieve a better understanding about a course-grained language from the standpoint of the West, in other words, this old language prefers to sacrifice completeness for function. Similarly, we can expect that the users articulate theinputted idioms by viewing a pronoun as a noun, viewing an adverb or a numeral as an adjective, and ignoring the conjunctions and the prepositions. The definitions of the Chinese idioms were obtained from [13]. And the building tool and materials for our ontology were obtained from the website of http://wordnet.princeton.edu/wordnet/download/standoff/ [14]. V. RESULTS The whole picture of this research is to identify a sole Chinese idiom as a counterpart of a particular user's inputted English idiom and description. In order to achieve the overall goal we decompose it into three sub goals: This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 72…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) (1) a conceptual model for language patterns, (2) a novel OWL DL ontology, and (3) the logic for identifying the counterpart. Figure 1. Our example of the encoding of the idioms “ru2zuo4zhen1zhan1” and “hun2bu4shou3she4”(the numbers: Chinese language 'stones) Figure 2. Use case diagram Fig. 1 shows the result of a pair of Chinese idiom' synonyms, “hun2bu4shou3she4” and “ru2zuo4zhen1zhan1” respectively. Additionally, the class “Attitude” in the picture ( on the left side and in the This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 73…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) middle of the list of the classes ) summarized the steps of the decoding. The layers of classes shows the state of the post-decoding: for “hun2bu4shou3she4”, it is composed of the “Disapproving_ Attitude”, “D_Special_Situations”, “DS_No_Stronger_Degree”, “V9”, “N1_9”, “N2_9”, and “A_9” categories respectively; for “ru2zuo4zhen1zhan1”, it is composed of the “No_Disapproving_Attitude”, “N_Special_Situations”, “NS_Stronger_Degree”, “V12”, “N1_12”, “N2_12”, and “A_12” categories respectively. We believe that logic and ontologies can shoulder the task for the use of the bilingual learners. Fig. 2, Fig. 3,Fig. 4, Fig. 5, and Fig. 6 show the logic of the CMCI ( conceptual model for Chinese idioms). Fig. 3 shows the logic of computing for the similarity degrees. The variables stand for two English words in the same word class,and the function E(i) stands for their synsets in Wordnet. In the equation, we compute the degree of similarity by using the overlap between their synsets. Figure 1. The logic for measuring the similarity between synsets Figure 4. The logic for determining the Chinese counterpart “ru2zuo4zhen1zhan1” (the numbers: Chinese language's tones) In other words, if no overlap between the two defining words' synsets, the similarity degree is zero; if the overlap is exactly the synsets' union, the two synsets are definitely same; in other cases, the degree is a decimal between zero and one. Fig. 4 shows the matched conditions between users' inputted information and the ontology's definitions. In this equation, if one of x, y, and z is false, the Chinese idioms' synonyms can be distinguished; at the same time, if none of a, b, c, and d is false, the user's inputted English idiom and description can be matched. The reasons for setting up the logic for determining the Chinese counterpart are to distinguish the synonyms of Chinese idioms so that every concept is clear and definite. Fig. 5. and Fig. 6 show the algorithm of identifying Chinese idioms. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 74…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 2. The algorithm of identifying Chinese idioms Figure 6. Our example of the matched Sample1 (Chinese idiom counterpart “ru2zuo4zhen1zhan1” ) depicted as UML object diagram VI. DISCUSSION We show here that an OWL DL ontology conduces to identifying Chinese idioms for English idioms and description. In addition, a conceptual model for Chinese idioms that allows new English idioms and / or new Chinese idioms to be coined was the main outcome of this research. In contrast, the present state of knowledge relating to Chinese idioms' identification is far from satisfying. For example, OCIRS's atomic This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 75…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) element was the Chinese characters, even worse, the results were not unique [15]. In compliance with the evaluation standards of ontologies, with regard to licensing, the CMCI ( conceptual model for Chinese idioms ) uses GNU license to promote interoperability; with respect to maturity, the CMCI will be kept on being developed and maintained; with respect to granularity, the CMCI is a coarse-grained ontology that is based on description logic; with respect to security, the CMCI respects users' right to privacy. Why should the components that construct the Chinese idioms ontology have less than ten tiers? On the one hand, we think that form follows function. On the other hand, we designed such a multi-layered structure for the convenience of determining to which ontological category a user's inputted concept has to belong. What is the nature of ontologies in the semantic web context? Ontologies exist for the purposes of mapping human languages to their corresponding senses. To achieve this, we have to keep conceptual clarity. Future work will be directed to applying this novel ontology in a business context. What is the use of the CMCI in a business context? The retrieval of the Chinese idiom counterpart is the main function for the use of the bilingual learners. In the educational sector, a conceptual model with the following properties is required. The principle of the conceptual model is to solely and definitely encode the frequently used Chinese idioms, so that we can ensure the clarity of each concept. The purpose of the conceptual model is to encode frequently used Chinese idioms so that we can definitely identify them by using the combination of the Longman defining words. In addition, the reason for building an OWL DL ontology is to represent the Chinese idioms' domain knowledge and share the resources with anyone who is interested in the semantic web. ACKNOWLEDGMENT Thank my original country and university for supporting me sustainably, anyone for kindness to our research. REFERENCES [1] F. Gomez, and C. Segami, “The recognition and classification of concepts in understanding scientific texts,” Journal of Experimental and Theoretical Artificial Intelligence, vol. 1, pp. 51–77, 1989. [2] F. Gomez, “Linking WordNet verb classes to semantic interpretation,” Proceedings of the COLING-ACL Workshop on the Usage of WordNet on NLP Systems, Universite de Montreal, Quebec, Canada, pp. 58–64, August 1998. [3] F. Gomez, C. Segami, and R. Hull, “Determining prepositional attachment, prepositional meaning, verb meaning and thematic roles,” Computational Intelligence, vol. 13(1), pp. 1–31, February 1997. [4] F. Gomez, and C. Segami, “Semantic interpretation and knowledge extraction,” Knowledge-Based Systems, vol. 20, pp. 51–60, 2007. [5] F. Gomez, “An algorithm for aspects of semantic interpretation using an enhanced WordNet,” Proceedings of the 2nd Meeting of the North American Chapter of the Association for Computational Linguistics, NAACL-2001, CMU, Pittsburgh, pp. 1–8, 2001. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 76…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [6] R. Hull, and F. Gomez, “Semantic interpretation of nominalizations,” Proceedings of the Thirteenth National Conference on Artificial Intelligence, Portland, Oregon, pp. 1062–1068, August 1996. [7] S. Hartmann, S. Link, “English sentence structures and EER modelling,” In Conceptual Modelling APCCM 2007, Australian Computer Society, CRPIT, vol. 67, pp. 27-35, 2007. [8] D. Oberle, A. Ankolekar, P. Hitzler, P. Cimiano, C. Schmidt, and M. Weiten, etc., “DOLCE ergo SUMO: on foundational and domain models in SWIntO (SmartWeb Integrated Ontology),” Technical Report, AIFB, University of Karlsruhe, pp.1-41, 2006. [9] D. Beeferman, A. Berger, J. Lafferty, “Statistical Models for Text Segmentation,” Machine Learning Journal ( Special Issue on Natural Language Learning), vol. 34, pp. 177-210, 1999. [10] D. Beeferman, A. Berger, J. Lafferty, “A lightweight punctuation annotation system for speech,” In ICASSP 1998, pp. 689-692, 1998. [11] D. Beeferman, A. Berger, “Agglomerative clustering of search engine query log,” In KDD 2000, pp. 1-10, 2000. [12] D. Beeferman, “Lexical discovery with an enriched semantic network,” In ACL/COLING 1998, Proceedings of the Workshop on Applications of WordNet in Natural Language Processing Systems, pp. 135-141, 1998. [13] H. Xu, Little Chinese-English dictionary. Beijing: Foreign language teaching and research press, April, 2004. [14] G. A. Miller, “WordNet: a lexical database for English,” Communications of the ACM, vol. 38(11), pp. 3941,1995. [15] H. B. Hu, C. M. Tu, C. L. Fu, L. Fu, F. Mao, & Y. Ma, “OCIRS: An Ontology-based Chinese Idioms Retrieval System,” World Academy of Science, Engineering and Technology, vol. 42, pp. 641-647, 2010. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 77…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) The Impact of Technology Enhanced Learning in Southwestern China:ca Case Study Haitao Li Sven Hartmann NielsPinkwart Department of Informatics Clausthal University of Technology Clausthal-Zellerfeld, Germany [email protected] Abstract : Technology-enhanced learning is increasingly used in developing countries, but is often not systematically evaluated. This paper presents a case study at Sichuan International Studies University where an “eExamsystem”, a self-training and test system, has been used. Results show that the eExam system helped poorer students from rural areas catch up with their peers from urban areas. Keywords-eExam; eLearning; technology-enhanced learning; evaluation I. INTRODUCTION Technology-enhanced learning is increasingly being adopted in developing countries, often in order to offer children also from poorer regions a chance to learn even if resources for teachers and schools are scarce. With regard to the definition of developing countries, the statement “most countries in Latin America, Middle East, Africa, Southeast Asia, and some parts of southern Europe, are designated as ‘developing countries’ because of their lower rank in the United Nations Development Program (UNDP) Human Development Index.” can be found in [2]. In China, higher education has been established throughout a period of at least one hundred years. Additionally, about five hundred universities located in more than fifty cities have trained a large number of experts / professionals in many scientific disciplines. However, a gap exists between these achievements and, at the other side, the fact that chances of urban school aged children going into higher education are three or four times greater than for children from rural areas. According to [2], China has 70,000 schools with computers and more than 10 million students who have mastered basic computer skills, but most of these schools are in cities, not in poorer, rural areas. Currently, it is necessary to introduce technology-enhanced learning in such a rapidly developing country as China. The main reason is that the universities are undermanned, but there are also other reasons for the necessity to use technology-enhanced learning in developing countries: (1) the development of learners' capabilities and their future careers require information technology. (2) the Chinese national teaching programme and quality oriented education include information technology. (3) information technology can lead to shorter exam times. When freshman numbers increase year by year, the students would hardly feel convenience without the support of information technology. Furthermore, it is feasible that information technology could foster the learning of unprivileged freshmen for the following reasons: (1) learning information technology is especially prevalent among younger teenagers. (2) Chinese National Computer Rank Examinations have successfully been implemented every year since the 1990s. (3) the existing eExam products developed by the Ministry of Education of China can measure achievements in a variety of different fields, This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 78…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) including office applications, VB programming, VFP programming, VC++ programming, network applications etc. In this paper, we describe the above-mentioned eExam system, which is designed to provide equal educational opportunities for freshmen students from the rural areas in China. Our aim is to validate the eLearning effect for the lower income regions of China - we therefore investigated the association between class grades and the area the students came from (low/high income). The data came from practical eExams about first-semester office application courses at Sichuan International Studies University. We put forward the hypothesis that the eExam system does enhance the learning of those freshmen who come from underdeveloped regions. In other words, we think that the eExam system plays a positive role for rural freshmen students, especially when the number of students is increasing and the universities are undermanned. About the organization of the next sections, first, we are going to describe some related work in other developing countries. Second, we would like to briefly introduce the eExam system. Third, we will present the data collected from two year’s teaching practice. Fourth, we will argue that having using the eExam system has made all the difference for poorer students from rural areas. Fifth, we would discuss our outcomes, our limitations, and the potential importance of this paper. II. RELATED WORK In order to understand the current eLearning growth points in developing countries, we have conducted a literature search using the ISI Web of Knowledge and scholar.google.com. While a recent, larger scale survey does not seem to exist, some papers attempted to suggest what kind of functions should be provided to raise the online learning satisfaction of underprivileged students [3], [4], [5], [6], and [7]. Nevertheless, these papers did not deal with the validation of eExam tools or skills about office applications. From Table I we can see that most eLearning systems are for one particular skill of the trainees. Furthermore, a quite high proportion of the papers apparently took it for granted that learning technology would necessarily result in desired effects [8], [9], [10],[11], [12], [13], [14], [15], and [16]. On the contrary, some papers doubt eLearning. For example, a review of 150 distance education programs in sub-Saharan Africa has concluded that traditional, paper-based means of distance learning continue to be more reliable, sustainable, and widely used than online methods of learning [17]. India’s technology and distance learning institutions, including the Indira Ghandi National Open University (IGNOU),the Indian Institute of Technology, the Birla Institute of Technology, and the School of Education Technology at Jadavpur University, have led the way in online degree courses and modules [1]. However, they fail to consider the need to provide basic literacy and computer skills and access to computers to poorer groups before they can begin to engage in higher online learning. As stated in [2] on page 51, this is problematic: “Despite the availability of technologies in urban regions, rural and poor people continue to be deprived of investment ,infrastructure, and skilled teachers. Thus far, the introduction of computers into education in developing countries seems to have done little to widen educational access to the rural poor, who also do not have easy access to conventional schools and colleges.” What happened in other Asian developing countries? This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 79…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) In Philippine, The University of the Philippines’ Open University launched am-learning program in 2004 that offered print and mobile materials for simple and universally relevant health, literacy, and numeracy education [18] .A survey of 387 students in their final undergraduate year at the Virtual University of Pakistan concluded that the majority of students found learning over the Internet and via satellite TV beneficial. The majority also reported difficulties in accessing computers, libraries, learning environments and efficient mentors [19]. At Indonesia’s Open University, the University of Terbuka, 320,000 students reported limitations in online infrastructure and access. Distance education systems and students continue to rely heavily on post, courier services, and telephones [20]. TABLE I. RELATED WORK IN OTHER DEVELOPING COUNTRIES This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 80…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 1. The eExam system in classroom use This paper attempts to investigate the effects of providing learning technologies to poorer students from rural areas based on evidence collected in a large-scale larg field study over a 2-year year period (see Fig. 1 for an impression of how the class was conducted). III. THE EEXAM SYSTEM The eExam system, mentioned before in this paper, it is a web based learning and eAssessment tool for the Chinese National Computerr Rank Examinations. It has gone through different cycles of iterative design ,development, and testing since the 1990s. At first, it supported only a few fields such as Fox base which was running on MS-DOS. DOS. As of 2007, a network version that covers many application fields exists. The eExamsystem contains approximately 5000 examination questions and it can support as many as 2000 parallel users. An automatic marking function characterizes one of the main features of the eExam system. This function makes it possible for a few examiners to examine one or two thousand examinees in a few hours. If the freshmen students wanted to do some exercise by themselves, a pool of test questions questions for trainees are provided. Figure 2. The eExam User’s Interface for trainees This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 81…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Fig. 2 shows the user interface of the system. The interface shows, among other things, the time remaining, the questions remaining, the questions completed, etc. Technically, the eExam system is based on a three-layer three layer architecture. In the client layer, information services can be requested by a browser. In such a way, end users such as students do not have to install software on their machines. In the middle layer, application servers for various domains are packaged. The application servers’ interfaces with uniform format are open and exposed. Thus, the complexity of operating systems and evolutionary platform can be ignored by developers, who can be concerned with business itself. Functional component-ware ware has been used to reduce early construction costs and maintenance costs. All applications are compliant with protocols such as SOAP, WSDL, and UDDI. In the hibernate layer, Object-Relational Object mappings were adopted. IV. MATERIALS AND METHODS At Sichuan International Studies University in China, an “office application” required course was given to all University freshmen twice a week for half a year. All the teaching materials for this course were contained in the eExam am system. Usually, one teacher was responsible for up to sixty students. Such a proportion meant that only instructional technology could ensure personalized learning. As such, during the whole learning process, only the eExam system was used in classes, and teachers merely demonstrated the examination questions in the database of the eExam system. When the learners began to do exercises in the classes, the system provided a set of tasks or questions that was randomly chosen from the servers. Furthermore, a continuous assessment allowed the learners to know the real state of their mastering skills. It was this real-world real world course that generated all the data in this paper. A. The First Experiment TABLE II. DISTRIBUTIONS OF STUDENTS IN YEAR 2006/07 This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 82…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 3. Results of the class of 2006 in September of 2006 In September of 2006, ten classes of randomly chosen freshmen students (total 198 students: 89 rural students; 109 urban students) were required to take the eExam before the course started. This was in order to test how much office application skills that they had learned before admission. Usually, most students partly met the elementary requirements of the course such as typing. In January of 2007, all freshmen students (total 1635 students: 696 rural students; 939 urban students) were required to take the same eExam. This time, most students finished all the tasks in the eExam: typing, word processing, spreadsheet calculations, and web page construction et al. The data that whether a student came from urban or rural areas is obtained from the office of student administration at Sichuan International Studies University in China. Before using the electronic system, Table II. and Fig. 3 have shown that the rural group performed not good, please notice the cross marks of the rural group and the urban group in Fig. 3 that shows the proportions of the students' number of fail. In contrast, after using this electronic system Table II. and Fig. 4 have shown that the proportions of the students' number of fail in rural group have dramatically decreased. At the same time, the proportions of the students' number of very good in rural group have significantly risen. Figure 4. Results of the class of 2006 in January of 2007 This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 83…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) B. The Second Experiment In September of 2007 (total 256 students: 96 rural students; 160 urban students) and in January of 2008 (total 2099 students: 782 rural students; 1317 urban students), for the new year’s freshmen students in grade 2007, the same experiment was repeated in order to validate the results. V. RESULTS To investigate whether the eExam system could help the poorer students’ learning of office application skills, we analyzed the data obtained in 2006, 2007, and 2008 .A. Results of the class of 2006 Table II. and Fig. 3 show how the students from urban and rural areas performed in the pre-test and in the post-test. The results are classified into four categories: Very Good (score 80% or higher). Good (70%79%),Pass (60%-69%), and Fail. .The data shows that no single rural student got a mark scored “Very Good” on the pre-test. In contrast, 60% urban students received this mark. Moreover, 60% rural students failed to receive the minimum score for passing the test (60%); in contrast, every urban student passed .Table II. and Fig. 4 indicate that, after the class using the eExam system, the results of the rural students were so well proportioned that they had caught up with their peers from urban areas. B. Results of the class of 2007 We wanted to test that the similar thing would happen again in the next year. Accordingly, we tested the freshmen students in 2007/08. TABLE III. DISTRIBUTIONS OF STUDENTS IN YEAR 2007/08 This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 84…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 5. Results of the class of 2007 in September of 2007 Table III., Fig.5, and Fig. 6 show the similar results. These confirm the findings from the year before: again ,the students from the rural, poorer areas were not successful at the pre-test (no student better than 70%, 45 out of 96 failing) while the students from the urban areas did much better (127 out of 160 with a “very good”, only one student failing). At the post-test, such a difference could not be observed anymore. In summary, this data is evidence that the class (in which the eExam system was the main learning tool, which was also available for students to train themselves from home) did play a positive role for the development of rural freshmen students’ office application skills. VI. DISCUSSION The main outcome of the work is the following. In September of 2006, the results of the first experiment indicated an association between the scores and the areas the students came from, however, about half a year later such association disappeared. These results could be repeated in the next year. We would have liked to compare these results to a situation where the eExam system was not used (but traditional learning and teaching methods) but did not have access to earlier data before 2006. Figure 1. Results of the class of 2007 in January of 2008 In order to improve educational equity, technology-enhanced learning tools can bridge the gap between the rural students and the urban students. In China, the economy is rising, the number of freshmen students is increasing, and the universities are chronically undermanned. In this situation, learning technologies, such as the eExam system presented in this paper, are needed to help poorer students – our data shows that good computer based learning tools can indeed be successful in this regard. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 85…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) With regard to the potential importance of our results, other special fields of study such as biology could be enhanced by using on-line learning tools. For example, the sites of NCBI (the National Center for Biotechnology Information, which advances science and health by providing access to biomedical and genomic information),and EMBL (European Molecular Biology Laboratory) could play an important role in helping rural university students. VII. CONCLUSION Overall, the field study results have confirmed our initial hypothesis that information technology can improve the poorer freshmen students’ office application learning. In addition, this paper provides an insight into the causes of the necessity for technology-enhanced learning at Sichuan International Studies University in south western China. In south western China as in many developing countries, the development of education lags behind that of economy. It is impossible to build up a famous university in a short time. There are too many students for the capacity of the existing universities. Therefore, using advanced learning technologies is necessary. The paper concludes that the poorer freshmen students can achieve educational equality in computer skills by using one such advanced learning technology: the eExam system. Based on our results, we believe that in many western China cases, where there are conventional colleges, the described system is workable. This conclusion does not attempt to suggest that the use of eExam /eLearning systems should be limited to colleges or to office applications. The implication is the opposite. The use of the system could be expanded at most secondary specialized schools in western China so that more rural students can keep pace with the progress of the information era and achieve fulfilled lives in the future. ACKNOWLEDGMENT Thank my original country and university for supporting me sustainably, and Dr. rer. nat. Nguyen-Thinh Le. REFERENCES [1] P. Sharma, The distance in education and online technologies in India, A. A. Carr-Chellman ed., London: Sage Publications, pp.52–66, 2005. [2] S. Gulati, “Technology-Enhanced Learning in Developing Nations: A review,” International Review of Research in Open and Distance Learning, vol. 9(1), pp. 43-58, Feb., 2008. [3] C. R. Wright, G. Dhanarajan, S. A. Reju, “Recurring Issues Encountered by Distance Educators in Developing and Emerging Nations,” International Review of Research in Open and Distance Learning, vol. 10(1), pp. 127-152, Feb., 2009. [4] I. Jung, T. M. Wong, C. Li, S. Baigaltugs, T. Belawati, “Quality assurance in Asian distance education: Diverse approaches and common culture,” International Review of Research in Open and Distance Learning, vol. 12(6), pp. 63-83, Oct., 2011. [5] A. S. Andersson, Å. Grönlund, “A Conceptual Framework for E-Learning in Developing Countries: A Critical Review of Research Challenges,” The Electronic Journal on Information Systems in Developing Countries, vol. 38, pp. 117-133, Sep., 2009. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 86…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) [6] J. Kim, W. Lee, “Assistance and possibilities: analysis of learning-related factors affecting the online learning satisfaction of underprivileged students,” Computers & Education, vol. 57(4), pp. 2395-2405, Dec., 2011. [7] A. Andersson, “Seven major challenges for e-learning in developing countries: Case study eBIT, Sri Lanka,” International Journal of Education and Development Using Information and Communication Technology, vol. 4(3), pp. 45-62, Oct., 2008. [8] R. Garrote, T. Pettersson, M. Christie, “LiveUSB Mediated Education: A method to facilitate computer supported education,” Australasian Journal of Educational Technology, vol. 27(4), pp.619-632, Aug., 2011. [9] A. S. Blignaut, J. E. Hinnostraza, C.J. Els, M. Brun, “ICT in education policy and practice in developing countries: South Africa and Chile compared through SITES 2006,” Computers & Education, vol. 55(4), pp.1552-1563, Sep., 2010. [10] R. Rubio, S. Martin, S. Moran, “Collaborative Web Learning Tools: Wikos and Blogs,” ComputerApplications in Engineering Education, vol. 18(3), pp. 502-511, Sep., 2010. [11] R. Vyas, S. Albright, D. Walker, A. Zachariah, M. Y. Lee, “Clinical training at remote sites using mobile technology: an India-USA partnership,” Distance Education, vol. 31(2), pp. 211-226, Apr., 2010. [12] M. Hodgins, B. Battel-Kirk, A. G Asgeirsdottir, “Building capacity in workplace health promotion: the case of the Healthy Together elearning project,” Global Health Promotion, vol. 17(1), pp. 60-68,Jan., 2010. [13] F. Helali, “Using ergonomics checkpoints to support a participatory ergonomics intervention in an industrially developing country (IDC)--a case study,” International Journal of Occupational Safety and Ergonomics, vol. 15(3), pp. 325-337, Sep., 2009. [14] T. Obura, W. E. Brant, F. Miller, I. J. Parboosingh, “Participating in a Community of Learners enhances resident perceptions of learning in an e-mentoring program: proof of concept,” BMC MEDICAL EDUCATION, vol. 11(3), pp. 125-129, Jan., 2011. [15] S. Raturi, R. Hogan, K. H. Thaman, “Learners' access to tools and experience with technology at the University of the South Pacific: Readiness for e-learning,” Australasian Journal of Educational Technology, vol. 27(3), pp. 411-427, Sep., 2011. [16] C. M. Guerra, M. P. Ramos, V. Z. Penna, J. M. Goto, L. Q. Santi, V. A. Stempliuk, J. Sallas, E. A. Servolo Medeiros, “How to educate health care professionals in developing countries? A Brazilian experience,” American Journal of Infection Control, vol. 38(6), pp. 491- 493, Aug., 2010. [17] J. Leary, Z. L. Berge, “Trends and challenges of e-learning in national and international agricultural development,” International Journal of Education and Development using Information and Communication Technology, vol. 2(2), pp. 51-59, Apr., 2006. [18] M. D. Peña-Bandalaria, “Impact of ICTs on open and distance learning in a developing country setting: the Philippine experience,” International Review of Research in Open and Distance Learning, vol. 8(1), pp. 3145, Feb., 2007. [19] I. Hussain, “A study of student’s attitude towards virtual education in Pakistan,” Turkish Journal of Distance Learning, vol. 8(2), pp. 69-79, Jan., 2007. [20] T. Belawati, A. Zuhairi, “The Practice of a Quality Assurance System in Open and Distance Learning: A case study at Universitas Terbuka Indonesia (The Indonesia Open University),” International Review of Research in Open and Distance Learning, vol. 8(1), pp. 46-60, Feb., 2007. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 87…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Congruent Networking: A novel concept and model of recommendation system for utilizing the electronic social networks to maximize quality of service in a context Nitin V Pujari Department of Computer Science PES Institute of Technology Bangalore, Karnataka, India [email protected] Vinay S K Department of Computer Science PES Institute of Technology Bangalore, Karnataka, India [email protected] Vishal V K Department of Computer Science PES Institute of Technology Bangalore, Karnataka, India [email protected] Abstract: Ever since the dawn of the civilization, every living entity on the planet, spends most of the time to survive effectively by forming its own network consisting of homogenous and / or heterogeneous entities. This can be termed as a social network in the context of that entity. Hence social networks together form groups, communities, societies and civilizations. These networks exhibit the property of homogenous and heterogeneous interests during their formation. A basic congruence does exist when such social networks are formed. The utilization of such social networks to carry out specific tasks needs the formation of a sub-network, which hence can be termed as a congruent network. Therefore a Congruent Network can now be defined as a network of entities specifically formed to carry out a task effectively. The strength of a congruent network is directly proportional to the sum of the degree of congruence of each entity selected for that context. This work attempts to propose a concept and model for generating generic and specific effective congruent networks for a context and / or a spectrum of contexts using the current electronic social networks. This work also proposes representation system of the congruent networks, and how congruent networks can be used as recommendation systems. Keywords-components; social networks; context; congruence; congruent network; homogeneous; heterogeneous I. INTRODUCTION It is known that human is a social animal [1], meaning that he/she would be highly interactive with other members to the point of having a recognizable and distinct society. We survive in the ontology of the world [2] around us by interacting with other entities of the society. Our interaction with others is not only the key to our survival, but also to our happiness and the success of our tasks. As explained by Aristotle [3], This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 88…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) “Anyone who either cannot lead the common life or is so self-sufficient as not to need to, and therefore does not partake of society, is either a beast or a god”. As we form a Society, we are all connected in one way or the other with whom we like and also whom we hate, just as it is often said that “the friend of my friend is my friend” and “the enemy of my enemy is my friend,” so too the friend of my enemy is my enemy. This implies that, we have a social network of our own. We can derive implications of social network as rules [4]. Some of the rules are Rule 1: We shape our network Rule 2: Our network shapes us Rule 3: Our friends affect us Rule 4: Friend of a friend may affect a friend Rule 5: The network has a life of its own Now there are service providers who offer services for the people to form or to be a part of a social network .The features of these services enable one's social network to grow exponentially. Attempts are also being made to make the social network as hybrid as possible. The social link [5] is being formed on various parameters such as hobbies, folksonomy, profile, views etc. As per rule 5, and factors for creating social networks, lifetime of social network varies and it is stronger in particular contexts [6]. Context here means we and members of our network are connected together effectively in a circumstance to do a task. Earlier investigations carried out discuss the community of purpose and communities of interest are formed voluntarily based on an intent or purpose which sometimes may mask the forced intent [7][8]. Whereas congruent networks once formed will probably be more suitable to carry out the purpose or interest effectively because most of times it considers attributes that are derived from sub-conscious actions as well. Ego-centric congruent networks may be used to check the degree of congruence w.r.t community of purpose and community of interest. The intent that connects us stronger in a network can be termed as “Congruence”. Such networks can be termed as “Congruent networks”. The dictionary meaning of congruence is as follows “The quality of agreeing; being suitable and appropriate”. The mathematical meaning of congruence can be stated as two figures or objects are congruent if they have the same, shape and size, or if one has the same shape and size as the mirror image of the other. II. MOTIVATION The underlying assumption to have congruent networks is that “humans think alike, act alike in some situations”[9]. We might have observed that, we and our friends react in a same way in some contexts. If we make our network with friends who are congruent with us, our social actions can be decided productively. With the increasing use of internet, most of our communication in a network happens online. Social networking sites are available to support social interaction and most of their service offerings are free. There has been a dramatic increase in the number of internet users, most of them are spending time on social networking sites. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 89…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 1: Number of users of Facebook Figure 2: Number of Twitter users As depicted by Figure 1, Figure 2(Source: Forbes, Twitter, Facebook), a question arises. Are current human entities becoming more social? This question can be answered in 2 ways. Firstly, people are becoming more active in social networking sites, thereby making them more social online; secondly, Human is not becoming socially connected but impulsively connected. Even though the social networking sites are providing various benefits, they have limitations of their own. Each of them provide a particular set of services and are used for different purposes. But most of them provide minimal services that can be considered beneficial for both the stake holders- user and service provider. Congruent networks thus may provide a better supplemented solution by generating suitable recommended networks for specific and/or generic contexts. Contexts can be task(s), activity(s), event(s), purpose(s) etc. III. CONGRUENT NETWORKS BEYOND SOCIAL NETWORKS A. Relationship between social networks and congruent networks Congruent networks are subsets of networks derived from social networks as depicted below in Figure 3. Figure 3: Social Networks and Congruent Networks in social context Figure 3 depicts that, to form congruent networks it is necessary to have associated social networks. The creation of congruent networks is influenced by the typical characteristics of human behavior of thinking similarly with respect to the other, in a context or a situation. It gives us a new dimension to view congruent networks outside the social context, if we associate biological congruence as well. Congruent networks can also be viewed as networks that utilize various aspects of human behavior including their biological composition in a context which otherwise is not within the spectrum of social networks. This assumption now makes congruent networks a superset of social networks which is the complement of the concept depicted in figure 4. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 90…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 4: Social Networks and Congruent Networks in universal context B. Limitations of Social Networks Even though social networks are large, growing fast, they have many limitations, and some are listed below. 1) Slowing down development of interests: They are good for maintaining ties established between people before, but they don't help to create new ties. They close people in particular communication circle and slowdown the development of their interests. 2) Changing expectations about privacy: Sharing is the most common activity in social networks. Even though it is not bad to share good things (creating awareness), same thing cannot be applied everywhere. For example, confidential information should not be shared in any way. Some specific limitations are : • Increased usage of Social Network Analysis by companies • Long term changes in cultural norms 3) Higher speed of interaction creates impatience and expectations of virality: If one can now share something with a thousand people in a minute, things move much faster. This can be a good thing, but it also means that news and information can spread before people have time to carefully process it and reflect upon it, and things can also fade out more quickly. This spontaneity, good and bad, leads to higher impatience. People increasingly expect things to "go viral", and if it does not, it is viewed as a failure. If one composes a song and share it and if it does not become popular, then it may result in a judgement that the song is not good. This expectation of virality also creates strong incentives within all industries, and specifically within the technology industry, to rely on virality to promote products. User acquisition is difficult and often expensive, and hence virality seems to be a boon: The downside of this is “a new unwillingness to create products for private use”. 4) Decreased ability to recover from mistakes: If one makes a mistake during their childhood, it is remembered longer, and could have serious long term repercussions. It is also harder to change one s mind and evolve their own views without being labelled as a "flip flopper". As one gets older, their views naturally become more informed and more nuanced. Evolution should be considered as a sign of maturity. This can also lead to more immediate and shallow assessments of people[11]. 5) Increased social comparison, potentially leading to envy and loneliness: People naturally compare themselves to other people. However, instead of just comparing oneself to the people seen in day to day life, we can compare ourselves to everyone else in our social network[12]. People (tend to) promote a positive image of themselves on social networks. With exceptions, they avoid posting many messages of loneliness or isolation, pictures where they look unattractive, etc. Not only is one comparing himself/herself to other people, he/she is also comparing himself/herself to the positive and flattering portrait of themselves that This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 91…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) people like to project. Economic research has shown that after a certain absolute level of wealth, the relative wealth impacts our happiness more than the absolute level. 6) Increased prevalence of "groupthink" and prioritization of social approval: The products built around the social networks are based on the idea that people want the guidance of others in making decisions, or at least, the approval of others. Many applications or products provide the "value" of knowing popular opinion. It is more likely that we want to know at which restaurant our friends are eating so that we can also eat along with them. "Popular" is not the same as "good", which is something that seems to get lost in social networks. Maybe we don't actually like what everyone else likes. At the most, we miss out on trying something we would have liked, because none of our friends tried it earlier. At the least, we feel secluded and isolated because our preferences are completely different from those of other people in our network, and the only content that gets made is that which appeals to the broadest mass market[10]. This is amplified at times, when we want the approval of others. We cannot decide on our own even for our personal life. People always involve society. More importantly, large innovations come from doing what other people are not doing, from questioning and pushing on conventional wisdom. Huge victories in social justice comes from people standing up and saying "I know this is how we have always done things and I know this is what our societal norms are, but I think they are wrong anyway." People should be willing to do what is not popular. 7) Addiction: Marriages are broken because people pay more attention to social networks or games , than paying attention to each other. That is a larger cost to humans than anything that has happened due to privacy or groupthink[10][11][12]. C. Solutions: Congruent Networks From the discussion above, an attempt to solve all of the above limitations plus other related limitations is made by creating “Congruent Networks”. There are 2 major things that contribute towards the solution. They are 1. Context: Our actions are limited by the context. Contexts are created to benefit all the stakeholders involved bilaterally. Mutual benefit helps in strengthening our ties with our contexts. 2. Only Social: We are considering only social attributes and social views. It can be shared only in the contexts which are meaningful to us. Privacy is not an issue here. D. Difference between Social Networks and Congruent Networks This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 92…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) TABLE I. SOCIAL V/S CONGRUENT IV. WORKING OF CONGRUENT NETWORKS As explained earlier, it is a must to have social networks before generating congruent networks. With these social networks, context matching is made. Only the nodes that match the context are retained and remaining are discarded. To do this, clustering is done with the attributes of the context. Nodes closer and nearer to each other in the “context space” are retained. Further, with the remaining nodes, congruence value for each of the nodes with the given context is calculated. Nodes having congruence factor factor greater than a threshold are considered congruent with the context. A. Proposed Architecture for Generation of Congruent networks Figure 5: Architecture for Generation of Congruent Networks The major phases of generating congruent networks are identified as follows: 1. Analyzing and optimizing social networks 2. Defining the context 3. Context matching 4. Calculating the degree of congruence 5. Generating congruent networks This papers was presented at 2 nd International Conference on E-Education E ucation & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 93…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) 1. Analyzing and optimizing social networks: We have many social networking sites where users share some information which he/she likes with their individual networks (friends). Users are usually identified with their profiles. User actions are analyzed and recorded in a format called as “User description format (UDF)”. UDF, along with the result of analysis, also contains profile data. It is important to consider that the user knows what information of him/her can be shared and it is completely under his/her discretion. Forming a congruent network does not necessarily mean “sharing of information”. We consider sharing as an action where information of the user is made available to other parties on the individual's choice. We are only considering the attributes for creation of congruent networks by maintaining privacy. The focus of the model is to generate a network of congruent people, without sharing their data. Only the relevant information, that assists the creation of congruent network in a context, is analyzed and/or created and then utilized. The social network data collected may have redundant instances of users, their followers or similar users. UDF takes care of the redundant data, and represents it as a numerical value after collecting, analyzing the social network data. For example, let us consider the example of Twitter. Instead of storing all the tweets a user has made, it is better to keep only the recent tweets and keep the classification/domain count for the rest of the tweets. Classification/domain count of context is a number which indicates the count of actions related to the context/domain. This demands that, it is necessary to identify the related contexts/domain for each of the users and the necessary services have to be provided for enabling the change of contexts/domains. The content of UDF is dynamic, and hence, it can change from time to time. 2. Defining the Contexts: Contexts are defined by properties. Property is an attribute associated with both the user and context. Attributes can be quantitative or qualitative. Quantitative attributes are measurable whereas qualitative attributes are not directly measurable but they can be derived through observation and analysis. Context is defined as a mixture of these attributes with a minimum threshold value for each of the attributes. Properties of context and attributes of user may not be same. It is possible to match the property of a context with the attributes of a user. Property of a context can be defined as a combination of attributes. Consider the following example. It is required to form a team for organizing a social awareness program. The context can now be defined with the property “Social participation” and with the attributes as a) Interested in social work b)participated in group activity and c)organized a community development program. Expressing the context property in terms of user attributes is done by identifying the actions on social networking sites which are recognizable, recordable and related to the context. For quantitative properties, they are directly expressed as “required value”. Context can be generic or specific. Generic Context: Generic context is a context having various sub contexts under it. These contexts are usually applicable to all the users. “Social Context” is one of the examples of generic contexts. Generic contexts are defined with multiple properties each of which covers multiple attributes. Generic context takes each attribute as equally important. One optimization that can be implemented is to consider only attributes that cover sub contexts. Specific Context: Specific context has well defined properties and cannot be decomposed further. Specific context usually captures single purpose. 3. Context Matching: Once the UDF is defined for all the users and contexts are expressed as attributes, context matching becomes filtering UDFs for contexts. For contexts with only quantitative attributes, matching can be This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 94…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) as simple as an SQL query. For contexts with mixed attributes, matching considers the result of analysis of social actions and other related attributes. Only the nodes/users satisfying these constraints are retained for the further process. Context Matching is a kind of clustering where clustering is made on attributes covering the properties of contexts. The challenges here are i) multiple attributes ii) the order of attributes. One possible way to handle the above challenges is to perform clustering on distinguishing important attributes and let the next phase to filter out further. 4. Calculating the degree of congruence: This is the important stage where congruent networks differ from other electronic social networks. In the previous stage we filter the nodes which do not satisfy the constraints of context. Here, we consider the “user as the ultimate decision maker” and follow reverse direction to the previous stage. No matter how important the context is, it is the user who determines the usefulness of the context. This stage assists the user to determine that importance. Unless the nodes are at centre of the “context space” where they are congruent already, congruence with the context depends on users. The degree of congruence can now be calculated in two ways1. Collect inputs from the user and do binary classification for classifying him/her as congruent or non congruent. 2. Let the user himself/herself agree or disagree with the context. When all of the non-congruent nodes are filtered out, it is important to give weights to the remaining nodes with respect to the context. The congruent weight can be calculated as, per node basis or per attribute basis. Decision again depends on the context and availability of attributes. For a node, the degree of congruence in the form of weight is calculated as the cumulative sum of all the attributes. For attribute congruence, the calculation is done for each of the individual attributes. 5. Generation of congruent networks: All the nodes remaining after Stage 4 are congruent with the context. The context is added to all the nodes in their “Congruence” field of UDF. Adding the context in the nodes has the advantage of reuse. When the same context is used multiple times, we can directly fetch the congruent nodes without repeating the process unless new nodes are added due to the dynamic nature of social networks. The issue to be tackled with this approach is to identify when the node becomes non-congruent with the context. It can be solved by monitoring the health of each node at regular intervals and update the „congruent contexts accordingly. V. REPRESENTATION AND VISUALIZATION OF CONGRUENT NETWORKS We can represent a congruent network as a graph, with nodes representing “people” and edges representing their “congruent relationships”. It is valid to have edges assigned with weights based on the “level of congruence” between the nodes, because the level of agreement varies for different contexts. These congruent networks are generic in a way that they cover maximum contexts as possible. These graphs can be colored differently to differentiate the contexts. Relationship between the nodes depends on the context. Initially all the nodes are congruently disconnected. When we consider a particular context, nodes will tend to become congruent with the context. This relationship between the nodes and context can be represented as a graph, with context as a central node and all other nodes having edges carrying congruence weight, to the context node. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 95…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) Figure 6: Representation of nodes and the context The nodes in these networks will have a lifetime. The lifetime begins, when nodes start to be congruent with the context and ends when its degree of congruence in terms of weight becomes zero. Networks should be formed in such a way that lifetime should be same for all the nodes and should not end until explicitly required by the context. When we consider a generic context, it becomes difficult to construct and visualize such a graph. Here, we consider all possible contexts under the given generic context, and all the nodes and construct such graphs for each of the individual contexts. Finally all these graphs are merged to show all contexts and nodes that are congruent. For the nodes which are congruent with multiple contexts, multiple edges emerge from the node to the context nodes, with different colours for different contexts. Such a graph can be visualized as shown below: Figure 7: Representation of nodes in the generic context The methodology described above concentrates on generating congruent networks for the given context. When it comes to the individual nodes/users, it can now be used as recommendation engine. In the first stage of social network analysis and optimization, we can identify user specific contexts. Based on the result of analysis and contexts to which he/she is congruent, recommendation of entities for the task required by entity can be easily done. Consider two entities which have same degree of congruence in context1. First entity has high degree of congruence in context2 and second entity in context3. When second entity wants to know something/get benefit from context2, instead of trying out all the entities which are congruent in context2, it can now directly try with first entity which has the same degree of congruence in context1 and can come to the decision on how well the context2 benefits him. For example, consider a scenario of virtual learning systems. We call the entity which wants to learn as 'learner entity' and entity that wants to assist others in learning as 'mentor entity'. Instead of getting help to learn new things from unknown mentor entities, the proposed system can now be utilized to identify the mentor which has proficiency in the required domain and congruent with the This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 96…… International Journal of Information Technology and Computer Science ( IJITCS ) ( ISSN : 2091 – 1610 ) learner entity. Because these entities are congruent in the context of social learning, the resultant system can be used as recommendation engine for carrying out effective teaching learning. VI. CONCLUSION , OPPORTUNITIES AND APPLICATIONS OF CONGRUENT NETWORKS The work carried out in this paper conclude that the proposed concept and model cane be used by the existing or upcoming electronic social networks to enhancing their untilization for maximixing quality of service in a context. This work also opens up the areas that can be chosen for research to apply proposed congruent network concept and model may include Maximizing team productivity, Assignment problem ,Formation of context based Knowledge groups ,Human relationship management , Comparative study of behavioural v/s Biological parameters to identify congruence, Product - Entity based congruence, Event Managed based Congruence, Pre-Market Analysis, Trend based Market analysis, Matrimonial services, Recruitment Services, E-teaching and E-learning, Graph theory based approach for relationship analytics etc. REFERENCES [1] Nancy J. Nersessian, M. Gorman, R. Tweney, & D. Gooding, A. Kincannon, "Interpreting Scientific and Engineering Practices: Integrating the cognitive, social, and cultural dimensions, In New Directions in Scientific and Technical Thinking" [2] John R. Searle, "Social ontology Some basic principles", University of California, Berkeley, USA [3] Alexa Koenig, "From Man to Beast: Imprisonment and Social Death", University of California, Berkeley School of Law, University of San Francisco, August 20, 2011 [4] Nicholas A. Christakis , James H. Fowler , "Connected : The Surprising Power of Our Social Networks and How They Shape Our Lives" [5] RossanoSchifanella, Alain Barrat; CiroCattuto,BenjaminMarkines, FilippoMenczer, "Folks in Folksonomies:Social Link Prediction from Shared Metadata", arXiv:1003.2281v1 [cs.CY] 11 Mar 2010 [6] Brian Skyrms and Robin Pemantle, "A dynamic model of social network formation" , special series of Inaugural Articles by members of the National Academy of Sciences elected on April 27, 1999. [7] Linda Carotenuto, William Etienne, Michael Fontaine,Jessica Friedman, Michael Muller, Helene Newberg, Matthew Simpson, Jason Slusher, and Kenneth Stevenson, ," CommunitySpace: Toward Flexible Support for Voluntary Knowledge Communities", Lotus Institute and Lotus Research, Lotus Development Corporation, 55 Cambridge Parkway, Cambridge MA 02142 USA [8] Constance Elise Porter, "A Typology of Virtual Communities: A Multi-Disciplinary Foundation for Future Research", Journal of Computer-Mediated Communication, Volume 10, Issue 1, page 00, November 2004. [9] Joan R. Rentsch, Richard J. Klimoski, "Why do „great minds think alike?: antecedents of team member schema agreement", Journal of Organizational Behavior,Special Issue: Shared Cognition,Volume 22, Issue 2, pages 107–120, March 2001 [10] Raymond T. Sparrowe, Robert C. Liden, Sandy J. Wayne, and Maria L. Kraimer "Social networks and the performance of individuals and groups". Acad manage j april 1, 2001 44:2 316-325; [11] Catherine Dwyer, Starr Roxanne Hiltz, Katia Passerini,"Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace", Proceedings of the Thirteenth Americas Conference on Information Systems, Keystone, Colorado August 09 - 12 2007 [12] Kimberly S. Young and Robert C. Rogers. "CyberPsychology& Behavior". SPRING 1998, 1(1): 25-28. doi:10.1089/cpb.1998.1.25. This papers was presented at 2 nd International Conference on E-Education & Learning Technologies ( ICEELT 2013 ) , Singapore on May 4 – 5 , 2013 ……. Page … 97……