Professional Documents
Culture Documents
2, 2016
Editor-in-Chief Tools and Content Development, Synchronous and
Asynchronous Learning, Medical Applications, E-Learning
Prof. Jacek Stando, Lodz University of Technology, Poland Hardware and Software, AV-Communication and Multimedia,
Ontologies and Meta-Data Standards, Simulated Communities.
Editorial Board
Publisher
Ali Dehghan Tanha, University of Salford, United Kingdom Society of Digital Information and Wireless Communications
Anne Le Calv, University of Applied Sciences and Arts Miramar Tower, 132 Nathan Road, Tsim Sha Tsui, Kowloon,
Western Switzerland, Switzerland Hong Kong
Antonis Mouhtaropoulos, Metropolitan College, Greece
Anuranjan Misra, Bhagwant Institute of Technology, India Further Information
Ekaterina Pshehotskaya, InfoWatch, Russia Website: http://sdiwc.net/ijeetdm/
Eyas El-Qawasmeh, King Saud University, Saudi Arabia Email: ijeetdm@sdiwc.net
Fadhilah Ahmad, University Sultan Zainal Abidin, Malaysia Tel.: (202)-657-4603 - Inside USA
Khitam Shraim, University of California, USA 001(202)-657-4603 - Outside USA
Nazih Moubayed, Lebanese University, Lebanon
Ramadan Elaiess, University of Benghazi, Libya Permissions
Spits Warnars Harco Leslie Hendric, Bina Nusantara The International Journal of E-Learning and Educational
University, Indonesia Technologies in the Digital Media (IJEETDM) is an open access
Suphan Nasir, Istanbul University, Turkey journal which means that all content is freely available without
Waralak V. Siricharoen, University of the Thai Chamber of charge to the user or his/her institution. Users are allowed to
Commerce, Thailand read, download, copy, distribute, print, search, or link to the full
Yoshiro Imai, Kagawa University, Japan texts of the articles in this journal without asking prior
Zhan Liu, University of Applied Sciences and Arts Western permission from the publisher or the author. This is in
Switzerland (HES-SO Valais-Wallis), Switzerland accordance with the BOAI definition of open access.
Chang Tik Chan, Monash University Malaysia, Malaysia
Disclaimer
Overview Statements of fact and opinion in the articles in the
International Journal of E-Learning and Educational
The SDIWC International Journal of E-Learning and Technologies in the Digital Media (IJEETDM) are those of the
Educational Technologies in the Digital Media (IJEETDM) is a respective authors and contributors and not of the
refereed online journal designed to address the networking International Journal of E-Learning and Educational
community from both academia and industry, to discuss recent Technologies in the Digital Media (IJEETDM) or The Society of
advances in the broad and quickly-evolving fields of computer Digital Information and Wireless Communications (SDIWC).
and communication networks, technology futures, national Neither The Society of Digital Information and Wireless
policies and standards and to highlight key issues, identify Communications (SDIWC) nor the International Journal of E-
trends, and develop visions for the digital information domain. Learning and Educational Technologies in the Digital Media
(IJEETDM) make any representation, express or implied, in
In the field of Wireless communications; the topics include: respect of the accuracy of the material in this journal and
Intelligent Tutoring Systems, Security Aspects, Immersive cannot accept any legal responsibility or liability as to the errors
Learning, Computer-Aided Assessment, Collaborative Learning, or omissions that may be made. The reader should make
Errors in E-Learning-Community Building, Accessibility to his/her own evaluation as to the appropriateness or otherwise
Disabled Users, Context Dependent Learning, E-Learning of any experimental technique described.
Platforms, Portals, Mobile Learning (M-Learning), Learning
Organization, Standards and Interoperability, Virtual Labs and Copyright 2016 sdiwc.net, All Rights Reserved
Virtual Classrooms, Digital Libraries for E -Learning, Joint
Degrees, Web-based Learning, Wikis and Blogs, Authoring The issue date is April 2016.
Volume 2, No. 2
TABLE OF CONTENTS
Original Articles
37
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
the role and advantage of technologies in The higher educational sector in Ghana is
teaching and learning are acknowledged. It growing quickly in terms of technological
is admitted in practice and research that infusion in teaching and learning [9]. It is
technologies have the basic role of observed that virtually all higher educational
maximising the efficiency of human skills institutions (HEIs) in Ghana use
and competencies [5], [6]. In terms of technologies, precisely information
education, technology infusion is aimed at communications technologies (ICTs) to some
facilitating teaching, learning and the extent [11]. For instance, universities and
accomplishment of administrative activities polytechnics in Ghana have subscribed to the
[5], [6], [7]. This means that technologies are use of Public Address Systems, projectors,
deployed in an academic institution at three computers and other devices in teaching.
levels: teaching, learning and Unlike situation in the past, students and
accomplishment of administrative processes lecturers in Ghana now significantly use e-
which involve research and communication. books, e-libraries and the internet in research
According to [8], the advantage of [11]. Universities and polytechnics also use
technological infusion in an academic intranet, Microsoft office applications and
institution is a reduction in costs and the other ICTs at the administrative level [9].
accomplishment of tasks with much
flexibility, speed, convenience and ease, Though the use of ICTs in teaching and
regardless of what level of education is learning is fast growing in Ghana, research
involved. Yet, the extent to which an has made little contribution to knowledge on
institution savours a technology in this important subjects of ICTs deployment and
respect depends on the institutions dynamic use in HEIs [9]. Some of these subjects are
capabilities in using it [6], [8], where the extent of use of ICTs, challenges
dynamic capabilities in this context would associated with ICT application, cost-benefit
depend on knowledge and experience with impact of ICTs deployment and types of ICTs
the specific technologies and their uses. used. As a result, academic debate on these
subjects in a Ghanaian perspective is weak.
A research by [8] posits that many categories This hinders the productive and effective use
of technologies are deployable in an of ICTs in HEIs in Ghana [12].
academic environment. They however add
that the bulk of technologies are information This study therefore contributes to academic
systems used basically for disseminating debate and knowledge with respect to only
information across stakeholders (i.e. one of these many subjects while leaving the
university council, management, faculty, remaining subjects for future research work.
students, parents and potential students) in an In this study, the objective is to identify ICTs
academic institution. Many studies (e.g. [1], used in HEIs in Ghana. This paper also
[9], [10] etc.) have identified the computer examines the extent to which identified ICTs
and its applications, internet, intranet, mobile are used in teaching and learning in HEIs in
phones and other e-learning systems as Ghana. This paper seeks to contribute to
information systems centred on information knowledge on ICTs used in a tertiary
dissemination across institutional educational environment in Ghana and the
stakeholders. extent to which these ICTs are used. In the
next section, the objective of this paper is
presented.
38
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
researcher [18], is of the view that these of the participating HEIs. To ensure that it
sampling methods are suitable for was reliable and valid, the design of the
quantitative studies in which the researcher questionnaire was based on standard
seeks to generalise findings. The Stratified measures. It was also submitted to many
sampling was used by researchers for research experts for scrutiny and suggestions,
appropriate categorizations. Since this study ensuring that errors were duly corrected.
covered two regions of Ghana; Ashanti and Moreover, the instruments reliability
Greater Accra Regions, the stratum included coefficient was .923, which reflects a high
the HEIs in these regions. Subsequently, 10 reliability of the studys data. In total, there
HEIs were randomly selected with students was a 100% return rate for Academic
therein forming the samples. A total of 3,119 Registrars, 92.86% return rate for Faculty
students participated in this study. and 93.38% for students.
A structured and self-administered The Statistical Package for the Social
questionnaire was the main instrument used Sciences (SPSS), Version 21, with its nested
in data collection. A self-administered AMOS software was used in data analysis.
questionnaire was used because it was The hypothesis is tested using Principal
equipped with features that allowed Component Analysis (PCA). Generally, the
participants to respond at their convenient PCA was used to classify ICTs into groups
time or in the absence of the researchers. The based on the extent to which they are used in
ICTs used for learning were measured on a learning in HEIs. This statistical tool also
five-point likert scale [Strongly disagree (1); identified individual ICTs that are generally
disagree (2); not sure (0); agree (4) and used for learning in the HEIs in Ghana. This
strongly agree (5)]. In the questionnaire, the tool was used as a result of its robustness and
extent of using each ICT was also measured its specialised function of classifying
by asking respondents to score from 1 to 5 the variables. It also provides statistical estimates
extent to which they used it in the higher (called extraction values) that can be used to
educational environment. create a hierarchy of the variables in terms of
the strength of their influence. In the next
Questionnaires were administered by hand section are the results of this study.
delivery to students. An accidental approach
was used in contacting students, since no RESULTS
information on them was accessible prior to
data collection. Therefore, their response was In this section, results of the study are
instant. The researchers asked the students to presented. Firstly, results are presented with
indicate their levels before administering respect to individual ICTs used in HEIs for
questionnaires to them. This was done to learning. Secondly, components of ICTs are
ensure that questionnaires were not extracted, with each component expressing
administered to new or fresh students who the extent to which its constituent ICTs are
knew little or nothing about the use of ICTs used for learning. This assessment is done
in the HEIs. using Principal Component Analysis (PCA).
Tables 1 to 6 come with results of this
Before questionnaires were administered, statistical assessment.
formal notices were written to the authorities
41
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Table 1 shows 24 ICTs (i.e. X1, X2 X24) Table 2 shows the correlation matrix of the
used for learning in HEIs. Mobile phones (M PCA. Correlation values in bold are
= 4.10, SD = 1.27) have the highest level of significant at 5% significant level. By taking
application, followed by tablets (M = 2.70, a close look at the distribution of these
SD = 0.78) and desk top personal computer correlations, it is seen that most of them are
(M = 2.12, SD = 1.00). There is quite some significant (p < .05). This situation reflects
level of consistency (with a mean score of the fact that most of the ICTs are significantly
2.00) in the extent to which other ICTs are used among students. This situation also
used in the HEIs. In the context of PCA, the reflects the validity of the PCA. Yet, there are
strength of the correlations among the ICTs other indicators of the validity of this
is the basis of whether all the ICTs are analysis. Table 3 comes with these remaining
sufficiently used or not. Table 2 in the indicators.
Appendix shows these correlations.
Table 3. KMO & Bartletts Test of Sphericity
KMO .732
Bartlett Chi-square (Critical value) 67.321
df 78
Sig. .001
42
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Table 3 shows the KMO test and Bartletts Apparently, both conditions are satisfied.
test of sphericity. These tests indicate the Hence, the PCA is sufficiently valid. This
validity of the PCA. By principle, the KMO means that any conclusions made from
value must be .70 or more for the Component results of this PCA would be valid. Table 4
Analysis to be valid. Also, the Bartletts test shows variables (ICTs) that have been
must be significant at 5% significance level. eliminated in the PCA.
Table 4. Communalities
Variable Extraction
X1 0.897
X3 0.811
X4 0.897
X5 0.557
X6 0.557
X7 0.557
X8 0.557
X9 0.522
X10 0.601
X11 0.540
X12 0.557
X13 0.766
X14 0.621
X16 0.560
X17 0.513
X18 0.545
X19 0.578
X20 0.550
X22 0.600
X24 0.500
Table 4 shows the communalities of the could mean that the extent to which they are
Principal Component Analysis. In a single used relative to other ICTs is insignificantly
iteration, some of the ICTs are eliminated. low. In Table 4, the value corresponding to
These include X2, X15, and X21. These each variable is called an extraction, which is
variables are Tablet, Massively Open Online usually equivalent to the R2 value in linear
Courses and Scanners. This means that these regression analysis. The larger the
three ICTs are not significantly used among communality value, the higher the need to
students relative to other ICTs. In Table 1, retain its corresponding variable or ICT and
Tablet is found to have a relatively high mean the higher the extent to which the ICT is used
score, but it is removed from the list of ICTs for learning. Therefore, mobile phone, tablet,
at the level of communalities because of its desktop PC and laptop PC are the most
poor relationship with other ICTs. This commonly used ICTs in for learning in HEIs
scenario does not mean that the three ICTs of our study. Though other ICTs such as e-
removed are not used at all in learning. It libraries, e-books and e-journals are used by
43
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
students, their extent of use is low, of ICTs or variables that are most correlated.
considering the cut-off point of .50 for their While Table 4 comes with extraction values
retention. that express the extent of use of individual
ICTs retained, Table 5 comes with
The validity and strength of the PCA is components that express the extent of use of
expressed in terms of the Eigen values of a group of ICTs.
components formed. A component is a group
F1 F2 F3 F4
Eigenvalue 12.334 5.420 3.863 2.383
Variability (%) 51.391 22.582 16.098 9.930
Cumulative % 51.391 73.972 90.070 3199.000
Table 5 shows the Eigen values and 90.1% of the total variation of 100%. The
variability of all components formed. By first component accounts for 51.4% of
principle, the total variability accounted by variation, whereas the second component
components must be sufficiently large for the contributes 22.6% of the total variation. The
PCA and its model to be strong and valid. It third component accounts for 16.1% of the
can be seen that this condition is satisfied as variation. Table 6 shows the components
the first three components contribute about (ICTs) of each component.
Table 6. Components of Components
PA Systems
Scree plot
14 100
10
8 60
6 40
4
20
2
0 0
F1 F2 F3 F4
axis
X10
X3
0.2 X1
X13
X14
0
-0.2 X23
-0.4 X15 X20 X19
X18
-0.6 X21
-0.8 X12
X8
X7
X6
X5
-1 X2
-1.2 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1
F1 (51.39 %)
45
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
F3 (16.10 %)
0.4 X24 X1
X3
0.2 X7
X6
X5
X12
X8 X19
0 X21 X4 X13
-0.2 X10
X9X22
X16
-0.4
-0.6 X20
X18
-0.8 X23
-1
-1.4-1.2 -1 -0.8-0.6-0.4-0.2 0 0.2 0.4 0.6 0.8 1 1.2
F1 (51.39 %)
Figure 1 shows components extracted from In view of the above results, all ICTs are
the retained variables or ICTs. From the significantly used in learning in HEIs, except
figure, the fourth component (F4) contributes three ICTs which are tablet, massively open
a low variation (< 10%). Therefore, it has no online courses, and scanners. Moreover,
components; all the variables are shared mobile phone, desktop pc, laptop pc, e-
among the first three components. In Table 6, encyclopaedia, e-libraries, e-books and e-
F1 contributes the highest variation and journals have the highest level of use as a
therefore has components that are most group of ICTs. In the next section, findings of
largely used by relative to F2 and F3. This the study are discussed.
means that the magnitude of the variation
accounted represent the extent to which items
that make up the component are used in
DISCUSSION
learning. Figures 2 and 3 depict the
significant correlations among variables. It is According to findings, twenty-one (21) of the
expected that variables are far off from the 24 ICTs identified in the literature are
centre but are as close to each other as significantly used for learning in higher
possible. This condition is largely satisfied educational institutions in Ghana. Some of
and reflects the fact that most of the variables these ICTs are digital media, e-mail, and
are significantly correlated. In both Figures mobile phone. The identification of these
2 and 3, X2 and X5 stand far off in the ICTs in Ghana is supported by several studies
opposite direction, a reason for which they (e.g. [13], [7]. Contrary to this studys
are removed in the PCA. Also, X21 is the findings, scanners and tablets are major ICTs
closest to the centre. This indicates that this used in some developing countries [7].
variable is highly related to X2 and X15, a Moreover, tablet, massively open online
reason for which it is also removed. Figure 1 courses, and scanners have been confirmed as
shows F1 and F2 on their axes, whereas ICTs significantly used in developed country
Figure 3 shows F1 and F3 on their axes. There contexts [6]. In the literature therefore,
should have been a third chart that shows F2 massively open online courses is the only
and F3 on their axes, but this chat is relegated confirmed ICT that is not significantly used
because the needed information is already in developing country contexts. But as
expressed in Figures 2 and 3. indicated by findings, scanners, tablets and
massively open online courses are ICTs not
significantly used in HEIs in Ghana.
46
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
The PCA used in data analysis places ICTs in ICTs (e.g. digital media, video calls, wikis,
three components. The variation accounted blogs, forums, etc.) are applied in HEIs in
by each component suggests the degree to developing country contexts at a relatively
which ICTs are applied in the higher lower extent. As revealed in findings
educational environment. The higher the however, this supported evidence does not
variation accounted by a component, the mean that these third-component ICTs are
more basic its ICTs and the higher the extent not used or are not significantly used.
to which they are applied in the higher
educational environment. Hence the first Considering the operational definition of
component comes with the most commonly basic ICTs in this study, ICTs of the first
used ICTs for learning in HEIs in Ghana. component are the most basic and the most
This component accounts for the highest frequently applied technologies for learning
variation of 51.4% of the total variation of in HEIs in Ghana, followed by ICTs in the
100%. Its items are mobile phone, desktop second and third components, in that order.
PC, laptop PC, e-encyclopaedia, e-libraries, Since the use of PCA in this context is scarce
e-books and e-journals. While some studies in the literature, future researchers would
(e.g. [1], [6]) identified these ICTs as basic have to conduct related studies using PCA to
educational technologies in developed buttress or disprove this studys evidences.
countries, no study could identify them as a
component in the context of PCA neither in
developed countries nor developing CONCLUSION AND
countries. Since the PCA is a more robust RECOMMENDATIONS
statistical tool in the context in which it is
used in this study [16], this study better Out of 24 ICTs, 21 are significantly used for
reveals the most basic ICTs used in HEIs. learning in higher educational institutions.
The ICTs significantly used are found in
In essence, mobile phone, desktop PC, laptop Table 6. Some of these ICTs are digital
PC, e-encyclopaedia, e-libraries, e-books and media, e-mail, and mobile phone. The three
e-journals have the highest extent of ICTs not significantly used are tablet,
application in HEIs in Ghana. Nonetheless, massively open online courses and scanners.
some other ICTs are significantly applied, In essence, these three ICTs are not often
and these ICTs constitute the second and used for learning in HEIs in Ghana. Of all the
third components extracted in the PCA. The 21 ICTs used for learning, the most
second component contributes 22.6% of the significantly used are mobile phone and
total variation and contains the second most laptop PC. Also, the least used ICT among
frequently used ICTs for learning in HEIs. the 21 ICTs retrieved is PA systems.
The third component accounts for 16.1% of
the variation. The variations accounted The ICTs retrieved are placed in three
express the extent to which ICTs in each components. The first component comes with
component are used in HEIs in Ghana. This the most commonly used ICTs for learning in
implies that items of the third component (i.e. our studys HEIs. This component accounts
digital media, video calls, wikis, blogs, for the highest variation of 51.4% of the total
forums, and social media, etc.) have the least variation of 100%. The second component
frequency of application in HEIs in Ghana. In contributes 22.6% of the total variation and
agreement, [7], [13] found that most of these contains the second most frequently used
47
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
ICTs for learning in HEIs. The third not reached the stage where they can run
component accounts for 16.1% of the massively open online courses. The removal
variation. The three components contribute of scanners and tablets in the PCA could be
about 90.1% of the total variation of 100%. as a result of their low level of application.
Tablets are really seldom used in HEIs as a
The first component is made up of ICTs such result of their high cost, while scanners have
as mobile phone, desktop PC, laptop PC, e- unpopular uses.
encyclopaedia, e-libraries, e-books and e-
journals. The fact that this component It is therefore recommended that HEIs in
accounts for the highest variation implies that Ghana focus on deploying the ICTs retained
its ICTs are basically relevant to learning in in the PCA, especially those in the first
HEIs. The second component is made up of component. This is because the use of these
ICTs such as e-mail, search engine, online ICTs yields higher effectiveness in the face
data storage, learning management systems, of the financial capability of HEIs and the
Microsoft office suite, and course specific ability of students, administrators and
software. The third component is made up of lecturers to use ICTs.
digital media, video calls, wikis, blogs &
forums, social media, projector, printers, lab
instruments, and pa systems. Thus the third
LIMITATIONS AND SUGGESTIONS
component contains ICTs that are least used
FOR FUTURE RESEARCH
for learning in HEIs.
This study could not provide a distinction
It is therefore concluded that a majority of the
between ICTs used in learning and ICTs used
ICTs are significantly used for learning in
in teaching. Invariably, the study provides no
HEIs. However, the extent of use of the ICTs
specific evidence regarding ICTs used by
is not the same. Some ICTs such as mobile
lecturers in teaching, research, learning and
phone, desktop PC, laptop PC, e-
student assessment, and ICTs used by
encyclopaedia, e-libraries, e-books and e-
students in learning. Thus this study only
journals are more frequently used. Hence,
provides evidence on the list of ICTs used for
mobile phone, desktop PC, laptop PC, e-
learning in a HEI environment in Ghana. This
encyclopaedia, e-libraries, e-books and e-
study could also not classify ICTs in terms of
journals are some of the basic ICTs which
which of them are best used for learning.
HEIs can effectively deploy in the early
stages of their ICTs deployment in a Future research must therefore address these
developing country context. limitations of the study. In this respect, the
ICTs must be identified on the basis of
Though ICTs such as PA systems, printers
lecturers learning, research, teaching and
and others are in the second and third
student assessment, as well as students
components, they are also among basic ICTs
learning and research. The ICTs must also be
used by HEIs, except those removed in the
classified in terms of those more suitable for
PCA such as massively open online courses.
teaching and those more suitable for learning.
This suggests that some HEIs in Ghana have
48
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
[5] Obuobi, D., Richards, D., Watts, A.K. (2006). [14] Herselman, M.E., Hay, H.R., (2003). Challenges
Applying Information Technology to Improve Posed by Information and Communication
Teaching and Learning in an African University, Technologies (ICT) for South African Higher
36th ASEE/IEEE Frontiers in Education Education Institutions, Informing Science, pp. 934-
Conference, 28-31 October, San Diego, CA. pp. 1-5. 943.
[6] Bhasin, B. (2012). Integration of Information and [15] Mbodila, M., Jones, T., Muhandji, K. (2013).
Communication Technologies in Enhancing Integration of ICT in Education: Key Challenges,
Teaching and Learning, Contemporary Educational International Journal of Emerging Technology and
Technology, 3 (2), 130-140. Advanced Engineering, 3 (11): 515-520.
[7] Aguele, L.I. (2012). Information and [16] Suhr, D.D., (1999). Principal Component Analysis
Communication Technology in Universities in vs. Exploratory Factor Analysis, University of
Nigeria: Challenges for Teaching and Learning, pp. Northern Colorado, Paper 203-230, pp. 1-11.
175-184.
[17] Ringner, M. (2008). What is principal component
[8] Keong, C.C., Horani, S., Daniel, J. (2005). A Study analysis? Nature Biotechnology, 26 (3): 303-304.
on the Use of ICT in Mathematics Teaching,
Malaysian Online Journal of Instructional [18] Creswell, J.W. (2003). Research Design Qualitative,
Technology (MOJIT), 2 (3): 43-51. Quantitative and Mixed Methods Approaches,
Second Education, SAGE Publications, International
[9] Agyei, D. D., Voogt, J. (2010). ICT use in the Educational and Professional Publisher, pp. 3-15.
teaching of mathematics: Implications for
professional development of pre-service teachers in [19] Krejcie, R. V., Morgan, D. W. (1970). Determining
Ghana, Information Technology Education, pp. 2-17. sample size for research activities, Educational and
Psychological Measurement, 30: 232-256.
[10] Dal, D., znacar, B. (2013). Problems Faced By
Information Technology Teachers in Schools at
High School Level and Solutions to Such Problems,
The Online Journal of New Horizons in Education, 2
(4):14-20.
49
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
APPENDIX
X1 X2 X3 X4 X5 X6 X7 X8 X9 X10 X11 X12 X13 X14 X15 X16 X17 X18 X19 X20 X21 X22 X23 X24
X1 1.00 -0.16 0.99 0.89 0.65 0.65 0.65 0.65 0.54 0.88 0.70 0.65 0.93 0.93 -0.21 0.55 0.59 0.24 0.87 0.28 0.20 0.79 0.08 0.65
-
X2 -0.16 1.00 -0.32 -0.59 0.42 0.42 0.42 0.42 -0.48 -0.55 -0.27 0.42 -0.30 0.12 0.77 -0.73 -0.37 -0.16 0.00 -0.10 0.43 -0.64 -0.34
0.16
X3 0.99 -0.32 1.00 0.95 0.56 0.56 0.56 0.56 0.59 0.93 0.71 0.56 0.95 0.87 -0.33 0.64 0.62 0.27 0.84 0.29 0.13 0.87 0.14 0.64
X4 0.89 -0.59 0.95 1.00 0.40 0.40 0.40 0.40 0.66 0.99 0.62 0.40 0.92 0.68 -0.59 0.78 0.56 0.36 0.76 0.36 0.00 0.97 0.31 0.55
X5 0.65 0.42 0.56 0.40 1.00 1.00 1.00 1.00 0.18 0.48 0.04 1.00 0.66 0.62 -0.06 0.03 -0.17 0.52 0.90 0.56 0.53 0.41 0.30 0.17
X6 0.65 0.42 0.56 0.40 1.00 1.00 1.00 1.00 0.18 0.48 0.04 1.00 0.66 0.62 -0.06 0.03 -0.17 0.52 0.90 0.56 0.53 0.41 0.30 0.17
X7 0.65 0.42 0.56 0.40 1.00 1.00 1.00 1.00 0.18 0.48 0.04 1.00 0.66 0.62 -0.06 0.03 -0.17 0.52 0.90 0.56 0.53 0.41 0.30 0.17
X8 0.65 0.42 0.56 0.40 1.00 1.00 1.00 1.00 0.18 0.48 0.04 1.00 0.66 0.62 -0.06 0.03 -0.17 0.52 0.90 0.56 0.53 0.41 0.30 0.17
X9 0.54 -0.48 0.59 0.66 0.18 0.18 0.18 0.18 1.00 0.65 0.66 0.18 0.74 0.44 -0.30 0.94 0.49 0.65 0.45 0.67 0.55 0.65 0.63 0.82
X10 0.88 -0.55 0.93 0.99 0.48 0.48 0.48 0.48 0.65 1.00 0.52 0.48 0.94 0.64 -0.65 0.76 0.45 0.46 0.82 0.46 0.05 0.99 0.40 0.48
X11 0.70 -0.27 0.71 0.62 0.04 0.04 0.04 0.04 0.66 0.52 1.00 0.04 0.61 0.77 0.16 0.65 0.96 -0.08 0.30 -0.03 0.20 0.44 -0.17 0.93
X12 0.65 0.42 0.56 0.40 1.00 1.00 1.00 1.00 0.18 0.48 0.04 1.00 0.66 0.62 -0.06 0.03 -0.17 0.52 0.90 0.56 0.53 0.41 0.30 0.17
X13 0.93 -0.30 0.95 0.92 0.66 0.66 0.66 0.66 0.74 0.94 0.61 0.66 1.00 0.79 -0.41 0.74 0.45 0.56 0.90 0.59 0.37 0.89 0.43 0.66
X14 0.93 0.12 0.87 0.68 0.62 0.62 0.62 0.62 0.44 0.64 0.77 0.62 0.79 1.00 0.16 0.37 0.66 0.06 0.74 0.13 0.33 0.52 -0.15 0.74
- - - - -
X15 -0.21 0.77 -0.33 -0.59 -0.30 -0.65 0.16 -0.41 0.16 1.00 -0.53 0.14 -0.50 -0.36 -0.43 0.32 -0.75 -0.62 0.19
0.06 0.06 0.06 0.06 0.06
X16 0.55 -0.73 0.64 0.78 0.03 0.03 0.03 0.03 0.94 0.76 0.65 0.03 0.74 0.37 -0.53 1.00 0.55 0.54 0.41 0.54 0.24 0.79 0.57 0.71
- - - - - -
X17 0.59 -0.37 0.62 0.56 0.49 0.45 0.96 0.45 0.66 0.14 0.55 1.00 -0.32 0.12 -0.28 0.38 -0.35 0.80
0.17 0.17 0.17 0.17 0.17 0.08
X18 0.24 -0.16 0.27 0.36 0.52 0.52 0.52 0.52 0.65 0.46 -0.08 0.52 0.56 0.06 -0.50 0.54 -0.32 1.00 0.56 1.00 0.65 0.51 0.97 0.21
X19 0.87 0.00 0.84 0.76 0.90 0.90 0.90 0.90 0.45 0.82 0.30 0.90 0.90 0.74 -0.36 0.41 0.12 0.56 1.00 0.59 0.37 0.77 0.39 0.36
X20 0.28 -0.10 0.29 0.36 0.56 0.56 0.56 0.56 0.67 0.46 -0.03 0.56 0.59 0.13 -0.43 0.54 -0.28 1.00 0.59 1.00 0.71 0.49 0.94 0.26
X21 0.20 0.43 0.13 0.00 0.53 0.53 0.53 0.53 0.55 0.05 0.20 0.53 0.37 0.33 0.32 0.24 -0.08 0.65 0.37 0.71 1.00 0.00 0.50 0.53
X22 0.79 -0.64 0.87 0.97 0.41 0.41 0.41 0.41 0.65 0.99 0.44 0.41 0.89 0.52 -0.75 0.79 0.38 0.51 0.77 0.49 0.00 1.00 0.48 0.41
-
X23 0.08 -0.34 0.14 0.31 0.30 0.30 0.30 0.30 0.63 0.40 -0.17 0.30 0.43 -0.62 0.57 -0.35 0.97 0.39 0.94 0.50 0.48 1.00 0.10
0.15
X24 0.65 -0.16 0.64 0.55 0.17 0.17 0.17 0.17 0.82 0.48 0.93 0.17 0.66 0.74 0.19 0.71 0.80 0.21 0.36 0.26 0.53 0.41 0.10 1.00
50
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2):37-51
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
51
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
ABSTRACT
In this paper, we propose a system which simulates interior, to expand the AR objects of the
seamlessly transfer between interior and exterior by house, the user touch the virtual icon for expansion
expanding and shrinking AR object of the building. of AR object with users index finger. Thereby, the
Thereby, the proposed system simulates user is able to see the inside the AR objects of the
environment around buildings and placement of a house. As interior simulation, the user simulates the
furniture by integrating an interior simulation placement and the movement of the interior objects
system and an exterior simulation system. such as a chair and the desk by pinching. Figure 2
Furthermore, we implement the construction of the shows the configuration of the proposed system.
intuitive synthetic system of the interior and The proposed system consists of PC, Web camera,
exterior in a building by using AR. Leap Motion Controller [5] and markers. PC
obtains images from a Web camera in real time.
2 THE PROPOSED SYSTEM The proposed system detects markers in obtained
images and calculates 3-dimensional positions and
2.1 Configuration of the Proposed System postures of objects based on the detected marker.
The proposed systems makes the detected marker
In this paper, we develop the intuitive and seamless the standard coordinate in the virtual space.
synthetic simulation system of the building by Thereby, the proposed system matches the
using AR. Figure1 shows the overview of the viewpoint of the virtual space with the viewpoint of
proposed system. The proposed system seamlessly the real space.
transfers between interior and exterior by
expanding and shrinking AR object of the building. 2.2 Flow of the Proposed System
Thereby, the proposed system simulates
environment around buildings and placement of a In this section, we describe about the proposed
furniture by integrating an interior simulation system based on its processing flow shown in figure
system and an exterior simulation system. 3. Firstly, to operate AR objects, the proposed
Furthermore, we develop the construction of the system obtains 3-dimensional positions of
intuitive synthetic system of the interior and fingertips by using Leap Motion Controller and
exterior in a building by using AR. As exterior
simulation, the user simulates the placement and
the movement of the exterior objects such as houses
and the miscellaneous small trees, and simulates the
appearance of the house by changing a roof and the
wall paper of the house. In case that the user
Figure 2. Configuration of the proposed system Figure 3. Flow of the proposed system
53
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
t1 t
(a) (b) (c)
Figure 4. Each coordinates Figure 5. Calculation the angle of rotation of the hand
54
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
2.4.1 Calculation of the Rotation Angle and 3-dimentional position of the tips of the first
To rotate the object by operation of user, the finger, respectively. Secondly, the proposed system
proposed system calculates the rotation angle of the calculates distance c between the target object with
hand of user. Figure 5 shows outline in calculation the fingertip of the thumbs by using
of the rotation angle of the hand. Firstly, as shown
in figure 5-(a), the proposed system calculates a 3-
2 2 2
dimensional vector a from 3-dimensional position (1 ) + (1 ) + (1 ) . (4)
of the center of the palm Wp to 3-dimensional
position of the tip of the thumb Fp when the time is Where, , and are 3-dimentional
t-1. Secondly, as shown in figure5-(b), the proposed coordinates of the object, respectively. Thirdly, the
system calculates a 3-dimensional vector a from 3- proposed system calculates distance d between the
dimensional position of the center of the palm Wp target object with the fingertip of the first finger by
to 3-dimensional position of the tip of the thumb using
Fp. When the time is t. Finally, to calculate the
rotation angle of the hand, the proposed system
converts 3-dimensional vectors a and a into 2- 2 2
(2 ) + (2 ) + (2 ) .
2
(5)
dimensional vectors A of a X-Y plane and A
respectively and calculates the rotation angle of
the hand by using Finally, the proposed method judges that user
pinches the target object, if these distances satisfy
= sin ||| |. (2)
Figure 6. Judgement of the pinching objects Figure 7. Example of the pinching objects
55
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Figure 8. Judgement of the touching icon Figure 9. An example of the occlusion problem
56
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
3.2 Discussion
57
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 52-58
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
REFERENCES
1. Nao Hasimoto, Introduction to ARToolKit augmented
reality programming, ASCII, Media Work, 2008
2. Koichi Kato, Mark Billinghurst, Ivan Poupyrev, Shinji
Tetuya, Keihachiro Tachibana, Tangible Interface
using the augmented reality , The Journal of the Society
for Art and Sciences, Vol. 1, No. 2, pp. 97-104, 2002
3. Tomoki Tanaka, Takuma Nakabayashi, Keita Kato,
Gakuto Hirasawa, Evaluation to the AR interior
simulator which unfolded to Web application,
Architectural Institute of Japan, Vol. 79, No. 698, pp.
1063-1069, 2014
4. Takuma Nakabayashi, Keita Kato, Gakuto
Hirasawa, Development of the tool for building designs
using augmented reality and the model Architectural
Institute of Japan, Vol. 17, No. 37, pp. 1053-1056, 2014
58
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
59
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
60
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Table 1. Bloom's taxonomy programming the data and using abstraction, generate
Category Interpret in programming
knowledge models through the data exploration.
retrieving relevant Knowledge from long-term
memory
3.1 Tasks and Mining Techniques
Remember - identifying a particular construct in a piece of
code;
- recognizing the implementation of a subject
According Pimentel and Omar [12], data mining
area concept. tasks are defined as certain classes of problems
constructing meaning from instructional according to the type of knowledge to be mined
messages, including oral, written, and graphical
communications.
and the desired goals for the solution. Since the
choice of mining technique and algorithm to be
Understand
- translating an algorithm from one form of used depends on the task to be executed.
representation to another form;
So, considering the objective of the study,
- explaining a concept or an algorithm or design
pattern describes the following task grouping or
carrying out or using a procedure in a given clustering highlighting the partitioning
situation. technique and k-means algorithm based on [13],
- that the process and algorithm or design [14].
Apply
pattern is known to the learner and both are
applied to a problem that is familiar, but that has 3.1.1 Clustering
not been solved previously in the same context
or with the same data or with the same tools;
breaking material into its constituent parts and Clustering has proposed to identify and approach
determining how the parts relate to one the similar records. Cluster is defined as a
another and to an overall structure or purpose. collection of similar records with each other but
Analyze
- breaking a programming task into its different from other records in other clusters.
component parts (classes, components, etc.); So, considering that the purpose of this study is
- organizing component parts to achieve an to form homogeneous clusters of learners, the
overall objective;
making judgments based on criteria and
clustering task has been chosen.
standards. Among the existing techniques, the partitioning
implement this type of task being the K-means
Evaluate - determining whether a piece of code satisfies
the requirements through defining an
algorithm the best known. The algorithm divides
appropriate testing strategy; the data set provided in clusters, requiring
putting elements together to form a coherent or
initially set the number of clusters to be created
functional whole; reorganizing elements into a for him. This number is set to K, the K-means
new pattern or structure. behalf reason.
Create
- coming up with a new alternative algorithm or
hypothesizing that a new combination of 3.2 Educational Data Mining
algorithms will solve a problem;
Data mining techniques can be applied to a
3 DATA MINING variety of decision-making contexts such as
telephony, marketing, finance, health and
The term Data mining defines the automated education, the focus of the work.
process of capture and analysis of large data sets Siemens and Baker [15] states that given the
to extract a meaning, being used both to describe large amount of data on students, educational
characteristics of the past as to predict trends for institutions show is traditionally inefficient in
the future [10]. the use of these data, in most cases, making
According to Fayyad et al. [11] the process analysis with serious delays, delaying actions
involves the application of specific algorithms and preventing possible interventions.
that extract patterns from the data. Moreover, it In this context, it creates an environment in
is one step in a larger process known as which new approaches are needed to discover,
Knowledge Discovery in Databases, KDD. understand and properly apply the valuable
Thus, with regard to the processing of information that exist within these data.
knowledge, their role is to apply algorithms on
61
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
In his research, Baker and Carvalho [16] in data collected through performance
reported that the mining educational data (EDM) evaluations.
starts more significantly in 2005 in Pittsburgh, Therefore, it is observed that, in this universe,
USA, with the first Workshop on Educational you can still get a lot of information that will
Data Mining, as part of the 20th National enable better decision making with regard to
Conference on Artificial Intelligence (AAAI educational programming.
2005), with sequels in 2006 and 2007. In 2008
launches in Montreal, Canada, the first 5 CASE STUDY
conference in EDM: First International
conference on Educational Data Mining, which In order, to obtain the data necessary to
turned out to settle down and earn an annual understand more precisely on the assimilation of
basis. The following year sees the launch of the knowledge and learning difficulties, by grouping
first volume of the specialized journal, JEDM students that have similarities in these aspects,
(Journal of Educational Data Mining) and in using data mining techniques applied lists of
2011 constituted a scientific society for EDM exercises questions created and / or adapted
(International Educational Data Mining according to the levels of the revised Bloom's
Society). Taxonomy [6], [8], [17] Technical course in
According to Baker and Carvalho [16], the Computer classes an educational institution.
educational data mining is an area of research
that has focused primarily on the development of 5.1 The Research Environment
methods to explore data sets collected in
educational settings. The study was conducted in a private educational
Thus, it is possible to obtain information that institution, with 40 students aged between 16
helped understand more effectively the various and 17, who joined on 2014 at the Technical
aspects of the learning processes as well as course in Computer Science with practical
improve the environment and methods of this emphasis in programming, analysis and
process as development of instructional development of systems for the discipline of
materials, monitoring and forecasting, among Logic programming.
others. By process of selection of the institution, the
4 RELATED WORK group of students was divided into two classes in
different shifts. Thus, 23 students in the morning
Between the significant research linking shift and 17 in the afternoon shift.
cognitive levels of Bloom's revised taxonomy The environmental choice made by the history of
and programming education, as [8], [17] which the institution with a high rate of low-income
discuss how each of the categories of taxonomy students in programming courses and a
can be interpreted and used in evaluation significant number of failures and evasions in the
program aiming to bring help in activities related course of Computer Technician.
to educational practices. Moreover, classes are composed of students who
Another relevant study [18], as he sought to did not have any contact with the computational
build the Three-phase method for teaching- logic or with a programming language. Thus, in
learning (MTEA) applied in educational the initial phase of the course, there are the
programming based on the taxonomy of Bloom greatest difficulties for students, it is the moment
[5], according to the cognitive and affective in which these get to know the concepts related
domain and applied by programming technique to development programs based on algorithms.
in doubles. In this context, it began the data collection
In [12] and [19] presented a model for the process for the construction of this work as
application of data mining techniques, using described below.
standard extraction algorithms, in order to
discover knowledge about a learner or a group,
62
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
63
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
64
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
65
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
66
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Presented the INCOR label on the issues. Even presenting the label COR on issues,
Highlighted the question of Understand level especially in Remember level of Bloom's
(Q2), which presented a program with an taxonomy, they were observed by the options
empty section (IF condition) and asked that chosen on the issues, difficulties in
among the options offered, the student chose differentiating the functioning of the
the one that best completed the code. structures used. Mainly between WHILE and
Observed great difficulties regarding the DO/WHILE commands.
operation of conditional structures At level Create, it was realized that the
(Understand level) and the differences solutions created not completely solved the
between the logical operators AND / OR. problem situations proposed. In some cases,
the codes presented consistent but not bring
Thus, it analyzing the information, it is observed the solution.
that the class 2 continued with difficulty with the
use of logical operators. Moreover, the level b) Cluster 1
Understanding was one in which the students With 205 events were grouped in this cluster, the
found most difficult. students (52%) with the following:
The "D" concept (bad) was obtained by the
Comparing the two results, the morning class students in applied evaluations. Highlighting
continued to show poor performance. In the S3 session, with the focus on learning the
addition, the two had problems in IF/ELSE structures using the algorithm.
structure, the Evaluate level (class 2) and another Presented the INCOR label on the issues,
in Remember (class 1). especially at the level Understanding. It (Q4)
was asked the student's understanding of a
Tables 7 and 8 show the results obtained from piece of code using the WHILE command. In
the data obtained in the sections relating to the addition, it identified little understanding
content Loop (while, do/while, for) in the about the functioning of loop structures
analyzed classes. (input and output conditions), confusion
increments and decrement, and failures in the
Table 7. Clustering in class 1 (Loop) Create level.
Cluster#
Attribute Full Data 0 1 2
c) Cluster 2
(506) (179) (205) (122)
With 122 events were grouped in this cluster, the
IdStudent AM1 AM21 AM17 AM5 students (17%) that have reached the concept
IdSession S3 S3 S3 S9 "B" (good) in the assessments and obtained the
IdQuestion Q1 Q2 Q4 Q5 label COR on issues, especially the Apply level.
CognLevel APP REM UND APP In addition, students did not have difficulties in
ResultQuest C D B C
AnswerQuest INCOR COR INCOR COR
large proportions on the subject studied.
ConceptAss D D D B
Checking the data, you can see that in general,
Analyzing the data from Table 7 above and other the group presented a poor performance,
results provided by WEKA tool was noted that: especially at the Understand level of Bloom's
Taxonomy that required to understand the
a) Cluster 0 functioning of repetitions structures. Also, if
With 179 events were grouped in this cluster the realized, problems related to increments and
students (30%) with the following: decrements in the present codes and problems in
The "D" concept (bad) was obtained by the construction solutions using commands.
students in applied evaluations. Highlighting
the S3 session, with the focus on learning the
structures using the algorithm.
67
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Table 8. Clustering in class 2 (Loop) session, the categorized question at this level
Cluster# (Q9), required to solve a problem
Attribute Full Data 0 1 2 contextualized the solution using one of
(374) (165) (107) (102) repeating structures seen in the classroom.
IdStudent AV1 AV6 AV7 AV12
Little understanding of the operation and use
IdSession S3 S3 S9 S3 (Create level) of repeating structures.
IdQuestion Q1 Q7 Q4 Q9
CognLevel APP APP UND CRE Thus, despite the class 2 income, it was noticed
ResultQuest C C B X that the students had difficulty understanding
AnswerQuest INCOR INCOR COR INCOR
ConceptAss D B C D
and, above all, to apply the concepts of the repeat
commands, especially increments and
Analyzing data of Table 8 above and other decrements associated with the operation of the
results provided by WEKA tool was noted that: loops.
68
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
At Create level, it was realized that some of Table 10. Clustering in class 2 (Arrays)
Cluster#
the solutions created not completely solved
the problem situations proposed. Attribute Full Data 0 1 2
(561) (291) (194) (76)
69
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
70
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
a) Cluster 0 7 CONCLUSIONS
In this cluster, with 116 occurrences, the
students (59%) were grouped that presented the The results show that learning assessments can
following points: generate important data about the process of
The concept of "D" (bad) in the assessments teaching and learning, especially when directed
(S6 session). by a taxonomy of educational objectives, this
The issues reached labeled "INCOR" on, work, Bloom's taxonomy.
especially at the Evaluate level the Also, confirm that the application of clustering
Taxonomy. techniques are quite useful for the formation of
Difficulties in understanding and application homogeneous clusters of learners. Once
of concepts learned about subroutines. identified, these groups allow the teacher to
At Create level, most students did not formulate most effective teaching strategies that
propose solutions to the problems posed. it will act according to the real needs of students,
especially those with learning disabilities.
b) Cluster 1 In the study it was possible to identify, for
76 events were grouped in this cluster, the example, in general, the students presented
students (35%) showing the following: major problems in the Create level. I.e.
Despite reaching the label COR on issues, difficulties in building solutions with the
presented the concept "C" (median) in the concepts presented, satisfying the problem
assessments (S12 session). situations proposed.
As for the learning of Conditional structures if
Difficulties in Remember level Bloom's
identified problems, especially in the IF/ELSE
Taxonomy and creating solutions using
structure. This situation is aggravated when the
subroutines (Create level).
problems required the knowledge of logical
operators AND and OR.
c) Cluster 2
In addition, it was noted that in some content,
46 events were grouped in this cluster, the
especially Loops and Arrays, students had little
students (6%) showing the following features:
understanding (level Understand) in the
Students hit the "D" concept (bad) in the
declaration and functioning of the structures.
assessments (S6 session) and reached the
Loops on the topic, there is confusion with the
INCOR label on the issues.
conditions for entry and exit and the action of
Great difficulty levels Remember and increment / decrement in the structures. In the
Understand of Bloom's Taxonomy. In the topical arrays, 2D arrays stands out with the use
first, the question required the student to of loops (rows and columns).
remember the sub concepts and the A fact to be noted is that, since the student finds
difference between procedures and function. it difficult in the early levels of the taxonomy it
In the second, an incomplete portion of reflects the other levels. Loops and Arrays
which called the option that correctly observed this fact.
completed the code. Another fact to note is the poor performance of
students in Arrays and Subroutines topics,
Thus, it is observed that the class 2 had some reflecting the difficulties do not identified and it
significant learning about the topic under study do not addressed in a timely manner. In some
(stanzas). Mainly evaluate solutions using the clusters, it was perceived difficulties at all levels
concepts seen in the classroom. of the taxonomy and on topic Subroutines, much
was not able to build solutions using the
Analyzing the information obtained from concepts.
classes, it is clear that in both there was a real The results also brought questions such as the
learning stanzas. Regardless of the context, or fact that students of class 2, which runs in the
example used, students could not understand the afternoon shift, with the same teacher and the
usefulness of the concept of subroutines. same classroom, deliver better results compared
71
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 59-72
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
to the class 1, which works in the evening shift. [8] WHALLEY, J. L; LISTER, R.; THOMPSON, E.;
CLEAR, T.; ROBBINS, P.; KUMAR, P. K. A;
Perhaps the shift factor can be analyzed within PRASAD, C.An Australasian Study of Reading and
the context of this work. Comprehension Skills in Novice Programmers, using
the Bloom and SOLO Taxonomies, In: VIII
The exercise lists drawn up this work, proved a Australasian Computing Education Conference
valid assessment tool that will enable other (ACE2006), Computer Society, pp. 243-252, 2006.
teachers, suffering adjustments in some cases, [9] THOMPSON, E.; REILLY, A. L.; WHALLEY, J.;
can better visualize the learning of students in HU, M.; ROBBINS, P.Blooms taxonomy for CS
assessment, In: X Australasian Computing
classes in which they operate. Education Conference - ACE, Australian Computer
However, it is expected that with the results Society,pp. 155-161, 2008.
shown, teaching strategies are built to enhance
[10] SFERRA, H. H. and CORREA, . M. C. J. Conceitos
the learning of programming students. As for the e aplicaes de Data Mining .Revista Cincia &
problem with the mathematical operations Tecnologia, pp. 19 -34, jul/dez, 2003.
presented at the beginning of the programming
[11] FAYYAD, U.; PIATETSKY-SHAPIRO, G.;
discipline, start classes with a math review with SMYTH, P. From Data Mining to Knowlegde
problems involving the subjects that it will be discovery. American Association for Artificial
Intelligence.1996.
needed later.
As future work, we intend to conduct deeper [12] PIMENTEL. E. P. and OMAR, N. Descobrindo
analysis on the data found by analyzing other Conhecimentos em Dados de Avaliao da
Aprendizagem com Tcnicas de Minerao de Dados.
points of view and work on a system that In: XII Workshop de Informtica na Escola, 2006,
provides a faster, more specific feedback for Campo Grande, MS. Anais do XXVI CSBC, 2006.
both teachers, and for the students
[13] CAMILO, C. O. and SILVA, J. C.; Minerao de
Dados: conceitos, tarefas, mtodos e ferramentas.
REFERENCES Goinia: Instituto de Informtica/UFG, 2009.
[1] SILVA, I. F. A.; SILVA, I. M. M. S; SANTOS, M. S. [14] WITTEN, I. H. and FRANK, E. . Data Mining:
Practical Machine Learning Tools and Techniques.
Anlise de problemas e solues aplicadas ao ensino 2nd edition,Morgan Kaufmann Publishers, San
de disciplinas introdutrias de programao. Francisco, CA, 2005.
Universidade Federal Rural de Pernambuco, Recife
PE. 03 p. 2009. [15] SIEMENS, G. and BAKER, R. S. J. D. Learning
analytics and educational data mining: towards
[2] JUNIOR, M. C. R. Como Ensinar Programao? communication and collaboration. In:
Informtica Boletim Informativo, Canoas, RS, v.1, INTERNATIONAL CONFERENCE ON
n.1, 2002. LEARNING ANALYTICS AND KNOWLEDGE, 2.,
2012, New York, NY, USA. Proceedings... ACM,
2012. p. 252254.
[3] BORGES, M. Avaliao de uma metodologia
alternativa para a aprendizagem de programao. In:
WORKSHOP DE EDUCAO EM [16] BAKER, R. S. J and CARVALHO, A. M. J. B, A.
COMPUTAO WEI, 8., 2000. Curitiba. Anais... Minerao de Dados Educacionais: Oportunidades
Curitiba, [s.n.], 2000. para o Brasil. Revista Brasileira de Informtica na
Educao, [s.l.] v. 19, n.2, pp. 3-13, 2011.
[4] RAABE, A. L. A. and SILVA, J. M. C. Um Ambiente
para Atendimento as Dificuldades de Aprendizagem [17] JESUS, E. A. and RAABE A. L. A. Interpretaes da
de Algoritmos. In Anais do XXV Congresso da Taxonomia de Bloom no Contexto da Programao
Sociedade Brasileira de Computao: XIII Workshop Introdutria. In: SIMPSIO BRASILEIRO DE
sobre Educao em Computao. So Leopoldo: INFORMTICA NA EDUCAO, 20., 2009. Ford.
Brasil, pp. 2326-2337, 2005. Anais...2009.
[5] BLOOM, B. S. (Ed.).Taxonomy of educational [18] FARIA, E.S.J. Mtodo trifsico de ensino-
objectives, Handbook 1: Cognitive domain. New aprendizagem baseado na taxionomia de objetivos
York: David McKay, 1956. educacionais de Bloom: uma aplicao no ensino de
programao de computadores. 2010. 453 f. Tese
(Doutorado em Engenharia Eltrica) - Faculdade de
[6] ANDERSON, L. W. and KRATHWOHL, D. R. Engenharia Eltrica, Universidade Federal de
(Ed.).A taxonomy for learning, teaching, and Uberlndia, 2010.
assessing: a revision of Blooms taxonomy of
educational objectives. New York: Addison Wesley
Longman, 2001. [19] FRANA, R. S. and AMARAL, H. J. C. Minerao
de Dados na Identificao de Grupos de Estudantes
com Dificuldades de Aprendizagem no Ensino de
[7] KRATHWOHL, D R. A revision of bloom's Programao. RENOTE-Revista Novas Tecnologias
taxonomy: an overview. Theory into Practice, [s.l.], n. na Educao, Porto Alegre v. 11, n.1,
41, v. 4, pp. 212-218, 2002. CINTED/UFRGS., 2013.
72
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
Tahir Ejaz, Hamood Ur Rahman, Adnan Masood, Tahir Zaidi, Muhammad Naveed
National University of Sciences and Technology (NUST),
Islamabad, Pakistan.
tahir.ejaz@ceme.nust.edu.pk, hamood@ceme.nust.edu.pk, am34029@yahoo.com,
tahirzaidi@ceme.nust.edu.pk, naveednust@gmail.com
73
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
74
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
R 20 T 9 4.116 6735.57
R 20 T 10 4.182 7045.48
R 20 T 11 4.128 6949.44
R 20 T 12 4.132 6868.36
R 30 T 7 3.557 12419.37
R 30 T 8 3.548 11910.12
R 30 T 9 3.551 11856.09
R 30 T 10 3.567 11720.68
R 30 T 11 3.551 11793.08
R 30 T 12 3.554 12266.15
5 MODELING
76
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
77
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
78
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 73-79
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
17. S. O. Nelson. Dielectric properties measurement 25. M. Mehdizadeh and T. K. Ishii, Electromagnetic field
techniques and applications. Transactions of the analysis and calculation of the resonance
ASAE, vol. 42, no. 2, pp. 523-529, 1999. characteristics of the loop-gap resonator, IEEE
18. C. A. Balanis, Advanced engineering Transactions on Microwave Theory and Techniques,
electromagnetics. vol. 20, New York: Wiley, 1989, vol. 37, no. 7, pp. 1113-1118, Jul. 1989.
pp. 41-48. 26. T. Ejaz, H. U. Rahman, T. Zaidi, T. Tauqeer, and A.
19. A Guide to the Characterisation of Dielectic Materials A. Shah, Analysis, simulation and experimental
at RF and Microwave Frequencies. Institute of verification of split-ring resonator, Microwave and
Measurement and Control, 2003. Optical Techmology Letters, vol. 57, no. 10, pp. 2358-
2363, 2015.
20. P. Wang, and A. Anderko. Computation of dielectric
constants of solvent mixtures and electrolyte 27. T. Ejaz, A. A. Shah, H. U. Rahman, T. Zaidi,
solutions. Fluid Phase Equilibria vol. 186, no. 1, pp. Improved shield design for split-ring resonator,
103-122, 2001. Proc. of 3rd Int. Conf. on Technological Advances in
Electrical, Electronics and Computer Engineering,
21. L. O. Salmazo, F. S. Bellucci, A. E. Job, and M. A. L.
Beirut, Lebanon, 29 Apr. 1 May 2015.
Nobre. Dielectric Permittivity Analysis of Mixtures
of Polar Liquids by Impedance Spectroscopy. 11th 28. T. Ejaz, H. U. Rahman, and T. Tauqeer, Shield
Int. Conf. on Advanced Material, Rio De Janerio, optimization and formulation of regression equations
Brazil, 2009. for split-ring resonator, Mathematical Problems in
Engineering, vol. 2016, Article ID 4754192, 10 pages.
22. H. G. Wang, and C. H. Chan. Mixture effective
permittivity simulations using IMLMQRF method on 29. Ansoft HFSS software: http://ansoft.com/Products/
preconditioned EFIE. Progress In Electromagnetics Simulation+Technology/Electronics/Signals+Integrity/
Research, vol. 57, pp. 285-310, 2006. ANSYS+HFSS
23. W. Froncisz and J. S. Hyde, The loop-gap resonator: 30. A. P. Gregory and R. N. Clarke. Tables of the
A new microwave lumped circuit ESR sample complex permittivity of dielectric reference liquids at
structure, Journal of Magnetic Resonance, vol. 47, frequencies up to 5 GHz. National Physical
pp. 515-521, 1982. Laboratory Report MAT 23, published by NPL,
24. M. Mehdizadeh, T. K. Ishii, J. S. Hyde and W. Teddington UK., 2012.
Froncisz, Loop-gap resonator: A lumped mode 31. Wolfram Research, Inc., Mathematica, Version 9.0,
microwave resonant structure, IEEE Transactions on Champaign, IL 2013.
Microwave Theory and Techniques, vol. 31, no. 12,
pp. 1059-1064, Dec. 1983.
79
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 80-85
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
The capstone project at the department of Blackboard Learn is an LMS system that provides
computer science at king Saud University (KSU) education institutions a virtual learning
consists of two courses that span the senior year. environment. The system provides tools that help
During the first course, students formulate the both instructors and students to take advantage of
problem they are addressing, survey the literature technology in their learning experience, from
and design their solution. A committee of faculty virtual classrooms to simple course management.
members examine different deliverables For example, students can keep in touch with their
throughout the semester as well as the final report course instructors and their classmates through e-
80
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 80-85
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
mail or message board. Blackboard also enables which are made available upon approval. Some of
students to receive and submit assignments, tests these building blocks include Collaborate Voice
and surveys as well as to view their grades as soon Authoring [8], Soft chalk Publish with Score
as instructors make them available. In addition, Center [9], and Tegrity Lecture Capture [10].
Blackboard provides students with a platform to
collaborate with each other through features such The Collaborate Voice Authoring building block
as groups, collaborate and message boards. A allows instructors and students to record audio and
study has shown that 70% of the students created post it to a Blackboard voice discussion board.
site are geared towards group work and group The voice recording can also be sent by e-mail to
projects [3]. The study found that students were specific instructors or students. The features of
creating websites to manage their class projects or this tool improve students engagement as well as
simply for study groups [3]. Since capstone give instructors the ability to produce audible
projects are mainly group projects, integrating the course content [8].
different aspects of the capstone projects into
existing LMS systems such as Blackboard should The Soft chalk Publish building block is a popular
improve the collaboration experience of students software that enables educators to create and share
and ease the management of their project related interactive learning content with their students.
activities without the need of student initiated The popularity of Soft chalk is due to its ease of
virtual study group (known as eTeam [4]). use. Instructors can build powerful learning
content, such as interactive web pages without
On the other hand, Blackboard provides requiring any programming or mark-up languages.
instructors with several tools to ease and improve Instead, Soft chalk generates lesson pages
their teaching experience, such as course content, automatically. Moreover, the grades from Soft
announcements, blogs, and secure and automated chalk quizzes are automatically added to the grade
testing and grading. In a study that tested whether center in Blackboard [9].
the reconfigurablity features of LMS systems
enables faculty to implement the seven principles Tegrity is a lecture capture software that can be
of teaching [5] effectively, Wang et. al. provided used by instructors to capture their lectures and
empirical evidence that LMS systems allow post them on Blackboard. The focus of the
faculty members to implement the seven software is student learning. In addition to viewing
principles of effective teaching [6]. Moreover, the the lecture, the building block allows students to
study showed that the more LMS systems are interact with the instructor, take notes, set
used, the greater the faculty perceived benefits [6]. bookmarks and much more. One of the main
Therefore, enabling LMS systems to deal with advantages of Tegrity is the ease of use. For
irregular courses such as capstone projects courses example, instructors do not have to record, convert
contributes to the leveraging of IT to improve the and upload their lecture videos, but rather simply
seven teaching principals. click the lecture on the browser and the video is
automatically uploaded to the right course [10].
Blackboard provides a complete framework for
extending its platforms. Using Building Blocks, Building blocks provide academic institutions the
developers create new applications or integrate ability to extend and customize Blackboard
existing tools into the blackboard platforms. functionality to meet their specific needs. The goal
Developers can publish their building blocks on of our project is to create a building block to
Blackboards building block sites, while users can manage capstone projects at the department of
search and download their desired extensions. For computer science at King Saud University. The
example, the City University of New York extension will also be available to other
(CUNY) uses several building blocks to extend institutions to customize and use on their capstone
the features and services of Blackboard for its project courses.
users [7]. Users can suggest building blocks,
81
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 80-85
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
82
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 80-85
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
3.2 System Functionalities: and final reports. The coordinator can create
course assignments in order to receive
In this section, we present the main functionalities submissions from the students and have them
of the CPMS system. These functionalities are graded by his or her specified examiners.
examiners assignment, course submissions, course Assignments can also be updated or deleted after
assignments and gradebook. creation. In addition to the regular options of
creating a blackboard assignment, the coordinator
3.2.1 Examiners assignment: has to select who can grade the assignment.
Supervisors, examiners, or both can grade
The examiners assignment tab has two options. assignments. In the coordinator does not select
The first one is used to assign examiners and the either option, he or she will be the only one with
second one is to remove an examiner. In order to access to the assignment. Figure 5 shows the
keep the extra permission, a custom MySQL assignment creation page.
database is used to stores the examiners and
supervisors relations. If the user is the course
coordinator, the examiners assignment tab is
visible as shown in figure 1. The coordinator must
assign examiners for each group using the name of
groups supervisor and a list of examiners from
which to choose. Figure 4 illustrates the examiner
assignment page. After assigning all examiners,
they will be able to access the submissions and
grade columns of their assigned. The coordinator
can also remove an examiner from a particular
group using the same page.
Figure 5: Assignment creation page.
4 CONCLUSION
3.2.4 Submissions:
Blackboard is used by 80% of the Top 50 Times
Once the coordinator creates an assignment, a Higher Education Reputation Ranking in 2014
submission entry is created. Students can submit, [10]. It also severs over 20 million K-12 students
view and download assignments through the and is currently used by 92% of top online
customized assignment page. Once a student bachelor degree programs [12]. Using Building
submits an assignment, all the students in the same Blocks, institutions can increase the usability of
group as well as the examiners that have access to the blackboard system by extending its
the assignment can see it. The coordinator can functionality and tailoring it to meet their needs.
view all submissions. Figure 6 shows the In this paper, we introduce a building block called
submission page from a students view. For all CPMS, designed to manage capstone projects. The
individual assignments, regular blackboard system takes advantage of current functionalities
assignments can be used. of the Blackboard Learn platform and provides a
course tool capable of managing group based
courses. CPMS allows multiple sections to have
one coordinator and several supervisors and
examiners. In addition, the CPMS course tool
extends the capabilities of the assignment creation,
gradebook and submissions in order to allow these
tools to behave differently based on the users role
in the capstone project.
5 REFERENCES
84
The International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) 2(2): 80-85
The Society of Digital Information and Wireless Communications (SDIWC), Apr - 2016 (ISSN: 2410-0439)
85
The International Journal of
E-LEARNING and EDUCATIONAL TECHNOLOGIES in the DIGITAL MEDIA (IJEETDM)
The SDIWC International Journal of E-Learning and Educational Technologies in the Digital Media (IJEETDM) aims to provide a
forum for scientists, engineers, and practitioners to present their latest research results, ideas, developments and applications in
the field of computer architectures, information technology, and mobile technologies. Original unpublished manuscripts are
solicited in the following areas including but not limited to:
1. Research papers: that are presenting and discussing the latest, and the most profound research results in the
scope of IJEETDM. Papers should describe new contributions in the scope of IJEETDM and support claims of
novelty with citations to the relevant literature.
2. Technical papers: that are establishing meaningful forum between practitioners and researchers with useful
solutions in various fields of digital security and forensics. It includes all kinds of practical applications, which
covers principles, projects, missions, techniques, tools, methods, processes etc.
3. Review papers: that are critically analyzing past and current research trends in the field. Manuscripts submitted
to IJEETDM should not be previously published or be under review by any other publication. Original unpublished
manuscripts are solicited in the following areas including but not limited to: