Keywords
online learningteacher’s role
ICT
LMS
Information technology
T58.5-58.64
Industrial engineering. Management engineering
T55.4-60.8
Technology (General)
T1-995
Technology
T
DOAJ:Computer Science
DOAJ:Technology and Engineering
Information technology
T58.5-58.64
Industrial engineering. Management engineering
T55.4-60.8
Technology (General)
T1-995
Technology
T
DOAJ:Computer Science
DOAJ:Technology and Engineering
Information technology
T58.5-58.64
Industrial engineering. Management engineering
T55.4-60.8
Technology (General)
T1-995
Technology
T
Information technology
T58.5-58.64
Industrial engineering. Management engineering
T55.4-60.8
Technology (General)
T1-995
Technology
T
Information technology
T58.5-58.64
Industrial engineering. Management engineering
T55.4-60.8
Technology (General)
T1-995
Technology
T
Full record
Show full item recordAbstract
Teachers have a major responsibility to engage students online for successful learning in online distance education programs. Identifying key aspects of the teachers’ role is important. The study reported in this paper investigated an online course for paramedic students. Data were collected from the teachers and students and their online interactions were observed. The study has shown that students’ message posting is likely to be related to the cognitive demand and accessibility of discussion tasks that staff design and the quality of teacher facilitation of discussion.Date
2012-01-01Type
ArticleIdentifier
oai:doaj.org/article:3f66e9928983479fb0ff65c9cf8a178c2223-4985
https://doaj.org/article/3f66e9928983479fb0ff65c9cf8a178c
Collections
Related items
Showing items related by title, author, creator and subject.
-
Towards an Ontology to Describe the Taxonomy of Common Modules in Learning Management SystemsCarlos E. Montenegro Marin; JUAN MANUEL CUEVA LOVELLE; OSCAR SANJUAN MARTINEZ; Edward Rolando Nuñez Valdez (ImaI-Software, 2011-12-01)This article have the objective a create ontology for "common modules in a Learning Management Systems", the steps for the build Ontology were: Determine the domain and scope of the ontology, Consider reusing existing ontology, Enumerate important terms in the ontology, Define the classes and the class hierarch, Define the properties of classes—slot and Define the facets of the slot, finally be explained how the ontology is composed.
-
Palavras do editorJorge M. Barreto (2006-08-01)Começamos este número por um tutorial de Christian Aranha, doutorando tendo como coautor seu orientador o Professor Emmanuel Passos, tutorial este sobre Mineração de Textos. Este assunto é uma aplicação moderna da Inteligência Artificial e o Professor Passos se dedica à IA desde os anos 70 quando, como professor do Instituto Militar de Engenharia (IME) fazia seu doutoramento na COPPE. Foi depois, por muitos anos Coordenador de Pós-gradução do programa de mestrado em Informática do IME e organizou os primeiros simpósios de IA da Sociedade Brasileira de Computação (SBC). Por ter uma vida dedicada à IA e por sua capacidade em tornar simples coisas complexas, recomenda-se a leitura deste tutorial. Tem sido feito um esforço para divulgar a revista além de nossas fronteiras e neste número são apresentados 2 trabalhos vindos da Argentina e 2 de Portugal. Esperamos receber submissões também de outros países de língua espanhola, Note-se que 3 artigos são em inglês o que aumenta a penetração da revista em outros países. Agradecemos aos que nos visitaram dando um total de mais de 1000 acessos por mês. Isto nos estimula a manter a RESI no ar, gratuita em toda sua extensão, correspondendo a nosso desejo de colaborar na direção de uma UNIDADE de toda a humanidade baseada nas DIFERENÇAS. Se conseguirmos um pequeno passo nesta direção estaremos recompensados pelo nosso trabalho. Jorge M. Barreto, Editor Chefe
-
A Comprehensive Analysis of Digital WatermarkingMuhammad Aamir Qureshi; Ran Tao (Asian Network for Scientific Information, 2006-01-01)Copyright protection of digital contents has become more and more important in accordance with the development of digital technology. As a solution of this predicament, digital watermark technology is drawing attention and various watermarking methods have been presented and studied. Digital watermarking provides protection of intellectual property in the digital world. Just as plagiarism runs rampant in the physical world, unauthorized copying of data whether it be audio, visual, or video exists in the digital world. Digital watermarking attempts to copyright the digital data that is freely available on the World Wide Web to protect owner`s rights. As opposed to traditional, printed watermarks, digital watermarks are transparent signatures. They are integrated within digital files as noise, or random information that already exists in the file. Thus, detection and removal of the watermark becomes more difficult. Typically, watermarks are dispersed throughout the entire digital file such that manipulation of one portion of the file does not alter the underlying watermark. However, it is difficult to decide which method is better than others, because the measure for evaluating their performance has not been established yet. Recently, digital contents can be easily accessed by using computer networks and the problem of protecting multimedia information becomes more and more important. To resolve various problems occurring in these upcoming areas and future emerging disciplines, digital watermark technology is now drawing attention as a new method and technique of protecting copyrights for digital data. Digita1 watermark is realized by embedding information data with an insensible form for human audio/visual systems. It must be difficult for an attacker to remove watermark purposely. In this paper an outline of watermarking and analysis of the various techniques used in the area of image watermarking is presented.