25.10.2012 Views

Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

Guenter Hilmer - Phd Thesis - Glamorgan Dspace - University of ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.3 EFTECS at TLS-Layer 3 EFTECS<br />

3.3 EFTECS at TLS-Layer<br />

In the EFTECS an educational module is regarded as the superstructure <strong>of</strong> the<br />

TLSs. Several instances <strong>of</strong> TLSs form an educational module.<br />

Whereas the purpose <strong>of</strong> the EM-Layer is to describe the educational module in<br />

general, the TLS-layer works one level below. Its main purpose is to use the<br />

information about the identified Teaching and Learning Strategies and to provide<br />

the author <strong>of</strong> the educational material with the possibility <strong>of</strong> “binding” together<br />

the single components <strong>of</strong> the TLSs. The TLS-layer works on and manages the<br />

relations between these single components. This process <strong>of</strong> linking together those<br />

single TLS components in a specific way creates new instances <strong>of</strong> a TLS. For<br />

example, a question, several answers, at least one correct answer and the type<br />

<strong>of</strong> the TLS (Single Choice, Multiple Choice, Yes or No) build one instance <strong>of</strong> a<br />

QA-TLS. Basically, the TLS-layer is working with and using single components<br />

<strong>of</strong> the TLSs and is linking them together. This linking is a semantic linking not<br />

a technical one in this context. This approach will result in a high number <strong>of</strong><br />

different TLS instances. However, the number <strong>of</strong> different sub-types <strong>of</strong> TLSs, e.g.<br />

inductive or deductive lecture (cf. section 3.3.2) is limited.<br />

At this point it is important to analyse which TLSs should be used in the EFTECS.<br />

To make this decision it will be necessary to evaluate how different TLSs can be<br />

created in a computing paradigm and how their specific meta-information has to<br />

be used in the EFTECS. Several TLSs were identified in the literature review and<br />

the ones that were selected for the EFTECS will now be introduced.<br />

3.3.1 Question and Answer<br />

The first TLS that was selected for an implementation into the EFTECS was the<br />

QA-TLS. It was selected due to the fact that it is already used in several educa-<br />

tional hypermedia projects [175]. Additionally, the single parts <strong>of</strong> this TLS were<br />

easy to identify, based on the authors experience. Table 1 illustrates the identified<br />

components <strong>of</strong> the QA-TLS which can be linked together to form the following<br />

sub-types <strong>of</strong> a QA-TLS:<br />

80

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!