Towards a participatory E-learning 2.0<br /> A new E-learning focused on learners and validation of the content
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 1
Abstract
Our aim is to propose a collaborative methodological approach centred on learners and based on the Web 2.0 tools in order to make E-learning 2.0. It is based on a process consisting of four iterative steps which are: grouping, collaborating, validating and publishing content. In this context, learners will be the creators of the content of assigned courses in a virtual meeting through the chat. These contents will be validated after a pedagogical monitoring by the instructor through the class's blog and merged into a single course content published on a class' wiki. Social interaction and sharing of files on the web will be the responsibility of social networks. The rest of the web 2.0 tools such as RSS feeds, tags, podcasts and video casts will be used as complementary tools in order to improve the quality of training. This methodological approach will allow E-learning 2.0 by ensuring a better interactivity, collaboration, sharing and an optimal exploitation of collaborative intelligence in the classroom.
Authors and Affiliations
Boubker Sbihi, Kamal Eddine El Kadiri
Computer Vision for Malaria Parasite Classification in Erythrocytes
In this is paper, we introduce a new approach to represent a mathematical modeling technique by means of linear programming as an efficient tool to solve problems related to medical imaging problems especially Malaria Di...
Mathematical Formula Recognition and Transformation to a Linear Format Suitable for Vocalization
Students with vision impairment encounter barriers in studying mathematics particularly in higher education levels. They must have an equal chance with sighted students in mathematics subjects. Making mathematics accessi...
Public key cryptosystem and a key exchange protocol using tools of non-abelian group
Public Key Cryptosystems assure privacy as well as integrity of the transactions between two parties. The sizes of the keys play an important role. The larger the key the harder is to crack a lock of encrypted data. We...
Anti-Synchronization of the Hyperchaotic Liu and Hyperchaotic Qi Systems by Active Control
This paper investigates the problem of anti-synchronization of identical hyperchaotic Liu systems (2008), hyperchaotic Qi systems (2008) and non-identical hyperchaotic Liu and hyperchaotic Qi systems using active nonline...
Modeling Virtual Meetings within Software Engineering Environment
It is a common scenario to see project’s stakeholders, such as managers, team leaders, and developers carrying out their meeting in the online environment without a suitable preparation and facilitation For instance, sta...