SlideShare a Scribd company logo
Adaptation in a PoEML-based E-
learning Platform
Roberto Perez-Rodriguez
Manuel Caeiro-Rodriguez
Luis Anido-Rifon
Introduction
• Educational Modeling Languages (EMLs) enable
the definition of UoLs in a pedagogy-independent
way.
• An EML describes not only contents, but also
– Activities to perform
– Composition of groups of participants
– Order between activities
• These specifications conform a process.
• The PoEML language follows into this conceptual
model, and it was developed following a
separation-of-concerns approach.
Life-cycle of a Unit-of-Learning
• Authoring: in this phase,
the UoL is designed by
making use of an
authoring tool.
• Publication: the UoL is
imported into an
execution engine.
• Delivering: the
participants perform the
UoL. This phase is also
known as run-time.
Elements in an Educational Scenario in
PoEML
Hierarchical Educational Scenario
Late Modeling
• A main issue in the design of e-learning systems is that
of the adaptation.
• Late modeling allows for designers to leave some parts
of the UoL unmodeled until run-time.
– Often, designers may prefer to model the most relevant
parts of the UoL, remaining the rest to be modeled at run-
time.
• Therefore, it is required to support incomplete (or
abstract) models, which will be specified in run-time.
• This paper introduces a conceptual framework and a
software architecture for supporting late modeling of
PoEML learning-flows.
Common Approaches to Adaptation
• Approach centered in process definition meta-
model
– Advanced modeling
– Late modeling
• Approach centered in the execution system
– Type adaptation (evolutionary change)
– Instance adaptation (ad-hoc change)
Approach Centered in Process-
Definition Meta-Model
• In this approach, it is the process meta-model the one that
determines the structure and the allowed types of changes.
The following lines are considered:
– Advanced modeling
– Late modeling
• Advanced modeling allows authors to consider alternatives
during run-time.
– The different alternatives (learning paths) that are allowed
during execution are modeled in the process definition at
design-time.
– During run-time, it should be possible to select one of those
alternatives. There are two main ways to do the selection:
• In accordance with the state of execution.
• In accordance with the decision of an authorized participant.
Approach Centered in the Process-
Definition Meta-Model (ii)
• Late modeling allows for leaving some parts of
the design without being modeled, in order to
be modeled during run-time.
• Some parts of the process definition are
leaved as black-boxes, in order to be modeled
during execution.
Approach Centered in the Execution
System
• In this approach, it is the execution system the
one that supports the types of change that are
allowed.
• The following lines are considered:
– Instance adaptation
– Type adaptation
Approach Centered in the Execution
System (ii)
• Instance adaptation is usually named exception
management. An exception can be seen as an
occasional deviation from the normal behavior of
a process. Exception management is in charge of
correcting the wrong situation, without need for
stopping all process instances, fix the model, and
enact all the instances again.
• Type adaptation deals with process instance
migration during a process execution from an old
schema to a new one.
A Late Modeling Example
A Late Modeling Example (ii)
• The initial scenario.
• Once the initial
scenario is finished,
three scenarios are
launched in parallel.
• Finally, participants are
requested to perform a
collaborative activity,
which is evaluated by
the teacher.
A Late Modeling Example (iii)
• Order and Temporal
views of scenarios
• The teacher may want
to tune the model in
some ways:
– Adding more activities.
– Changing the temporal
constraints for activity
finishing.
– Adding/skipping a
goal, etc.
Late Modeling of PoEML Learning-
Flows
• Following an aspect-oriented approach, the
allowed changes in the model can be
systematically categorized in aspects, each
one dealing with an specific concern.
• A. Situating placeholders in the UoL model
– The approach here is to use a special type of
construct, named placeholder.
– The placeholder occupies the place of the
unmodeled element or specification.
Late Modeling of PoEML Learning-
Flows
– A. Situating placeholders in the UoL model.
– In PoEML, we identify the following placeholder types:
• Scenario placeholder. It is a black box that reserves space for a
scenario model. The language constructs will be added at run-time
in the space kept by the placeholder.
• Goal placeholder. It reserves the space for the definition of a
learning objective.
• Environment placeholder
• Tool placeholder
• Data placeholder. It is used for reserving the space to add
resources and/or activities to a UoL at run-time.
• Order placeholder. It keeps the space for adding ordering
constraints at run-time.
• Temporal placeholder. It enables the deferred definition of
temporal constraints in the Unit of Learning.
Late Modeling of PoEML Learning-
Flows
• B. Modeling black-
boxes at run-time
• When the execution
flow reaches a black-
box, the educational
scenario is
instantiated, but it
cannot progress
towards the accessible
state.
Late Modeling of PoEML Learning-
Flows
• A learning-flow with a
temporal placeholder
in the final scenario.
• At run-time the
teacher may fill the
placeholder by making
use of the authoring
environment.
Late Modeling of PoEML Learning-
Flows
• C. Updating of instances.
• Every learner who starts a learning-flow
enacts a new instance.
• Every learning-flow instance has its own state.
• When a teacher commits a change in the
learning-flow model, every instance has to be
re-evaluated from root to leaves in order to
update its state.
The Moodle Extension for PoEML
• A. The authoring environment
– The authoring process consists on a series of
atomic operations.
• Add/edit/delete a scenario
• Add/edit/delete a goal
• Add/edit/delete a resource/activity
– This authoring strategy presents some advantages
• Atomic changes are automatically seen by other co-
authors
• There is no need for a complex consistency check like
the one needed when importing a manifest file
The Moodle Extension for PoEML (ii)
• B. The run-time environment
The Moodle Extension for PoEML
• C. Monitoring
– Monitoring of a goal
• Possible states of a goal and number of students per state.
Histogram
• Detail of the status of a goal for every enrolled student
Implementation
• Overall architecture
Implementation
• A. The learning-flow engine
– It is the core component of the e-learning system
– Stores information on scenarios, participants,
goals, etc. and it makes the state of the system to
evolute depending on events
– This component is integrated through a well-
defined interface
– Two subcomponents:
• Models manager
• Instances manager
Implementation
• B. The middleware layer
– The functionality of the learning-flow engine is
published into a WSDL file.
• C. Presentation modules
– Three views:
• Authoring
• Monitoring
• Delivering
Conclusions
• This paper details the implementation of a late
modeling approach for PoEML
• Late modeling allows for leaving some parts of a UoL
model unspecified until run-time
• The aspect-orientation of PoEML presents great
advantages in supporting late modeling
• The combination of late modeling and advanced
modeling provides a high degree of adaptation
• Future work: to support adaptation based on the
execution engine
– Instance adaptation
– Type adaptation

More Related Content

Viewers also liked

Virtual Reality Smackdown
Virtual Reality SmackdownVirtual Reality Smackdown
Virtual Reality Smackdown
Ronnie Isherwood
 
Jersey Windows User Group
Jersey Windows User GroupJersey Windows User Group
Jersey Windows User Group
Ronnie Isherwood
 
Windows Parental controls
Windows Parental controlsWindows Parental controls
Windows Parental controls
Ronnie Isherwood
 
Branching by abstraction
Branching by abstractionBranching by abstraction
Branching by abstraction
Roberto Perez-Rodriguez
 
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Ronnie Isherwood
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisation
Ronnie Isherwood
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
Ronnie Isherwood
 
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring usMicrosoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Ronnie Isherwood
 
Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2
Ronnie Isherwood
 
Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012
Ronnie Isherwood
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
Ronnie Isherwood
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
Ronnie Isherwood
 

Viewers also liked (12)

Virtual Reality Smackdown
Virtual Reality SmackdownVirtual Reality Smackdown
Virtual Reality Smackdown
 
Jersey Windows User Group
Jersey Windows User GroupJersey Windows User Group
Jersey Windows User Group
 
Windows Parental controls
Windows Parental controlsWindows Parental controls
Windows Parental controls
 
Branching by abstraction
Branching by abstractionBranching by abstraction
Branching by abstraction
 
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
 
Building solutions with microsoft virtualisation
Building solutions with microsoft virtualisationBuilding solutions with microsoft virtualisation
Building solutions with microsoft virtualisation
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012Introduction to System Center Advisor and Virtual Machine Manager 2012
Introduction to System Center Advisor and Virtual Machine Manager 2012
 
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring usMicrosoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
 
Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2Protecting Microsoft Virtualization with DPM 2012 R2
Protecting Microsoft Virtualization with DPM 2012 R2
 
Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012Managing hypervisors with System Center Virtual Machine Manager 2012
Managing hypervisors with System Center Virtual Machine Manager 2012
 
Multifactor Authentication
Multifactor AuthenticationMultifactor Authentication
Multifactor Authentication
 
Microsoft Remote Desktop Services
Microsoft Remote Desktop ServicesMicrosoft Remote Desktop Services
Microsoft Remote Desktop Services
 

Similar to EDUCON 2010: Adaptation in a PoEML-based E-learning Platform

Software Engineering : OOAD using UML
Software Engineering : OOAD using UMLSoftware Engineering : OOAD using UML
Software Engineering : OOAD using UML
Ajit Nayak
 
Object Oriented Analysis and Design Unit-1
Object Oriented Analysis and Design Unit-1Object Oriented Analysis and Design Unit-1
Object Oriented Analysis and Design Unit-1
SangeethaSubramaniam14
 
OOSD_UNIT1 (1).pptx
OOSD_UNIT1 (1).pptxOOSD_UNIT1 (1).pptx
OOSD_UNIT1 (1).pptx
DebabrataPain1
 
SMD Unit i
SMD Unit iSMD Unit i
SMD Unit i
madhavi patil
 
ppt2.pptx
ppt2.pptxppt2.pptx
ppt2.pptx
JOHNNYGALLA2
 
ID, UP, & RUP.pptx
ID, UP, & RUP.pptxID, UP, & RUP.pptx
ID, UP, & RUP.pptx
Ravindranath67
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
SADEED AMEEN
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
Rody Middelkoop
 
Beit 381 se lec 11,12 - 41 - 12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
Beit 381 se lec 11,12  -  41 -  12 mar16 - 3 & 4 of 4 - sdlc incremental and ...Beit 381 se lec 11,12  -  41 -  12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
Beit 381 se lec 11,12 - 41 - 12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
babak danyal
 
DITEC - Software Engineering
DITEC - Software EngineeringDITEC - Software Engineering
DITEC - Software Engineering
Rasan Samarasinghe
 
11 system development models
11 system development models11 system development models
11 system development models
meenakshi24
 
Architecture of Object Oriented Software Engineering
Architecture of Object Oriented Software EngineeringArchitecture of Object Oriented Software Engineering
Architecture of Object Oriented Software Engineering
Sandesh Jonchhe
 
Software process models
Software process modelsSoftware process models
Software process models
Malik WaQas
 
Unified modeling language basics and slides
Unified modeling language basics and slidesUnified modeling language basics and slides
Unified modeling language basics and slides
venkatasubramanianSr5
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
Jayant Dalvi
 
The Open Science Laboratory - Cosmetic Surgery for Moodle Sam Marshall
The Open Science Laboratory - Cosmetic Surgery for Moodle 	Sam MarshallThe Open Science Laboratory - Cosmetic Surgery for Moodle 	Sam Marshall
The Open Science Laboratory - Cosmetic Surgery for Moodle Sam Marshall
Ireland & UK Moodlemoot 2012
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
MusTufa Nullwala
 
Chapter 1,2,3,4 notes
Chapter 1,2,3,4 notesChapter 1,2,3,4 notes
Chapter 1,2,3,4 notes
Aruna M
 
Design patterns
Design patternsDesign patterns
Design patterns
Majid Qafouri
 

Similar to EDUCON 2010: Adaptation in a PoEML-based E-learning Platform (20)

Software Engineering : OOAD using UML
Software Engineering : OOAD using UMLSoftware Engineering : OOAD using UML
Software Engineering : OOAD using UML
 
Object Oriented Analysis and Design Unit-1
Object Oriented Analysis and Design Unit-1Object Oriented Analysis and Design Unit-1
Object Oriented Analysis and Design Unit-1
 
OOSD_UNIT1 (1).pptx
OOSD_UNIT1 (1).pptxOOSD_UNIT1 (1).pptx
OOSD_UNIT1 (1).pptx
 
SMD Unit i
SMD Unit iSMD Unit i
SMD Unit i
 
ppt2.pptx
ppt2.pptxppt2.pptx
ppt2.pptx
 
ID, UP, & RUP.pptx
ID, UP, & RUP.pptxID, UP, & RUP.pptx
ID, UP, & RUP.pptx
 
Software process Models
Software process ModelsSoftware process Models
Software process Models
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Beit 381 se lec 11,12 - 41 - 12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
Beit 381 se lec 11,12  -  41 -  12 mar16 - 3 & 4 of 4 - sdlc incremental and ...Beit 381 se lec 11,12  -  41 -  12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
Beit 381 se lec 11,12 - 41 - 12 mar16 - 3 & 4 of 4 - sdlc incremental and ...
 
DITEC - Software Engineering
DITEC - Software EngineeringDITEC - Software Engineering
DITEC - Software Engineering
 
11 system development models
11 system development models11 system development models
11 system development models
 
Architecture of Object Oriented Software Engineering
Architecture of Object Oriented Software EngineeringArchitecture of Object Oriented Software Engineering
Architecture of Object Oriented Software Engineering
 
Software process models
Software process modelsSoftware process models
Software process models
 
2 uml
2 uml2 uml
2 uml
 
Unified modeling language basics and slides
Unified modeling language basics and slidesUnified modeling language basics and slides
Unified modeling language basics and slides
 
Structured system analysis and design
Structured system analysis and design Structured system analysis and design
Structured system analysis and design
 
The Open Science Laboratory - Cosmetic Surgery for Moodle Sam Marshall
The Open Science Laboratory - Cosmetic Surgery for Moodle 	Sam MarshallThe Open Science Laboratory - Cosmetic Surgery for Moodle 	Sam Marshall
The Open Science Laboratory - Cosmetic Surgery for Moodle Sam Marshall
 
Testing throughout the software life cycle
Testing throughout the software life cycleTesting throughout the software life cycle
Testing throughout the software life cycle
 
Chapter 1,2,3,4 notes
Chapter 1,2,3,4 notesChapter 1,2,3,4 notes
Chapter 1,2,3,4 notes
 
Design patterns
Design patternsDesign patterns
Design patterns
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

EDUCON 2010: Adaptation in a PoEML-based E-learning Platform

  • 1. Adaptation in a PoEML-based E- learning Platform Roberto Perez-Rodriguez Manuel Caeiro-Rodriguez Luis Anido-Rifon
  • 2. Introduction • Educational Modeling Languages (EMLs) enable the definition of UoLs in a pedagogy-independent way. • An EML describes not only contents, but also – Activities to perform – Composition of groups of participants – Order between activities • These specifications conform a process. • The PoEML language follows into this conceptual model, and it was developed following a separation-of-concerns approach.
  • 3. Life-cycle of a Unit-of-Learning • Authoring: in this phase, the UoL is designed by making use of an authoring tool. • Publication: the UoL is imported into an execution engine. • Delivering: the participants perform the UoL. This phase is also known as run-time.
  • 4. Elements in an Educational Scenario in PoEML
  • 6. Late Modeling • A main issue in the design of e-learning systems is that of the adaptation. • Late modeling allows for designers to leave some parts of the UoL unmodeled until run-time. – Often, designers may prefer to model the most relevant parts of the UoL, remaining the rest to be modeled at run- time. • Therefore, it is required to support incomplete (or abstract) models, which will be specified in run-time. • This paper introduces a conceptual framework and a software architecture for supporting late modeling of PoEML learning-flows.
  • 7. Common Approaches to Adaptation • Approach centered in process definition meta- model – Advanced modeling – Late modeling • Approach centered in the execution system – Type adaptation (evolutionary change) – Instance adaptation (ad-hoc change)
  • 8. Approach Centered in Process- Definition Meta-Model • In this approach, it is the process meta-model the one that determines the structure and the allowed types of changes. The following lines are considered: – Advanced modeling – Late modeling • Advanced modeling allows authors to consider alternatives during run-time. – The different alternatives (learning paths) that are allowed during execution are modeled in the process definition at design-time. – During run-time, it should be possible to select one of those alternatives. There are two main ways to do the selection: • In accordance with the state of execution. • In accordance with the decision of an authorized participant.
  • 9. Approach Centered in the Process- Definition Meta-Model (ii) • Late modeling allows for leaving some parts of the design without being modeled, in order to be modeled during run-time. • Some parts of the process definition are leaved as black-boxes, in order to be modeled during execution.
  • 10. Approach Centered in the Execution System • In this approach, it is the execution system the one that supports the types of change that are allowed. • The following lines are considered: – Instance adaptation – Type adaptation
  • 11. Approach Centered in the Execution System (ii) • Instance adaptation is usually named exception management. An exception can be seen as an occasional deviation from the normal behavior of a process. Exception management is in charge of correcting the wrong situation, without need for stopping all process instances, fix the model, and enact all the instances again. • Type adaptation deals with process instance migration during a process execution from an old schema to a new one.
  • 12. A Late Modeling Example
  • 13. A Late Modeling Example (ii) • The initial scenario. • Once the initial scenario is finished, three scenarios are launched in parallel. • Finally, participants are requested to perform a collaborative activity, which is evaluated by the teacher.
  • 14. A Late Modeling Example (iii) • Order and Temporal views of scenarios • The teacher may want to tune the model in some ways: – Adding more activities. – Changing the temporal constraints for activity finishing. – Adding/skipping a goal, etc.
  • 15. Late Modeling of PoEML Learning- Flows • Following an aspect-oriented approach, the allowed changes in the model can be systematically categorized in aspects, each one dealing with an specific concern. • A. Situating placeholders in the UoL model – The approach here is to use a special type of construct, named placeholder. – The placeholder occupies the place of the unmodeled element or specification.
  • 16. Late Modeling of PoEML Learning- Flows – A. Situating placeholders in the UoL model. – In PoEML, we identify the following placeholder types: • Scenario placeholder. It is a black box that reserves space for a scenario model. The language constructs will be added at run-time in the space kept by the placeholder. • Goal placeholder. It reserves the space for the definition of a learning objective. • Environment placeholder • Tool placeholder • Data placeholder. It is used for reserving the space to add resources and/or activities to a UoL at run-time. • Order placeholder. It keeps the space for adding ordering constraints at run-time. • Temporal placeholder. It enables the deferred definition of temporal constraints in the Unit of Learning.
  • 17. Late Modeling of PoEML Learning- Flows • B. Modeling black- boxes at run-time • When the execution flow reaches a black- box, the educational scenario is instantiated, but it cannot progress towards the accessible state.
  • 18. Late Modeling of PoEML Learning- Flows • A learning-flow with a temporal placeholder in the final scenario. • At run-time the teacher may fill the placeholder by making use of the authoring environment.
  • 19. Late Modeling of PoEML Learning- Flows • C. Updating of instances. • Every learner who starts a learning-flow enacts a new instance. • Every learning-flow instance has its own state. • When a teacher commits a change in the learning-flow model, every instance has to be re-evaluated from root to leaves in order to update its state.
  • 20. The Moodle Extension for PoEML • A. The authoring environment – The authoring process consists on a series of atomic operations. • Add/edit/delete a scenario • Add/edit/delete a goal • Add/edit/delete a resource/activity – This authoring strategy presents some advantages • Atomic changes are automatically seen by other co- authors • There is no need for a complex consistency check like the one needed when importing a manifest file
  • 21. The Moodle Extension for PoEML (ii) • B. The run-time environment
  • 22. The Moodle Extension for PoEML • C. Monitoring – Monitoring of a goal • Possible states of a goal and number of students per state. Histogram • Detail of the status of a goal for every enrolled student
  • 24. Implementation • A. The learning-flow engine – It is the core component of the e-learning system – Stores information on scenarios, participants, goals, etc. and it makes the state of the system to evolute depending on events – This component is integrated through a well- defined interface – Two subcomponents: • Models manager • Instances manager
  • 25. Implementation • B. The middleware layer – The functionality of the learning-flow engine is published into a WSDL file. • C. Presentation modules – Three views: • Authoring • Monitoring • Delivering
  • 26. Conclusions • This paper details the implementation of a late modeling approach for PoEML • Late modeling allows for leaving some parts of a UoL model unspecified until run-time • The aspect-orientation of PoEML presents great advantages in supporting late modeling • The combination of late modeling and advanced modeling provides a high degree of adaptation • Future work: to support adaptation based on the execution engine – Instance adaptation – Type adaptation