Teaching with Real Time Communications Technologies

Author(s):  
Richard Caladine

Real time communications technologies are just that: technologies that facilitate real time or synchronous communications. An example that springs rapidly to mind is the telephone. The real time communications technologies (RTCs) that are commonly found in educational contexts include text-based examples such as text chat, and rich media examples such as video chat, videoconference, and Access Grid. Teaching with RTCs is not the same as face-to-face teaching due to the imposition the technology makes on the learning, thus limiting some activities. Full definitions of videoconference and video chat and recommendations for teaching with videoconference and video chat are discussed in detail in Chapter XIII. Likewise, teaching with Access Grid plus a description and a definition of it are provided in Chapter XIV. In this chapter some general approaches to teaching that are common to all RTCs are discussed and contrasts are drawn between other approaches that clearly highlight the differences in the RTCs.

Author(s):  
Richard Caladine

In the previous chapters three real time communications technologies (RTCs) have been discussed. Videoconferences have been used for real time communications in distance learning for many years. In recent years many institutions have used videoconferences in addition to the text-based communications tools in learning management systems: discussion forums and chat. Video chat is a new technology. It is computer based and inexpensive after the purchase of the computer as software is often free and the basic audio and video equipment is inexpensive. Video chat facilitates two-way video and audio communications and thus it is likely to displace videoconference from its place in the market. The Access Grid is also gaining use in education as a teaching tool due to the richness of the experience of multiple video streams, and additional tools that allow true collaboration. How these technologies are used in educational settings has a direct impact on the effectiveness and efficiency of the educational experience and theoretical guides to their use have been discussed earlier in this book. One of the early theoretical approaches was that put forward by Michael Moore.


Author(s):  
Richard Caladine

Videoconference and audioconference have been used for communications in businesses for many years. In teaching and learning videoconference has been used for at least the last 15 years and possibly longer. Videoconference and audioconference technologies have been used in education, especially in distance education where students and teachers are in different locations. Like all educational technologies, videoconference and audioconference are suited to some and not all teaching and learning activities. Before these established real time communications technologies (RTCs) and the newer technology video chat are explored they need to be carefully defined to eliminate or minimize confusion.


2014 ◽  
Vol 13 (3) ◽  
pp. 375-391 ◽  
Author(s):  
Annemieke Ensing ◽  
Geerdina M. van der Aalsvoort ◽  
Paul van Geert ◽  
Silke Voet

We propose a new definition of learning potential as an emergent phenomenon. It emerges in the process of creating a unique scaffolding situation through the real-time interaction between teacher and child. We provide a model for analyzing the behavioral sequences within these scaffolding dynamics and illustrate it with the data of two qualitatively representative children working on a curriculum-related task with their teacher. It is hypothesized that if the dyads truly create their own dynamic scaffolding–related situation as presented in the model, they are expected to differ in terms of their temporal patterns in a nontrivial way. Analyses showed significantly different patterns for both dyads. We conclude that, in applied settings, an analysis of the dynamic patterns of scaffolding creation might provide important information about learning potential, in addition to information obtained with standardized dynamic tests.


SIMULATION ◽  
2021 ◽  
pp. 003754972110031
Author(s):  
Daniella Niyonkuru ◽  
Gabriel Wainer

Development of Embedded Real-Time Systems is prone to error, and developing bug-free applications is expensive and no guarantees can be provided. We introduce the concept of Digital Quadruplet which includes: a 3D virtual representation of the physical world (a Digital Twin), a Discrete-Event formal model of the system of interest (called the “Digital Triplet”), which can be used for formal analysis as well as simulation studies, and a physical model of the real system under study for experimentation (called the “Digital Quadruplet”). We focus on the definition of the idea of a Digital Quadruplet and how to make these four apparati consistent and reusable. To do so, we use the Discrete-Event formal model as a center for both simulation and execution of the real-time embedded components with timing constraints, as well as a common mechanism for interfacing with the digital counterparts, providing model continuity throughout the process. Here we focus on a principal part of the Digital Quadruplet idea: the provision of an environment to allow models to be used for simulation (in virtual time), visualization, or execution in real-time. A Discrete-EVent Systems specifications (DEVS) kernel runs on bare-metal hardware platforms, avoiding the use of an Operating RTOS in the platform, and the combination with discrete-event modeling engineering.


2021 ◽  
Vol 7 ◽  
pp. e787
Author(s):  
José Roldán-Gómez ◽  
Juan Boubeta-Puig ◽  
Gabriela Pachacama-Castillo ◽  
Guadalupe Ortiz ◽  
Jose Luis Martínez

The Internet of Things (IoT) paradigm keeps growing, and many different IoT devices, such as smartphones and smart appliances, are extensively used in smart industries and smart cities. The benefits of this paradigm are obvious, but these IoT environments have brought with them new challenges, such as detecting and combating cybersecurity attacks against cyber-physical systems. This paper addresses the real-time detection of security attacks in these IoT systems through the combined used of Machine Learning (ML) techniques and Complex Event Processing (CEP). In this regard, in the past we proposed an intelligent architecture that integrates ML with CEP, and which permits the definition of event patterns for the real-time detection of not only specific IoT security attacks, but also novel attacks that have not previously been defined. Our current concern, and the main objective of this paper, is to ensure that the architecture is not necessarily linked to specific vendor technologies and that it can be implemented with other vendor technologies while maintaining its correct functionality. We also set out to evaluate and compare the performance and benefits of alternative implementations. This is why the proposed architecture has been implemented by using technologies from different vendors: firstly, the Mule Enterprise Service Bus (ESB) together with the Esper CEP engine; and secondly, the WSO2 ESB with the Siddhi CEP engine. Both implementations have been tested in terms of performance and stress, and they are compared and discussed in this paper. The results obtained demonstrate that both implementations are suitable and effective, but also that there are notable differences between them: the Mule-based architecture is faster when the architecture makes use of two message broker topics and compares different types of events, while the WSO2-based one is faster when there is a single topic and one event type, and the system has a heavy workload.


HPB ◽  
2020 ◽  
Vol 22 ◽  
pp. S88
Author(s):  
S. Wilson ◽  
J. Barkun ◽  
K. Bertens ◽  
G. Martel ◽  
F. Balaa ◽  
...  

Author(s):  
Tasha N. Lewis ◽  
Holly Schneider

This article is a description of face-to-face real-time international virtual language exchanges that have been integrated into first and second year Spanish courses at the university level. The focus of this article is to explain the origins of the virtual language exchange, its implementation into the program-wide curriculum, its effect on students, and to explain in detail how a session operates. The success of the virtual language exchange program is evident based on an analysis of video captured dialogues, coordinator and facilitator observations of the program, as well as participant feedback about the experience. The content and methodology of this article are adaptable to any second/foreign language course.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 4157-4161

Particular in medical communication is can say as an underappreciated skill. By using ever-growing number of new infrastructure, apps are devices our reality has turned out to be progressively interconnected, numerous connections among specialists and patients are still amazingly dated. A great deal of delicate data is passed along face to face, however most different collaborations are done by means of telephone. Without the need to revive or physically demand data the Real-time applications receive and send data instantaneously. It could be devices that screens vitals and immediately streams those readings to a database or different devices or for connecting the patient with doctors it could be a simple application of chat.


Author(s):  
Meghna Sharma ◽  
Jagdeep Kaur

The problem of hazard detection and the robotic exploration of the hazardous environment is the need of the of the hour due to the continuous increase of the hazardous gases owing to the industry proliferation and modernization of the infrastructure. It includes radiological materials and toxic gases with long term harmful effects. The definition of a hazardous environment and extracting the parameters for the same is itself a complicated task. The chapter proposes the alarming solution to warn about the level of hazardous effects for a particular environment area. The need of the hour is to build complete systems that can autosense the hazardous environment even in low visibility environment and raise an alarm. The combination of IoT and machine learning can be best used for getting the real-time data and using the real-time data for analyzing the accurate current hazardous level as well as prediction of future hazards by reading the parameters for detection and also selecting the useful parameters from them.


Sign in / Sign up

Export Citation Format

Share Document