Escolar Documentos
Profissional Documentos
Cultura Documentos
OCTOBER, 2006
PSZ 19 : 16 (Pind. 1/97)
UNIVERSITI TEKNOLOGI MALAYSIA
UNIVERSITI TEKNOLOGI MALAYSIA
BORANG PENGESAHAN STATUS TESIS♦
“Saya/Kami* akui bahawa saya telah membaca karya ini dan pada pandangan
JUDUL: DEVELOPING A CONSTRUCTION INDUSTRY WEB-BASED LEARNING
saya/kami* karya ini
SYSTEM IN adalah memadai dari
CONSTRUCTION segi skop danEDUCATION
MANAGEMENT kualiti untuk tujuan
penganugerahaSESI
n ijazah Sarjana Muda
PENGAJIAN Sains
: 2006/ Pembinaan”.
2007
1.Tandatangan
Tesis adalah hakmilik :Universiti..............................
Teknologi Malaysia. ............
2. Perpustakaan Universiti Teknologi Malaysia dibenarkan membuat salinan untuk tujuan
Nama Penyelia
pengajian I
sahaja. : PN. TANTISH KAMARUDDIN
3. Perpustakaan dibenarkan membuat salinan tesis ini sebagai bahan pertukaran antara
Tarikh :
institusi pengajian tinggi. ..........................................
4. ** Sila tandakan ( 9 )
9 TIDAK TERHAD
Disahkan oleh
. .
(TANDATANGAN PENULIS) (TANDATANGAN PENYELIA)
Alamat Tetap :
67 LORONG 4
TAMAN TUPAI MAS 34000 DR. ARHAM ABDULLAH
TAIPING PERAK Nama Penyelia
Signature : ....................................................
Name of Supervisor I : DR ARHAM ABDULLAH
Date : 13 NOVEMBER 2006
Signature : ....................................................
Name of Supervisor II : MOHD NUR AMAWISHAM ALEL
Date : 13 NOVEMBER 2006
ii
I declare that this project report entitled “Developing a Construction Industry Web-
Based Learning System in Construction Management Education” is the result of my
own research except as cited in the references. The project report has not been
accepted for any degree and is not concurrently submitted in candidature of any other
degree.
Signature : ....................................................
Name : TOH TIEN CHOON
Date : 13 NOVEMBER 2006
iii
ACKNOWLEDGEMENT
Praise is to the Almighty God of the Universe from whom I come and belong.
This piece of work would not become possible without the contributions from many
people and organizations. Most importantly, I would like to acknowledge my
supervisor, Dr Arham Abdullah for his kind assistance, constructive criticisms and
observations in this master project. A special thank you for my master project co-
supervisor, Mr Mohd Nur Asmawisham Alel, who is also the webmaster of Faculty
of Civil Engineering at Universiti Teknologi Malaysia for giving me the opportunity
to be involved with the research which I really treasure the experiences I gained
along the process especially in utilizing the open source e-learning software and
developing the CTMC e-learning system. I also like to thank the CTMC directors,
Associate Professor Dr Muhd Zaimi Abd Majid and Associate Professor Dr
Mohamad Ibrahim Mohamad for their valuable comments and ideas that have
provided me with very useful background data and information. Not to forget all
member of staff in Division of Construction Management, Department of Structure
and Materials, Universiti Teknologi Malaysia where my heart will always remain.
Many thanks go to my relatives back home and all my other friends here. I have
received a great deal of support while studying at this postgraduate master. Many
more persons participated in various ways to ensure my research succeeded and I am
thankful to them all.
v
ABSTRACT
ABSTRAK
TABLE OF CONTENTS
DECLARATION ii
DEDICATION iii
ACKNOWLEDGEMENTS iv
ABSTRACT v
ABSTRAK vi
TABLE OF CONTENTS vii
LIST OF TABLES xi
LIST OF FIGURES xii
LIST OF ABBREVIATIONS xiv
1 INTRODUCTION 1
1.1 Introduction 1
1.2 Issues and Problem Statements 2
1.3 Research Objectives 3
1.4 Research Scopes and Limitations 3
1.5 Research Justifications 4
1.6 Chapters Organization 5
2 LITERATURE REVIEW 6
2.1 Definition of Current State of the Art 6
2.2 Engineering Education Scenario 7
2.3 Common Teaching Methods 9
2.4 Lecturing 10
viii
3 RESEARCH METHODOLOGY 56
3.1 Literature Review 56
3.2 Documentary Analysis 57
3.3 Planning for Portal Deployment 59
3.4 Data and Security Requirements 61
3.5 Software Configuration Management and
Storyboarding 63
ix
REFERENCES 118
xi
LIST OF TABLES
LIST OF FIGURES
LIST OF ABBREVIATIONS
INTRODUCTION
1.1 Introduction
Two major factors impacted the construction industry during the last few
years. The first was an increase in computer ownership by professionals and the
availability of share packages. The second was increased competition in the industry.
This competition compelled companies to use advanced technologies to reduce costs
and time, while maintaining project quality. During the same period, construction
industry became more diversified and fragmented. As projects became more complex,
more design firms, contractors, subcontractors, suppliers and associated specialists
were needed to guide the project through the feasibility study, planning, design,
construction and operation phases (Li and Young, 1996). Information is a key
element that drives these processes and holds all the activities together. Because the
amount of information is considerable, its effective management and control
becomes challenging. Therefore, the construction industry applies information
technologies (IT) to cope with these demands. Moreover, study of this information
management systems show that they can boost the industry productivity. For instance,
computer aided design, construction automation, and decision support packages have
helped the industry respond quickly to design changes; keep down construction costs;
and make efficient decisions.
2
1.3.1 To identify the current state of the art regarding the types of teaching methods
in the field of Construction Management studies.
1.3.2 To identify the information regarding on the current syllabuses of the Master
of Science in Construction Management education and suitable materials for
the short courses to be used in the e-learning system.
1.3.3 To develop a web-based learning system for the post graduate candidates and
the short courses participants in order to provide a medium, to learn and gain
knowledge in the field of Construction Management.
With its vast potential and global reach, the Internet places increasing
demands for our nation’s educators. Some suggest the Internet will bridge the gap
between school and home and increasing numbers of teachers have already
incorporated web-based resources into their curriculum to expand instruction time
beyond the typical classroom day. Web-based tools can genuinely support the
teachers, collect and disseminate real-time information, eliminate technology
problems, extend learning opportunities, and prepare their students for tests.
Spearheading this revolution is a new generation of administrators and teachers who
will utilize web-based learning tools to help students prepare for the information age
we now live in (Valerie Chernek, 2006).
The write-up in this research comprises of five (5) main chapters including
the introduction, literature review, research methodology, web-portal development
and lastly the conclusion and suggestion. These chapters are arranged and organized
in such a way so that they are inter-related consequentially among each of the topics
stated as above (Glatthorn, 1998). Chapter 1: Introduction, discusses on the matters
which are relevant to the fundamentals of research such as topic introduction, issues
and problem statement, research aims and objectives, research scopes, research
justification and the chapters organization. The first chapter is significant in
determining the “4 WH 1 H” concept representing what, when, where, who and how.
Later on, the second chapter focuses on the literature review. Chapter 2:
Literature Review is written as to explain, review and gather the information related
to the current state of the art regarding the types of teaching methods in the field of
Construction Management studies. Besides that, this chapter would also touch in
detail about information regarding the current syllabuses of the Master of Science in
Construction Management education and suitable materials for the short courses.
Meanwhile, this information might resource from reference books, articles and
journals either in hardcopy format or online web-resources as well. Accordingly,
Chapter 3: Research Methodology emphasize on the methods used in collecting data,
including the secondary data through articles, books and journal reviews.
It also deals with how study is designed and performed to gain understanding
towards designing a web-based learning system for the post graduate candidates and
the short courses participants in order to provide a medium, to learn and gain
knowledge in the field of Construction Management. As a result, Chapter 4: Web-
Based Learning System Development would discuss on the developed web portal for
e-learning in detail including the guidelines to utilize the web correctly and
effectively. Then, Chapter 5: Conclusion and Recommendation are written to draw
conclusions which have achieved. A section is also devoted to limitations in this
study output where there is a need for possible areas to further research in the vast
field of web-based learning system in construction management applications.
CHAPTER 2
LITERATURE REVIEW
Current shall mean things that occurring in or belonging to the present time;
“current events”; “the current topic”; “current negotiations”; “current psychoanalytic
theories”; “the ship’s current position” (Web Dictionary, 2006). Current also refers to
being in progress now; for example current negotiations. Its synonyms are including
prevalent, especially at the present time. The characteristic of recent times or
informed of what is current is such as au courant, contemporary, mod, modern, up-
to-date, and up-to-the-minute or in existence now. Most generally existing or
encountered at a given time: predominant, prevailing, prevalent, regnant, rife and
widespread (Answers, 2006). Based on the web definition for state of the art, it is the
system available on the market or it is still just an innovative concept, or it is
somewhere in between. Besides that, state of the art might also refer to the highest
degree of development of an art or technique at a particular time; for instance, “the
state of the art in space travel”. Moreover, it is also an adjective referring to the level
of development (as of a device, procedure, process or technique) reached at any
particular time usually as a result of modern methods (Merriam-Webster Online
Dictionary, 2006). It could be meant as the current level of advancement achieved by
the most modern, up-to-date technology or thinking (English Dictionary, 2006).
7
You undoubtedly learned something about teaching from your teachers, but
what if they were bad teachers? Even if you did have good teachers, this method at
best gives the new professor a limited repertoire and does not provide for any of the
necessary practice. This approach also does not help you incorporate new
educational technology into the classroom unless you have had the rare opportunity
to take a course from one of the pioneers in these areas. An opinion contrary to this is
given by Highet (1976, p. 112), who argues that a course on education during
graduate study is not needed since students can learn by watching good and bad
teachers. Some of the characteristics of good teachers may well be inborn and not
made, but the same can be said for engineers.
An efficient teacher can do a good job teaching in the same amount of time
an inefficient teacher spends doing a poor job. New professors who study educational
methods will likely be better prepared to teach and will be more efficient during their
first years in academia. There is a general trend toward reducing the number of
courses in pedagogy and increasing the number of content courses for both grade
school and high school teachers. However, there is no trend toward zero courses or
no practice in how to teach. The optimum number of courses in teaching methods
undoubtedly lies between the large number required of elementary school teachers
and the zero number taken by most engineering professors. The demand for more
and more technical courses is frequently heard at both the undergraduate and
graduate levels in fact.
9
The teaching technique that is best for the students is often not economically
feasible, especially in terms of public schooling. Reducing class size is expensive,
and many schools do not have the budget to maintain small classes. Similarly, the
teaching resources best suited to the students, such as the latest technology, may not
be available to the teacher. Teachers must find the best techniques to teach the
students using the resources available to them (Think Quest, 2000). The teaching
methods commonly employed on the college level include lectures, demonstrations,
laboratory exercises, discussion and quiz sections, field trips, audio-visual
presentations, and seminars. Examples of other methods are independent study,
programmed instruction, and self study teaching modules (Univ. of Georgia, 2003).
If the lesson content is such that it requires the quick, efficient coverage of a
lot of facts, teacher-centered methods, such as lectures, demonstrations, slides, or
audio-visual presentations, may be indicated. On the other hand, student-centered
methods, such as laboratory exercises, field trips, student demonstrations or reports,
or reading assignments, may be more effective when intense student involvement is
needed to increase the understanding of broad concepts or processes (Univ. of
Georgia, 2003). The following brief discussions of the use of some of the more
common instructional strategies may be helpful as you seek to develop your own
repertoire of teaching techniques.
10
2.4 Lecturing
Lecturing is often equated with college teaching. This is not rapidly changing,
however, as university instructors have begun to recognize that not all students
benefit from lecture, nor is lecture the most efficient way to disseminate information.
Originally the “lecturer” read to an audience because access to written material was
limited, and many of the learners were illiterate. The printing process, digitalized
information, and general literacy have dramatically changed the lecturer’s function.
Lecturing still has its rightful place among dozens of other teaching techniques, but
the question one has to ask is, “Which technique will do most to help students
learn?” Furthermore, some of the topics lend themselves much more naturally to
lecturing when comparing to others.
The lecture is valid for these reasons: to provide structure and organization to
scattered material; to help pace student learning; to reinforce assigned reading by
providing an alternative perspective or source of information; and to use the public
speaking opportunity to motivate students (Farris, 1985). One of the most common
teaching techniques is the lecture method. It is the most economical method of
transmitting knowledge, but it does not necessarily hold the student’s attention or
permit active participation. However, lectures can be effective, if supported by texts
and other references. About ninety percent of post secondary instruction uses the
lecture method, but it is significantly less common in primary and secondary schools.
Being in the same room with someone saying something is not equivalent to
learning it. Students must engage the material to retain it. Also, given that students’
attention span is around 15 to 20 minutes long and university classes last 50 to 75
minutes, you need to do something to control their attention. Lectures should be
punctuated with periodic activities. Many university instructors report that when they
intersperse short lectures with active engagement for students for as brief a time as
two to five minutes, students seem to become re-energized for the next 15 to 20
minutes mini lecture (Middendorf and Kalish, 1996). When you start to plan a lecture,
first consider your audience. Undergraduate students represent a broad cross section
of backgrounds and skills, and as a result may arrive at college with varying levels of
competence. You neither want to talk over their heads nor to patronize them. You
will be more effective if you try as much as possible to draw on knowledge they
already have or appeal to experiences that, by analogy, suit the topic. Before
preparing the lecture, ask yourself: how does the lecture fit into the course as a whole?
What are your objectives?
Do you want to provide the students with an overview of the subject, give
them some background information, or provoke them into further contemplation?
Once you’ve decided that the nature of your topic is indeed suitable for a lecture and
have considered both your objectives and the knowledge level of your audience, you
still want to make sure that what you need to cover will fit within the time allotted. A
typical instructor lament is that there is so much material and so little time. Good
organization will enable you to eliminate irrelevant material so that you may cover
important points more thoroughly. One award-winning university faculty member
told us that “I believe in the ‘few things’ approach. Rather than going through a lot of
topics, I cover a few in great depth. Having students stay with a few topics provides a
longer lasting learning experience than jumping through a lot of different things”
(Middendorf et. al., 1996). Another university professor tells us that in 20 years of
teaching a large introductory lecture course, he has gradually eliminated 75 percent
of the material he tried to cover. He thinks it is much better for his students to really
learn a little than for them to be buried under too much (Farris, 1985).
12
A lecture should be designed with the student’s perspective in mind. What are
students’ current knowledge, assumptions, biases, and, perhaps, misconceptions
about the topic? In planning the lecture, you will need to find a way to build on the
knowledge students bring, and also provide a means for students to reflect upon their
biases and misconceptions. The lecture overall should be planned to answer the
question, “How will students’ understanding be different at the end of the
presentation?” (Farris, 1985). Once you have determined your subject and what your
students’ needs are, formulate one general question that covers the heart of it, one
you could answer in a single lecture. Take time to write it down and study it. Then
generate three or four points that you could develop to answer this question. Note
these down under the question. You are now gazing at your lecture outline (Farris,
1985). Your next task is to define the elements of your key points and generate
effective examples or analogies for each. Examples generated “on the spur of the
moment” in class tend to be trivial; if prepared in advance, examples can both
illustrate a particular point and broaden students’ understanding of the subject.
Think the examples through carefully and consider ways to illustrate them
with chalkboard diagrams, slides, overhead transparencies, demonstrations, or case
studies, any of which can increase students’ understanding and interest. To
effectively teach concepts, we must tell our students the generality or rule and give
them specific and carefully considered examples. However, that is not enough. If
they are to learn the concept in a usable way, we must provide them with a chance to
practice using it. For example, in an anthropology lecture on ethnocentrism, students
could be asked to list foods from other countries that they find disgusting. Then, you
could give them a list of things Americans eat that are unacceptable to people from
other cultures. The value of this type of exercise is that it helps students to make
connections between ideas and to create structures of meaning out of what otherwise
might be merely a large number of unrelated facts. Demonstrating that you know
more than your students is easy; teaching is more difficult. Keep in mind that how
you relate the material to students will determine your effect as a teacher more than
will your ability to generate perfect, complete answers to every question students ask.
13
Your lecture will be more effective if you remember a number of points about
the style and clarity of presentation. The following suggestions can help ensure that
your lecture is clear and well received (Cashin, 1985). Speak clearly and loudly
enough to be heard. This may seem obvious but undoubtedly we have all sinned
against this prescription. Talk as though you are talking to the person sitting in the
very back of the room. Perhaps in the very first class you should suggest that people
signal you if they cannot hear, e.g., cup a hand behind an ear. Speak slowly. Most of
us tend to speak more rapidly when nervous, and this makes many lectures difficult
to follow. We also do not notice how fast we are speaking unless it is pointed out or
we hear ourselves on tape. Slow down. Avoid distracting mannerisms, verbal tics
like “ah” or “you know,” straightening your notes or tie, etc. Use a videotape early in
the semester to help you identify mannerisms that you want to shed. Provide an
introduction. Begin with a concise statement, something that will preview the lecture.
Give the listeners a set or frame of reference for the remainder of your presentation.
Refer to previous lectures. Attract and focus their attention. Try a broad question to
students or a survey of opinions to help draw student attention to your presentation.
Ask only one question at a time. Do not ask a string of questions one after the
other in the same utterance. For example, ask, “Compare the skeleton of an ape with
that of a human.” Do not ask, “How are apes and humans alike? Are they alike in
bone structure and/or family structure and/or places where they live?” A series of
questions tends to confuse students. They are not able to determine just what the
teacher is requesting from them. Napell (1978), states that videotape replays reveal
an interesting pattern when the teacher asks a series of questions. “Hands will go up
in response to the first question, and a few will go down during the second, and those
hands remaining up will gradually get lower and lower as the instructor finally
concludes with a question very different from the one for which the hands were
initially raised.” Collect several answers to your question, even if the first student to
answer gives a perfect response. Not all students think at the same speed, and you
want to encourage those who were not first to continue reflecting. Often, the third or
fourth answers will add dimensions that the first answer missed.
15
When student questions are desired, request them explicitly, wait, and then
acknowledge student contributions. For example, a teacher may wish to solicit
questions about the plays of Shakespeare, which the class has been studying. The
instructor might say, “What questions or clarifications of points need to be raised?”
or, “Please ask questions about the main characters or the minor characters,
whichever you wish at this point,” or “In light of Sally’s allusion to Lady Macbeth, I
invite you to ask her some questions for embellishment or clarification.” Avoid
soliciting questions without a context, as in the classic, “Any questions?” Indicate to
students that questions are not a sign of stupidity but rather the manifestation of
concern and thought about the topic. Be very careful not to subtly or even jokingly
convey the message that a student is stupid for asking for clarification or restatement
of an idea already raised in class or in the text.
Let students try out their answers by quickly discussing them in pairs or by
writing for a minute or two. They are much more willing to share their answers with
the class when they have had this opportunity. Use a variety of probing and
explaining questions. Ask questions that require different approaches to the topic,
such as causal, teleological, functional, or chronological explanations. Avoid
beginning your question with the words “why” and “explain,” and instead phrase
your questions with words which give stronger clues about the type of explanation
sought. Thus, for a chronological explanation, instead of asking, “Why did we have a
depression in the 1930s?” try “What series of events led up to the stock market crash
of 1929 and the high unemployment in the 1930s?”
When answering a student’s question, keep in mind your goals for that day’s
class. If the question moves the class toward that goal, you will want to give a
complete answer or to redirect it to the class for discussion. If the question is not
pertinent, you can tell the student where he or she can find an answer or offer to
discuss it after class. However, a majority of the new instructors are often at a loss
when they do not know the answer to a question. But it is not necessary to be able to
field every question, and students can sense when an instructor “fakes” an answer.
Instead, the instructor can offer to find the answer (and then should be sure and
follow up) or suggest to the student where he or she can find the answer to the
questions being asked in fact.
16
Knowing the content to be covered is not enough. Naming the chapter your
students will read is not enough. If you’ve only thought as far as, “I want students to
know,” you haven’t thought through enough about what needs to be taught. You
should be able to articulate what the students will be able to do with the information
or ideas. For example, in a philosophy class for which students has read a chapter on
epistemologies or theories of knowledge, you might want students to be able to
construct legitimate arguments for and against any epistemology about which they
have read. Having a clear goal in mind makes it much easier to plan a discussion.
You know what you want students to get out of it. But it is not enough: an instructor
told the story of how she wanted her students to deal with the issue of prejudice.
Many discussion activities can be used in the classroom. You want to choose
one that will help your students meet your goals for the discussion. The more specific
you can be in assigning the task, the more likely your students will be to succeed at it.
Some possible tasks are as follows: Think-Pair-Share, brainstorm, buzz groups, case
analysis, role-playing, and press conferences. Choosing a grouping method varies by
size, method of selection, and duration. By size: Two to six is ideal. Smaller groups
(two-three) are better for simple tasks and reaching consensus. Also, students are
more likely to speak in smaller groups. Larger groups of four-five are better for more
complex tasks and generating lots of ideas. By selection: Randomly assigning
students to groups avoids the problem of friends wanting to get off track.
For long term groups, you may want to select for certain attributes or skills
(e.g. a statistician, geology major, and a writer) or by interest in the topic, if different
groups have different tasks. By duration: Just for this activity or for all semester.
Stop the discussion groups while they are still hard at work; next time, they will
work doubly hard. Long term groups allow students to practice collaborative skills
and make stronger bonds, but sometimes they get tired of each other. Choosing a
debriefing method may involve many techniques which can get students to share
what their smaller groups have done with the entire class: verbally, on newsprint/
flipchart, blackboard or overhead, ditto/ photocopy, etc. And you don’t have to hear
from everyone; calling on a few groups at random to report works quite well.
Computer labs can be among the richest experiences students have at the
university. It is one of the few opportunities students will have to practice computer
and science much in the way professionals do. Often, though, labs are presented as
mere recipes in which students follow precise instructions to arrive at a conclusion
whose importance is not clear. In order for labs to be effective, students need to
understand not only how to do the experiment, but why the experiment is worth
doing, and what purpose it serves for better understanding a concept, relationship, or
process. The most important thing you can do to ensure that your lab sections run
smoothly is to be well prepared. Your preparation, prior to the start of the semester,
should include being acquainted with the storeroom of the lab so that time won’t be
lost during a lab looking for necessary equipment or materials, and if applicable,
knowing the location of the first aid kit, basic first aid rules, and procedures for
getting emergency assistance (Ronkowski, 1986). Basic weekly planning for your lab
section might include the following.
Know exactly what the students are supposed to learn and why they have to
learn these things. This will come in handy when your students start to wonder why
they’re doing what they’re doing. Perform the entire experiment in advance. There is
no guarantee it’s going to work as advertised in the lab manual. By going through the
lab yourself, you’ll be familiar with some of the stumbling blocks that your students
may confront and you’ll know the subtle points of the process you are demonstrating.
If this isn’t possible, at least read through the procedure as though you were doing it.
And familiarize yourself with the equipment that your students will be using. Also,
obtain some sample data and work the calculations and answer the questions
(without using the key). Read and study the theory on which the experiment(s) are
based. Your understanding of the theoretical aspect of the lab should be useful to you
in handling most student questions which don’t deal with concrete parts of the
experiment(s). Research the relevance of the experiment, both the technique being
taught and the applications of the theory being demonstrated. Talk to experienced
instructors. They will often have very useful tips about things you are teaching. Plan
how you will guide students in preparing their lab reports.
21
questions to guide small group discussion. Pay careful attention to the sequencing of
the questions. Early questions might ask participants to make observations about the
facts of the case. Later questions could ask for comparisons, contrasts, and analyses
of competing observations or hypotheses. Final questions might ask students to take
a position on the matter. The purpose of these questions is to stimulate, guide or prod
(but not dictate) participants’ observations and analyses. The questions should be
impossible to answer with a simple yes or no. Debrief the discussion to compare
group responses. Help the whole class interprets and understand the implications of
their solutions. Then, allow groups to work without instructor interference. The
instructor must be comfortable with ambiguity and with adopting the non-traditional
roles of witness and resource, rather than authority.
There are some guidelines for designing the case study questions including
the cases can be more or less “directed” by the kinds of questions asked; these kinds
of questions can be appended to any case, or could be a handout for participants
unfamiliar with case studies on how to approach one. What is the situation; what do
you actually know about it from reading the case? (Distinguishes between fact and
assumptions of critical understanding), what issues are at stake? (Opportunity for
linking to theoretical readings), what questions do you have; what information do
you still need? Where or how could you find it? What problem(s) need to be solved?
(Opportunity to discuss communication versus conflict, gaps between assumptions,
sides of the argument), what are all the possible options? What are the pros and cons
of each option? What criteria should you use when choosing an option and lastly
what does that mean about your assumptions?
This method of teaching is based on the simple, yet sound principle that we
learn by doing. Students learn physical or mental skills by actually performing those
skills under supervision. An individual learns to write by writing, to weld by welding,
and to fly an aircraft by actually performing flight maneuvers. Students also learn
mental skills, such as speed reading, by this method. Skills requiring the use of tools,
machines, and equipment are particularly well suited to this instructional method
(Dynamic Flight, 2003). Every instructor should recognize the importance of student
performance in the learning process. Early in a lesson is to include demonstration
and performance; the instructor should identify the most important learning
outcomes. Next, explain and demonstrate the steps involved in performing the skill
being taught. Then, allow students time to practice each step, so they can increase
their ability to perform the skill. The demonstration-performance method is widely
used. The science teacher uses it during laboratory periods, the aircraft maintenance
instructor uses it in the shop, and the flight instructor uses it in teaching piloting
skills. There are five essential phases in including explanation, demonstration,
student performance, instructor supervision and lastly evaluation.
that have been explained and demonstrated. The second activity is the instructor's
supervision. Student performance requires students to act and do. To learn skills,
students must practice. The instructor must, therefore, allot enough time for
meaningful student activity. Through doing, students learn to follow correct
procedures and to reach established standards. It is important that students be given
an opportunity to perform the skill as soon as possible after a demonstration. In flight
training, the instructor may allow the student to follow along on the controls during
the demonstration of a maneuver. Immediately thereafter, the instructor should have
the student attempt to perform the maneuver, coaching as necessary. In another
example, students have been performing a task, such as a weight and balance
computation, as a group. Prior to terminating the performance phase, they should be
allowed to independently complete the task at least once, with supervision and
coaching as necessary. In this phase, the instructor judges student performance. The
student displays whatever competence has been attained, and the instructor discovers
just how well the skill has been learned.
For slides, less is more. Students learn more when they view fewer slides but
have more time to analyze and interpret them. Discussions, short writing assignments,
and application exercises will reinforce concepts and increase learning from slides.
With slides, the three steps are slightly different than those with video. Prior to
viewing, rehearse the points you want to make about each slide; plan questions to
direct student attention and activities to encourage student participation. While
viewing, direct student attention; give them a question or two to answer as they view
the slides. Do not turn the classroom lights all the way off. Do not show more than
five slides in a row, or view multiple slides for more than five minutes at a time.
During post viewing, leave an empty slot after every few slides. Ektographic
projectors, the most commonly used type at universities, will shut off automatically
when a blank slot is left between slides. At this point, give the students an activity to
respond to the slides: discussions, short writing assignments, or application exercises,
for example, will reinforce the concepts and increase learning (Middendorf, 1993).
Make your notation consistent with that in the textbook or lecture, so that
students do not have to translate from one system into another. Underline or in some
other way mark the most important parts of your presentation: the major assumptions,
conclusions, or intermediate steps that you plan to refer to later on. Colored chalk
may help to clarify drawings. Talking about what you are writing gives your students
the material in both visual and auditory modes. Be sure to speak loudly enough; if
you are facing the board to write on it, you must raise your voice somewhat to be
heard. Other tips for effective board use are including erase only when you have run
out of space. If you find that you have made a mistake, stop. Don’t go back over the
last three panels madly erasing minus signs: first explain the error, then go back and
make corrections, if possible, with a different color of chalk or marker.
If you are presenting material that you want students to duplicate in their
notes, you need to give them time to copy what you have written. They will want to
copy everything you put on the board into their notes, even if you tell them not to.
Don’t ask them to analyze while they are writing. When you want them to discuss a
point, stop writing. Let people catch up to you (they may be lagging behind by two
or three lines). Then begin your discussion. Similarly, if you have engaged in a long
discussion without writing very much on the board, allow them time to summarize
the discussion in their notes before you begin to use the board or to speak. Students
will copy everything you put on the board (and sometimes nothing else) into their
notes. The board should serve to highlight and clarify your discussion or lecture.
Find out if you are using the board effectively. After class, request one
advanced and one average student to lend you their notes. If the notes seem
inadequate, ask yourself what you could have done to make your presentation more
clear. At some point, ask your students if they can read or make sense of what you
have written. Don’t do this every five minutes; an occasional check, however, is in
order. View a videotape of your presentation, putting yourself in the place of a
student taking notes. After the chalk or marker board, the overhead projector is the
most frequently used teaching tool in the college classroom. Many of the points
made above about board use apply to the overhead. Keep in mind these guidelines
when producing and presenting transparencies (Middendorf, 1993). These guidelines,
will improve legibility of your projected materials and the students comprehension.
28
Even if you find excellent materials to download and present in class, these
may not always serve your instructional objectives. Select carefully, and make sure
students know what is important and why. If you plan to surf on the web during a
presentation, plan meticulously the navigation sequence. Students can grow fatigued
and uninterested watching you click and browse, looking for the correct link. Also, if
you are not the author of the pages you are planning to visit, it is a good idea to
check the links the day of the presentation. Certain pages and links undergo continual
editing, and may not always look the same from one visit to the next. Also make sure
you’ve checked the pages in the browser you’ll use in class. Some pages interact
differently with different browsers. It is less risky to download the pages and run
them from a disk, rather than rely on the active server. Finally, be sure to enlarge the
size of the display font in the browser and minimize clutter on screen by turning off
extraneous buttons bars. In developing your presentation, allow for frequent periods
when you can move away from the computer to share the students’ perspective.
29
However, some of the short courses are directly related to the continuing
professional development in the field of construction management. This programme
was designed to enable individuals, in a short time-block, to update their professional
skills or to acquire new computing skills. It also provides an opportunity for
individuals who, through their various professional commitments are unable to attend
courses during business hours, to obtain personal or professional development. In the
Department of Civil and Building Engineering at Loughborough University, the
modules and short courses are available for Continuing Professional Development
which can be accumulated for a Master of Science in Construction Management
degree (Loughborough University, 2006). For Universiti Teknologi Malaysia, its
School of Professional and Continuing Education (SPACE) is offering the short
courses in Construction Management based on the modules and subjects in the
Master of Science in Construction Management programme which are also
conducted by the UTM Construction Management lecturers (UTM, 2006).
31
Much of the discussion here relates to the development and the implications
of different quality requirements for construction as well as the issues associated
with insuring conformance. Safety during the construction project is also influenced
in large part by decisions made during the planning and design process. Some
designs or construction plans are inherently difficult and dangerous to implement,
whereas other, comparable plans may considerably reduce the possibility of
accidents. For example, clear separation of traffic from construction zones during
roadway rehabilitation can greatly reduce the possibility of accidental collisions.
Beyond these design decisions, safety largely depends upon education, vigilance and
cooperation during the construction process. Workers should be constantly alert to
the possibilities of accidents and avoid taken unnecessary risks.
A variety of different organizations are possible for quality and safety control
during construction. One common model is to have a group responsible for quality
assurance and another group primarily responsible for safety within an organization.
In large organizations, departments dedicated to quality assurance and to safety
might assign specific individuals to assume responsibility for these functions on
particular projects. For smaller projects, the project manager or an assistant might
assume these and other responsibilities. In either case, insuring safe and quality
construction is a concern of the project manager in overall charge of the project in
addition to the concerns of personnel, cost, time and other management issues.
Inspectors and quality assurance personnel will be involved in a project to represent a
variety of different organizations.
Each of the parties directly concerned with the project may have their own
quality and safety inspectors, including the owner, the engineer/architect, and the
various constructor firms. These inspectors may be contractors from specialized
quality assurance organizations. In addition to on-site inspections, samples of
materials will commonly be tested by specialized laboratories to insure compliance.
Inspectors to insure compliance with regulatory requirements will also be involved.
Common examples are inspectors for the local government’s building department,
for environmental agencies, and for occupational health and safety agencies. The US
Occupational Safety and Health Administration (OSHA) routinely conduct site visits
of work places in conjunction with approved state inspection agencies.
35
OSHA inspectors are required by law to issue citations for all standard
violations observed. Safety standards prescribe a variety of mechanical safeguards
and procedures; for example, ladder safety is covered by over 140 regulations. In
cases of extreme non-compliance with standards, OSHA inspectors can stop work on
a project. However, only a small fraction of construction sites are visited by OSHA
inspectors and most construction site accidents are not caused by violations of
existing standards. As a result, safety is largely the responsibility of the managers on
site rather than that of public inspectors. While the multitude of participants involved
in the construction process require the services of inspectors, it cannot be emphasized
too strongly that inspectors are only a formal check on quality control. Quality
control should be a primary objective for all the members of a project team.
Managers should take responsibility for maintaining and improving quality control.
Employee participation in quality control should be sought and rewarded, including
the introduction of new ideas. Most important of all, quality improvement can serve
as a catalyst for improved productivity. By suggesting new work methods, by
avoiding rework, and by avoiding long term problems, good quality control can pay
for itself. Owners should promote good quality control and seek out contractors who
maintain such standards.
While the general information about the construction site is usually available
at the planning stage of a project, it is important for the design professionals and
construction manager as well as the contractor to visit the site. Each group will be
benefited by first-hand knowledge acquired in the field. For design professionals, an
examination of the topography may focus their attention to the layout of a facility on
the site for maximum use of space in compliance with various regulatory restrictions.
In the case of industrial plants, the production or processing design and operation
often dictate the site layout. A poor layout can cause construction problems such as
inadequate space for staging, limited access for materials and personnel, and
restrictions on the use of certain construction methods. Thus, design and construction
inputs are important in the layout of a facility.
The construction manager and the contractor must visit the site to gain some
insight in preparing or evaluating the bid package for the project. They can verify
access roads and water, electrical and other service utilities in the immediate vicinity,
with the view of finding suitable locations for erecting temporary facilities and the
field office. They can also observe any interference of existing facilities with
construction and develop a plan for site security during construction. In examining
site conditions, particular attention must be paid to environmental factors such as
drainage, groundwater and the possibility of floods. Of particular concern is the
possible presence of hazardous waste materials from previous uses. Cleaning up or
controlling hazardous wastes can be extremely expensive.
Reinforcing bars for concrete can also be pre-cut and shaped to the desired
configuration in a manufacturing plant or in an automated plant located proximate to
a construction site. A major problem in extending the use of pre-fabricated units is
the lack of standardization for systems and building regulations. While designers
have long adopted standard sizes for individual components in designs, the adoption
of standardized sub-assemblies is rarer. Without standardization, the achievement of
a large market and scale economies of production in manufacturing may be
impossible. An innovative and more thorough industrialization of the entire building
process may be a primary source of construction cost savings in the future.
based on the lump sum price computed by multiplying the quoted unit price for each
specified task by the corresponding quantity in the owner’s estimates for quantities.
However, the total payment to the winning contractor will be based on the actual
quantities multiplied by the respective quoted unit prices. Instead of inviting
competitive bidding, private owners often choose to award construction contracts
with one or more selected contractors. A major reason for using negotiated contracts
is the flexibility of this type of pricing arrangement, particularly for projects of large
size and great complexity or for projects which substantially duplicate previous
facilities sponsored by the owner. An owner may value the expertise and integrity of
a particular contractor who has a good reputation or has worked successfully for the
owner in the past. If it becomes necessary to meet a deadline for completion of the
project, the construction of a project may proceed without waiting for the completion
of the detailed plans and specifications with a contractor that the owner can trust.
However, the owner’s staff must be highly knowledgeable and competent in
evaluating contractor proposals and monitoring subsequent performance.
The language used for specifying the risk assignments in these areas must
conform to legal requirements and past interpretations which may vary in different
jurisdictions or over time. Without using standard legal language, contract provisions
may be unenforceable. Unfortunately, standard legal language for this purpose may
be difficult to understand. As a result, project managers often have difficulty in
interpreting their particular responsibilities. Competent legal counsel is required to
advise the different parties to an agreement about their respective responsibilities.
Standard forms for contracts can be obtained from numerous sources, such as the
American Institute of Architects (AIA) or the Associated General Contractors (AGC).
These standard forms may include risk and responsibility allocations which are
unacceptable to one or more of the contracting parties. In particular, standard forms
may be biased to reduce the risk and responsibility of the originating organization.
42
Legal procedures are highly structured with rigid, formal rules for
presentations and fact finding. On the positive side, legal adjudication strives for
consistency and predictability of results. The results of previous cases are published
and can be used as precedents for resolution of new disputes. Negotiation among the
contract parties is a second important dispute resolution mechanism. These
negotiations can involve the same sorts of concerns and issues as with the original
contracts. Negotiation typically does not involve third parties such as judges. The
negotiation process is usually informal, unstructured and relatively inexpensive. If an
agreement is not reached between the parties, then adjudication is a possible remedy.
A third dispute resolution mechanism is the resort to arbitration or mediation and
conciliation. In these procedures, a third party serves a central role in the resolution.
These outside parties are usually chosen by mutually agreement of the parties
involved and will have specialized knowledge of the dispute subject. In arbitration,
the third party may make a decision which is binding on the participants. In
mediation and conciliation, the third party serves only as a facilitator to help the
participants reach a mutually acceptable resolution.
43
The success of a contractor depends upon this estimate, not only to obtain a
job but also to construct the facility with the highest profit. The planner has to look
for the time-cost combination that will allow the contractor to be successful in his
commitment. The result of a high estimate would be to lose the job, and the result of
a low estimate could be to win the job, but to lose money in the construction process.
When changes are done, they should improve the estimate, taking into account not
only present effects, but also future outcomes of succeeding activities. It is very
seldom the case in which the output of the construction process exactly echoes the
estimate offered to the owner. In the monitoring and control stage of the construction
process, the construction manager has to keep constant track of both activities'
durations and ongoing costs. It is misleading to think that if the construction of the
facility is on schedule or ahead of schedule, the cost will also be on the estimate or
below the estimate, especially if several changes are made. Constant evaluation is
necessary until the construction of the facility is complete. When work is finished in
the construction process, and information about it is provided to the planner, the third
stage of the planning process can begin. The evaluation stage is the one in which
results of the construction process are matched against the estimate. A planner deals
with this uncertainty during the estimate stage.
Only when the outcome of the construction process is known is he/she able to
evaluate the validity of the estimate. It is in this last stage of the planning process that
he or she determines if the assumptions were correct. If they were not or if new
constraints emerge, he/she should introduce corresponding adjustments in future
planning. Even before design and construction processes begin, there is a stage of
“pre-project planning” that can be critical for project success. In this process, the
project scope is established. Since construction and design professionals are often not
involved in this project scope stage, the terminology of describing this as a “pre-
project” process has arisen. From the owner’s perspective, defining the project scope
is just another phase in the process of acquiring a constructed facility. The definition
of a project scope typically involves developing project alternatives at a conceptual
level, analyzing project risks and economic payoff, developing a financial plan,
making a decision to proceed (or not), and deciding upon the project organization
and control plan. The danger of poor project definition comes from escalating costs
(as new items are added) or, in the extreme, project failure.
45
The costs of a constructed facility to the owner include both the initial capital
cost and the subsequent operation and maintenance costs. Each of these major cost
categories consists of a number of cost components. The capital cost for a
construction project includes the expenses related to the initial establishment of the
facility including land acquisition, including assembly, holding and improvement;
planning and feasibility studies; architectural and engineering design; construction,
including materials, equipment and labor; field supervision of construction;
construction financing ; insurance and taxes during construction; owner’s general
office overhead; equipment and furnishings not included in construction and lastly
inspection and testing. The operation and maintenance cost in subsequent years over
the project life cycle includes the following expenses such as land rent, if applicable
operating staff; labor and material for maintenance and repairs; periodic renovations;
insurance and taxes; financing costs; utilities and owner’s other expenses.
The magnitude of each of these cost components depends on the nature, size
and location of the project as well as the management organization, among many
considerations. The owner is interested in achieving the lowest possible overall
project cost that is consistent with its investment objectives. It is important for design
professionals and construction managers to realize that while the construction cost
may be the single largest component of the capital cost, other cost components are
not insignificant. For example, land acquisition costs are a major expenditure for
building construction in high-density urban areas, and construction financing costs
can reach the same order of magnitude as the construction cost in large projects such
as the construction of nuclear power plants. From the owner’s perspective, it is
equally important to estimate the corresponding operation and maintenance cost of
each alternative for a proposed facility in order to analyze the life cycle costs. The
large expenditures needed for facility maintenance, especially for publicly owned
infrastructure, are reminders of the neglect in the past to consider fully the
implications of operation and maintenance cost in the design stage. In most
construction budgets, there is an allowance for contingencies or unexpected costs
occurring during construction.
48
attributes of the system. The role of statistical inference is to estimate the best
parameter values or constants in an assumed cost function. Usually, this is
accomplished by means of regression analysis techniques. Unit costs for bill of
quantities: A unit cost is assigned to each of the facility components or tasks as
represented by the bill of quantities. The total cost is the summation of the products
of the quantities multiplied by the corresponding unit costs. The unit cost method is
straightforward in principle but quite laborious in application. The initial step is to
break down or disaggregate a process into a number of tasks. Collectively, these
tasks must be completed for the construction of a facility. Once these tasks are
defined and quantities representing these tasks are assessed, a unit cost is assigned to
each and then the total cost is determined by summing the costs incurred in each task.
The level of detail in decomposing into tasks will vary considerably from one
estimate to another.
A listing of the most important information sets would include the cash flow
and procurement accounts for each organization, intermediate analysis results during
planning and design, design documents, including drawings and specifications,
construction schedules and cost estimates, quality control and assurance records,
chronological files of project correspondence and memorandum, construction field
activity and inspection logs, legal contracts and regulatory documents. Some of these
sets of information evolve as the project proceeds. The financial accounts of
payments over the entire course of the project are an example of overall growth. The
passage of time results in steady additions in these accounts, whereas the addition of
a new actor such as a contractor leads to a sudden jump in the number of accounts.
Some information sets are important at one stage of the process but may then be
ignored. Common examples include planning or structural analysis databases which
are not ordinarily used during construction or operation. It may be necessary at later
stages in the project to redo analyses to consider desired changes. In this case,
archival information storage and retrieval become important. Even after the
completion of construction, an historical record may be important for use during
51
Based on the conceptual plan, the cost estimate and the construction plan, the
cash flow of costs and receipts for a project can be estimated. Normally, this cash
flow will involve expenditures in early periods. Covering this negative cash balance
in the most beneficial or cost effective fashion is the project finance problem. During
planning and design, expenditures of the owner are modest, whereas substantial costs
are incurred during construction. Only after the facility is complete do revenues
begin. In contrast, a contractor would receive periodic payments from the owner as
construction proceeds. However, a contractor also may have a negative cash balance
due to delays in payment and retainage of profits or cost reimbursements on the part
of the owner. Plans considered by owners for facility financing typically have both
long and short term aspects. In the long term, sources of revenue include sales, grants,
and tax revenues. Borrowed funds must be eventually paid back from these other
sources. In the short term, a wider variety of financing options exist, including
borrowing, grants, corporate investment funds, payment delays and others.
53
Many of these financing options involve the participation of third parties such
as banks or bond underwriters. For private facilities such as office buildings, it is
customary to have completely different financing arrangements during the
construction period and during the period of facility use. During the latter period,
mortgage or loan funds can be secured by the value of the facility itself. Thus,
different arrangements of financing options and participants are possible at different
stages of a project, so the practice of financial planning is often complicated. On the
other hand, the options for borrowing by contractors to bridge their expenditures and
receipts during construction are relatively limited. For small or medium size projects,
overdrafts from bank accounts are the most common form of construction financing.
Usually, a maximum limit is imposed on an overdraft account by the bank on the
basis of expected expenditures and receipts for the duration of construction.
Contractors who are engaged in large projects often own substantial assets and can
make use of other forms of financing which have lower interest charges than
overdrafting. In recent years, there has been growing interest in design-build-operate
projects in which owners prescribe functional requirements and a contractor handles
financing. Contractors are repaid over a period of time from project revenues or
government payments. Eventually, ownership of the facilities is transferred to a
government entity.
As a general principle, however, the costs of funds for construction will vary
inversely with the risk of a loan. Lenders usually require security for a loan
represented by a tangible asset. If for some reason the borrower cannot repay a loan,
then the borrower can take possession of the loan security. To the extent that an asset
used as security is of uncertain value, then the lender will demand greater return and
higher interest payments. Loans made for projects under construction represent
considerable risk to a financial institution. If a lender acquires an unfinished facility,
then it faces the difficult task of re-assembling the project team. Moreover, a default
on a facility may result if a problem occurs such as foundation problems or
anticipated unprofitability of the future facility. As a result of these uncertainties,
construction lending for unfinished facilities commands a premium interest charge of
several percent compared to mortgage lending for completed facilities.
The borrowed funds are usually secured by granting the lender some rights to
the facility or other assets in case of defaults on required payments. In contrast,
corporate bonds such as debentures can represent loans secured only by the good
faith and credit worthiness of the borrower. Refinancing of debts has two major
advantages for an owner. First, they allow re-financing at intermediate stages to save
interest charges. If a borrowing agreement is made during a period of relatively high
interest charges, then a repurchase agreement allows the borrower to re-finance at a
lower interest rate. Whenever the borrowing interest rate declines such that the
savings in interest payments will cover any transaction expenses (for purchasing
outstanding notes or bonds and arranging new financing), then it is advantageous to
do so. Another reason to repurchase bonds is to permit changes in the operation of a
facility or new investments. Under the terms of many bond agreements, there may be
restrictions on the use of revenues from a particular facility while any bonds are
outstanding. These restrictions are inserted to insure bondholders that debts will be
repaid. By repurchasing bonds, these restrictions are removed. For example, several
bridge authorities had bonds that restricted any diversion of toll revenues to other
transportation services such as transit.
CHAPTER 3
RESEARCH METHODOLOGY
This is also known as the documentary frequency studies where, it is also the
type of normative-survey research, like historical research, deals with records which
already exist. But it is definitely quantitative. It is not concerned with the general
importance of the documents, but with certain characteristics which can be identified
and counted. The fact that one works directly from documents does not mean that he
avoids all problems of collecting and selecting data. In some cases, he may need only
to produce a few books from a library, but in other cases he may need to collect his
documentary specimens from afar, and he may have to select only certain aspects of
these specimens for his study. In documentary analysis, the following may be used as
sources of data such as records, reports, printed forms, letters, autobiographies,
bulletins, catalogues, syllabi, court decisions, pictures, films and cartoons. When
using documentary sources, one must bear in mind the fact that data appearing in
print are not necessarily trustworthy. Documents used in this research must be
subjected to the same careful types of critics employed by the historian. Not only is
the authenticity of the document important, but the validity of its contents is also
crucial in fact (Kulbir Singh Sidhu, 1984).
Hence, the purposes of the documentary studies are including describing the
prevailing practices or conditions; to discover the relative importance of, or interest
in certain topics or problems; to discover level of difficulty of presentations in
textbook or in other publications; to evaluate bias, prejudice or propaganda in
textbook presentations; to analyze types of errors in student’s work; to analyze the
use of symbols representing persons, political parties or institutions, countries, or
points of view; to identify the literacy style, concepts or beliefs of a writer and lastly
to explain the possible causal factors related to some outcome, action or event. The
curriculum analysis can be particularly valuable in curriculum revision. The
underlying theory states that since not everything known can be taught in school, the
things which are socially most useful should be selected and taught. These can be
discovered by an appropriate interpretation of frequency analysis of social activities
and interest. In fact, this research technique is to tackle the reviewing of the current
syllabuses and short courses material in the Construction Management education.
58
TOPIC SELECTION
Firstly, a research topic is being selected
through an extensive literature review,
reading and surveying on journals, reference
books and previous research articles. Then,
Stage 1 the possible practical outcome of the study is
decided. The area of research is being
Topic Selection matched with the supervisors who have the
related expertise and specialization.
Writing about the web portal deployment planning is a little like those heady
philosophical discussions one has in high school about Existentialism, and the
struggle to make rational decisions in an irrational universe. A lot of that type of
debate relates to the building of portals, particularly the need to make choices and
then commitments to them. The difficult aspect of this decision making is that portal
design involves the task of aggregating disparate subsystems into a single interface
that has to satisfy a contradictory set of users and their needs. Additional factors that
make this decision-making process so difficult are the rapid changes in data and
technologies, organizational issues, and, last but not least, ignorance. Portal plans
often start out innocently as a means of collaboratively sharing information among a
common user base. Questions like “Who will use the portal?”; "What synergy among
our disparate user groups will this portal bring?” and perhaps, “What self-service
features can we expect from this portal?” will have been addressed in broad terms at
the onset of a program, so that the monies needed for development and deployment
start flowing. But what happens next? One word comes to mind: chaos.
where they are going to go next. If a design does not provide a proper navigation
model, users may become confused, lose interest, and ultimately browse somewhere
else. A portal is defined as retrieving the information such as calendar, messageboard,
news feed, search, query and email from the office cupboard. Generally, a file
cabinet is a place where multitudes of related and unrelated data are stored for office
use. The file cabinet analogy can be applied to portals because they warehouse
unrelated data for business operations. With file cabinets, individual folders are
tabbed to indicate the content they keep. With portals, portlet applications emulate
folders in that they represent individual subsystems of data. Typically, a requirement
is considered a specific characteristic or functionality that the system must perform
on a problem domain from a customer’s perspective. If a requirement is established
but does not affect a stakeholder, it should be considered a design or implementation
decision. To gather requirements for a portal project, development, testing, and
design teams should sit down with all of the program’s stakeholders who are
responsible for all of the different subsystems and portlets to determine the features
that are needed for the successful deployment of your system.
The exclusion of partners who are expected to contribute content to the portal
usually ends up hurting your program in the long run. Similarly, the inclusion of
extraneous portal participants in your development or design meetings could also be
a distraction. A compromise must be drawn that allows for the limited participation
of each portlet subsystem’s team with members who possess technological and
problem domain expertise of their application. Those members must then be allowed
to report back to their team about the details of those meetings. Last, all concerned
parties should be prepared to negotiate trade-offs in each other’s deployments.
Requirements come in many flavors, but the following sections describe some
typical requirements that portal applications might consider capturing during their
design activities, along with definitions and questions you should ask. Operational
requirements focus on 24 hours and 7 days portal uptime so that user operations and
maintenance activities do not conflict. Some questions that your design team might
consider when capturing these requirements are as follows like what does the system
do?; what are your performance constraints and expectations?; how often and when
will new content be made available to users?; lastly when and what maintenance
activities are needed to service the portal community?
61
This profile acts like a filter for content and is stored on either the client’s
machine or on some content provider’s server. Unfortunately, latency issues can
become a problem with the implementation of push technology. Networks can
become overloaded and filters can allow significant amounts of unwanted content to
be propagated to a system if the filters are not properly configured. Typically,
profiles work well for simple queries such as stock quotations and weather forecasts
and can overwhelm a system when complex alert systems are implemented.
Additionally, consideration needs to be given to how your portal system persist data
during transactional activities. Will a relational database or an XML file suffice as
data-persistence mechanisms? Are your data operations atomic, and can they be
rolled back if they are not properly processed? Should data abstraction layers be
implemented, like Java Data Objects (JDO) or other Object/ Relational Mapping
(ORM) tools? These are just a few of the issues that your portal team should
deliberate on during data requirements analyses.
62
Security is usually one of the biggest concerns for any portal deployment
process. Relevant data needs to be exposed to users of a portal based on profile
information that might be stored in an LDAP directory server or some other
persistent data store for retrieval. User communities need to be established so that
Web content can be targeted properly to the portal audience. Some questions that
might be used to capture common security requirements are as follows: “Will
declarative or programmatic security is implemented?”; “What type of a Security
realm is needed for deployment?”; “Will security features propagate properly among
all of the disparate portlets?” Compromised data on a portal application, or any Web
application for that matter, negatively impacts the user community that will use and
support that application. Any single incident can severely damage the reputation of a
company that deploys a portal, which will impair its ability to effectively conduct
future operations. Because of this, portal applications must address the threat of a
security breach or the compromising of delicate user profiles, by implementing
security operating policies that can help improve user trust. Many portal frameworks
roll their own proprietary security APIs, but in many instances, consideration should
be given to the adherence to open security standards.
Perhaps that seems trivial, but the time savings are invaluable when the
system indicates that the code is no longer working several months after checking it
into a source code repository. With these tests, the programmer can jog the memory
in an easy fashion to recollect how his code worked, and determine what new bugs
were introduced to undermine the software. Several open-source offerings can be
used to perform unit testing (JUnit) and load testing activities (JMeter). Bugs are an
unavoidable aspect of software development. The key to dealing with them is
ensuring that they are tracked and fixed, and that someone corroborates that they are
properly corrected. Web-based defect tracking systems provide program stakeholders
with the capability to remotely ascertain the feature requests, bug fix details, and
problem resolution. Scarab (http://scarab.tigris.org/) is an open-source tool that you
can implement to meet your bug defect tracking needs. Continuous integration is a
concept championed by Martin Fowler that emphasizes an Extreme Programming
practice of testing the software baseline through automated procedures to ensure that
64
bugs reveal themselves quickly rather than propagating through the system and
revealing themselves in the latter stages of development, which could cripple the
deployment plans. Clearly, requirements are important in that they capture what the
stakeholders of a system expect their system to do. In order for these requirements to
be considered valid, they need to be correct, realistic, and traceable. Portal
component developers must be vigilant in their requirements capturing undertakings
because scope creep or mismanaged requirements handling can undermine the efforts
of all the dependent groups that are responsible for its release. For example, it makes
no sense to establish a requirement that your target run on a Solaris platform when
you’ve been told that the application you’re developing can only run on Windows.
System performance always tests the stated criterion that your requirements should
be realistic. Sure, you can state that your content queries should return results in less
than five seconds, but is that always realistic? Sometimes more difficult queries can
deliver results after five seconds; does that mean that your requirement is unrealistic?
Perhaps, but it is always important to set realistic requirement goals that apply to
reasonable requests that occur in a consistent manner.
Some search engines omit text submitted with the search request so that they
can search for terms that is deemed more relevant. This operation means that words
such as “a” and “the” might be overlooked during the search operation. Furthermore,
some engines discriminate between uppercase and lowercase characters in a search
string, others do not. A problem with keyword searching is that words that are
spelled the same but have different meanings result in ambiguous content returns
from your query. A concept search attempts to determine what the query string
actually means and tries to obtain content that is statistically related to the string
query. In addition to these two types of searches, search engines enable users to
refine their queries to target content they need. Some of that refinement includes the
capability to search for two or more words and to exclude words that might confuse
the engine database. Boolean operators in the form of words or symbols are part of
that query refinement. Boolean operators such as AND, OR, and NOT, as well as +, -,
enable the search operation to combine and subtract terms from the request.
66
The idea of using computer to assist training of people started long ago like
the use of Computer-assisted Training (CBT). Since the invention of Internet and
various digital media, this idea of using these media for educational experience
emerges as what we call e-learning today. E-learning is sometimes refereed to as
online Learning/ Education or Network Learning/ Education. Till now, many
universities or organizations have implemented some forms of e-learning system to
extend their education or training online. In general, E-Learning is the use of
technology to enhance educational experience. It includes Computer-based Training
(CBT), Web-based Training (WBT), digital collaboration and virtual classroom,
delivered via Internet, intranet, extranet, e-books, and CD-ROMs etc. Some people
also tried to give some richer meanings to e-learning by saying that the “e”, besides
“electronic”, also means “extended” and “expanded”. As the Internet technologies
allow global access to any Website, e-learning system via Internet is able to provide
online learning opportunity 24 hours a day to users.
In general, users of an LMS are divided into two main classes: Students and
Tutors. Whilst tutors have a similar view of the LMS to students, they usually have
additional tools and privileges that allow them to add materials, create conferences
and track student’s progress. In some cases students have an area for conversation
that is private from the tutor’s view. To many organizations, LMS is a basic engine
for e-learning initiatives. If technology is the backbone of an e-learning program,
services are activities that link facilitators, users and managers together on this
backbone. Services are required in the running of an e-learning program. Services are
in the form of content creation and delivery, facilitator support, marketing, launching,
facilitation, monitoring, assessment, collection of user feedback, newsletter, helpdesk,
and any form of ongoing support to users of an e-learning program.
While e-learning services are activities that link facilitators, users and
management together, strategies are principles, thoughts and methods on how to use
the resources and services in order to achieve the e-learning objectives. The two
levels of strategies that are important to an e-learning program are the learning
strategies and e-learning strategies. For learning strategy, the strategy here includes
use of pedagogy, instructional design principles, way of delivery, level of interaction
and participation, level of facilitation, level of resource support, and type of
collaboration model in order to achieve the objectives of an e-learning program for a
particular group of users (Christopher Tan, 2003).
After the content for particular course is created and loaded to a LMS for user
to access in a particular e-learning program, the following issues are frequently
raised: How easy can the content of this course be portable to other LMS? Can some
of the small sub units of the content for this course be readily assembled to become
the content for another course? If the answers to the above questions are “no”, it
would means content for this e-learning program would have to be recreated in many
ways, and this would mean cost and labor. A Reusable Learning Object (RLO) is an
element of or all of an instructional program that is delivered using technology. RLO
can be lesson plans, case studies, quizzes, simulations, or interactions. These objects
are stored in a database and briefly described using MetaData. MetaData, in this
context, is the information about the learning object. MetaData can be the name of
the author, the instructional approach used, or the learning objective it works to
fulfill. RLOs allow designers to create content once, store the content in a database
using MetaData and deliver the content in many different structures. RLOs can
provide the underlying structure for Adaptive Learning Systems. Educators or course
facilitators can, based on the demands of different learner groups, pull together
different lessons consisting of a combination of these basic learning objects and
present to or accessed by learner groups A and B.
77
Open source doesn’t just mean access to the source code. The distribution
terms of open-source software must comply with the following criteria: 1. Free
Redistribution. The license shall not restrict any party from selling or giving away
the software as a component of an aggregate software distribution containing
programs from several different sources. The license shall not require a royalty or
other fee for such sale. Rationale: By constraining the license to require free
redistribution, we eliminate the temptation to throw away many long-term gains in
order to make a few short-term sales dollars. If we didn’t do this, there would be lots
of pressure for cooperators to defect. 2. Source Code. The program must include
source code, and must allow distribution in source code as well as compiled form.
Where some form of a product is not distributed with source code, there must be a
well-publicized means of obtaining the source code for no more than a reasonable
reproduction cost–preferably, downloading via the Internet without charge. The
source code must be the preferred form in which a programmer would modify the
program. Deliberately obfuscated source code is not allowed. Intermediate forms
such as the output of a preprocessor or translator are not allowed.
know who is responsible for the software they are using. Authors and maintainers
have reciprocal right to know what they’re being asked to support and protect their
reputations. Accordingly, an open-source license must guarantee that source be
readily available, but may require that it be distributed as pristine base sources plus
patches. In this way, “unofficial” changes can be made available but readily
distinguished from the base source. 5. No Discrimination against Persons or
Groups. The license must not discriminate against any person or group of persons.
Rationale: In order to get the maximum benefit from the process, the maximum
diversity of persons and groups should be equally eligible to contribute to open
sources. Therefore we forbid any open-source license from locking anybody out of
the process. Some countries, including the United States, have export restrictions for
certain types of software. An OSD-conformant license may warn licensees of
applicable restrictions and remind them that they are obliged to obey the law;
however, it may not incorporate such restrictions itself. 6. No Discrimination
against Fields of Endeavor. The license must not restrict anyone from making use
of the program in a specific field of endeavor. For example, it may not restrict the
program from being used in a business, or from being used for genetic research.
Rationale: The major intention of this clause is to prohibit license traps that
prevent open source from being used commercially. We want commercial users to
join our community, not feel excluded from it. 7. Distribution of License. The rights
attached to the program must apply to all to whom the program is redistributed
without the need for execution of an additional license by those parties. Rationale:
This clause is intended to forbid closing up software by indirect means such as
requiring a non-disclosure agreement. 8. License Must Not Be Specific to a
Product. The rights attached to the program must not depend on the program’s being
part of a particular software distribution. If the program is extracted from that
distribution and used or distributed within the terms of the program’s license, all
parties to whom the program is redistributed should have the same rights as those
that are granted in conjunction with the original software distribution. Rationale:
This clause forecloses yet another class of license traps. 9. License Must Not
Restrict Other Software. The license must not place restrictions on other software
that is distributed along with the licensed software. For example, the license must not
insist that all other programs distributed on the same medium must be open-source
79
At the same time, the United Nations Educational, Scientific and Cultural
Organization, UNESCO, has also opened a gateway to resources related to the free
software and open source technology movement. Some of the open source e-learning
software is as follows. Online Learning and Training; OLAT is a web-based
Learning Management System (LMS)/ Learning Content Management System
(LCMS) used in the public sector of Switzerland. The initial development started at
the University of Zurich, Switzerland where it is deployed on the main OLAT server.
Official support for OLAT is available at the OLAT-Center. OLAT is open source
and completely free of charge. The e-Learning XHTML editor (eXe) is a web-based
authoring environment designed to assist teachers and academics in the design,
development and publishing of web-based learning and teaching materials without
the need to become proficient in HTML, XML or complicated web-publishing
applications. It supports SCORM exports for LMS. Moodle is a free, open source
PHP application for producing Internet-based educational courses and Web sites on
any major platform (Linux, Windows and Mac OS X). Courses are easily built up
using modules such as forums, chats, journals, quizzes, surveys, assignments,
workshops, resources, choices and more. Moodle has been designed to support
modern pedagogies based on social constructionist, and focuses on providing an
environment to support collaboration, connected knowing and a meaningful
exchange of ideas (UNESCO, 2005).
3.13 Linux Web Solutions with Apache, PHP, MySQL and ht://Dig
Of all the web servers on the market today, Apache is most popular because it
supplies basic web server functionality right out of the box. Yet, many customers
want a more sophisticated website, one with SQL database functionality, search
capabilities, and server-side scripting. The complexity and interdependencies of these
packages make it difficult for independent software vendors, solution developers,
and website administrators to put together a solution. Customizing the Apache server
with additional functionality can be complex on the Linux platform. The solutions
for extending functionality are just not obvious. This explanation describes how to
install, configure, and deploy a sophisticated Apache website on the Linux operating
system. Such a website includes the powerful, server-side scripting language, PHP3,
access to the full-featured SQL database, MySQL and the ht://Dig search engine. All
of the software packages described in this description is open source applications.
What makes open source software so attractive? First of all, it is free. Secondly, you
get copies of the software source code, which frees you to control the software to
meet your short-term and long-term requirements.
Apache is more widely used than all other web servers combined. A survey
by Netcraft in September 2000 substantiates this claim. After polling over 21 million
sites for web server software usage on Internet-connected computers, they found that
over 61% of all Internet websites run on the Apache server. (For updates, see
http://www.netcraft.com/survey/). Clearly, the Apache Software Foundation is
meeting its goal “to provide a secure, efficient, and extensible server that keeps its
HTTP services in step with HTTP standards.” The Apache Web Server Project
homepage contains versions of the Apache server and corresponding documentation
that you can download. The official website for the Apache Web server is
http://www.apache.org/. In term of getting the support and help from Apache, this
organization has prepared their online documentation and a list of frequently asked
questions, the Apache site maintains a number of mailing lists. To receive mail from
other Apache developers about code releases, bug fixes, security fixes, and other
information, join one, such as announce@apache.org. Locate the mailing list at
http://www.apache.org/announcelist.html (Compaq, 2000).
83
The PHP (originally Personal Home Page) scripting language supports the
creation of dynamic, customized websites. With PHP, developers embed scripts
within web pages. The web server calls PHP to perform the script operations, and
then the server returns the page to the user. Functionally, PHP and the Microsoft
Active Server Page (ASP) scripting language are quite similar. PHP popularity
continues to grow. Many open-source and commercial projects choose PHP as an
implementation language for web-based e-mail solutions, database access tools, and
shopping carts for e-commerce sites, among others. The official PHP website at
http://www.php.net publishes usage statistics it receives from NetCraft. At the
current growth rate, as of September 2000, there will be in excess of 3.5 million
(virtual) servers using PHP. To read a complete list of projects, select “Projects” on
the PHP website. In addition to online documentation and a list of frequently asked
questions, the PHP site maintains a set of mailing lists. As mailing list members learn
about the PHP product, they can share their findings with others on the mailing list.
If you prefer a bundled set of information, you can subscribe to the twice-daily digest.
Multiple countries maintain mailing lists; at the time of this writing, there are
versions in English, Italian, Portuguese, and Spanish. For general discussions
subscribe to php3@lists.php.net. To subscribe to this or another mailing list, see the
PHP3 support page, http://www.php.net/support.php.
Alternatively, these steps can be followed for Apache, PHP, MySQL and
ht://Dig setup as well. Moodle (in this research, Dokeos is applied) requires that a
webserver, PHP and a supported database be installed to run on Windows. This may
be achieved by using EasyPHP, a package that bundles all the software you need in
the form of Apache (webserver), PHP and MySQL (database) into a single Windows
application. Please note however, that EasyPHP is not designed to be used for a
production server. Here are the steps from start to finish. 1. Preparation: Firstly, if
you have ever installed MySQL before (even as part of another package), uninstall it
all, delete all the MySQL files and make sure you delete c:\my.cnf and
c:\windows\my.ini. You might want to do a search and delete ANY file called
my.cnf or my.ini. If you’ve ever installed PHP before delete any files called
php4ts.dll from around your Windows directory, as well as any files called php.ini. 2.
Get EasyPHP: Then, download EasyPHP from here: EasyPHP 1.7 (approx 10 Mb).
You may want to try the later EasyPHP 1.8 (approx 9 Mb). 3. Install EasyPHP: Run
the downloaded file: easyphp1-7_setup.exe. The installation process is in French but
is much like installing any other Windows program (Moodle Docs, 2006).
It is advised to accept the defaults and letting it all install. Note: that
“Suivant” means Next and “Oui” means Yes. At the end of the install leave the
checkbox selected to “Lancer EasyPHP” (Start EasyPHP) and hit the “Terminer”
button. You might be taken to an information web page which you can safely ignore.
If all went well, congratulations! Apache, PHP and MySQL are all installed and
running! You should see a black E in your toolbar tray. You can right click on it to
get a menu which will let you control the running programs, but you won’t need that
for now. Some things may be in French and you may prefer English. You can
download this file http://www.easyphp.org/telechargements/dn.php?F=indexUS_1.7
which contains English versions of www and home folder in the EasyPHP1-7 folder.
These can be copied over the default files. 4. Create a database: The next thing you
need to do is to set up a database for Moodle (in this research, Dokeos is applied) to
use. Right-click the black E in the toolbar tray and choose Administration, then click
DB Management (beside PHPMyAdmin). Alternatively, using a browser, go to
85
http://localhost/mysql/ (note the final slash). If asked for a username, use “root” with
a blank password. You should see a phpMyAdmin web interface that allows you to
create a new databases and user accounts. Create a new database by typing “moodle”
(in this research, Dokeos is applied) into the field and hitting the “Create” button.
That was easy! You can also create a new user to access your database if you want.
This can be a bit tricky for a first-time user, so you might just want to use the
existing user “root” with no password in your Moodle (in this research, Dokeos is
applied) config for now, and fix this later. 5. Get Moodle! (Dokeos): You’re ready to
install Moodle! (In this research, Dokeos is applied); download the latest release of
Moodle from Moodle.org, or Dokeos from Dokeos.com then unzip the archive. 6.
Installing Moodle (Dokeos): Copy your Moodle (in this research, Dokeos is applied)
files into C:\Program Files\EasyPHP\www. You can either copy the entire Moodle/
Dokeos directory (ie C:\Program Files\EasyPHP\www\moodle) or copy all the
contents of the Moodle (Dokeos) directory. If you choose this second option then
you will be able to access your Moodle/ Dokeos home page using http://localhost/
instead of http://localhost/moodle/ (Moodle Docs, 2006).
Make a new empty folder somewhere else for Moodle (Dokeos) to store
uploaded files in, eg: C:\moodledata or C:\dokeosdata. Go into your Moodle (Dokeos)
folder. Make a copy of config-dist.php, and call it config.php. 7. The web based
installer: You’re nearly there now! The rest of the setup is all web-based. Visit
http://localhost/moodle/admin/ with your browser to continue the setup via your
browser. To use zip files with Moodle (for example the backups use zip) you might
need to enable “zlib”. You can do this by going to your EasyPHP directory
(C:\Program Files\EasyPHP), and running the program phpini.exe in there. Put a
mark in the checkbox next to “zlib.dll”. Close that window, and then go to the black
E in your toolbar and right-click it to get a menu; select “Restart” from this menu. 8.
Tips: If you don’t or can’t use EasyPHP, here are a few tips to make sure your PHP
is set up correctly and avoid common problems: Make sure you enable the GD
module so Moodle (Dokeos) can process images; you may have to edit php.ini and
remove the comment (;) from this line: ‘extension=php_gd2.dll’. Make sure you
enable the Zlib module so that you can create and unpack zip files from within
Moodle (Dokeos). You may have to edit php.ini and fix the directory for
session.save_path; instead of the default “/tmp” use a Windows like “c:/temp”.
86
The e-learning framework can be broken down into four layers, each with a
series of modular components. The first layer, presentation tier should consist of
portal, entitlement, profiles and user interface. Then, the second layer is to be
supported by the common service tier including the user management, user
administration, collaboration, schedule management, event management and service
locator. These are followed by the third layer which is also known as the e-learning
service tier, consisting of learning content management, learning management,
learning administration, assessment, and digital resources. The last layer is called a
resource tier repository which is made of learning content, learning meta-data,
learning administration, learning assessment, and user. In getting started with
implementation, the precursors to any successful e-learning architecture, regardless
of type of institution, are three key elements including resources, constituents and
strategy. In addition, the implementation roadmap has 3 phases including web
applications, web services and web futures. However, passing through the first phase
is not a prerequisite for entering the second phase (Sun Microsystems, 2003).
88
supports multiple forms of interaction and is able to adopt new mechanisms with
advances in technology. The main forms of interaction supported including e-mail,
threaded discussion, web cast, desktop sharing/ stimulation, white-boards and chat.
Schedule Management/ Calendar: All services have access to a single schedule
management system controlling both synchronous and asynchronous messages
between the services and the users. Examples of this functionality might include
reminder messages on the progress of a student application for enrollment. User
calendar functionality is also supplied by the schedule management service. Event
Management: All interaction between users and services is captured by the event
management service. This data provides invaluable information for both program
management and research into the pedagogy of e-learning. This warehouse of events
then allows for both canned and dynamic reporting. An example of dynamic
reporting might include the ability to ask “How long does it take for a tutor to
respond to a student query?”
Dokeos contains several tools for different purposes. The Agenda/ calendar
Announcements: important messages for the students (contains also mail
functionality); Course Description: explain the objectives, methodology, course
material, assessment methods to the students; Documents: a basic file manager to
store all kind of documents; Learning Path: determine how the students should
browse through your course. This tells the student which steps he should follow. It
guides the students through your course. Example: pretest, view document 1, post
text, visit site X. With this tool you can also set prerequisites. For instance: the site
cannot be visited before the test has been completed. The learning path is SCORM
compatible and can import and export SCORM packages. Links: links to external
sites; Forums: asynchronous discussion. Drop Box: students can submit
assignments to the teacher (instead of filling the mailbox of the teacher with mails
with large attachments); Groups: group several users together (for a specific task for
instance); Chat module: instant discussion; Student publications: students can
share their work with the rest of the students; Tracking: who has done what and
when and more (Wikipedia4, 2006).
All these different tools are getting more and more combined where each
group has (or can have) its own private document space. Each group has (or can have)
its own private forum. Moreover, a teacher can post an agenda item or announcement
for one or more groups or user or for all the students. Resources (a document, a link,
a forum message) can be combined with the resource linker: you can also add an
‘attachment’ to another course resource in a forum message, an announcement, or an
agenda item. The Dokeos code is written in PHP, using MySQL as database backend.
It already supports SCORM import, and SCORM export is now in an experimental
stage. User data can be imported into the system using CSV or XML files. Dokeos
can add user info and authenticate through LDAP. For the next release (1.6) the
Dokeos developer team is putting effort into complying with W3C xhtml and CSS
standards. Some JavaScript is still required however, and using SCORM more or less
requires the use of frames in the learning path module. The Dokeos development is
an international project where universities, organizations and individuals contribute.
94
EasyPHP is a complete software package allowing using all the power and
the flexibility that offers the dynamic language PHP and the efficient use of
databases under Windows. Package includes an Apache server, a MySQL database, a
fully PHP execution, as well as easy development tools for your web site or your
applications. In order for your scripts to be executed, you must place your files in the
“www” directory. The Apache server is configured to automatically open an index
file when you enter the address ‘http://localhost/’ (Apache must have been started).
This page is the default start page, it’s the proof that EasyPHP is running. You are
advised to create a directory for each project inside the “www” directory; so you can
easily manage all of your developments. To proceed, create a new directory in the
“www” or use the directory created after the installation: “project1” (can be
renamed). Then, save the PHP page with of the following extension: php, php3, php4.
This is the usual set up of the EasyPHP. Extensions may vary with your hosting
company, so don’t forget to change the extension if needed.
95
The Dokeos open source e-learning software could be obtained from here
(http://www.dokeos.com/) without paying any fee. Through this web portal, users
would have the abilities to experience themselves the demo campus which indicated
the stimulation of a Dokeos system. The counter section is ready for downloading the
latest documentation and software developed. Besides, paying services are also
available for special consultation and training, hosting and support, development and
migration, customers and partners, and lastly the video conferencing. Since then,
Dokeos is developed in order to respond to the vision of using Dokeos as a human
resources training tool. To fulfill the requirements of open source software, it also
has completed with the Dokeos world wide community. There is a list of worldwide
list, user’s forum, and universities consortium. It is then a course management web
application translated in 34 languages and helping more than 1,000 organizations
worldwide to manage learning and collaboration activities. Dokeos is also a company
helping these organisations launches and develops blended learning programs.
96
As until the last step discussed, the local web server has been set up. One
easy way to start the Dokeos installation is to right click the EasyPHP button which
is represented with the symbol “E”, and click at the local web option. The keyboard
shortcut for this command can also be done by pressing the “F7” button instead. It
seems like you don’t have much choices except clicking the “Install Dokeos” button.
Immediately, you will see the interface as what is shown at the figure above. There
are 6 steps in this installation process and let us start with the “New installation”
button. Step 3 is the MySQL database settings. At this moment, we just need to
follow the default values since our purpose is to run the whole web at the desktop
only. The database host will be set to “localhost”, database username is “root” and
the database password can be left blank at this moment. To proceed, just click
“Next”. Here comes the configuration setting where the administrator is requested to
key in their particulars like email, last name, first name, telephone, login, password,
portal name and the organization short name. Click “Next” until finish then.
98
Install is web based. The mail system should be configured during the
installation, but is not vital for a test installation. Email functions in the Dokeos
system are handled by standard PHP functions, and are configured through the
php.ini file. On windows, find and open php.ini (could be placed here
c:\windows\php.ini or for EasyPHP 1.7:EasyPHP1-7\apache\php.ini). Then, search
for “SMTP”. Change the default value to: SMTP= [name of your smtp.mailserver.tld
that handles outgoing messages]. For example: SMTP= smtp.myserverprovider.com,
or SMTP=smtp.inapg.fr. Restart the web server. In Outlook, the necessary
information for outgoing mail can be found in Tools, Options, Send mail, Accounts,
Parameters and Connections. After installation, before entering admin interface, you
should create a course so that you can play with a non-empty course list. On the
home page of your portal, log in as admin, Click on Create a course area and fill in
the form. All values are important during the course creation here. After that, to
delete a course see section for course management.
99
You can look for a course using the search form on top of Courses tool. It
will search all fields: name, code, leader (teacher), language, etc. Once the course
located, you can modify its settings, move it to another category, delete it or make a
backup of it. The backup will consist of a ZIP file stored, by default, in the Archive
directory at the root of the Dokeos web server area. It can be restored through the
Create course button of the portal home page (depending on config, by default, only
system administrator can restore courses). During the backup process you can also
export the course ZIP archive into the Archive directory of another Dokeos portal,
e.g. a test installation on a teacher machine. Once the copy is made, it is, by default,
located in the “archive” directory at the root of Dokeos install. As campus admin,
you can restore it through “Create a course”. At the bottom of “Create a course” you
have a “Restore” link. If the course already exists, it will be replaced, so be careful.
There is no function yet to duplicate a course in two different occurrences. The
restore does not restore the users but only creates a CSV list of the users.
102
The uploading courses are done by the teachers and trainers of the related
subjects like for Construction Project Management, Construction Site Management
and Safety Control, Construction Technology, Construction Law and Contract,
Project Planning and Scheduling, Construction Management Information System,
Financial Management, Project Estimating and Human Resource Management. The
above figure showed about the uploaded courses note for Construction Management
Information System. The same arrangement will also go to the Professional Short
Courses which are organized by the CTMC, FKA at UTM. However, the sequences
of the course notes are not in the correct order since this is the limitation of the
software itself. In order to make a proper sequential arrangement of the notes, the
teacher will have to upload the last lecture notes first and then followed by the earlier
versions of notes. When it completes, the interface will be like what we can see at the
above. Trainers can also upload and delete the notes that they want. Then, the
students will just need to click the “ZIP” button for notes downloading.
104
4.14 Configuration
Config is text based. To edit your Dokeos portal settings, use a good text
editor (Ms-Word or Open Office are NOT text editors). Consider using: on MAC:
SimpleText on Windows: Notepad or Editplus on Linux: Bluefish or Quanta. The
files to be edited are located in dokeos/claroline/inc/conf. which can be situated like
this: C:\Program Files\EasyPHP\www\dokeos\claroline\inc\conf. Important. In
general you need to restart the server software (e.g. EasyPHP) for modifications to be
implemented. 1. Main configuration file; the main information about the installation
is claro_main.conf.php. It is highly recommended to read this file. A few extracts
follow here: $rootWeb=”http://localhost/dokeos/”. The URL of the school, the name
“localhost” is for a test installation on a single PC. For access to the installation from
another machine change the “localhost” to a network accepted name of the hosting
machine, or use your web address for the school. $rootSys=”c:/program
files/easyphp/www/dokeos/”. The files for the school are placed in this directory.
When you write http://localhost/dokeos/ in a browser you get the index.php in this
directory. $garbageRepositorySys=”c:/program
files/easyphp/www/dokeos/claroline/garbage/”.
Change this address to a place out of web if you can. There is no need to take
back up of this directory. $mysqlRepositorySys=”C:/Program
Files/EasyPHP/mysql/data/”. The place for the data of the school, general
information given during installation (examples): $siteName=”VICIM e-school”,
$CourseProgram=http://www.ucl.ac.be/etudes/cours, $administratorSurname=”Doe”,
$administratorName=”John”, $emailAdministrator=”admin@localhost”,
$telephone=”(000) 001 02 03”, $administrator[“name”]=$administratorName.”,
“$administratorSurname, $administrator[“phone”]=$telephone,
$administrator[“email”]=$emailAdministrator, $educationManager[“name”]=”Albert
Einstein”, and $educationManager[“phone”]=”” $educationManager["email"]="",
$Institution="VICIM", $InstitutionUrl=http://www.vicim.urv.es,
$allowSelfReg=true. The user can make self-registration. $allowSelfRegProf=true.
The user can make self-registration to become a teacher. Not recommended. 2. Self
modification of profile and email: To modify user’s behavior, for instance, edit
106
5. Upload limits, Size: Limits for the maximum size of files you can upload
are both in Dokeos itself and in the settings of your PHP and Apache server:
/etc/php.ini (in Windows it may be C:\WINDOWS\php.ini... or look for php.ini file),
claroline/inc/conf/group.document.conf.php and claroline/document/document.php
In php.ini I set the upload_max_filesize = 50M and in the: claroline/document/
document.php the ($maxFilledSpace = 500000000). The claroline/inc/conf/group.
document.conf.php has as standard: $groupDocument_maxFilledSpace = 20000000.
Still, big files upload through the web might prove an uncertain experience. If you
want to upload very big files to a course, consider using FTP. The files sent by FTP
are shown by the Documents tool. Time: Upload limit could also come from the
php.ini time limit. By default, PHP scripts execution are limited to 30 seconds. If the
upload exceeds these 30 seconds, the PHP scripts ends before the upload is complete.
You can either change your php.ini file, or add to the beginning of the concerned
scripts a set_time_limit (int seconds) statements. In php.ini you change:
max_execution_time = 30 to something higher.
107
As the e-learning system administrator, the author can always click on at the
platform administration link which is located at the top blue bar in the system itself.
Right immediately, the above snap screen would be appearing in front of the monitor.
This could in fact show the detail layout of the whole “Dokeos” e-learning system
that is available now. Thus, there are 5 main sub-trees including the users, courses,
classes of users, platform and dokeos.com sections. The users section is consisting of
the users list, add users functions, export the user list into an XML/ CSV file or
importing a list of users from an XML/ CSV file instead. Meanwhile, the courses
section provides the functions like course list, creating a course, manage virtual
courses, categories of courses and adding users to the course. Classes of users also
consist of the class list and adding the classes function. Platform section however, is
to provide the Dokeos configuration settings, system announcements, languages and
to configure homepage. At the same time, Dokeos also providing the services to host
the developed e-learning system to the internet with paying a fee.
109
The print screen above indicates the start from the “My course’s menu” such
as after logging in the system where it must have already created a course website.
After that, click on the title of the course that you wish to administer. The course
main page contains all the features visible to the students, but there are more options
available, and two additional sections to this screen. If you see course from student
point of view (you see course home page but are not offered to hide or show its
content), then the login you entered is not a valid teacher login. A solution to this
may be to self-register once again and inform the system administrator that the
ancient login can be deleted. It can be convenient to view the work as a student will
see it. In top right corner it is possible to change between the teacher and the student
profile. When you are a teacher, change to student profile by clicking on the “Student
view”. Return to the teacher environment by click on “Teacher view”. At the top of
the screen is the introduction text for the course. Click on “Modify” to alter the text
that is displayed “Edit/ Add text”, then click OK to update the introduction text.
110
4.18 Agenda
The agenda appears both in each course area and as a synthetic tool for the
student (“My agenda” in top banner). In the course, the agenda appears as a list of
events. You can attach documents or activities to a date so that the agenda becomes a
chronological program for the learning activities. In addition to being present in the
agenda, the new events are indicated to the student when he or she logs in the next
time. The system tells what has been added in the Agenda (and in the
Announcements) since his or her last visit; icons appear on the portal home page
besides the courses where events and announcements have been added. If you want
to go further in the logic of structuring learning activities one after the other, it is to
be suggested that you use preferably the Learning Path that offers the same principles
with more advanced features. The Learning Path can be considered as a synthesis of
a Table of Contents tool with an Agenda and sequencing (imposed order) and
tracking. Click on the “Modify” icon in the agenda item to be changed and to amend
the details displayed as required. Then, click on OK to accept changes.
111
This learning path will look like a Table of Contents and can be used as a
Table of Contents, but it will offer much more. The Learning Path tool has two
functions including creating a learning path and upload a SCORM or IMS format
learning path. A Learning Path is a sequence of learning steps included in modules. It
can be content-based (looking like a table of contents) or activities-based, looking
likes an agenda or a program of what you need to do in order to understand and
practice a certain knowledge or know-how. In addition to being structured, a learning
path can also be sequenced. This means that some steps will constitute pre-requisites
for others (“you cannot go to step 2 before step1”). Your sequence can be suggestive
(you show steps one after the other) or imperative (you add pre-requisites so that
people are forced to follow the sequence). The first step is to arrive to Learning Path
Builder section. In the Learning Path screen, there is a link to it. There you can create
many paths by clicking onto “Add a new learning path”. But they are empty, till you
add modules and steps to them.
112
4.20 Dropbox
5.2 Conclusions
In fact, the Dokeos open source e-learning software is very simple and
straight forward software which can be also categorized as user-friendly as well.
However, the software itself is considered as powerful software as this has been
proved by its diversity users from all around the world. The users’ requirement is set
to the minimum so that all of them can handle and utilize this software easily.
Whereas, this is the main concern of the author to ensure that both of the lecturers,
trainers, postgraduate students and the short courses participants could be able to rely
on this software for fulfilling the needs of self-paced learning and training. Besides,
with the development of this software, it would also improve and eliminate the
unnecessary process when transferring the course notes from the trainers/ lecturers to
the students and short courses participants. In this case, e-learning has really helped
and could reduce the unnecessary steps in disseminating knowledge and at the same
place with the guarantee of transferring the safe course notes and material to the
students and learners. This process could be discussed as the users must be connected
with the internet connection first where this internet is considered as a facilities that
has been well established among the Malaysian.
After reaching and getting into the CTMC e-learning website, the users just
need to key in their particulars including usernames and passwords only. Since the
software is so user-friendly, the author believed that the users could use to the system
in just a split second. There should be no problem at all. At the mean time, this
system is being developed as part of the Construction Technology and Management
Centre (CTMC), at Faculty of Civil Engineering (FKA), Universiti Teknologi
Malaysia (UTM) web application. After all, this system should be managed and
administrated by the Faculty of Civil Engineering (FKA) webmaster. On the other
hand, this system is also acted as the document management system for the
Construction Technology and Management Centre (CTMC) especially for their
related courses and lecture notes which are to be delivered for the students and short
courses participants. Finally, this research is also very much concerning in enhancing
the use of Information Technology (IT) application for the learning’s and training’s
document management system particularly in the construction industry.
116
The research done has several limitations such as the web-based learning
system is only focused on the platform of providing the space and location for the
placement and storage of the lecture notes and contents so that they are free from any
virus attacks and internet threats such as hackings and virus hits. Although this
system is simple, it has reached and fulfilled the objectives in this research as to
develop a web-based learning system for the post graduate candidates and the short
courses participants in order to provide a medium, to learn and gain knowledge in the
field of Construction Management. This succeed way to eliminate and avoid from
especially the virus attack would have helped the Construction Technology and
Management Centre (CTMC), FKA, UTM to save in a lot of the resources including
monetary, personnel and time in managing their courses and lectures contents.
courses included in the system as well other than the Masters program and
professional short courses. Most current e-learning products and services overlooked
one crucial factor: how people learn. Work in the area of “collaborative learning” has
shown that learning requires a repertoire of approaches such as: involvement with
realistic tasks, interactions with peers and facilitator or coaches and the opportunities
for feedback and self-reflection. Research into effective e-learning indicates online
communities must be build knowledge together as they work on interesting and
realistic projects and problems. To robustly learn important so call “soft skills” (such
as negotiation or sales techniques, leadership), people must build their new
knowledge by using the new knowledge in multiple ways. They must actively try to
use new ideas and skills, get feedback on a project or performance, and have time to
reflect on what they had done. Despite the availability of new research in areas such
as learning sciences, cognitive science, reasoning, collaborative learning, learner-
centered design, and learning technology, this knowledge is under utilized in most
currently available e-learning products and services. Unfortunately, too many e-
learning companies “deliver course materials” rather than create knowledge-building
communities. And too many e-learning companies stress memorization of facts that
are tested with multiple choice questions, rather than having the learners actually use
their new knowledge and skills as part of collaborative projects with other online
learners. In fact, this situation should be improved indeed.
REFERENCES
Bell, J. (1993). “How to Complete Your Research Project Successfully: A Guide for
First-Time Researchers.” New Delhi: UBS Publisher’s Distributors Ltd.
Cashin W. (1985). “Improving Lectures.” Idea Paper No. 14. Manhattan, KS: Kansas
State University, Center for Faculty Evaluation and Development.
Farris P. J. (1985). “Teaching, Bearing the Torch.” Second, 2nd Edition. Boston:
McGraw-Hill College.
Field C.G. and Rivkin S. R., (1975). “The Building Code Burden.” Lexington Books,
D.C. Heath and Co., Lexington, MA.
Greenberg, L. (2002). “LMS and LCMS: What’s the Difference?” ASTD Learning
Circuit. Available: http://www.learningcircuits.org/2002/dec2002/greenberg.htm.
Last accessed: 8th June 2006.
Highet, G. (1976). “The Immortal Profession: The Joys of Teaching and Learning.”
Weybright and Talley, New York.
120
Kevin Kruse (2006). “Beginner Basics: The Benefits and Drawbacks of e-Learning.”
Available: http://www.e-learningguru.com/articles/art13.htm. Last accessed: 10th
May 2006.
Middendorf, J. (1993). “Active Viewing for Video, Films, and other Audio Visuals.”
Teaching Resources Center Newsletter, 4(1), 3.
Moodle Docs (2006). “Installation Guide for Windows Using EasyPHP.” Available:
http://docs.moodle.org/en/Installation_guide_for_Windows_using_EasyPHP.
Last accessed: 8 September 2006.
Open Source Initiative (2006). “The Open Source Definition.” Available: http://www.
opensource.org/docs/definition.php. Last accessed: 12th August 2006.
Rossett, A. (Ed.) (2002). “The ASTD E-Learning Handbook.” New York: McGraw-
Hill International Corporation.
122
Stice, J. (1991). “The Need for a ‘How to Teach’ Course for Graduate Students.”
Proceedings ASEE Annual Conference, ASEE, Washington, DC, 65.
Think Quest (2000). “The Learning Curve: Teaching Techniques.” Available: http://
library.thinkquest.org/C005704/content_teaching_it_techniques.php3. Last
accessed: 16th May 2006.
Vijayan, M. (2006). “UTM Spent RM500, 000 to Fight Virus Attacks.” Available:
http://thestar.com.my/news/story.asp?file=/2006/6/4/nation/14433226&sec=natio
n. Last accessed: 11th August 2006.
Vouk, M. A., Bitzer, D. L., and Klevans, R. L. (1999) “Workflow and End-User
Quality of Service Issues in Web-Based Education.” IEEE Trans. Knowl. Data
Eng. 11(4), 673 – 687.