E-mastering application utilizing pertinence heuristics evaluation for children

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Choosing ease of use assessment techniques (UEMs) to uncover convenience issues in e-learning projects is affected by time, cost, simplicity of use, and effectiveness. Heuristic assessment has turned into a generally acknowledged technique for ease of use assessment in programming improvement. This paper presents Heuristic Assessment for Tyke E-learning applications (HECE), an exhaustive arrangement of heuristics for kid e-learning alongside a definite clarification for the ease of use specialists on the most proficient method to apply them. These arrangements of heuristics depend on Nielsen's unique ten heuristics produced for programming. Nielsen heuristics are essentially nonexclusive, and won't not include ease of use credits particular to kids or e-learning. The new HECE set would conquer these weaknesses. The legitimacy and viability of these heuristics were assessed against two created e-learning programs composed by ReDSOFT for KG-2 and exceptional need understudies. The outcomes showed that HECE distinguished subjective likenesses and contrasts with client testing, and that HECE is most appropriate for assessing general and kid ease of use. Consolidated with client testing, HECE offers another track that can help with directing the kid e-learning industry to outline applications that are both instructive and pleasurable for youngsters.


  • Keywords


    E-Mastering; Human Computer Interaction; Heuristics Evaluation

  • References


      [1] M. A.Storey, B. Phillips, M. Maczewski, and M. Wang. “Evaluating the usability of Web-Based Learning Tools,” Education Technology & Society, vol. 5, pp.91-100, July 2002.

      [2] B.Wong, T. T. Nguyen, E. Chang, E., and N. Jayaratna. “Usability Metrics for E-Learning,” Workshop on Human Computer Interface for Semantic Web and Web Applications, Springer-Verlag, Heidelberg, Germany, LNCS no. 2889, pp. 235 – 252, 2003.

      [3] C. Ardito, M. F.Costabile, M. De Marsico, R.Lanzilotti, Levialdi S., Roselli T., and V. Rossano, “An Approach to Usability Evaluation of e-Learning Applications,” Universal Access in the Information Society International Journal, vol.4, no. 3, pp. 270-283, 2006.https://doi.org/10.1007/s10209-005-0008-6.

      [4] A. De Angeli, M. Matera, M. F. Costabile, F. Garzotto, and P. Paolini, “On the Advantages of a Systematic Inspection for Evaluating Hypermedia Usability,” International Journal of Human-Computer Interaction, Lawrence Erlbaum Associates, vol. 15, no. 3, pp. 315-335, 2003.https://doi.org/10.1207/S15327590IJHC1503_01.

      [5] R. Molich, and J. Nielsen, “Improving a human-computer dialogue,” Communications of the ACM, vol. 33, no.3, 338-348, March, 1990.https://doi.org/10.1145/77481.77486.

      [6] J. Nielsen, Heuristic evaluation. In J. Nielsen & R. L. Mack (eds.), Usability inspection methods, pp. 25-62, New York: John Wiley & Sons, 1994.

      [7] M. Matera, M.F. Costabile, F. Garzotto, and P. Paolini, “SUE Inspection: An Effective Method for Systematic Usability Evaluation of Hypermedia,” IEEE Transaction, vol.32, no. 1, January 2002.

      [8] R. Jeffries, J. Miller, C. Wharton C., and K. M. Uyeda, “User interface evaluation in the real world: A comparison of four techniques,” in Proc. ACM CHI, pp.119-124, 1991.

      [9] K. H. Madsen, “Special issue on the diversity of usability practices,” Communication ACM, vol.42, no.5, 1999.https://doi.org/10.1145/301353.301415.

      [10] K.Sathesh Kumar, K.Shankar, M. Ilayaraja and M. Rajesh, “Sensitive Data Security In Cloud Computing Aid Of Different Encryption Techniques, Journal of Advanced Research in Dynamical and Control Systems, vol.18, no.23, 2017.

      [11] K. Vijayakumar C,Arun, Analysis and selection of risk assessment frameworks for cloud based enterprise applications”, Biomedical Research, ISSN: 0976-1683 (Electronic), January 2017.


 

View

Download

Article ID: 10009
 
DOI: 10.14419/ijet.v7i1.9.10009




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.