Академический Документы
Профессиональный Документы
Культура Документы
Abstract—Due to the increasing demand for RFID expertise and the existence of a knowledge gap between industry and academia in
this domain, work has been stimulated to help spread understanding in this field and bridge the gap between theoretical examinations
and industrial practices. Among the encouraged work, there is the Integrated Auto-ID Technology for Multidisciplinary Undergraduate
Studies (I-ATMUS) project that involved developing an online learning environment for RFID technology with a remotely controllable
laboratory system. Technological resources can now be accessed by learners through the Web technology to apply appropriate
configurations to the system, conduct experiments using RFID technology, and perform statistical analysis on the acquired data. The
developed educational tool was used by two sets of students, who showed improvements in their confidence, knowledge, and skills.
Index Terms—Remote laboratory, learning environment, online teaching, RFID, hands-on education.
1 INTRODUCTION
these commands and scenarios, and takes care of distribut- problem is by keeping the security level high, but manually
ing them among its subagents (motor agents and relay adding an exception (to the Firewall) for each program that
board agents) in order to create the desired set of motions launches one or more agents, so that agents are able to
and displacements of RFID tags. Note that all forms of choose a communication port and send/receive messages.
communication in this system (commands, scenarios, The second issue is related to the hierarchy of the computer
requests, queries, and data) consist of messages that are routing system. To be more specific, if two computers/
encoded in Extensible Mark-up Language (XML). To know servers are connected to the same Intranet through different
more about this agent-based architecture and the thorough routers, then one of the machines might not always receive
details of its implementation, see [19], [20], [21]. Note that messages from the other. To mitigate this risk, the establish-
[19] also describes the used hardware devices and explains
ment of a sublocal network through one router is suggested.
the step-by-step implementation process, which eases the
task of replicating the overall system. 4.3 Programmatic Control
In such a setting, agents might, and usually do, reside on
NBL is a programming language that was tailored specifi-
different computers/servers. As agent communication is a
cally for this system to ease the use of hardware while trying
key factor for proper functionality of the involved system,
messaging has to be particularly reliable. Two implementa- to obtain a particular setup (such as the one shown in Fig. 5).
tion issues may be faced when adjusting to this require- Two important points about this feature are to be noted:
ment. First, the security level on the connected machines first, the use of NBL is optional because the system interface
has to be lowered to allow such messaging, which may includes soft buttons through which the mechanism can be
cause a whole in the security. A way to alleviate this straightforwardly controlled. This eliminates the issue of
300 IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, VOL. 2, NO. 4, OCTOBER-DECEMBER 2009
having learning barriers or attention dispersion for students. are made. The execution of each scenario translates
Second, NBL is easier to utilize than other more commonly into computational results and/or a set of train
used programming languages, such as C or Java, because it motions that can be either parallel or serial.
treats hardware scenarios as a set of English statements 4. The data-acquisition module: This consists of differ-
rather than function calls, and it uses a generalized (or ent input fields and radio buttons that let users
standardized) way of defining objects (and that is simply by change the environment variables of the experiment
using the keyword “var”) as opposed to typed languages in before conducting it. After the experimentation ends,
which the type of the variables (e.g., integers, doubles, an Excel file that contains the RFID read data is
Booleans, strings, lists, functions, objects, etc.) has to be generated and can be accessed through a link.
defined. Therefore, the user deals with computational
details at a higher (and easier) level and is able to put more 5 STUDENT ASSESSMENT
focus on the hardware control should s/he opt to follow the
programmatic approach. Besides providing users with hands-on experience with
Among the benefits that result from the use of NBL are RFID, this project is also expected to increase the under-
the significant reduction in mouse clicks, the omission of standing of the technology and its relevant areas, improve
tediousness in acquiring specific setups, the construction of student attitudes about engineering education, and enhance
complex testing scenarios, and the option of reading RFID their confidence toward any instructed technology. Surveys
tags while in motion. Moreover, scenarios can be saved in were used to assess the developed educational tool and its
files, and scenario libraries can be established and ex- impact on learners, a fact that provides means to receive
panded for easier future use. Furthermore, NBL has feedback and improve the learning environment and the
computation aspects similar to the other well-known operability of its laboratory testing system.
programming languages (e.g., Java); it lets the programmer Junior level engineering students in Industrial Statistics
use arithmetic operators, loops, if-else statements, lists, and Manufacturing Systems courses (having 14 and
function calls, recursion, etc. Below is an example of an NBL 37 enrolled students, respectively) were assigned different
scenario and its corresponding interpretation: exercises including reading assignments about RFID
technology overview, opportunities, limitations and con-
troversies, designing and implementing RFID solutions,
major application areas, and emerging trends. In addition,
group exercises were assigned to use the developed
education tool for hands-on experiments. Student groups
were asked to use
TABLE 1 TABLE 2
Median Industrial Statistics Student Significance (p Value) of Module in Describing Pre and
Confidence before and after I-ATMUS Postconfidence among Industrial Statistics Students
TABLE 3 TABLE 4
Median Manufacturing Systems Student Significance (p Value) of Module in Describing Pre and
Confidence before and after I-ATMUS Postconfidence among Manufacturing Systems Students
Responses for the second set of questions were collected 9. The content of the module was easy to understand.
after activities in which student teams used our learning 10. The examples and exercises helped me learn.
environment to collect real RFID system data for a larger The median response to each of the 10 items was “agree.”
designed experiment. Teams then estimated, examined for For the hands-on assignment, students worked in groups
adequacy, and selected linear regression models of the larger and were asked to use the camera to acquire a good visual
RFID system in order to understand read rate variation in on the hardware platform. Then they were asked to collect
terms of angle and distance between tags and antennas. data by moving the RFID tags and antennas using manual
Models also led to discussions about how one could use control. The third setup was to code some scenarios using
statistics to understand potential interference among tags. NBL programming language and collect RFID data while
Three students did not participate fully due to absenteeism. the tags were mobile. Such scenarios had a certain degree of
They are not considered in our summary of results. complexity that involved iteration loops (for-loops or while-
loops) and variable declarations. Because students did not
5.2 Manufacturing Systems Course necessarily have experience with programming, they took a
Having assigned numerical values 1-5 to ordered categories short course during a lecture to learn how to use the
“very unsure” through “very confident,” we report in learning environment and NBL language.
Table 3 median confidence before and after Phase 1
activities in the manufacturing systems course with respect 5.3 Review of Student Assessment
to each of the relevant topics. Median confidence improved Median confidence improved in 6/8 and 8/8 topics among
in 8/8 topics, and average median confidence across topics Industrial Statistics and Manufacturing Systems students,
improved greater than 52 percent. In every topic median respectively. Average median confidence improved greater
confidence improved to the category of “confident.” than 35 percent among Industrial Statistics students, and
Significance (p value) of module in describing pre- and 52 percent among Manufacturing Systems students. Theo-
postconfidence among Manufacturing Systems students is retically appropriate statistical models of confidence show
significantly improved confidence in 5/8 topics among
given in Table 4. In every topic, there was significant
Industrial Statistics students. Among Manufacturing Sys-
( ¼ 0:05) improvement from pre- to postmodule confidence.
tems students there is significant improvement in con-
Similar to the other course, in the second set of questions,
fidence about all eight topics. Also in both classes, median
students were asked to indicate their agreement upon some responses to each of the positive statements about activities
statements by choosing from five ordered categories: were “agree.” Finally, there were no consistent, significant
strongly disagree, disagree, neutral, agree, and strongly results with respect to learning style. In summary, the
agree. The statements for this course included: activities introduced to Industrial Statistics and Manufac-
turing Systems seem to have improved student confidence
1. This module helped me to learn more about wireless
about relevant topics remarkably. Student attitudes about
ID technology.
the activities were markedly positive. Results of statistical
2. This module helped me to learn more about wireless
models are not confounded by variable learning styles; the
use of Webcams. activities themselves do not seem to appeal to certain
3. This module helped me to learn more about manual learning styles.
control of the module.
4. This module helped me to learn more about wireless
data collection and analysis. 6 CONCLUSION
5. This module helped me to learn more about the NBL In this paper, the authors present a learning environment
programming language. that enables learners to access technological resources of an
6. I would like to have more modules like this to help RFID laboratory through Web technology. Such a project
me learn. has a highly automated testing system that is easy to use by
7. This module helped me visualize RFID data and its beginner-level learners. It also has the advanced feature of
contents. controlling hardware devices programmatically in order to
8. This module was relevant to my education. develop complex test scenarios rapidly and with less
LEHLOU ET AL.: AN ONLINE RFID LABORATORY LEARNING ENVIRONMENT 303
tediousness. After engaging students from two different [15] R. Gurbuz, “Web-Based Curriculum Development of a Manu-
facturing Technology Programme,” Int’l J. Eng. Education, vol. 20,
classes in using this educational tool, student assessments
no. 4, pp. 566-577, 2004.
were performed to measure its impact on learners. Results [16] M. Ogot, G. Elliott, and N. Glumac, “An Assessment of in-Person
show that this online environment helped students learn and Remotely Operated Laboratories,” J. Eng. Education, vol. 92,
many aspects of RFID technology and obtain hands-on no. 1, pp. 57-62, 2003.
experience through conducting test experiments, program- [17] IU News Room, “IU’s Kelley School Receives Gift from Zebra
Technologies for RFID Lab,” http://newsinfo.iu.edu/news/
ming hardware scenarios, collecting and analyzing data, page/normal/3154.html, Mar. 2006.
and drawing conclusions. [18] M.C. O’Connor, “RFID Makes the Grade,” Radio Frequency
Identification J., http://www.rfidjournal.com/article/articleview/
1538/1/1/, Apr. 2005.
ACKNOWLEDGMENTS [19] N. Lehlou, “An Agent-Based Architecture of a Remotely Con-
trollable Laboratory System for an Online RFID Learning
This material is based on work supported by the US National Environment,” master’s thesis, Univ. of Arkansas, 2008.
Science Foundation (NSF) under Grant No. DUE0633334. [20] N. Lehlou, N. Buyurgan, and J.R. Chimka, “EIA Approach to
Any opinions, findings, and conclusions or recommenda- Support Laboratory Learning Environments,” Proc. Am. Soc. Eng.
Education Conf. (ASEE ’08), 2008.
tions expressed in this material are those of the authors and [21] N. Lehlou, N. Buyurgan, and J.R. Chimka, “Integrated Auto-
do not necessarily reflect the views of the NSF. The authors ID Technology for Multi-Disciplinary Undergraduate Studies
thank NSF for their support to implement the I-ATMUS (I-ATMUS),” Proc. Am. Soc. Eng. Education Conf. (ASEE ’08),
project. The authors also thank Dr. Craig W. Thompson, 2008.
[22] R.M. Felder and L.K. Silverman, “Learning and Teaching Styles in
Joseph E. Hoag, Alejandro Mendoza, Kevin J. Oden, Jonathan Engineering Education,” J. Eng. Education, vol. 78, no. 7, pp. 674-
B. Marshal, Qilu Wang, Xavier S. Neely, Korbi E. Orr, and 681, 1988.
Dewanna Jenkins for their assistance in the I-ATMUS project. [23] P. McCullagh, “Regression Models for Ordinal Data,” J. Royal
Statistical Soc., B, vol. 42, no. 2, pp. 109-142, 1980.