The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In blended learning, learners' interest is closely related to whether they can successfully finish their studies. In order to study on learners' interest, we adopt situated cognition theory as the theoretical basis, and carried out data mining for learners' online behaviors, as well as the analysis of brain cognitive experiment data. Then brain mechanism for context learning interest and online operation...
This paper presents a classroom research study that studied the effect of giving the students of a Digital Logic course the chance to retake all exams except the final. Each exam is designed to match a single learning outcome of the course. The theoretical background that the study is based upon is the Metacognitive Awareness Framework. We are reporting that the effort that the Faculty and teaching...
Despite the documented need to train and educate more cybersecurity professionals, we have little rigorous evidence to inform educators on effective ways to engage, educate, or retain cybersecurity students. To begin addressing this gap in our knowledge, we are conducting a series of think-aloud interviews with cybersecurity students to study how students reason about core cybersecurity concepts....
As the size of data table grows, the concepts generated become larger in number. Making sure the set of extent remaining unchanged, the purpose of attribute reduction of concept lattice is to find out minimum subsets of attributes and make knowledge presented by concept lattice simpler, decision problem simplified as well. This paper introduced the definition of introducer which was minimum closure...
The use of computers and the Internet have changed classic methods of teaching and Learning, introducing the concept of distance Learning as a great opportunity for studying unfettered by constraints of time and space [1]. In addition, acquisition of new skills and knowledge is not only affected by an individual's mental schemes or beliefs, but also by their interaction, cooperation and collaboration...
Several learning technologies have been developed over the years in order to help distance learning process. However, those technologies are still not enough to give the proper interaction between their users and the technologies themselves. It is caused by the absence of the technologies ability to give context based on their users conditions. When human interacts with each other, they understand...
We introduce the principles of symbolization and conceptualization of perceived reality. We show them as processes that are applicable inside of a computer mind. We derive those processes from principles of a human mind. We present process of higher order regular abstraction and state automata acceptance as possible machine reality realization mechanism. We present the algorithm for evolution of machine...
The KID (Knowledge-Information-Data) model is a unified structure which unifies data, information, and knowledge. It is also a data driven process in the data transformation process from data, to information, and then to knowledge. In this process, knowledge is enriched and enhanced with continuous perception of the external context and at the three stages of the data transformation. In other words,...
Laboratory work is a well-accepted component of science and engineering programs. One emerging trend has been the increasing utilisation of remotely accessed laboratories, where the students can remotely monitor and/or control physical apparatus, typically across the internet. This supports greater flexibility of access for students as well as the possibility of sharing of facilities between institutions...
This paper proposes the development of mathematical reasoning in undergraduate students through vector cryptography implemented in a software system. Mathematical reasoning is a cognitive function that could be improved using symmetric encryption techniques such as Hill Cipher, which implements the operations of the linear arithmetic spaces. The goal of this research project is that undergraduate...
Context-aware systems have historically employed a limited range of available data and while research across a diverse range of domains is addressing an increasingly broad range of data the level of intelligence generated in context-aware systems remains generally very limited. This is arguably due to the highly dynamic nature and inherent complexity of context. Individuals view the world though a...
Traditional resource model based on distributed cognition mainly includes two major parts, which are resource information structure and resource information interaction. To improve this models capability in resource description and practical application, the description of resource in this model is to be classified by two categories, which are the forward resource information structure and backward...
Any activity in a computer-supported cooperative working environment produces a set of traces. In a collaborative working context, such traces may be very voluminous and heterogeneous. They reflect all the interactive actions among the actors themselves and between the actors and the system. This paper examines what is required to exploit traces in the context of a collaborative working environment...
Group interaction is a key component of group-based learning. However, its implementation in existing learning practices is inefficient. Previous studies discussed the use of concept mapping in group learning. Apart from its clear benefits for group learning and interaction, deficiencies of using concept mapping in distance groups were also recognized, mainly related to labor division, group coordination,...
The purpose of this study was to investigate the effects of navigation tools on cognitive load within a hypermedia learning environment. The hypermedia learning environment here is a Computer Based Online Aptitude Test System on which the study was carried out. A study was conducted with a total n = 35 college students respectively. Participants were randomly assigned to one of the two online computer...
With the rapid development of the information technology, it is inevitable that the distributed mobile computing will evolve to the pervasive computing gradually whose final goal is fusing the information space composed of computers with the physical space in which the people are working and living in. Therefore, pervasive applications need a middleware that can detect and act upon any context changes...
This paper introduces a retrieval system based on context rather than content. The system uses a set of vector spaces to represent the different contextual characteristics (position, time, sound environment, etc.). In this model both the current context and the items in the corpus are represented by vectors. We then use vector similarities to identify the relevant items given the context. In order...
In computer algebra there are different ways of approaching the mathematical concept of functions, one of which is by defining them as solutions of differential equations. We compare different such approaches and discuss the occurring problems. The main focus is on the question of determining possible branch cuts. We explore the extent to which the treatment of branch cuts can be rendered (more) algorithmic,...
Pervasive computing (also referred to as ubiquitous computing or ambient intelligence) aims to create environments where computers are invisibly and seamlessly integrated and connected into our everyday environment. Pervasive computing applications are often interaction transparent, context aware, and experience capture and reuse capable. Interaction transparency means that the human user is not aware...
In this study, we examine trust in information technology's (IT) relationship with postadoption exploration of knowledge management systems (KMS). We introduce and distinguish between trust in IT and trust in IT support staff as object-specific beliefs that influence technology's infusion into organizations. We suggest that these object-specific beliefs' influence on intention to explore KMS is mediated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.