scholarly journals RESEARCH ON THE PERCEPTION OF DIFFERENT TYPES OF EDUCATIONAL INFORMATION BY FUTURE BACHELORS IN CYBERSECURITY

2020 ◽  
Vol 3 (39) ◽  
pp. 63
Author(s):  
A. Samoylenko

The article presents a study of the perception of different types of educational information by future bachelors in cybersecurity. The results of the study are characterized by the use of such types of information as audio (listen to audio), visual (watch video snippet), audio-visual (see video snippet with audio), presentations and electronic text without video or audio, as well as combinations all of these options. The subject of the research is the questions concerning the state of use of types of educational information in the educational environment in the process of preparation of bachelors in cybersecurity on a specialty, introduction of technology of distance and blended learning in universities. A comparative analysis of the types of information that is more readily perceived by higher education providers and their teaching staff is also made. The purpose of the work is to publish the results of a study that was conducted over three academic semesters in order to study the state of perception of different types of educational information by future bachelors in cybersecurity. Interviewing and interviewing methods are a part of the work done. The field of application of the results is a methodological field for improving the training of cybersecurity bachelors who require the use of electronic content, educational environments and communication systems in the Internet.Keywords: educational information, audio-visual information, textual information, cybersecurity bachelors training.

2020 ◽  
Vol 4 (40) ◽  
pp. 87
Author(s):  
A. Samoylenko

The article presents a study of the state of Internet usage in the process of professional training of cybersecurity bachelors. The concept of preparation has been clarified. The problems related to the security of cyberspace are characterized. The subject of research is the frequency of use of the Internet in the process of professional training of cybersecurity bachelors, namely questions related to the frequency of search of educational information on the Internet and its type and perception, the use of the online educational environment in the preparation of bachelors in cybersecurity in the specialty, the introduction of remote technology and blended learning at universities. The purpose of the work is to publish the results of a study that was conducted over three academic semesters in order to study the state of use of the Internet in the process of professional training of bachelors in cybersecurity. Interviewing and interviewing methods are a part of the work done. The published results indicate that there is an increasing need to use the Internet in the professional training of cybersecurity bachelors. The field of application of the results is a methodological field for improving the methodology of training bachelors in cybersecurity, which require the use of electronic content, educational environments and communication systems in the Internet, capable characterized by the motivation of future bachelors in cybersecurity for professional training and the systematic use of modern technologies in modern technology. to select methods, software for programming, creation and implementation of virtual space products , the ability to design digital technology environments.Keywords: Internet, cybersecurity, vocational training.


2020 ◽  
Author(s):  
John J Shaw ◽  
Zhisen Urgolites ◽  
Padraic Monaghan

Visual long-term memory has a large and detailed storage capacity for individual scenes, objects, and actions. However, memory for combinations of actions and scenes is poorer, suggesting difficulty in binding this information together. Sleep can enhance declarative memory of information, but whether sleep can also boost memory for binding information and whether the effect is general across different types of information is not yet known. Experiments 1 to 3 tested effects of sleep on binding actions and scenes, and Experiments 4 and 5 tested binding of objects and scenes. Participants viewed composites and were tested 12-hours later after a delay consisting of sleep (9pm-9am) or wake (9am-9pm), on an alternative forced choice recognition task. For action-scene composites, memory was relatively poor with no significant effect of sleep. For object-scene composites sleep did improve memory. Sleep can promote binding in memory, depending on the type of information to be combined.


Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 741
Author(s):  
Yuseok Ban ◽  
Kyungjae Lee

Many researchers have suggested improving the retention of a user in the digital platform using a recommender system. Recent studies show that there are many potential ways to assist users to find interesting items, other than high-precision rating predictions. In this paper, we study how the diverse types of information suggested to a user can influence their behavior. The types have been divided into visual information, evaluative information, categorial information, and narrational information. Based on our experimental results, we analyze how different types of supplementary information affect the performance of a recommender in terms of encouraging users to click more items or spend more time in the digital platform.


2020 ◽  
Vol 5 (41) ◽  
pp. 35
Author(s):  
A. Samoylenko

The article presents a study of the state of use of educational information for the preparation of bachelors in cybersecurity. The key bases of the legislative base of Ukraine are analyzed. Based on a number of studies of the use of the Internet in the process of training bachelors in cybersecurity, the state of perception of different types of educational information by future bachelors in cybersecurity and the use of device types in the training of bachelors in cybersecurity. bachelors in cybersecurity.The subject of the research is the issues related to the means for learning on the Internet, social networks, distance learning courses, mass open distance courses, YouTube channels with interactive self-assessment of knowledge and in learning environments by means of network simulators for programming. The aim of the work is to publish the results of a study conducted during three semesters in order to study the state of use of educational information for the preparation of bachelors in cybersecurity. The methods of the conducted work include the method of interviews and questionnaires. The published results show that there is an increasing need to use distance learning courses, mass open distance courses, interactive YouTube channels for self-assessment of knowledge and in learning environments using network simulators for programming. The scope of the results is a methodological field for improving the methodology of training bachelors in cybersecurity, which require the use of electronic content, educational environments and communication systems in an educational-digital environment.


1970 ◽  
Vol 14 (6) ◽  
Author(s):  
Oksana Ye. Kravchina

The author considers different types of information networks, some problems of educational information networks formation abroad and gives the characteristics of information networks taking into account the usage of information and communication technologies in the general secondary education.


2017 ◽  
Vol 29 (11) ◽  
pp. 1791-1802 ◽  
Author(s):  
Heath E. Matheson ◽  
Laurel J. Buxbaum ◽  
Sharon L. Thompson-Schill

Our use of tools is situated in different contexts. Prior evidence suggests that diverse regions within the ventral and dorsal streams represent information supporting common tool use. However, given the flexibility of object concepts, these regions may be tuned to different types of information when generating novel or uncommon uses of tools. To investigate this, we collected fMRI data from participants who reported common or uncommon tool uses in response to visually presented familiar objects. We performed a pattern dissimilarity analysis in which we correlated cortical patterns with behavioral measures of visual, action, and category information. The results showed that evoked cortical patterns within the dorsal tool use network reflected action and visual information to a greater extent in the uncommon use group, whereas evoked neural patterns within the ventral tool use network reflected categorical information more strongly in the common use group. These results reveal the flexibility of cortical representations of tool use and the situated nature of cortical representations more generally.


2021 ◽  
Vol 11 (3) ◽  
pp. 1327
Author(s):  
Rui Zhang ◽  
Zhendong Yin ◽  
Zhilu Wu ◽  
Siyang Zhou

Automatic Modulation Classification (AMC) is of paramount importance in wireless communication systems. Existing methods usually adopt a single category of neural network or stack different categories of networks in series, and rarely extract different types of features simultaneously in a proper way. When it comes to the output layer, softmax function is applied for classification to expand the inter-class distance. In this paper, we propose a hybrid parallel network for the AMC problem. Our proposed method designs a hybrid parallel structure which utilizes Convolution Neural Network (CNN) and Gate Rate Unit (GRU) to extract spatial features and temporal features respectively. Instead of superposing these two categories of features directly, three different attention mechanisms are applied to assign weights for different types of features. Finally, a cosine similarity metric named Additive Margin softmax function, which can expand the inter-class distance and compress the intra-class distance simultaneously, is adopted for output. Simulation results demonstrate that the proposed method can achieve remarkable performance on an open access dataset.


2020 ◽  
Vol 38 (1) ◽  
pp. 1-28 ◽  
Author(s):  
Bogeum Choi ◽  
Austin Ward ◽  
Yuan Li ◽  
Jaime Arguello ◽  
Robert Capra

1950 ◽  
Vol 17 (2) ◽  
pp. 145-153 ◽  
Author(s):  
J. O. Hinze ◽  
H. Milborn

Abstract Liquid, supplied through a stationary tube to the inner part of a rotating cup widening toward a brim, flows viscously in a thin layer toward this brim and is then flung off, all by centrifugal action. The flow within this layer and the disintegration phenomena occurring beyond the brim have been studied, experimentally as well as theoretically. A formula has been derived for the thickness and for the radial velocity of the liquid layer within the cup, which proved to agree reasonably well with experimental results. Three essentially different types of disintegration may take place around and beyond the edge of the cup designated, respectively, by: (a) the state of direct drop formation; (b) the state of ligament formation; and (c) the state of film formation. Which one of these is realized depends upon working conditions. Transition from state (a) into (b), or of state (b) into state (c) is promoted by an increased quantity of supply, an increased angular speed, a decreased diameter of the cup, an increased density, an increased viscosity, and a decreased surface tension of the liquid. The experimental results have been expressed in relationships between relevant dimensionless groups. For the state of ligament formation a semiempirical relationship has been derived between the number of ligaments and dimensionless groups determining the working conditions of the cup. Results of drop-size measurements made for the state of ligament formation as well as for the state of film formation show that atomization by mere rotation of the cup is much more uniform than commonly achieved with pressure atomizers.


1997 ◽  
Vol 3 (1) ◽  
pp. 57-68 ◽  
Author(s):  
Guy R. West ◽  
Ari Gamage

This study assesses the significance of different types of tourists to Victoria, Australia, by their relative contribution to the economy. Differential impacts are calculated using an input–output model incorporating marginal household coefficients. The analysis demonstrates that the conventional input–output model can overestimate the flow-on effects to value added, income and employment by a significant amount. It finds that domestic tourists are the largest contributor to the State economy, with day-trippers spending the greatest amount. International tourists rank last in terms of economic impacts on the state.


Sign in / Sign up

Export Citation Format

Share Document