scholarly journals Fascinatin’ Rhythm – and Pauses in Translators’ Cognitive Processes

Author(s):  
Ricardo Muñoz Martín ◽  
Celia Martín de Leon

The Monitor Model fosters a view of translating where two mind modes stand out and alternate when trying to render originals word-by-word by default: shallow, uneventful processing vs problem solving. Research may have been biased towards problem solving, often operationalized with a pause of, or above, 3 seconds. This project analyzed 16 translation log files by four informants from four originals. A baseline minimal pause of 200 ms was instrumental to calculate two individual thresholds for each log file: (a) A low one – 1.5 times the median pause within words – and (b) a high one – 3 times the median pause between words. Pauses were then characterized as short (between 200 ms and the lower threshold), mid, and long (above the higher threshold, chunking the recorded activities in the translation task into task segments), and assumed to respond to different causes. Weak correlations between short, mid and long pauses were found, hinting at possible different cognitive processes. Inferred processes did not fall neatly into categories depending on the length of possibly associated pauses. Mid pauses occurred more often than long pauses between sentences and paragraphs, and they also more often flanked information searches and even problem-solving instances. Chains of proximal mid pauses marked cases of potential hesitations. Task segments tended to happen within 4–8 minute cycles, nested in a possible initial phase for contextualization, followed by long periods of sustained attention. We found no evidence for problem-solving thresholds, and no trace of behavior supporting the Monitor Model. 

2021 ◽  
Vol 11 (13) ◽  
pp. 5944
Author(s):  
Gunwoo Lee ◽  
Jongpil Jeong

Semiconductor equipment consists of a complex system in which numerous components are organically connected and controlled by many controllers. EventLog records all the information available during system processes. Because the EventLog records system runtime information so developers and engineers can understand system behavior and identify possible problems, it is essential for engineers to troubleshoot and maintain it. However, because the EventLog is text-based, complex to view, and stores a large quantity of information, the file size is very large. For long processes, the log file comprises several files, and engineers must look through many files, which makes it difficult to find the cause of the problem and therefore, a long time is required for the analysis. In addition, if the file size of the EventLog becomes large, the EventLog cannot be saved for a prolonged period because it uses a large amount of hard disk space on the CTC computer. In this paper, we propose a method to reduce the size of existing text-based log files. Our proposed method saves and visualizes text-based EventLogs in DB, making it easier to approach problems than the existing text-based analysis. We will confirm the possibility and propose a method that makes it easier for engineers to analyze log files.


2021 ◽  
Vol 11 (14) ◽  
pp. 6434
Author(s):  
Cecilia Hammar Wijkmark ◽  
Maria Monika Metallinou ◽  
Ilona Heldal

Due to the COVID-19 restrictions, on-site Incident Commander (IC) practical training and examinations in Sweden were canceled as of March 2020. The graduation of one IC class was, however, conducted through Remote Virtual Simulation (RVS), the first such examination to our current knowledge. This paper presents the necessary enablers for setting up RVS and its influence on cognitive aspects of assessing practical competences. Data were gathered through observations, questionnaires, and interviews from students and instructors, using action-case research methodology. The results show the potential of RVS for supporting higher cognitive processes, such as recognition, comprehension, problem solving, decision making, and allowed students to demonstrate whether they had achieved the required learning objectives. Other reported benefits were the value of not gathering people (imposed by the pandemic), experiencing new, challenging incident scenarios, increased motivation for applying RVS based training both for students and instructors, and reduced traveling (corresponding to 15,400 km for a class). While further research is needed for defining how to integrate RVS in practical training and assessment for IC education and for increased generalizability, this research pinpoints current benefits and limitations, in relation to the cognitive aspects and in comparison, to previous examination formats.


Author(s):  
Jozef Kapusta ◽  
Michal Munk ◽  
Dominik Halvoník ◽  
Martin Drlík

If we are talking about user behavior analytics, we have to understand what the main source of valuable information is. One of these sources is definitely a web server. There are multiple places where we can extract the necessary data. The most common ways are to search for these data in access log, error log, custom log files of web server, proxy server log file, web browser log, browser cookies etc. A web server log is in its default form known as a Common Log File (W3C, 1995) and keeps information about IP address; date and time of visit; ac-cessed and referenced resource. There are standardized methodologies which contain several steps leading to extract new knowledge from provided data. Usu-ally, the first step is in each one of them to identify users, users’ sessions, page views, and clickstreams. This process is called pre-processing. Main goal of this stage is to receive unprocessed web server log file as input and after processing outputs meaningful representations which can be used in next phase. In this pa-per, we describe in detail user session identification which can be considered as most important part of data pre-processing. Our paper aims to compare the us-er/session identification using the STT with the identification of user/session us-ing cookies. This comparison was performed concerning the quality of the se-quential rules generated, i.e., a comparison was made regarding generation useful, trivial and inexplicable rules.


2017 ◽  
Vol 5 (2) ◽  
pp. 14 ◽  
Author(s):  
Mehrdad Fazeli Falavarjani ◽  
Forozan Irandust

Today’s diverse community often includes culturally rich environments that contain cues pertaining to more than one culture. These cultural cues can shape cognitive processes, such as creativity. This study aims to investigate the interactive effects of Openness to Experience, Extroversion and Multicultural Experience (including the real and desired experiences) on creative problem-solving ability using the quantitative method on a diverse sample of international students (N= 102). The findings indicate that the interactive effect of extensive multicultural experience and Openness to Experience predict the creative solution. It means the multicultural experience is beneficial for individuals to foster creative ability when they are highly open to experience, whereas, among those who are not open, more extensive multicultural experience do not lead to enhancement of creating the correct solution. Furthermore, this interaction term was not pronounced among the extroverted individuals. Implications of these findings for promoting creativity in learning environments are discussed.


2017 ◽  
Author(s):  
Wendy Hasenkamp ◽  
Christine Wilson-Mendenhall ◽  
Erica Duncan ◽  
Lawrence Barsalou

Studies have suggested that the default mode network is active during mind wandering, which is often experienced intermittently during sustained attention tasks. Conversely, an anticorrelated task-positive network is thought to subserve various forms of attentional processing. Understanding how these two systems work together is central for understanding many forms of optimal and sub-optimal task performance. Here we present a basic model of naturalistic cognitive fluctuations between mind wandering and attentional states derived from the practice of focused attention meditation. This model proposes four intervals in a cognitive cycle: mind wandering, awareness of mind wandering, shifting of attention, and sustained attention. People who train in this style of meditation cultivate their abilities to monitor cognitive processes related to attention and distraction, making them well suited to report on these mental events. Fourteen meditation practitioners performed breath-focused meditation while undergoing fMRI scanning. When participants realized their mind had wandered, they pressed a button and returned their focus to the breath. The four intervals above were then constructed around these button presses. We hypothesized that periods of mind wandering would be associated with default mode activity, whereas cognitive processes engaged during awareness of mind wandering, shifting of attention and sustained attention would engage attentional subnetworks. Analyses revealed activity in brain regions associated with the default mode during mind wandering, and in salience network regions during awareness of mind wandering. Elements of the executive network were active during shifting and sustained attention. Furthermore, activations during these cognitive phases were modulated by lifetime meditation experience. These findings support and extend theories about cognitive correlates of distributed brain networks.


2019 ◽  
Vol 10 (1) ◽  
pp. 21-36 ◽  
Author(s):  
Rooselyna Ekawati ◽  
Ahmad Wachidul Kohar ◽  
Elly Matul Imah ◽  
Siti Maghfirotun Amin ◽  
Shofan Fiangga

This study aimed to determine the cognitive process employed in problem-solving related to the concept of area conservation for seventh graders. Two students with different mathematical ability were chosen to be the subjects of this research. Each of them was the representative of high achievers and low achievers based on a set of area conservation test. Results indicate that both samples performed more cyclic processes on formulating solution planning, regulating solution part and detecting and correcting error during the problem-solving. However, it was found that the high achiever student performed some processes than those of low achiever. Also, while the high achiever student did not predict any outcomes of his formulated strategies, the low achiever did not carry out the thought process after detecting errors of the initial solution gained. About the concept of area conservation, the finding also reveals that within the samples’ cognitive processes, the use of area formula come first before students decided to look for another strategy such as doing ‘cut-rotate-paste’ for the curved planes, which do not have any direct formula. The possible causes of the results were discussed to derive some recommendation for future studies.


Author(s):  
Sagar Shankar Rajebhosale ◽  
Mohan Chandrabhan Nikam

A log is a record of events that happens within an organization containing systems and networks. These logs are very important for any organization, because a log file will able to record all user activities. Due to this, log files play a vital role and contain sensitive information, and therefore security should be a high priority. It is very important to the proper functioning of any organization, to securely maintain log records over an extended period of time. So, management and maintenance of logs is a very difficult task. However, deploying such a system for high security and privacy of log records may be overhead for an organization and require additional costs. Many techniques have been designed for security of log records. The alternative solution for maintaining log records is using Blockchain technology. A blockchain will provide security of the log files. Log files over a Blockchain environment leads to challenges with a decentralized storage of log files. This article proposes a secured log management over Blockchain and the use of cryptographic algorithms for dealing the issues to access a data storage. This proposed technology may be one complete solution to the secure log management problem.


1974 ◽  
Vol 18 (3) ◽  
pp. 239-254 ◽  
Author(s):  
Kenneth E. Sinclair ◽  
Terence A. Heys ◽  
Stephen de C. Kemmis

In this paper a trait-state conception of anxiety is presented which incorporates a number of extensions to current theorizing. The conception is a cognitive one in that it emphasizes information processing that occurs with respect to both the trait and state components of anxiety. The conception indicates a number of insights into human problem solving that can be made through a consideration of cognitive processing, anxiety processing, and their interaction. In particular, the role of coping styles in threat reduction and the influence of A-state on specific cognitive processes are examined. Implications for theory and further research are discussed.


2008 ◽  
Vol 275 (1641) ◽  
pp. 1421-1429 ◽  
Author(s):  
Amanda M Seed ◽  
Nicola S Clayton ◽  
Nathan J Emery

Recent work has shown that captive rooks, like chimpanzees and other primates, develop cooperative alliances with their conspecifics. Furthermore, the pressures hypothesized to have favoured social intelligence in primates also apply to corvids. We tested cooperative problem-solving in rooks to compare their performance and cognition with primates. Without training, eight rooks quickly solved a problem in which two individuals had to pull both ends of a string simultaneously in order to pull in a food platform. Similar to chimpanzees and capuchin monkeys, performance was better when within-dyad tolerance levels were higher. In contrast to chimpanzees, rooks did not delay acting on the apparatus while their partner gained access to the test room. Furthermore, given a choice between an apparatus that could be operated individually over one that required the action of two individuals, four out of six individuals showed no preference. These results may indicate that cooperation in chimpanzees is underpinned by more complex cognitive processes than that in rooks. Such a difference may arise from the fact that while both chimpanzees and rooks form cooperative alliances, chimpanzees, but not rooks, live in a variable social network made up of competitive and cooperative relationships.


Sign in / Sign up

Export Citation Format

Share Document