Analyzing Human's Continuous Learning Processes with the Reflection Sub Task
Analyzing Human's Continuous Learning Processes with the Reflection Sub Task
出处
《通讯和计算机(中英文版)》
2015年第1期20-27,共8页
Journal of Communication and Computer
参考文献17
-
1Russell, S., and Norvig, P. 1995. Artificial Intelligence: A Modern Approach (1 st Edition). Prentice Hall.
-
2Russell, S., and Norvig, P. 2009. Artificial Intelligence: A Modern Approach (3rd Edition). Prentice Hall.
-
3Marton, F., and Booth, S. 1997. Learning and Awareness. Routledge.
-
4Boud, D., Keogh, R., and Walker, D. 1985. Reflection." Turning Experience into Learning. Routledge.
-
5Schunk, D. H., and Zimmerman, B. J. 2007. Motivation and Self-Regulated Learning: Theory, Research and Applications. Routledge.
-
6Buckler, B. A. 1996. Learning Process Model to Achieve Continuous Improvement, the Learning Organization, 3, 3. MCB University Press.
-
7Sessa, V. I., and London, M. 2006. Continuous Learning in Organizations." Individual, Group, and Organizational Perspectives. Psychology Press.
-
8Smita, J., and Trey, M. 2012. "Facilitating Continuous Learning: Review of Research on Individual Learning Capabilities and Organizational Learning Environments." Presented at the annual meeting of the AECT International Convention, Louisville, http://www.memphis.edu/icl/idt/clrc/clrc-smita-research.p df.
-
9Yamaguchi, T., Takemori, K., and Takadama, K. 2013. Modeling a Human's Learning Processes Toward Continuous Learning Support System, in Mechatronics Engineering, Habib, M. K., Davim, J. P. (eds.), Wiley-ISTE.
-
10Yamaguchi, T., Takemori, K., and Takadama, K. 2014. "Visualizing Mental Learning Processes with Invisible Mazes for Continuous Learning." S. Yamamoto (ed.), HIMI 2014, Part II, Lecture Notes in Computer Science (LNCS Vol.8522), Proc. of 16th International Conference, HCI International 2014, pp. 137-148, Springer.
-
1祝颖.互联网时代的学习方法[J].记者摇篮,2003(5):42-42.
-
2肖琴.浅析基于网络学习过程中的元认知能力——以物理学习为对象[J].太原城市职业技术学院学报,2011(7):146-147.
-
3郭强,周继平,郭迎迎,胡兆龙,刘建国.考虑负相关性信息的协同过滤算法研究[J].计算机应用研究,2013,30(12):3543-3545.
-
4周志平.陶行知教育思想与人类学习的三种方式[J].福建陶研,2012(2):33-38. 被引量:2
-
5水晓美.蚂蚁的非凡本领[J].大科技(科学之谜)(A),2006(5):50-51.
-
6韩树军.计算机网络安全的入侵检测技术探析[J].现代商业,2016(14):181-182. 被引量:3
-
7阎明印,蔡振江,杨晶栾,江南,杨叔子.适于专家系统的机器学习模型与过程[J].沈阳工业学院学报,1997,16(1):59-63. 被引量:1
-
8《计算机应用基础》课程学习指导(Ⅰ)[J].西江教育论丛,2009(2):23-29.
-
9陈凯文,石良武.校园网离你有多远[J].办公自动化,2001(2):46-48.
-
10连和谬.WLAN技术在高校校园安全应用的研究[J].湖北科技学院学报,2015,35(1):21-23.