Cambridge Journals Online (CJO) is the e-publishing service for over 230 journals published by Cambridge University Press and is entirely developed and hosted in-house. The platform's powerful capacity and reliable performance are maintained by a combination of our own expertise and a process of consultation with the library and research communities. With the help of these stakeholders, we maintain CJO as an industry-leading e-publishing service.
Classical knowledge representation methods traditionally work with established relations such as synonymy, hierarchy and unspecified associations. Recent developments like
ontologies and folksonomies show new forms of collaboration, indexing and knowledge representation and encourage the reconsideration of standard knowledge relationships. In a
summarizing overview we show which relations are currently utilized in elaborated knowledge representation methods and which may be inherently hidden in folksonomies and ontologies.
This paper presents a work in progress whose
purpose is to model the handled, acquired, correct and
erroneous knowledge of individual learners engaged in
learning activities through virtual learning environments.
This knowledge is represented according to a cognitivecomputational
model which also serves to represent the
domain knowledge via an authoring tool. The latter
generates structures that allow the tutor to provide an
effective feedback to improve significantly the cognitive
level of the learner.
Z. Zhang, X. Han, Z. Liu, X. Jiang, M. Sun, и Q. Liu. Proceedings of the 57th Annual Meeting of the Association for Computational Linguistics, стр. 1441--1451. Florence, Italy, Association for Computational Linguistics, (июля 2019)
A. Paivio. Draft chapter presented at the conference on Pathways to Literacy Achievement for High Poverty Children at The University of Michigan School of Education, (2006)
Gayrat, и Avazjon. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III):
38-42(марта 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..