A methodology for designing cognitive lesson maps
نویسندگان
چکیده
منابع مشابه
step-by-step methodology for developing strategy maps: a hybrid approach using quality function deployment, fuzzy screening and fuzzy cognitive maps
nowadays balanced scorecard has a critical role in implementing strategies for many organizations. strategy map as the 3rd generation of bsc by inverting mission and vision into strategic objectives is the linkage between formulating and implementing strategies. however, the methodology of developing strategy maps has many ambiguities. this study with inspiring by other authors and exploring li...
متن کاملDesigning a model for children education through TV with a cognitive approach for environmental education
Our aim in this research is to design a model for children TV education with a cognitive approach to environmental education. People are bombarded by information in the media age, and this subjection to various news has made the learning process hard. Especially because a part of this sort of education is done by these media. The public education whose addressees are the public is done by mass ...
متن کاملA methodology for designing semantic annotations
This paper presents a methodology for designing languages for semantic annotation. Central in this methodology is the specification of representation formats as renderings of conceptual structures defined by an abstract syntax as set-theoretic constructs. An ideal representation format is defined as one that is able to represent all the conceptual distinctions made in the abstract syntax, and o...
متن کاملDesigning a Modelling Methodology for Legal Workflows
This paper analyses the requirements that need to be met in order to provide a modelling methodology suitable for the modelling of legal workflows. It subsequently provides a methodology for the legal environment which meets the stated requirements.
متن کاملA Methodology for Designing Controlled Anonymous Applications
Many anonymous applications offer unconditional anonymity to their users. However, this can provoke abusive behavior. Dissatisfied users will drop out or liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users. However, designing such applications is no sinecure. This paper presents...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Izvestia: Herzen University Journal of Humanities & Sciences
سال: 2020
ISSN: 1992-6464
DOI: 10.33910/1992-6464-2020-198-66-74