Cognitive Computing and Internet of Things最新文献

筛选
英文 中文
Cognitive Positioning Technologies for IoT Network Devices 物联网网络设备认知定位技术
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1001847
A. Dudnik, I. Bakhov, Olha Cholyshkina, Andriy Fesenko, Olexander Grinenko, Volodymyr Brodkevych, S. Zybin
{"title":"Cognitive Positioning Technologies for IoT Network Devices","authors":"A. Dudnik, I. Bakhov, Olha Cholyshkina, Andriy Fesenko, Olexander Grinenko, Volodymyr Brodkevych, S. Zybin","doi":"10.54941/ahfe1001847","DOIUrl":"https://doi.org/10.54941/ahfe1001847","url":null,"abstract":"Nowadays, wireless technologies are increasingly being used for human needs. Increasingly, technologies are emerging that are used by people not only for the need to transfer data. One of these technologies is the Internet of Things, which often uses wireless sensors with ZigBee data transmission technology as end devices.There are areas that require deployment of these networks on the territory, a large number of sensors are required, which must with sufficient accuracy “know” their position on the deployment area. Usually, devices with built-in GPS modules are used for this, but devices containing this module are significantly more expensive than without it. And if in a large distributed network with many segments, more than 1000 such devices are required, then a device with a GPS module can only be at most one for each segment. Therefore, if this is a forest where there are many thousands of trees and it is necessary to monitor fires at the initial stage, which take place in many US states in the summer, then the cognitive task of teaching those devices, that do not contain a GPS module, to determine their position is relevant. This paper proposes a mathematical formulation of the cognitive task of learning to determine the coordinates of devices in wireless sensor networks. The study of the mathematical model has been carried out. The purpose of these studies was to find new alternative teaching methods for determining the distance between objects of IoT sensor networks, using the function of localizing objects where an emergency occurred.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information display preferences for assembly instructions in 6 industrial settings 6种工业设置中装配指令的信息显示偏好
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003292
Ari Kolbeinsson, Emmie Fogelberg, Peter Thorvald
{"title":"Information display preferences for assembly instructions in 6 industrial settings","authors":"Ari Kolbeinsson, Emmie Fogelberg, Peter Thorvald","doi":"10.54941/ahfe1003292","DOIUrl":"https://doi.org/10.54941/ahfe1003292","url":null,"abstract":"We detail the results of an ongoing study into the preference of workers in 6 different industrial companies for assembly instruction display types and modalities for their tasks. This study is performed as a part of a project that aims to create a theoretical framework for understanding requirements for instruction presentation in industry, and providing guidance to the creators of assembly instructions. The study, as well as the project as a whole, aims to expand on approaches from the Industry 4.0 framework, with a particular focus on the more recent Operator 4.0 approach that adds a focus on more human-centric aspects of digitalisation in industry. The study being presented is comprised of facility visits to each partner company where the current state of practice was presented by each company, an examination of information presentation and operating procedures by the authors, and in-depth interviews with assembly workers at each site. All companies examined deal with variants in production, and the complexity of assembly spans from low to extremely high. The companies involved mostly rely on experienced workers, with high training, and relatively long times to train new personnel. The interviews led to findings such as simplified images being strongly preferred for both beginners and experienced workers, with an emphasis on the image matching the worker’s viewpoint to the product, and experienced workers preferring simplified images with highlighted markings for details that can be seen from where the task is performed, and more. The findings will be used in further work to create a theoretical framework around digital work instructions, as well as used directly to help partner companies better standardise their instructions to support the cognitive abilities and limitations of their assembly workers. The goal with this is to create safe, comfortable and profitable workplaces that fulfil goals of social sustainability in the long term.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133927283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things Security Policy in Enterprises 企业物联网安全策略
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1001836
Michal Trziszka
{"title":"Internet of Things Security Policy in Enterprises","authors":"Michal Trziszka","doi":"10.54941/ahfe1001836","DOIUrl":"https://doi.org/10.54941/ahfe1001836","url":null,"abstract":"The aim of the article is to discuss the risks resulting from expanding access to the network of new devices, and at the same time to show to what extent the implementation of procedures in the field of data security and architecture of systems used for data processing may affect the security of the continuity of the company's technological processes, but also data protection. The author draws attention to the fact that the problem of data and process security in the Internet of Things should be considered not only in terms of the protection of the content of information, but also its authenticity and topicality. On the other hand, inadequate formulation of the rules of the Internet of Things security policy in a given enterprise may mean limiting the availability of solutions and access to data, often eliminating the possibility of obtaining and processing them altogether. Enterprises must therefore act in such a way as to help maintain both the functionality and security of their systems.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124491328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interface And Interaction: The Symbolic Design for Bridge Conning System 界面与交互:桥梁连接系统的符号设计
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003297
Bingyu Mu, Fang Bin Guo, Zaili Yang, I. Jenkinson
{"title":"Interface And Interaction: The Symbolic Design for Bridge Conning System","authors":"Bingyu Mu, Fang Bin Guo, Zaili Yang, I. Jenkinson","doi":"10.54941/ahfe1003297","DOIUrl":"https://doi.org/10.54941/ahfe1003297","url":null,"abstract":"Technology is evolving at a dizzying speed. The digitalisation trend refers to a socio-technical phenomenon and process that influence social actors’ practices and interaction, which is reshaping people’s workplaces and influencing everyone on the way of working. The advancements in digitalisation also involved domain of marine industry. Ship bridge, where is a complex working environment contains a plethora of interactions between seafarers and technology-supported systems and equipment. Sometimes the digitalisation released employees’ physical workload, however, increased cognitive load. In maritime, the safety-critical domain, it is critical to design appropriate interfaces and interactions to satisfy the industry’s and operators’ needs, making technology adapt to them.The role of design has shifted from technology driven machine-centred design to user-centred design. Norman (2019) reminded us in context of the digitalisation, interaction and service designers come into the spotlight. The new role of design becomes a strategic problem-solving process to deliver innovative products, systems, services and experiences. “Easy to use” and “intuitive” are terms often cited to describe the desired user experience (UX) created by user interfaces (UIs). Product semantics and semiotics betters the UI/UX design. Krippendorff (1989) revealed that design is making sense (of things). Norman (2013) has a similar definition of design as an act of communication. In modern design, function, form, and meaning are collectively pursued by designers. The appropriately designed UI can communicate with users and provoke users’ emotions, reactions, and engagements. According to ship bridge, poor graphical UI (GUI) design has shown negative impacts on navigation operations, and inappropriate information layout increases potential risks of safety at sea. It is critical for interface and interaction design to support sensemaking by presenting information appropriately and aesthetically. Symbols, colours, and the use of animation are three graphical design elements for web-based interfaces categorized by Cyr (2008). These three elements should also be considered referring to the screen-based displays of the equipment in ship bridge. There are proofs that the icons evolve into symbols as the result of the systematic shift of information from the graphical signs to the users' memory through the repeated interaction with interface elements. Once the user-definable and pre-defined symbols are shaped, the contents can be visualized and manipulated in a very flexible and intuitive way, which will help designers to develop effectively communicating and meaningful interfaces to improve sensemaking for seafarers and achieve the “easy” and “intuitive” experience ultimately. This paper aims to develop a simple and user-friendly interface assuring an intuitive human-machine interaction (HMI), therefore, minimizing human errors and sea accidents. The design integrates the state-of-the","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123081981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time-Aware and Spatial Oriented Driven User Interfaces in the Context of Safe Zones for Underground Mining 井下开采安全区背景下的时间感知和空间导向驱动用户界面
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1001835
Norbert Gomolla, Herwig Zeiner, Roland Unterberger, Raúl Miñón Jiménez, P. Hartlieb
{"title":"Time-Aware and Spatial Oriented Driven User Interfaces in the Context of Safe Zones for Underground Mining","authors":"Norbert Gomolla, Herwig Zeiner, Roland Unterberger, Raúl Miñón Jiménez, P. Hartlieb","doi":"10.54941/ahfe1001835","DOIUrl":"https://doi.org/10.54941/ahfe1001835","url":null,"abstract":"This paper deals with visualization of time and safety critical data collected in underground mining operations. These data contain information of the rock mass and its behavior, the environmental conditions as well as general geometric, and time dependent information. Eventually, the combination of the data shall secure safe and sustainable extraction of valuable raw materials by combining information from a wide range of sensors in a data-driven Internet of Things platform, performing suitable evaluations, and, finally, feeding back the extracted learning to all stakeholders involved in a convenient and platform independent way from mine management to foremen and equipment operators. The results are novel visualization techniques for underground mining. The most suitable UIs in heavy duty mining operations are robust and customizable, using latest web technology in their dashboards. Depending on the required user category, the dashboard display may be configured accordingly. In this work we focus on the workers’ and the mine operators’ (e.g. underground, on-site workers including technicians and engineers) needs to display in real-time relevant operational information on immediate or urgent tasks/actions.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123415022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Security and Usability of the Internet of Things through a Scalable Network-Level Smart System 通过可扩展的网络级智能系统提高物联网的安全性和可用性
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003975
Mandeep Pannu, Iain Kay, Ismail El Sayad
{"title":"Improving the Security and Usability of the Internet of Things through a Scalable Network-Level Smart System","authors":"Mandeep Pannu, Iain Kay, Ismail El Sayad","doi":"10.54941/ahfe1003975","DOIUrl":"https://doi.org/10.54941/ahfe1003975","url":null,"abstract":"The Internet of Things (IoT) is a network of interconnected devices, sensors, and systems that communicate without human intervention. This technology involves embedded sensors, software, and wireless communication protocols that enable devices to collect and exchange data in real-time. This allows businesses and individuals to monitor and control various aspects of their environment, from temperature and humidity to security and energy consumption providing intelligent insights and automating various tasks. However, these increasingly connected devices bring security vulnerabilities to homes and businesses facing digital attacks that were never possible. These could be IoT-connected door locks that leak network passwords or IoT coffee makers that can be set to make coffee from outside one's home network. These problems arise mainly from IoT devices where usability and functionality were the focus, and security was not considered. Furthermore, these IoT devices cannot implement security due to limited storage, memory, and processing power. This paper aims to assess the feasibility and develop an intelligent system that improves the security of Internet of Things (IoT) devices in the best possible way with minimal user interaction and a learning curve, which the IoT manufacturer may need to provide. At the same time, the system will provide end users with traditional intrusion detection methods and artificial intelligence-driven detection techniques that monitor the IoT devices to get timely feedback and possible actions with or without users' interactions.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114340108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Situation Awareness Monitoring by Behaviour Detection and Model’s Processes Retroaction for Crew Member of Nuclear Power Plant 基于行为检测的核电站机组人员态势感知监测与模型过程逆向
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003293
Yanfei Liu, Chao Shen, Junsong Liu, Feng Fu, Yuzhou Liu
{"title":"Situation Awareness Monitoring by Behaviour Detection and Model’s Processes Retroaction for Crew Member of Nuclear Power Plant","authors":"Yanfei Liu, Chao Shen, Junsong Liu, Feng Fu, Yuzhou Liu","doi":"10.54941/ahfe1003293","DOIUrl":"https://doi.org/10.54941/ahfe1003293","url":null,"abstract":"Based on on-site operator’s control behavior and model’s consequential behavior & cognitive process’ retroaction (MBPR), a situation awareness detection method is proposed for crew members of nuclear power plant control room. Firstly, the cognitive models are built depending on of operator’s control knowledge, cognitive characteristic parameters and working environment’s. The cognitive model itself reflects the cognitive process and cognitive characteristics of the operator under that specific working conditions, and model’s consequential behavior embodies the operator’s cognitive characteristic and the selected procedural knowledge. From this point, the model’s consequential behavior is the representation of the operator’s procedural knowledge and operator’s certain cognitive characteristics. With this method, the on-site operator’s behavior can be captured and applied to compare model’s behaviour. Then by retroacting the model’s procedure, the operator’s cognitive characteristic and selected procedural knowledge at the moment can be obtained through tracing back the model’s behavior to its procedure. Finally, the operator’s cognitive characteristic and selected procedural knowledge are unearthed, and it can be as the representation of crew member’s cognitive status.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114730753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust: the Vital Fluid of Interactions 信任:互动的重要流体
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003294
Laurent M Chaudron, Jean-Marie Burkhardt, Lisa Chouchane, Pauline Munoz, N. Maille, Anne-Lise Marchand
{"title":"Trust: the Vital Fluid of Interactions","authors":"Laurent M Chaudron, Jean-Marie Burkhardt, Lisa Chouchane, Pauline Munoz, N. Maille, Anne-Lise Marchand","doi":"10.54941/ahfe1003294","DOIUrl":"https://doi.org/10.54941/ahfe1003294","url":null,"abstract":"In this paper we present a multidimensional approach to the concept of Trust in complex technical environments. A survey allows to focus on the two main types: Interpersonal Trust (IT) and Trust in Automation (TA), an extended generic conceptual modeling based on a grounded theory methodology is proposed; finally the first phase of an experimental campaign is presented. The whole project aims at a better understanding of the role of the various components of Trust during the decision process of a human operator in cooperation with sophisticated systems and human partners.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114829351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Laboratory assessment of heat strain in female and male wildland firefighters 野外男女消防员热应变的实验室评估
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003976
Belén Carballo Leyenda, Jorge Gutiérrez Arroyo, José Gerardo Villa Vicente, Fabio García-Heras, Juan Rodríguez Medina, Jose A Rodríguez-Marroyo
{"title":"Laboratory assessment of heat strain in female and male wildland firefighters","authors":"Belén Carballo Leyenda, Jorge Gutiérrez Arroyo, José Gerardo Villa Vicente, Fabio García-Heras, Juan Rodríguez Medina, Jose A Rodríguez-Marroyo","doi":"10.54941/ahfe1003976","DOIUrl":"https://doi.org/10.54941/ahfe1003976","url":null,"abstract":"Wildland firefighters (WFF) face a set of specific work-related factors that directly affect their physical and cognitive abilities and compromise their health and safety. The working conditions include hard physical work and environmental conditions that combine high temperatures and high radiant heat. Such environments make using personal protective equipment (PPE) mandatory to protect them from risks. This fact restricts heat removal and adds extra weight, increasing thermal strain and the risk of heat-related illnesses on WFF. Since the number of females WFF has increased, it is necessary to study the repercussions of heat stress on this group. To date, it is not yet well-known whether sex-related differences in thermoregulation will be relevant when the individuals are wearing PPE and performing high physical effort in a hot environment. Therefore, we aimed to investigate the physiological response when performing moderate to high-intensity effort in a hot-dry environment while wearing PPE according to sex. Twenty WFF 10 females [23.9 ± 3.2 yr, 163.8 ± 3.4 cm and 62.7 ± 9.1 kg] and 10 males [31.9 ± 6.6 yr, 178.8 ± 5.8 cm and 73.9 ± 7.7 kg]) performed a 125 min treadmill test in a controlled ambient (30 ºC and 30% relative humidity). The protocol consisted of two exercise stages where WFF performed different continuous and variable exercise bouts in order to mimic the effort performed during real deployments. Participants wore the full standard PPE during the test. Oxygen uptake (VO2), heart rate (HR), core temperature (CT) and chest temperature (SkT) were monitored throughout the test. HR and CT were used to calculate the physiological strain index (PSI). Differences in body mass pre-post trials corrected for fluid intake were used to calculate sweat production (SwP), sweating rate (SwR), and evaporative efficiency (EE). Differences (p < 0.05) between females and males were found in %VO2max (62.5 ± 7.4 vs 55.3 ± 5.), HR (155 ± 10 vs 134 ± 14 beats·min–1), % of maximal HR (81.3 ± 3.5 vs 42.3 ± 6.5), CT (38.0 ± 10 vs 37.7 ± 0.33 ºC), SkT (36.0 ± 0.6 vs 35.3 ± 0.6 ºC) and PSI (4.1 ± 0.5 vs 3.5 ± 0.6). Even though SwR was higher (p < 0.05) for male participants (1001.5 ± 268.3 ml) compared to females (647.5 ± 145.9 ml), females had higher EE (32.9 ± 4.6 vs 16.7 ± 6.2 %). In conclusion, performing high-intensity exercise in hot-dry conditions while wearing PPE leads to a higher thermal and cardiovascular load for female WFF, making them more susceptible to heat illness. These results could be linked to lower aerobic fitness, sweating rate, and hormonal aspects that increased the thermal burden.","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134206598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cognitive nature of procrastination 拖延症的认知本质
Cognitive Computing and Internet of Things Pub Date : 1900-01-01 DOI: 10.54941/ahfe1003291
E. Zabelina, Dastan Abdrakhmanovich Smanov
{"title":"Cognitive nature of procrastination","authors":"E. Zabelina, Dastan Abdrakhmanovich Smanov","doi":"10.54941/ahfe1003291","DOIUrl":"https://doi.org/10.54941/ahfe1003291","url":null,"abstract":"One of the typical social problems of the 21st century - procrastination - is defined as irrational postponement of desired goals indefinitely, even when aware of the negative consequences of this delay (Lay, 1997). Although possible causes of procrastination have long been cited, such as irrational beliefs (Ellis, Knaus, 1977), low self-esteem, and fear of failure (Burka, Yuen, 1983), cognitive predictors of procrastination have not been studied holistically as a system. Moreover, it remains unclear which cognitive mechanisms are involved in different types of procrastination. This study seeks to partially fill this gap by finding cognitive features of people prone to procrastination.The results of the study (N = 311) revealed differences in most of the diagnosed cognitive indicators, which suggests an important role of cognitive processes in the shaping of a procrastination tendency. Comparison of cognitive scores in the high and low procrastination groups showed that procrastinators had higher rates of cognitive closure, namely higher scores on the scales of order (p = 0.000), predictability (p = 0.052), decisiveness (p = 0.000), aspiration to cognitive closure (p = 0.000). Cognitive closure means motivation to receive an unambiguous response and cut off unnecessary, contradictory and interfering information. This is consistent with the data on higher stiffness in procrastinators (p = 0.05).Besides, procrastinators have a more pronounced frustational tolerance (p = 0.000), and a sense of self-improvement (p = 0.001). They have less vigilance (p = 0.000), but more overindulgence (p = 0.000), as well as more avoidance in decision-making (p = 0.000). Differences are also found on the temporal focus scale: people prone to procrastination are less focused not only on the future (p = 0, 000), but also on the present (p = 0, 000). Predictably, procrastinators had significantly lower levels of claims (p = 0.004) and self-esteem (p = 0.01). Procrastinators showed lower indicators of self-organization of activities: consistency (p = 0.000), purposefulness (p = 0.000), perseverance (p = 0.024), fixation (p = 0.000), self-organization (p = 0.000), orientation to the present (p = 0.000). At the same time, they have more pronounced cognitive copying strategies: avoiding behavior (p = 0.000), anxiety (p = 0.000), cognitive overestimation (p = 0.000), intolerance to stress situations (p = 0.000).The results of discriminant analysis made it possible to determine the indicators that have the greatest influence on inclusion in the group procrastinators. These are low orientation towards the present, avoidance in decision-making, vigilance, pursuit of cognitive closure, low tolerance of frustration, and low self-organization of activities. The study thus expands the understanding of the cognitive nature of procrastination. The results suggest that cognitive features such as a weak focus on the events of the present, a habit of avoiding decision-making, weakened v","PeriodicalId":285612,"journal":{"name":"Cognitive Computing and Internet of Things","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126687752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信