• Title/Summary/Keyword: Implicit theory of intelligence

Search Result 3, Processing Time 0.02 seconds

Polanyi's Epistemology and the Tacit Dimension in Problem Solving (폴라니의 인식론과 문제해결의 암묵적 차원)

  • Nam, Jin-Young;Hong, Jin-Kon
    • Journal for History of Mathematics
    • /
    • v.22 no.3
    • /
    • pp.113-130
    • /
    • 2009
  • It can be said that the teaching and learning of mathematical problem solving has been greatly influenced by G. Polya. His heuristics shows down the explicit process of mathematical problem solving in detail. In contrast, Polanyi highlights the implicit dimension of the process. Polanyi's theory can play complementary role with Polya's theory. This study outlined the epistemology of Polanyi and his theory of problem solving. Regarding the knowledge and knowing as a work of the whole mind, Polanyi emphasizes devotion and absorption to the problem at work together with the intelligence and feeling. And the role of teachers are essential in a sense that students can learn implicit knowledge from them. However, our high school students do not seem to take enough time and effort to the problem solving. Nor do they request school teachers' help. According to Polanyi, this attitude can cause a serious problem in teaching and learning of mathematical problem solving.

  • PDF

A Study of Factors Effecting on Gifted Students' Achievement : Self-determination, Learning Goal-orientation, Self-efficacy, Implicit Theory of Intelligence, and Self-regulated Learning Strategy (영재의 학업성취에 영향을 주는 심리적 요인들: 자기결정성, 학습목표지향성, 자기효능감, 지능관 및 자기조절학습전략을 중심으로)

  • Jo, Son-Mi
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.3
    • /
    • pp.611-630
    • /
    • 2011
  • The purpose of the study was to investigate which psychological factors influence on the gifted students' achievement. As a psychological factor, self-determination, learning goal-orientation, self-efficacy, belief of intelligence, and self-regulated learning strategy were examined. The difference in psychological factors between the gifted with high achievement and the gifted with low achievement was to explored. For the study 128 gifted students' data from second-year data of Korean Education Longitudinal Study (KELS) were selected and analyzed. The findings indicate that the predictors of gifted students' achievement are extrinsic regulation, identified regulation, mastery-approach goal, self-efficacy, elaboration, and meta-cognition factor. Especially, the factor of elaboration and identified regulation are the strongest predictors. The findings from t-test analysis indicate that the gifted with low achievement show the low level in self-determination, mastery-approach, self-efficacy, elaboration, meta-cognition, place management and seeking social assistance from teacher. Therefore the developing elaboration, one of regulation learning strategy, is essential to improve the achievement of the gifted students with low scores.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.