Connectionism: The Pros and Cons

Authors

  • Mahshad Tasnimi TEFL Department, Islamic Azad University, North Tehran Branch, Tehran, Iran

DOI:

https://doi.org/10.53555/es.v1i1.892

Keywords:

: connectionism, neural networks, node, interconnection, weight, cue.

Abstract

The emergence of connectionism represents a paradigm shift in science. Connectionism has its root in cognitive and computational neuroscience. Likening the brain to a computer, connectionism tries to explain human mental abilities in terms of artificial neural networks. A neural network consists of large number of nodes/units joined together to form a network of interconnections. Knowledge is distributed among these interconnections. Therefore, learning is a by-product of processing. This article deals with the concept of connectionism, what it accounts for and what it does not account for. Furthermore, a comparison between traditional symbolic view and connectionist view is presented. Finally, different approaches to connectionism are discussed.

Downloads

Download data is not yet available.

References

Smart, Nigel (February 19, 2008). "Dr Clifford Cocks CB". Bristol University. Retrieved August 14,2011.

Adrian Leunga, Yingli Shengb, Haitham Cruickshankb, "The security challenges for mobile ubiquitous services" Information Security Group, Royal Holloway, University of London, Egham, UKbCentre for Communication Systems Research, University of Surrey, Guildford, Surrey, UK , 2007.

B. Lampson, M. Abadi, M. Burrows, and E. Wobber, “Authentication in distributed systems: Theory and practice,” Technical Report 83, Digital Systems Research Center, February 1992.

T. Leighton and S. Micali, “Secret-key agreement without public-key cryptography,”in Advances in Cryptology —Proceedings of Crypto ’93 (D. R. Stinson, ed.), vol. 773 of Lecture Notes in Computer Science, pp. 456—479, Springer-Verlag, 1993.http://www.naharnet.com/stories/en/676.

Naharnet Newsdesk(28 October 2010). Men Disguised as Women Likely Involved in Attack on UN Investigators in Dahiyeh http://www.nascio.org/publications/documents/NASCIO securityAtTheEdge.pdf, july 2009.

John Edwards, DOD tackles security challenges of mobile computing, defense Systems, June 13, 2011.

Downloads

Published

2015-01-31

How to Cite

Tasnimi, M. (2015). Connectionism: The Pros and Cons. International Journal For Research In Educational Studies, 1(1), 22–38. https://doi.org/10.53555/es.v1i1.892