Beyond Overload: Assessing Cognitive Load to Facilitate Learning Transfer in Virtual Environments
- Authors
-
-
Usman A. ABDURRAHMAN
Department of Information and Communication Technology, Northwest University, Kano, Kano State, Nigeria
Author
-
Abubakar A. ROGO
Department of Computer Science, Northwest University, Kano, Kano State, Nigeria
Author
-
Abdulkadir A. BICHI
Department of Software Engineering, Northwest University, Kano, Kano State, Nigeria
Author
-
Akibu M. ABDULLAHI
Department of Computing and Informatics, Albukhary International University, Alor Setar, Malaysia
Author
-
- Keywords:
- Cognitive load, psychophysiological responses, driving simulator, learning transfer.
- Abstract
-
Learning transfer, the ability to apply knowledge to new situations, is a foundation of effective education. It involves applying what one has learned in a previous situation to solve problems or navigate new environments. However, this process can fail when a new challenge overwhelms our cognitive resources. Because working memory has a limited capacity, extraneous mental demands can cause overload, hampering performance. This study investigates this phenomenon by measuring the cognitive load of undergraduate students during an immersive virtual reality (VR) driving simulation. We used real-time physiological indicators, pupil diameter and heart rate, to assess the students' mental workload as they performed complex driving tasks. Our analysis, which categorized different levels of cognitive load, revealed that these psychophysiological measures were directly sensitive to changes in mental demand. The results confirm that tracking physiological signals like heart rate and pupil size provides a valuable window into cognitive load, highlighting its critical role in understanding and facilitating learning transfer within realistic, simulated environments.
- References
- Downloads
- Published
- 03-11-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Adekunle O. ADEWOLE, Ayodeji O. ARIYO, Development of an Edge-Enabled IoT Smart Energy Meter with Artificial Intelligence (AI)-Based Load Prediction for Device-Level Monitoring , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Damilare L. ADEKEYE, Uche M. IROKA, A Microcontroller-Based Intelligent Electricity Theft Detection and Prevention System , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Ukange N. SYBIL, Hadiza A. UMAR, Ogar M. OKO, Habeebah A. KAKUDI, Usman MAHMUD, Alex AARON, Leveraging Quantum Machine Learning for Early Ovarian Cancer Diagnosis , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Caleb A. ABORISADE, Jide E.T. AKINSOLA, Ifeoluwa M. OLANIYI, Fathia O. ONIPEDE, Emmanuel A. OLAJUBU, Ganiyu A. ADEROUNMU, Machine Learning-Based Polycystic Ovary Syndrome Generative Modelling via Ensemble Learning and Neural Networks for Infertility Prediction , FUDMA Journal of Engineering and Technology: Vol. 1 No. 1 (2025): July 2025
- Olatunde A. AKANO, Wariz A. ISMAEL, Ayomikun A. AWOSEYI, Femi AYO, Ifeoluwa M. OLANIYI, Jide E.T. AKINSOLA, Short Messaging Service Spam Detection Model Using Natural Language Processing and Deep Learning Techniques , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwasanmi S. ADANIGBO, Opeyemi O. ASAOLU, Adedayo A. SOBOWALE, Temidayo AKINDAHUNSI, Akinbayode A. ASAOLU, Intrusion Detection in Mobile Adhoc Networks: A Review of Signature-Based, Anomaly-Based, and Hybrid Approaches , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Yusuf T. BAFFA, Muhammad Y. MUHAMMAD, Aliyu SHUAIBU, Enhanced Detection and Classification Models for Distributed Denial-of-Service Using Time-Based Features in Cybersecurity , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
You may also start an advanced similarity search for this article.
