Beyond Overload: Assessing Cognitive Load to Facilitate Learning Transfer in Virtual Environments
- Authors
-
-
Usman A. ABDURRAHMAN
Department of Information and Communication Technology, Northwest University, Kano, Kano State, Nigeria
Author
-
Abubakar A. ROGO
Department of Computer Science, Northwest University, Kano, Kano State, Nigeria
Author
-
Abdulkadir A. BICHI
Department of Software Engineering, Northwest University, Kano, Kano State, Nigeria
Author
-
Akibu M. ABDULLAHI
Department of Computing and Informatics, Albukhary International University, Alor Setar, Malaysia
Author
-
- Keywords:
- Cognitive load, psychophysiological responses, driving simulator, learning transfer.
- Abstract
-
Learning transfer, the ability to apply knowledge to new situations, is a foundation of effective education. It involves applying what one has learned in a previous situation to solve problems or navigate new environments. However, this process can fail when a new challenge overwhelms our cognitive resources. Because working memory has a limited capacity, extraneous mental demands can cause overload, hampering performance. This study investigates this phenomenon by measuring the cognitive load of undergraduate students during an immersive virtual reality (VR) driving simulation. We used real-time physiological indicators, pupil diameter and heart rate, to assess the students' mental workload as they performed complex driving tasks. Our analysis, which categorized different levels of cognitive load, revealed that these psychophysiological measures were directly sensitive to changes in mental demand. The results confirm that tracking physiological signals like heart rate and pupil size provides a valuable window into cognitive load, highlighting its critical role in understanding and facilitating learning transfer within realistic, simulated environments.
- References
- Downloads
- Published
- 03-11-2025
- Section
- Articles
- License
-
Copyright (c) 2025 FUDMA Journal of Engineering and Technology

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
How to Cite
Similar Articles
- Murtala ISMAIL, Mohammed S. ISMAIL, Eli A. JIYA, Machine Learning-Driven Recruitment Recommendation System for Employment in Nigerian Universities , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Abubakar L. IBRAHEEM, John K. ALHASSAN, Noel D. MOSES, Suleiman AHMAD, Development of Ensemble SVM–LSTM Model for Phishing Website Detection , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Olawale J. OLALUYI, Johnson O. ADEOGO, Adeniyi O. AJIBOYE, Mayowa O. ORESELU, Olarewaju T. OGINNI, Application of Machine Learning for Enhancing Fake Logo Detection , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Oluwayinka. G. AKINWAMIDE, Olugbenga O. AMU, Christopher FAPOHUNDA, Prediction of International Roughness Index of Flexible Pavement Using Machine Learning-Based Predictive Framework in Ekiti State , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Hafsah A. ABDULRAHMAN, Muhammad M. HAMIDU, Techno-Economic Optimization of a Hybrid PV-Wind-Waste-to Energy System for the University of Maiduguri , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Emma S. EKPO, Mokọ́ládé JOHNSON, Constructing Meaning and Enhancing Well-Being: The Role of Place Attachment, Place Identity, and Sense of Place in Architectural Studio Environments , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Mokọ́ládé JOHNSON, Bashir SALIM, Enobong EQUERE, Miriam I. CHUKWUMA-UCHEGBU, Emma EKPO, Ali B. ABDULSALAM, Conserving Indigenous Geometries: A Vital Approach to Integrating Cultural Heritage into Architectural Education , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Shamsuddeen J. AHMAD, Saifullahi S. SADI, Muhammad M. AHMAD, Abdullahi D. UMAR, Shamsuddeen USMAN, Comparative Analysis of Machine Learning Algorithms for the Detection and Classification of Suspicious Emails , FUDMA Journal of Engineering and Technology: Vol. 1 No. 2 (2025): December 2025
- Opeyemi O. ASAOLU, Oluwasanmi S. ADANIGBO, Temidayo J. AKINDAHUNSI, Advances in Privacy Preservation Techniques for Mobile Ad Hoc Networks: A Review , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
- Usman A. ABDURRAHMAN, Abdulkadir A. BICHI, Usman HARUNA, Akibu M. ABDULLAHI, A Hybrid Graph Neural Network Framework Integrating Handcrafted Features for Real-Time Iris Recognition in Motion , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- Usman A. ABDURRAHMAN, Abdulkadir A. BICHI, Usman HARUNA, Akibu M. ABDULLAHI, A Hybrid Graph Neural Network Framework Integrating Handcrafted Features for Real-Time Iris Recognition in Motion , FUDMA Journal of Engineering and Technology: Vol. 2 No. 1 (2026): June 2026
