• Title/Summary/Keyword: 대응원리

Search Result 172, Processing Time 0.025 seconds

Effects of Polar Literacy Education Program for Elementary and Middle School Students (초·중학생 대상 극지 소양 교육 프로그램의 효과)

  • Sueim Chung;Donghee Shin
    • Journal of The Korean Association For Science Education
    • /
    • v.43 no.3
    • /
    • pp.209-223
    • /
    • 2023
  • This study was conducted to evaluate the effectiveness of a polar literacy education program for elementary and middle school students, and to derive implications for new education to respond to climate change. We developed modular education programs based on the seven principles of polar literacy established by the Polar-ICE team. We divided them into two courses, one emphasizing science concepts and another emphasizing humanities and sociological issues. We then selected and structured detailed programs suitable for the two courses. These two courses were applied to 26 elementary and middle school students for approximately 69 hours in a Saturday science class hosted by the Department of Science Education at a university in Seoul. The 26 students were divided into three groups. Two groups completed the science education program for polar literacy and a humanities and social studies education program for polar literacy, respectively. The third group, the control group, received general science education unrelated to polar literacy. Before and after running the programs, all three groups responded to a polar literacy test and questionnaires that used vocabulary and presented scenes associated with polar regions. The test results were expressed using Wilcoxon signed ranks, which is a non-parametric test method, and improvements made upon completion of the program were analyzed. From a cognitive aspect, all three groups showed improvement after completing the program in the knowledge area; however, the experimental groups showed a greater degree of improvement than the control group, and there was a clear difference in the contents or materials explicitly covered. From an affective aspect, the difference between before and after the program was minor, but the group that focused on humanities and social issues showed a statistically significant improvement. Regarding changes in polar imagery, the two experimental groups tended to diverge from monotonous images to more diverse images compared to the control group. Based on the above results, we suggested methods to increase the effectiveness of polar literacy education programs, the importance of polar literacy as appropriate material for scientific thinking and earth system education, measures to improve attitudes related to the polar region, and the need to link to school curriculums.

Application and Evaluation of Object-Oriented Educational Programming Language 'Dolittle' for Computer Science Education in Secondary Education (중등 컴퓨터과학교육을 위한 객체지향형 EPL '두리틀'의 적용 및 평가)

  • Kwon, Dae-Yong;Gil, Hye-Min;Yeum, Yong-Cheul;Yoo, Seoung-Wook;Kanemune, Susumu;Kuno, Yasushi;Lee, Won-Gyu
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.6
    • /
    • pp.1-12
    • /
    • 2004
  • Current computer education is difficult to educate basic concepts and principals of the computer science because the 7th curriculum of computer education is focused on the application of software. According to the ACM K-12 report about the computer science education model, current computer education is taking the wrong way and we should put the highly priority on the education of the fundamentals through programming languages for a better computer education oriented to the computer science. This paper introduces a new object-oriented educational programming language "Dolittle". The design principals of Dolittle are simple syntax of Korean, incremental programming, text based programming, aliasing of function, and object-oriented programming. Being applied to middle school classes, we can confirm that Dolittle is easy to learn, and gives rise to high interest and keeps interest through a course, and also is of great practical use in class for programming novice.

  • PDF

Is the Precautionary Principle Unscientific?: 'Rationality' of the Precautionary Principle and its Conflicts with Risk Analysis Framework (사전주의의 원칙은 비과학적인가?: 위험 분석과의 논쟁을 통해 본 사전주의 원칙의 '합리성')

  • Ha, Dae-Cheong
    • Journal of Science and Technology Studies
    • /
    • v.10 no.2
    • /
    • pp.143-174
    • /
    • 2010
  • How can a regulatory policy to address potential hazards be made legitimate in the face of scientific uncertainty? The precautionary principle has been gradually regarded as the most persuasive answer to this intricate question in Europe since the 1970s and generally recognized as a guiding principle in international environmental law. This principle, however, has often been subject to diverse concerns and criticisms due to its vague definition. This article tries to elaborate the precautionary principle while reviewing both the validity and unreasonableness of these criticisms over this principle. Then, this article explores the policy relevance of this principle by applying this elaborated definition to the concrete case of risk governance such as the risk assesment of food safety. In the end, this paper emphasizes the fact that the precautionary principle can be applied in the field of risk governance, refuting the argument that the precautionary principle is only a moral attitude or a political position.

  • PDF

Topological Interference Management via 8 Trigram (8괘(卦)(Trigram)를 이용한 위상간섭 제거)

  • Lee, Moon Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.95-106
    • /
    • 2017
  • In this paper, we investigate the conventional topological interference management (TIM) with proposed network topology such as 8 trigram (8 user networks). The key observation is that optimal symmetric degree of freedom (DoF) can be achieved for 8 user network with different channel coherence times by adaptively selecting the interference alignment scheme via controlling the alignment feasibility of the transmitted signals. However, this yields a very complex problem, for which we use the combination of different schemes such as interference avoidance and repetition coding. In addition to the above schemes, we propose a triangular transmit cooperation (TTC) algorithm for 8 user networks to achieve the optimal symmetric DoF. And We apply the principle of complementarity of 8 trigram to remove the interferences, and correspond the concepts of win-win and conflict to direct and indirect signals of transmit and receive respectively. We find that the principle of complementarity comes out from the trigram of I Ching. That is, we apply the relation of confrontation and coexistence to 8 transmitters and receivers, and get the results of symmetric DoF of 4/3.

Time to Invest in Real Asset with Option Pricing Theory - Focused on REITs - (옵션가격결정이론에 기반한 실물자산의 투자시기 결정 - 부동산투자신탁회사(REITs)를 중심으로 -)

  • Jun, Jae-Bum;Lee, Sam-Su
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.6
    • /
    • pp.54-64
    • /
    • 2010
  • A firm decides to go to the project based on its investment analysis. However, the cash flows generated from the real project can not be always coincident with what expected as it follows uncertain behavior and the asymmetric payoff caused by the managerial flexibilities involved in the real asset affects the project value. Amongst various managerial flexibilities entailed in most of the real assets, although investment delay has been known to enhance the project value thanks to its ability to provide new market information to management, the related research to select the time to invest have been just few. Therefore, this research aims to show the theoretical framework to decide when to invest reflecting the behaviors of increasing project value and loss recovery cost due to investment delay with option pricing, related financial economic, and variational theories.

Preliminary Structural Form Planning for Suspension Bridge According to Force Flow (힘의 흐름을 따르는 현수교의 초기 구조형태계획)

  • Kim, Namhee;Koh, Hyun-Moo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1315-1326
    • /
    • 2013
  • Geometric form of a suspension bridge that uses load-sensitive cables takes on not only resisting loads but also becoming a visually sensible shillouette. This study has proposed a preliminary structural form planning for a suspension bridge following force flow by adopting the two possibilities of the graphic statics. First, the force polygon allows alternative load paths for the same loading condition. Second, a new structural form for the newly developed load path can be constructed using the reciprocal principle that exits between a structure space and the corresponding force polygon. Major structural form parameters that affect both structural and aesthetic aspecs are first identified. The relationships between structural forms and the corresponding force polygons are then investigated for the identified parameters. Upon the investigation, a stepwise process is developed for a preliminary structural form planning for a suspension bridge. The proposed structural form planning method is general that can be easily expanded to generate design alternatives of similar form-active structural systems. It is also expected that this method will be used as an educational tool to explain the interrelationships between structural forms and their force flows.

A Study on S-Function in SEED Cryptosystem (SEED암호에서 S-함수에 대한 고찰)

  • Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1295-1305
    • /
    • 2017
  • There is SEED cryptosystem in domestic block cipher standard. This code was drafted by the Korea Information Security Agency (KISA) in October 1998 and underwent a public verification process in December of the same year, which resulted in the final amendment to improve safety and performance. Unlike DES, it is a 128-bit block cipher that has been passed through various processes and established in 2005 as an international standard. It is a block cipher with a pastel structure like DES, but the input bit block has been increased to 128 bits, double DES. In this paper, first, we introduce the general algorithm of SEED cryptosystem and analyzed mathematically generating principle of key-value which is used in F-function. Secondly, we developed a table that calculates the exponent of the primitive element ${\alpha}$ corresponding to the 8-bit input value of the S-function and finally analyzed calculating principle of S-function designed in G-function through the new theorem and example. Through this course, we hope that it is to be suggest the ideas and background theory needed in developing new cryptosystem to cover the weakness of SEED cryptosystem.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

문왕팔괘(文王八卦)에 관(關)한 연구(硏究)

  • Yun, Chang-Yeol
    • Journal of Korean Medical classics
    • /
    • v.13 no.2 s.17
    • /
    • pp.58-67
    • /
    • 2000
  • 통과대문왕팔괘차서도화문왕팔괘방위도적연구(通過對文王八卦次序圖和文王八卦方位圖的硏究). 득도요여하결론(得到了如下結論). 1. 최초명명위문왕팔괘차서도화문왕팔괘방위도적인시소옹(最初命名爲文王八卦次序圖和文王八卦方位圖的人是邵雍). 문왕팔괘차서도화문왕팔괘방위도수연몰유시문왕소화적확체적근거(文王八卦次序圖和文王八卦方位圖雖然沒有是文王所畵的確切的根據), 단시종추연복희이(但是從推演伏羲易), 동사상결합(同事相結合), 최종확립여금적역학체계적인시문왕(最終確立如今的易學體系的人是文王). 이차환부합현금적역리(而且還符合現今的易理), 인차구유일정설복력(因此具有一定說服力). 2. 재문왕팔괘차서도중삼남유일양이음구성(在文王八卦次序圖中三男由一陽二陰構成). 삼녀유일음이양구성(三女由一陰二陽構成). 저가이용음양호근적원리진행설명(這可以用陰陽互根的原理進行說明). 3. 복희팔괘방위도현시모종공간상(伏羲八卦方位圖顯示某種空間相). 이문왕팔괘방위도칙현시사시(而文王八卦方位圖則顯示四時). 팔절적변화화만물생장적류행주기등시간상적변화(八節的變化和萬物生長的流行周期等時間上的變化). 4. 문왕팔괘방위도동사시적오행상일치(文王八卦方位圖同四時的五行相一致). 시상생관계(是相生關係), 팔괘당중각유양개목김토(八卦當中各有兩개木金土). 시유우형흔왕성(是由于形흔旺盛), 수화각유일개시유우기흔왕성(水火各有一개是由于氣흔旺盛). 5. 문왕팔괘방위도재표면상간호상시오행상생적관계(文王八卦方位圖在表面上看好象是五行相生的關係). 단시(但是), 상호성대면적팔괘적오행도성상극관계(相互成對面的八卦的五行都成相剋關係). 화동측상임적감수(和東側相臨的坎水) 간토(艮土) 진목(震木) 손목도시성상극관계(孫木都是成相剋關係). 종차가이지도상극시발전만물적주체(從此可以知道相剋是發展萬物的主體). 6. 대우복희팔괘전화위문왕팔괘적원리(對于伏羲八卦轉化爲文王八卦的原理), 수유각종이론제출(雖有各種理論提出). 단시상무확체적설법(但是尙無確切的說法). 7. 복희팔괘주요체현천도화외상등(伏羲八卦主要體現天道和外象等), 문왕팔괘측체현인사화내정등(文王八卦側體現人事和內情等). 8. 복희팔괘위체(伏羲八卦爲體), 문왕팔괘위용(文王八卦爲用). 복희팔괘중(伏羲八卦中), 위변화적주체적천지즉건곤위우중축(爲變化的主體的天地卽乾坤位于中軸). 문왕팔괘중(文王八卦中), 위변화적대용적일월즉감리위우중축(位變化的大用的日月卽坎離位于中軸). 9. 복희팔괘도속우표현춘천적변화지상적제일괘도(伏羲八卦圖屬于表現春天的變化之象的第一掛圖), 생괘도화창조도(生掛圖和倉曹圖), 문왕팔괘도칙속우표현하천적변화지상적제이괘도(文王八卦圖則屬于表現夏天的變化之象的第二掛圖), 장괘도화발전도(長掛圖和發展圖). 10. 문왕팔괘도시류행이치기용적역지용(文王八卦圖是流行以致其用的易之用), 표현무질서화혼란(表現無秩序和混亂), 위화여괴리상호란무적난음난양지상(韋和與乖離相互亂舞的亂陰亂陽之象). 11. 문왕팔괘도화낙서적변화원리상일치(文王八卦圖和洛書的變化原理相一致), 가이장낙서적수직접대응도문왕팔괘도중(可以將洛書的數直接對應到文王八卦圖中). 우명낙서팔괘도(又名洛書八卦圖). 구수도혹일구역(九數圖或一九易). 12. 문왕팔괘도적상대응적수자지합도위십(文王八卦圖的相對應的數字之合都爲十). 저예시료성괘도십수도적출현(這豫示了成掛圖十數圖的出現).

  • PDF

Analysis of Second Graders' Counting an Irregular Arrangement of Three-Digit Objects (세 자리 수의 불규칙 배열 대상에 대한 초등학교 2학년의 수 세기 분석)

  • Chang, Hyewon
    • Communications of Mathematical Education
    • /
    • v.36 no.4
    • /
    • pp.469-486
    • /
    • 2022
  • Counting occupies a fundamental and important position in mathematical learning due to its relation to number concepts and numeral operations. In particular, counting up to large numbers is an essential learning element in that it is structural counting that includes the understanding of place values as well as the one-to-one correspondence and cardinal principles required by counting when introducing number concepts in the early stages of number learning. This study aims to derive didactical implications by investigating the possibility of and the strategies for counting large numbers that is expected to have no students' experience because it is not composed of current textbook activities. To do this, 89 second-grade elementary school students who learned the three-digit numbers and experienced group-counting and skip-counting as textbook activities were provided with questions asking how many penguins were in a picture where 260 penguins were irregularly arranged and how to count. As a result of analyzing students' responses in terms of the correct answer rate, the strategy used, and their cognitive characteristics, the incorrect answer rate was very high, and the use of decimal principles, group-counting, counting by one, and partial sum strategies were confirmed. Based on these analysis results, several didactical implications were derived, including the need to include counting up to large numbers as textbook activities.