• Title/Summary/Keyword: Computer Science Activities

Search Result 620, Processing Time 0.03 seconds

Possibility of Inclusive Adaptation of The ABA Intervention at School

  • Saigh, Budor H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.83-88
    • /
    • 2022
  • Applied Behaviour Analysis (ABA) is the applied science where strategies are derived from the principles of behaviour and are applied to improve meaningful social behaviours [3]. This study investigates the possible inclusive value of the use ABA in schools in Saudi Arabia. Interviews were conducted with two ABA therapists and a support teacher in order to address this possibility. From the research findings, it emerged how ABA is one of the cognitive-behavioural intervention models and therefore, can be generalised to other disorders or diagnoses and the applied behavioural analysis does have an inclusive value as it structures individualized activities for the increase of both personal and social skills and these activities allow the subject to work on his or her skills, which are, however, absolutely preparatory to the inclusion of the subject in the classroom context.

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

A petri-net based execution model of processing equipment for CSCW-based shop floor control in agile manufacturing

  • Hong, Soondo;Cho, Hyuenbo;Jung, Mooyoung
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.193-200
    • /
    • 1995
  • A shop floor control system(SFCS), a central part of agile manufacturing, performs the production activities required to fill orders. In order to effectively control these activities, CSCW (computer supported cooperative work) is adopted where a supervisor does not exist. In this paper, we define functional perspective of CSCW-based shop floor control using planning, scheduling, and execution functions. In particular, we focus on an execution model that can coordinate the planning and scheduling functions. Execution can be defined informally as a function that downloads and performs a set of scheduled tasks. Execution is also responsible for identifying and resolving various errors whether they come from hardware or software. The purpose of this research is to identify all the execution activities and solving techniques under the assumptions of CSCW-based heterarchical control architecture. This paper also proposes a classification scheme for execution activities of CSCW-based heterarchical control architecture. Petri-nets are used as a unified framework for modeling and controlling execution activities. For solving the nonexistence of a supervisor, A negotiation-based solution technique is utilized.

  • PDF

Network Construction of Women′s Volunteer Center (여성자원활동센터의 네트워크 구축 방안)

  • 이성철
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.179-197
    • /
    • 2003
  • Since 1991, so many women's volunteer centers have established in local self governing body or several women's organizations. The aims are to promote and manage women's volunteer activities. For last 12 years, one of aims has been already attained. But the other one is beyond attainment, because there are few network system among women's volunteer centers. For more efficient management of volunteer activities, it is necessary to construct computer network system in every volunteer center. In this paper, we describe current network situation and suggest network construction method of women's volunteer centers.

An AI Service to support communication and language learning for people with developmental disability (발달장애인을 위한 커뮤니케이션과 언어 학습 증진을 위한 인공지능 서비스)

  • Park, Chan-Jun;Kim, Yang-Hee;Jang, Yoonna;Umadevi, G.R;Lim, Heui-Seok
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.51-57
    • /
    • 2020
  • Children with language developmental disabilities often struggle through their lives from a lot of challenges in everyday life and social activities. They're often easily deprived of the opportunity to engage in social activities, because they find difficulty in understanding or using language, a core means of communication. With regard to this issue, AAC(Augmentative and Alternative Communication) can be an effective communication tool for children who are suffering from language disabilities. In this paper, we propose a deep learning-based AI service to make full use of the pictogram as an AAC tool for children with language developmental disabilities to improve not only the ability to interact with others but the capacity to understand language. Using this service, we strive to help these children to more effectively communicate their intention or desire and enhance the quality of life.

Identifying the leaders and main conspirators of the attacks in terrorist networks

  • Abhay Kumar Rai;Sumit Kumar
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.977-990
    • /
    • 2022
  • This study proposes a novel method for identifying the primary conspirators involved in terrorist activities. To map the information related to terrorist activities, we gathered information from different sources of real cases involving terrorist attacks. We extracted useful information from available sources and then mapped them in the form of terrorist networks, and this mapping provided us with insights in these networks. Furthermore, we came up with a novel centrality measure for identifying the primary conspirators of a terrorist attack. Because the leaders of terrorist attacks usually direct conspirators to conduct terrorist activities, we designed a novel algorithm that can identify such leaders. This algorithm can identify terrorist attack leaders even if they have less connectivity in networks. We tested the effectiveness of the proposed algorithms on four real-world datasets and conducted an experimental evaluation, and the proposed algorithms could correctly identify the primary conspirators and leaders of the attacks in the four cases. To summarize, this work may provide information support for security agencies and can be helpful during the trials of the cases related to terrorist attacks.

Using The Anthology Of Learning Foreign Languages In Ukraine In Symbiosis With Modern Information Technologies Of Teaching

  • Fabian, Myroslava;Bartosh, Olena;Shandor, Fedir;Volynets, Viktoriia;Kochmar, Diana;Negrivoda, Olena;Stoika, Olesia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.241-248
    • /
    • 2021
  • The article reviews the social media as an Internet phenomenon, determines their place and level of popularity in the society, as a result of which the social networks are a resource with perspective pedagogical potential. The analysis of social media from the point of view of studying a foreign language and the possibility of their usage as a learning medium has been carried out. The most widespread and popular platforms have been considered and, based on their capabilities in teaching all types of speech activities, the "Instagram", "Twitter", and "Facebook" Internet resources have been selected as the subject of the research. The system of tasks of teaching all types of speech activities and showing the advantages of the "Instagram", "Twitter", and "Facebook" platforms has been proposed and briefly reviewed.

The Effects of Learning Activities on the Application of Augmented Reality Contents in Elementary Science Instruction (초등학교 과학수업에서 AR 콘텐츠 활용이 학습 활동에 미치는 효과)

  • Kim, Kyung-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.75-85
    • /
    • 2009
  • This study compared the differences between a group that studied with AR contents and a group that studied in a traditional method to examine the effects of AR contents use in elementary school science classes. The effects in four areas of studying were examined : study focus rate, study activities consuming variables, study participation activeness and instructional climate. As a result, there was no significant difference in study concentration rate between the AR and traditional groups. For study participation activeness, the AR group had higher participation actions, but there was no difference between the groups for language participation. For study activities consuming variables, the AR group stimulated more diverse study activities than the traditional group. For instruction climate, the AR contents group contributed more to creating a positive climate compared to the traditional group. Therefore, the results showed that application of AR contents on science classes would stimulate active participation of students and various study activities and help create a positive instructional climate.

  • PDF

A Study to Improve the Extracurricular Activities in Elementary school Using WBI (WBI를 이용한 초등학교 재량활동의 개선에 관한 연구)

  • Jung Kyu-Cheol;Jang Hae-Suk;Lee Chung-Kook;Park Kihong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.669-672
    • /
    • 2004
  • 인터넷과 웹의 급속한 성장은 전반적으로 우리사회에 영향을 미쳤고 교육 분야도 예외는 아니다. 정보화 사회에 대응하는 교육의 효율성을 높이고자 교육개혁을 추진하고 있다. 7차 교육과정에서는 정보화 사회에 대처할 수 있는 능력함양을 위해 정보화교육의 중요성을 강조하고 있으며, 국가 차원의 교육정보화 사업달성을 위해 노력하고 있다. 그러나 초등학교에서는 컴퓨터 교육에 대한 정확한 교육과정과 교육내용이 제시되어있지 않고 재량활동의 일부분으로 컴퓨터교육을 실시함에 따라 마땅한 컴퓨터 교재와 학생들의 수준별 학습이 이루어지지 못하여 체계적인 컴퓨터교육이 이루어지지 못하고 있는 실정이다. 본 연구는 웹 기반 교수-학습을 활용하여 학습자 중심의 자기 주도적 학습을 하고 학습자에게 학습과정에 대한 자기 평가의 기회를 제공함으로써 학습에 대한 인식과 주도성을 증진시키고, 수준별 학습을 할 수 있는 올바른 패러다임을 모색하였다.

  • PDF

Honeypots Tools Study and Analysis

  • Al-Jameel, Sultan;Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.162-173
    • /
    • 2021
  • The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.