• Title/Summary/Keyword: Universal Computer Science Education

Search Result 10, Processing Time 0.021 seconds

A Case Study on Necessity of Universal Computer Science Education in Elementary Schools to Nurture Digital Talents (디지털인재 양성을 위한 초등학교의 보편적 정보교육 도입의 필요성 연구)

  • Choi, Moonseok;Shin, Seungki
    • Journal of The Korean Association of Information Education
    • /
    • v.26 no.3
    • /
    • pp.209-218
    • /
    • 2022
  • The government of South Korea discusses ways to expand computer science education to solve the digital divide. In-service elementary school teachers are also aware of the need for computer science education, with 77.3% of those who responded positively to the expansion of computer science education. The participating elementary school in this study has conducted computer science education for more than an hour per a week since the 1980s. As a result of a survey, the proportion of students taking private education was 16.2%. It shows 50.3% lower than 66.5% of other surveys conducted in 2021, which means the effectiveness in reducing private education when continuous computer science education is being conducted in the school system. In the case study analysis, teachers pointed out that the instructional content varies by instructors due to the absence of the national curriculum. The parents recognized the importance of computer science education but did not know the learning content and mentioned the necessity of the national computer science education curriculum. It means that computer science education should provide a universal educational opportunity as an independent subject in elementary schools for nurturing future talents.

Faculty Members' Knowledge and willingness to Implement the Universal Design for Learning for Students with Disabilities in Saudi Universities

  • Alzahrani, Hassan M
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.315-321
    • /
    • 2022
  • Many students with disabilities and special needs are enrolled in higher education, which substantiated the need for research regarding faculty members' knowledge and willingness to implement supportive strategies in higher education in Saudi Arabia. This study explored Saudi university faculty members' knowledge and willingness to apply UDL (Universal Design for Learning) principles in their teaching practice. Surveys were used for data collection for this descriptive research. The findings indicated faculty members felt that they were knowledgeable regarding UDL and were willing to use UDL principles in teaching their students. Furthermore, there were no statistically significant differences between faculty members' knowledge levels regarding UDL based on their current position and years of experience. The findings indicated there was a significant relationship between gender and knowledge, with males having a significantly higher mean knowledge, although further analyses revealed it was a small effect. Finally, the results suggest more years of experience are related to greater willingness to use UDL principles, and this is particularly true for those in a lecturing position. These findings could be helpful, particularly for the Ministry of Education in Saudi Arabia to shed light on faculty members' UDL knowledge. Further research is needed to substantiate the findings.

Study on the Direction of Universal Big Data and Big Data Education-Based on the Survey of Big Data Experts (보편적 빅데이터와 빅데이터 교육의 방향성 연구 - 빅데이터 전문가의 인식 조사를 기반으로)

  • Park, Youn-Soo;Lee, Su-Jin
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.2
    • /
    • pp.201-214
    • /
    • 2020
  • Big data is gradually expanding in diverse fields, with changing the data-related legislation. Moreover it would be interest in big data education. However, it requires a high level of knowledge and skills in order to utilize Big Data and it takes a long time for education spends a lot of money for training. We study that in order to define Universal Big Data used to the industrial field in a wide range. As a result, we make the paradigm for Big Data education for college students. We survey to the professional the Big Data definition and the Big Data perception. According to the survey, the Big Data related-professional recognize that is a wider definition than Computer Science Big Data is. Also they recognize that the Big Data Processing dose not be required Big Data Processing Frameworks or High Performance Computers. This means that in order to educate Big Data, it is necessary to focus on the analysis methods and application methods of Universal Big Data rather than computer science (Engineering) knowledge and skills. Based on the our research, we propose the Universal Big Data education on the new paradigm.

Features of Implementing Pedagogical Practices on the Example of EU Countries' Experience

  • Mykhailo Poplavskyi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.129-135
    • /
    • 2024
  • Studying at a modern university involves using modern methods and the latest advances in science and education, which applies to Ukraine and all higher education institutions in Europe, determining the relevance of the study and its international significance. The study aims to analyze and implement effective and innovative practices that can be used in integrated educational programs, which include interactive work in education at the European level. The use of general scientific approaches, such as theoretical, statistical, and empirical, allows achieving the set goals. The central hypothesis of the research is the presentation of the best pedagogical practices in the educational program, which includes interactive and universal. The results of the study prove the effectiveness of interactive training. Future research is devoted to developing new pedagogical practices and the development of algorithms for their implementation.

Mathematical Models That Underlie Computer Simulation of the Hook and Line Fishing Gears

  • Gabruk, Victor Ivanovich;Kudakaev, Vasilii Vladimirovich
    • Ocean and Polar Research
    • /
    • v.41 no.1
    • /
    • pp.19-34
    • /
    • 2019
  • The present study obtained universal mathematical models of all elements and characteristics regarding hook and line fishing systems. To describe the hook and line fishing systems on site we used three kinds of coordinate systems: the earth based coordinate system, natural coordinate system, and flow (velocity) coordinate system. Mathematical models presented in this article allow us to define the shape of the fishing gear, the tension of the rope at different points, hydrodynamic resistance, diameter of the hook's wire, immersion depth of the fishing hooks, distance from hooks to the ground and the required lifting force of the floats. These models allow for the performance of computer simulations regarding any kinds of hook and line gears in still water or water where flow occurs.

ECC-based UMTS-AKA Protocol Providing Privacy and Perfect Forward Secrecy (타원 곡선 암호 기반의 프라이버시와 완전한 전방향 안전성을 제공하는 UMTS-AKA 프로토콜)

  • Kim Dae-Young;Cui Yong-Gang;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.506-510
    • /
    • 2006
  • 3G 이동통신기술중 하나인 UMTS(Universal Mobile Telecommunications System)에서는 무선 구간의 안전한 통신을 위해 UMTS-AKA(Authentication and Key Agreement) 프로토콜이 사용된다. 그러나 SN(Serving Network)과 HN(Home Network)의 통신량 소비 문제, SQN(SeQuence Number) 동기화 문제 등 여러 가지 문제점이 제기되었다. 본 논문에서는 기존 프로토콜의 문제점과 IMSI(International Mobile Subscriber Identity)의 노출로 인한 프라이버시 문제점을 해결하고, ECDH(Elliptic Curve Diffie Hellman) 기법으로 완전한 전방향 안전성을 제공하는 프로토콜을 제안한다.

  • PDF

An Energy-Efficient MAC Protocol for Wireless Wearable Computer Systems

  • Beh, Jounghoon;Hur, Kyeong;Kim, Wooil;Joo, Yang-Ick
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.7-11
    • /
    • 2013
  • Wearable computer systems use the wireless universal serial bus (WUSB), which refers to USB technology that is merged with WiMedia physical layer and medium access control layer (PHY/MAC) technical specifications. WUSB can be applied to wireless personal area network (WPAN) applications as well as wired USB applications such as PAN. WUSB specifications have defined high-speed connections between a WUSB host and WUSB devices for compatibility with USB 2.0 specifications. In this paper, we focus on an integrated system with a WUSB over an IEEE 802.15.6 wireless body area network (WBAN) for wireless wearable computer systems. Due to the portable and wearable nature of wearable computer systems, the WUSB over IEEE 802.15.6 hierarchical medium access control (MAC) protocol has to support power saving operations and integrate WUSB transactions with WBAN traffic efficiently. In this paper, we propose a low-power hibernation technique (LHT) for WUSB over IEEE 802.15.6 hierarchical MAC to improve its energy efficiency. Simulation results show that the LHT also integrates WUSB transactions and WBAN traffic efficiently while it achieves high energy efficiency.

An Analysis of Authentication and Key Agreement Protocols in UMTS (UMTS에서 인증 및 키 동의 프로토콜에 대한 분석)

  • Cui Yong-Gang;Kim Dae-Young;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.457-462
    • /
    • 2006
  • In UMTS (Universal Mobile Telecommunication System), a protocol called UMTS AKA is used to authenticate MSs (Mobile Stations). When an MS is in a foreign network, the serving network contacts the AuC (Authentication Center) located at the home network of the MS to authenticate it. To reduce this cost, AuC sends n AVs(Authentication Vectors) to the serving network. Although the use of AVs allows the serving network to authenticate an MS without contacting the AuC each time, there are also shortcomings such as synchronization problem. Subsequently, a set of protocols adopting the same or similar method have been proposed. In this paper, we analyze and compare authentication protocols for UMTS with respect to the use of AVs and its alternatives. We conclude that using Kerberos-like ticket key overcomes some of the drawbacks of using AVs, whereas AVs provide much better security.

  • PDF

Python-based Software Education Model for Non-Computer Majors (컴퓨터 비전공자를 위한 파이썬 기반 소프트웨어 교육 모델)

  • Lee, Youngseok
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.73-78
    • /
    • 2018
  • Modern society has evolved to such an extent that computing technology has become an integral part of various fields, creating new and superior value to society. Education on computer literacy, including the ability to design and build software, is now becoming a universal education that must be acquired by everyone, regardless of the field of study. Many universities are imparting software education to students to improve their problem-solving ability, including to students who are not majoring in computers. However, software education contains courses that are meant for computer majors and many students encounter difficulty in learning the grammar of programming language. To solve this problem, this paper analyzes the research outcomes of the existing software education model and proposes a Python-based software education model for students who are not majoring in computer science. Along with a Python-based software education model, this paper proposed a curriculum that can be applied during one semester, including learning procedures, and teaching strategies. This curriculum was applied to a liberal arts class and a meaningful result was derived. If the proposed software education model is applied, the students will be interested in the computer literacy class and improve their computational thinking and problem-solving ability.

Efficient Sign Language Recognition and Classification Using African Buffalo Optimization Using Support Vector Machine System

  • Karthikeyan M. P.;Vu Cao Lam;Dac-Nhuong Le
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.8-16
    • /
    • 2024
  • Communication with the deaf has always been crucial. Deaf and hard-of-hearing persons can now express their thoughts and opinions to teachers through sign language, which has become a universal language and a very effective tool. This helps to improve their education. This facilitates and simplifies the referral procedure between them and the teachers. There are various bodily movements used in sign language, including those of arms, legs, and face. Pure expressiveness, proximity, and shared interests are examples of nonverbal physical communication that is distinct from gestures that convey a particular message. The meanings of gestures vary depending on your social or cultural background and are quite unique. Sign language prediction recognition is a highly popular and Research is ongoing in this area, and the SVM has shown value. Research in a number of fields where SVMs struggle has encouraged the development of numerous applications, such as SVM for enormous data sets, SVM for multi-classification, and SVM for unbalanced data sets.Without a precise diagnosis of the signs, right control measures cannot be applied when they are needed. One of the methods that is frequently utilized for the identification and categorization of sign languages is image processing. African Buffalo Optimization using Support Vector Machine (ABO+SVM) classification technology is used in this work to help identify and categorize peoples' sign languages. Segmentation by K-means clustering is used to first identify the sign region, after which color and texture features are extracted. The accuracy, sensitivity, Precision, specificity, and F1-score of the proposed system African Buffalo Optimization using Support Vector Machine (ABOSVM) are validated against the existing classifiers SVM, CNN, and PSO+ANN.