• Title/Summary/Keyword: Web Tools

Search Result 692, Processing Time 0.026 seconds

The Development and Application of Information Communication Technology Application Instruction Model based on PBL-based Instruction Model (프로젝트 학습을 기반으로 하는 ICT 활용 수업 모형의 개발 및 적용)

  • Jung, Hyo-Sook;Jun, Woo-Chun
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.347-360
    • /
    • 2002
  • Advances in information communication technology (ICT) require new paradigms in every aspect of our society. In this sense, schools are supposed to educate students to solve real-world problems with ICT. However, schools have not provided quality education to students for learning ICT and applying it. It is thus necessary to develop various ICT instruction models for creative students to lead the information society. One of the popular instruction models using the Web is the project-based model. The model includes inquiry activities of areas, such as variety of subjects, real-world problems, issues, and presentation activities of study results. The model also encourages interactions among students for achieving common goals. In this paper, we present an ICT application instruction which provides four major enhancements to the existing project-based model. The stages of model consist of eight activities type and supporting tools. Also, we implement our proposed model for some elementary school courses.

  • PDF

A Integrated Suite for Database Benchmarks (데이터베이스 벤치마크를 위한 통합 도구)

  • Jeong Hoe-Jin;Lee Sang-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.2 s.105
    • /
    • pp.165-174
    • /
    • 2006
  • As new database systems are developed or new functions are added to existing database systems, database developers or users would like to evaluate new database systems or new functions. This paper presents an integrated database benchmark suite. The integrated suite offers genetic benchmarks, custom benchmark, and hybrid benchmarks to users on a unified Web user interface. With regard to text data generation, the integrated suite supports eight data distributions with three data types. The integrated suite can also generate XML data in three different ways. Users can run benchmarks in realistic environments by performing the workload generation facility of the integrated suite, which generates composite workloads similar to real-world workloads. Using supporting tools, users can easily implement new generic and custom benchmarks in the integrated suite. An illustrative demonstration to add a new custom benchmark into the integrated suite is presented.

Investigation of Potential Fire Hazard Resources of Bridges on National Routes by Field and Web-based Satellite (현장 및 실내조사를 통한 일반국도교량의 화재위험요소 분석)

  • Kim, Yongjae;Kim, Seungwon;Ann, Hojune;Kong, Jungsik;Park, Cheolwoo
    • International Journal of Highway Engineering
    • /
    • v.19 no.6
    • /
    • pp.105-115
    • /
    • 2017
  • PURPOSES : The occurrence of unexpected disasters, including fire events, increases as the road network becomes complicated and traffic volume increases. When a fire event occurs on and under bridges, the damage extensively influences direct damage to structures, vehicles, and human life and secondary socioeconomic issues owing to traffic blockage. This study investigated potential fire-hazard risks on bridges of the Korean national route road. METHODS : The investigation was conducted using field investigation and analysis with satellite pictures and road views from commercial websites and the Bridge Management System (BMS). From the filed investigation, various potential fire resources were identified. The satellite pictures and road views were helpful in measuring and recognizing conditions underneath bridges, stowage areas, etc. RESULTS : There are various potential fire resources underneath bridges such as piled agricultural products, parked petroleum tanks, construction equipment, and attached high-voltage cables. A total of 94.6% of bridges have underneath clearances of less than 15 m. A bridge underneath volume that can stow a potential fire hazard resource was $7,332m^3$ on average, and most bridges have about $4,000m^3$ of space. Based on the BMS data, the amounts of PSC and steel girders were 29% and 25%, respectively. CONCLUSIONS : It was found that the amount of stowed potential fire hazard resources was proportional to the underneath space of bridges. Most bridges have less than 15 m of vertical clearance that can be considered as a critical value for a bridge fire. The fire risk investigation results should be helpful for developing bridge fire-protection tools.

A Study on the Structure and Practice of Project Room for Designer under Web System (디자이너를 위한 웹기반 프로젝트룸 구성과 활용방안에 대한 연구)

  • 유보현
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.289-298
    • /
    • 2002
  • Under the circumstances of general use of Internet, the construction of on-line system has been made in various fields. We can use and share the informations will other people through the cyber communities and find many ways to promote communication tools. Project Room is a sort of Cyber Space which carry out design project using On-fine system. Users(Designers and Clients) will be able to develop their design project using Internet. The project content may be opened and will be critically contributed the construction of Knowledge-based industry. At the same time, the development of user-friendly tutorial should be fellowed. Tutorial is one of the most important factors to promote Project Room. This study presents the possibility of execution of Cyber community under the construction of Project Room and User-friendly tutorial in the On-line system.

  • PDF

Development of an Engineering Education Framework for Aerodynamic Shape Optimization

  • Kwon, Hyung-Il;Kim, Saji;Lee, Hakjin;Ryu, Minseok;Kim, Taehee;Choi, Seongim
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.14 no.4
    • /
    • pp.297-309
    • /
    • 2013
  • Design optimization is a mathematical process to find an optimal solution through the use of formal optimization algorithms. Design plays a vital role in the engineering field; therefore, using design tools in education and research is becoming more and more important. Recently, numerical design optimization in fluid mechanics, which uses computational fluid dynamics (CFD), has numerous applications in the engineering field, because of the rapid development of high-performance computing resources. However, it is difficult to find design optimization software and contents for educational purposes in aerospace engineering. In the present study, we have developed an aerodynamic design framework specifically for an airfoil, based on the EDucation-research Integration through Simulation On the Net (EDISON) portal. The airfoil design framework is composed of three subparts: a geometry kernel, CFD flow analysis, and an optimization algorithm. Through a seamless interface among the subparts, an iterative design process is conducted. In addition, the CFD flow analysis and the design framework are provided through a web-based portal system, while the computation is taken care of by a supercomputing facility. In addition to the software development, educational contents are developed for lectures associated with design optimization in aerospace and mechanical engineering education programs. The software and content developed in this study is expected to be used as a tool for e-learning material, for education and research in universities.

Design and Implementation of an Automatic Grading System for Programming Assignments (자동화된 프로그래밍 과제 평가 시스템의 설계 및 구현)

  • Kim, Mi-Hye
    • Journal of Internet Computing and Services
    • /
    • v.8 no.6
    • /
    • pp.75-85
    • /
    • 2007
  • One of important factors for improving the learning achievement of students in computer programming education is to provide plenty of opportunities of problem-solving experiences through variety forms of assignments, However, for the most cases, evaluation of programming assignments is performed manually by instructors and automated tools for the accurate evaluation are not equipped at the present time. Under this restricted environment instructors need much work and time to grade assignments so that instructors could not deliver sufficient programming assignments to students, In order to overcome this problem. au automated programming assignment evaluation system is needed that would enable instructors to evaluate assignments easily in an effective and consistent way and also to detect any plagiarism activities among students in program source codes readily, Accordingly, in this paper we design and implement a Web-based programming assignment grading system that allows instructors to evaluate program performance automatically as well as to evaluate program styles and piagiarism easily with appropriate feedback.

  • PDF

Vulnerability Analysis on the CNG Crypto Library (CNG 암호 라이브러리의 보안 취약점 분석)

  • Lee, Kyungroul;Oh, Insu;Lee, Sun-Young;Yim, Kangbin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.838-847
    • /
    • 2017
  • CNG which was released as a substitute of the previous CAPI (Cryptography API) library from Microsoft is constructed with individual modules based on the plug-in architecture, this means CNG is exceedingly helpful in the cost of development as well as the facility of extension. On the opposite side of these advantages, considerations on security issues are quite insufficient. Therefore, a research on security assurance is strongly required in the environment of distributing and utilizing the CNG library, hence, we analyze possible security vulnerabilities on the CNG library. Based on analyzed vulnerabilities, proof-of-concept tools are implemented and vulnerabilities are verified using them. Verified results are that contents of mail, account information of mail server, and authentication information of web-sites such as Amazon, E-bay, Google, and Facebook are exposed in Outlook program and Internet Explorer program using CNG library. We consider that the analyzed result in this paper can improve the security for various applications using CNG library.

DDoS attack traffic through the analysis of responses to research (트래픽 분석을 통한 DDoS 공격에 대한 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.1-6
    • /
    • 2014
  • DDoS (Distributed Denial Service, Distributed Service) attacks are being generated for a constant threat on the Internet, countermeasures for this have been proposed. However, the problem has become an increasingly effective instruction in any Measures are a variety of attacks and sophisticated attacks. Attackers can change a steady attack tools to respond to these, the experts as a countermeasure to this constantly research for a fresh attack. This paper is to introduce countermeasures to DDoS recent representative examples of 7.7DDoS and look for 3.3DDoS existing types of DDoS attacks increased PPS attacks, high traffic sent, web service delay and router and firewall settings, applications and to describe the DDoS countermeasures research by certification, is so that you can plan effectively for the future DDoS attacks proposed method.

  • PDF

Plant Biotechnology and Bioinformatics (식물 생명공학과 생물정보학)

  • Kim, Jung-Eun;Paik, Hyo-Jung;Kim, Young-Cheol;Hur, Cheol-Goo
    • Journal of Plant Biotechnology
    • /
    • v.33 no.3
    • /
    • pp.209-222
    • /
    • 2006
  • The whole genome sequence was completed in arabidopsis and rice. Large amounts of EST data have been available from many other plants. Also, vast quantities of diverse biological data have been generated by various '-omics' technologies such as transcriptomics, proteomics, and metabolomics. Bioinformatics plays an essential role in extracting useful information from these tremendous amounts of biological data. In this review we introduced experimental methods to generate massive data, applications to plant science such as plant disease resistance and molecular breeding and bioinformatics tools and web sites available in plant biotechnology R&D. We concluded that new experimental methods and bioinfomation analysis techniques have made major contributions to the development of plant biotechnology and that bioinformatics has become a critical factor in plant biotechnology R&D.

The practical use with online database program of cosmetics' raw materials. (화장품원료 온라인 데이터베이스 구축과 활용)

  • Jeon Sang-hoon;Kim Ju-Duck
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.29 no.2 s.43
    • /
    • pp.233-250
    • /
    • 2003
  • We often use the KCID(Korean Cosmetic Ingredient Dictionary) and ICID(International Cosmetic Ingredient Dictionary) within cosmetics research and within their export and import. so far, we do not have a database of a cosmetics' raw materials. Because of this, we consume a lot of time to find the raw material data that is needed. This study constructs a cosmetics' raw material database and develops the program to retrieve it. We used a Linux machine as the equipment for this study and we used Apache web server, MySQL database server and PHP as the tools of this study. 11,817 kinds of raw materials data were registered as ICID, 866 kinds of raw materials data were registered as KCID and 28,008 kinds of raw materials data with registered trade name into the database. Also, The database was composed of the database of the association form. The database of the online form could ultimately reduce the task time as soon as it did its purpose. The product of this study can become a good basis of data to reconfigure. In the future, it can become a good database in relation with different databases.