• Title/Summary/Keyword: computer-related activities

Search Result 264, Processing Time 0.023 seconds

Analysis of Class Effects by Creativity and Convergence Extracurricular Program Activities (창의융합 비교과프로그램 활동에 따른 수업효과 분석)

  • Pi, Su-Young
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.11-21
    • /
    • 2021
  • The aim of this study is to examine the effectiveness of learning by running an extracurricular program to make effective learning of unfamiliar and difficult programming education possible for students in the humanities. Analysis of learning-related data for one semester of lectures that were collected from 70 humanities students in departments A and B, data collected from a creative convergence app development contest extracurricular program, and data obtained through a questionnaire show that extracurricular program activities affect academic performance. The results of the core competency diagnosis test for students that was conducted before and after participating in the curriculum showed that core competencies improved for both A and B departments after participating in the curriculum. This study shows that extracurricular program activities can help individuals improve their abilities, while also providing customized guidance to reclusive students to improve their academic performance. By carrying out customized coaching for each department to develop apps related to the major field rather than general apps, we hope for improvements in ability to solve problems by converging with the major field, computational thinking, and creative thinking, in the future.

Implementation of Git's Commit Message Complex Classification Model for Software Maintenance

  • Choi, Ji-Hoon;Kim, Joon-Yong;Park, Seong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.131-138
    • /
    • 2022
  • Git's commit message is closely related to the project life cycle, and by this characteristic, it can greatly contribute to cost reduction and improvement of work efficiency by identifying risk factors and project status of project operation activities. Among these related fields, there are many studies that classify commit messages as types of software maintenance, and the maximum accuracy among the studies is 87%. In this paper, the purpose of using a solution using the commit classification model is to design and implement a complex classification model that combines several models to increase the accuracy of the previously published models and increase the reliability of the model. In this paper, a dataset was constructed by extracting automated labeling and source changes and trained using the DistillBERT model. As a result of verification, reliability was secured by obtaining an F1 score of 95%, which is 8% higher than the maximum of 87% reported in previous studies. Using the results of this study, it is expected that the reliability of the model will be increased and it will be possible to apply it to solutions such as software and project management.

A Study on the Change in Dietary Patterns of Some Elementary School Children in Seoul - concerning the Frequent Use of Computers - (서울지역 일부 초등학생의 식생활 양상 변화에 대한 연구 - 컴퓨터 사용을 중심으로 -)

  • 강영림;김애정
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.13 no.4
    • /
    • pp.284-292
    • /
    • 2003
  • This study was conducted to investigate the changes of dietary attitudes and behaviors in relation to the use of computers of elementary school children in Seoul. The total of 451 elementary school children, consisting of 235 females and 216 males, participated in the study. The result of domestic characteristics, dietary attitudes and behaviors, the level of the use of computers, and health-related symptoms of the subjects were achieved through the questionnaires as follows: The average height, weight, BMI and obesity-index of the participants were 149.0 cm, 42.4 kg, 19.0, -8.6, respectively. Anions subjects, 42.8% answered their bed times were between 11~12 pm, and 82.4% answered that they had extracurricular activities. The most desired activity as their leisure was computer works (female: 44.3%, male: 62.5%). 38.4% of children used the computers for 1~2 hours a day and the most general usage of computers was a computer game (66.1%). The changes in dietary habits of the subjects were such as eating faster(30.2%), having lots of snacks(28.8%), eating anything at hand(26.4%), skipping breakfast due to over-sleeping(18.4%). As changes in life patterns, those in the time managements for watching T.V.(35.3%), reading(35.0%), exercising(31.9%), sleeping(27.5%), relaxing(27.5%) and other hobbies(26.4%) were observed. In conclusion, many children were being affected by the socioeconomic factors changing the environments, especially by the need for the use of computers. The rates of eating alone and skipping breakfast were getting higher in the dietary patterns of elementary school children. We found that the changes in social environments according to the heavy use of the computer were affecting on their dietary pattern. The direction and method of nutrition education had to be established for the proper understanding of the desirable dietary behaviors.

  • PDF

A Study for Substantial of Computer Education in Elementary Schools through Discretion Activity (재량활동을 통한 초등 컴퓨터 교육 내실화 방안)

  • Oh, Pill-Woo;Kim, Yong-Beom;Kim, Myeong-Ryeol
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.4
    • /
    • pp.15-23
    • /
    • 2006
  • The current 7th Curriculum require elementary students to participate in an independent computer education class one time per week through means of discretion activity. However a national standard of this educational process has yet to be established, which has made regional provincial and city offices of education to choose textbooks for this purpose by discretion, that showed difference in quality, in operating education curriculums related to computer education for each classes in school such as continuing the repetitive contents without any rank or system. Also informatization education, which is one of national policies, might develop educational unbalance to young children who are to become the main characters in the future information society, due to excessive emphasis on aspect of using computer, which develops education mainly based on learning functions of applicable software. Therefore, we are proposing a discretion activity education curriculum model for utilization of computer education in elementary school which is showing regional difference based on former studies. This study will be helpful in substantiating of computer education in elementary schools in the future.

  • PDF

Educational Effects of Collaborative Story Creation Activities Using the Entry Programming Language (엔트리 프로그래밍 언어를 활용한 협력적 이야기 생성하기 활동의 교육적 효과)

  • Seo, Hyunseok;Jeong, Youngsik
    • Journal of The Korean Association of Information Education
    • /
    • v.22 no.6
    • /
    • pp.651-660
    • /
    • 2018
  • To determine the educational effects of collaborative story creation activities using the Entry programming language, we instructed first year students at the national university of education on these activities for three weeks and analyzed the changes in their software (SW) education capacity and story creating ability. The completed analysis showed no significant changes in the students' SW education capacity as related to information literacy, computational thinking, and learner competency; however, the students' ability to create stories increased significantly. Although students struggled to learn story creation using Entry, they gradually found that the activities were useful and their interest in creating stories grew. Therefore, we suggest expanding the number of subject curriculum activities using Entry in order to improve SW education capacity as well as the subject capacity for student teachers.

Analysis on Trend of Study Related to Computational Thinking Using Topic Modeling (토픽 모델링을 이용한 컴퓨팅 사고력 관련 연구 동향 분석)

  • Moon, Seong-Yun;Song, Ki-Sang
    • Journal of The Korean Association of Information Education
    • /
    • v.23 no.6
    • /
    • pp.607-619
    • /
    • 2019
  • As software education was introduced through the 2015 revised curriculum, various research activities have been carried out to improve the computational thinking of learners beyond the existing ICT literacy and software utilization education. With this change, the purpose of this study is to examine the research trends of various research activities related to computational thinking which is emphasized in software education. To this end, we extracted the key words from 190 papers related to computational thinking subject published from January 2014 to September 2019, and conducted frequency analysis, word cloud, connection centrality, and topic modeling analysis on the words. As a result of the topical modeling analysis, we found that the main studies so far have included studies on 'computational thinking education program', 'computational thinking education for pre-service teacher education', 'robot utilization education for computational thinking', 'assessment of computational thinking', and 'computational thinking connected education'. Through this research method, it was possible to grasp the research trend related to computational thinking that has been conducted mainly up to now, and it is possible to know which part of computational thinking education is more important to researchers.

SELFCON: An Architecture for Self-Configuration of Networks

  • Boutaba, Raouf;Omari, Salima;Singh Virk, Ajay Pal
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.317-323
    • /
    • 2001
  • Traditional configuration management involves complex labor-intensive processes performed by experts. The configuration tasks such as installing or reconfiguring a system, provisioning network services and allocating resources typically involve a large number of activities involving multiple network elements. The network elements may be associated with proprietary configuration management instrumentation and may also be spread across heterogeneous network domains thereby increasing the complexity of configuration management. This paper introduces an architecture for the self-configuration of networks (SELFCON). The proposed architecture involves a directory server, which is uses to maintain configuration information. The configuration information stared in the directory server is modeled using the standard DEN specification thereby allowing effective exchange of network, system and configuration management data among heterogeneous management domains. SELFCON associates configuration intelligence with the components of the network, rather than limit it to a centralized management station. The network elements are notified about related changes in configuration policies, based upon which, they perform self-configuration. SELFCON is able to provide automation of configuration management and also an effective unifying framework for enterprise management.

  • PDF

HB-DIPM: Human Behavior Analysis-Based Malware Detection and Intrusion Prevention Model in the Future Internet

  • Lee, Jeong Kyu;Moon, Seo Yeon;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.489-501
    • /
    • 2016
  • As interest in the Internet increases, related technologies are also quickly progressing. As smart devices become more widely used, interest is growing in words are missing here like "improving the" or "figuring out how to use the" future Internet to resolve the fundamental issues of transmission quality and security. The future Internet is being studied to improve the limits of existing Internet structures and to reflect new requirements. In particular, research on words are missing here like "finding new forms of" or "applying new forms of" or "studying various types of" or "finding ways to provide more" reliable communication to connect the Internet to various services is in demand. In this paper, we analyze the security threats caused by malicious activities in the future Internet and propose a human behavior analysis-based security service model for malware detection and intrusion prevention to provide more reliable communication. Our proposed service model provides high reliability services by responding to security threats by detecting various malware intrusions and protocol authentications based on human behavior.

A Study on Cognition about Copyright of Digital Works

  • Lee, Yong-Whan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.5
    • /
    • pp.41-49
    • /
    • 2017
  • Digital works such as computer programs, music, photographs, movies and dramas are copyrighted. Even if there were more than 1,000 violations per year for digital works, the punishment was very weak. Especially copyright infringement by teenager is increasing. This study aims to present the direction of future development through questionnaires on the perception and direction of college students about copyright. 157 college students were surveyed about copyright awareness, perception of detailed legal provisions, cost of monthly expenses, copyright violation, and direction of copyright protection. As a result of the questionnaire survey, awareness was high at 69%, but in detailed law was low at 17.2% and 22.3%. In the future direction of copyright policy, 72.6% of them answered that they should be "strengthened" and "more and more strengthened". In order to protect copyrights, enforcement of crackdowns, public relations activities, expansion of the legal market, and technical protection should be done. In order to do this, copyright-related education for elementary, middle, high school and college students are needed more and it is necessary to expand the legal market where high quality contents are traded. More research is needed on copyright protection technological methods.

Discovering Temporal Work Transference Networks from Workflow Execution Logs

  • Pham, Dinh-Lam;Ahn, Hyun;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.101-108
    • /
    • 2019
  • Workflow management systems (WfMSs) automate and manage workflows, which are implementations of organizational processes operated in process-centric organizations. In this paper, wepropose an algorithm to discover temporal work transference networks from workflow execution logs. The temporal work transference network is a special type of enterprise social networks that consists of workflow performers, and relationships among them that are formed by work transferences between performers who are responsible in performing precedent and succeeding activities in a workflow process. In terms of analysis, the temporal work transference network is an analytical property that has significant value to be analyzed to discover organizational knowledge for human resource management and related decision-making steps for process-centric organizations. Also, the beginning point of implementinga human-centered workflow intelligence framework dealing with work transference networks is to develop an algorithm for discovering temporal work transference cases on workflow execution logs. To this end, we first formalize a concept of temporal work transference network, and next, we present a discovery algorithm which is for the construction of temporal work transference network from workflow execution logs. Then, as a verification of the proposed algorithm, we apply the algorithm to an XES-formatted log dataset that was released by the process mining research group and finally summarize the discovery result.