• Title/Summary/Keyword: programming

Search Result 7,688, Processing Time 0.029 seconds

A Study on Regional-customizededucation program selection model using big data analysis (빅데이터 분석을 활용한 지역 맞춤형 교육프로그램 선정 모형 개발)

  • Hyeon-Seong Kim;Jin-Sook Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.381-388
    • /
    • 2023
  • This thesis is purposed to develop a regional-customized education program selection model using big data analysis. Based on the literature review, the concepts and characteristics of big data and lifelong education are analyzed. In addition, this thesis presents how to collect the data for lifelong education and to use big data suitable for the characteristics of lifelong education. Based on these results, a regional- customized lifelong education program selection model is developed. The regional customized lifelong education program model is developed by the following six steps. The customized education program model proposed in this study has a high degree of flexibility in terms of practical use, as it can be utilized in real-time data provision methods such as the nationally approved Lifelong Learning Personal Status Survey without the need for analysis one year later, allowing for selective analysis and future predictions. It is clear that there is a significant need and value for big data in the education field. Furthermore, all programs used in the sample model are provided free of charge, and due to the programming nature, the community is actively engaged in exchanges, making it very easy to modify and improve for the development of a more complete education program model in the future.

A Study on the integrative ways of moral education for the building of children's social awareness and relationship skills (초등학생의 사회인식 및 대인관계 능력 함양을 위한 도덕교육의 통합적인 방안 연구)

  • Lee, In Jae;Chi, Chun-ho
    • The Journal of Korean Philosophical History
    • /
    • no.29
    • /
    • pp.375-396
    • /
    • 2010
  • The aim of this paper is to suggest some ways of moral education for the building of children's social awareness and relationship skills as social and emotional competencies. Based on the social and emotional learning(SEL), this paper is tried to provide the effective ways to develop children's social awareness and relationship skill. According to SEL, social and emotional competence is the ability to understand, manage, and express the social and emotional aspects of one's life in ways that enable the successful management of life tasks such as learning, forming relationships, solving everyday problems, and adapting to the complex demands of growth and development. And it is also the process of acquiring and effectively applying the knowledge, attitudes, and skills necessary to recognize and manage emotions. Five key competencies such as self-awareness, social awareness, responsible decision making, self-management, relationship skills are taught, practiced, and reinforced through SEL programming. Moral education and social and emotional learning have emerged as two prominent formal approaches used schools to provide guidance for students' behavior. social awareness and relationship skills are necessary for succeeding in school, in the family, in the community, in life in general. Equipped with such skills, attitudes and beliefs, young children are more likely to make healty, caring, ethical, and responsible decisions and to avoid engaging in behaviors with negative consequences such as interpersonal violence and bullying.

Comparative analysis of deep learning performance for Python and C# using Keras (Keras를 이용한 Python과 C#의 딥러닝 성능 비교 분석)

  • Lee, Sung-jin;Moon, Sang-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.360-363
    • /
    • 2022
  • According to the 2018 Kaggle ML & DS Survey, among the proportions of frameworks for machine learning and data science, TensorFlow and Keras each account for 41.82%. It was found to be 34.09%, and in the case of development programming, it is confirmed that about 82% use Python. A significant number of machine learning and deep learning structures utilize the Keras framework and Python, but in the case of Python, distribution and execution are limited to the Python script environment due to the script language, so it is judged that it is difficult to operate in various environments. This paper implemented a machine learning and deep learning system using C# and Keras running in Visual Studio 2019. Using the Mnist dataset, 100 tests were performed in Python 3.8,2 and C# .NET 5.0 environments, and the minimum time for Python was 1.86 seconds, the maximum time was 2.38 seconds, and the average time was 1.98 seconds. Time 1.78 seconds, maximum time 2.11 seconds, average time 1.85 seconds, total time 37.02 seconds. As a result of the experiment, the performance of C# improved by about 6% compared to Python, and it is expected that the utilization will be high because executable files can be extracted.

  • PDF

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

Development of A Turn Label Based Optimal Path Search Algorithm (Turn Label 기반 최적경로탐색 알고리즘 개발)

  • Meeyoung Lee
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.1-14
    • /
    • 2024
  • The most optimal route-search algorithm thus far has introduced a method of applying node labels and link labels. Node labels consider two nodes simultaneously in the optimal route-search process, while link labels consider two links simultaneously. This study proposes a turn-label-based optimal route-search technique that considers two turns simultaneously in the process. Turn-label-based optimal route search guarantees the optimal solution of dynamic programming based on Bellman's principle as it considers a two-turn search process. Turn-label-based optimal route search can accommodate the advantages of applying link labels because the concept of approaching the limit of link labels is applied equally. Therefore, it is possible to reflect rational cyclic traffic where nodes allow multiple visits without expanding the network, while links do not allow visits. In particular, it reflects the additional cost structure that appears in two consecutive turns, making it possible to express the structure of the travel-cost function more flexibly. A case study was conducted on the metropolitan urban railway network consisting of transportation card terminal readers, aiming to examine the scalability of the research by introducing parameters that reflect psychological resistance in travel with continuous pedestrian transfers into turn label optimal path search. Simulation results showed that it is possible to avoid conservative transfers even if the travel time and distance increase as the psychological resistance value for continuous turns increases, confirming the need to reflect the cost structure of turn labels. Nevertheless, further research is needed to secure diversity in the travel-cost functions of road and public-transportation networks.

A Study on the Intelligent Online Judging System Using User-Based Collaborative Filtering

  • Hyun Woo Kim;Hye Jin Yun;Kwihoon Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.273-285
    • /
    • 2024
  • With the active utilization of Online Judge (OJ) systems in the field of education, various studies utilizing learner data have emerged. This research proposes a problem recommendation based on a user-based collaborative filtering approach with learner data to support learners in their problem selection. Assistance in learners' problem selection within the OJ system is crucial for enhancing the effectiveness of education as it impacts the learning path. To achieve this, this system identifies learners with similar problem-solving tendencies and utilizes their problem-solving history. The proposed technique has been implemented on an OJ site in the fields of algorithms and programming, operated by the Chungbuk Education Research and Information Institute. The technique's service utility and usability were assessed through expert reviews using the Delphi technique. Additionally, it was piloted with site users, and an analysis of the ratio of correctness revealed approximately a 16% higher submission rate for recommended problems compared to the overall submissions. A survey targeting users who used the recommended problems yielded a 78% response rate, with the majority indicating that the feature was helpful. However, low selection rates of recommended problems and low response rates within the subset of users who used recommended problems highlight the need for future research focusing on improving accessibility, enhancing user feedback collection, and diversifying learner data analysis.

An Examination of the Course Syllabi Related to Data Librarian in the ALA-accredited Library and Information Science Degree Programs (ALA인가 문헌정보학 학위 과정의 데이터 사서 양성과 관련된 교과목의 강의계획서 분석)

  • Hyoungjoo Park
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.4
    • /
    • pp.307-334
    • /
    • 2023
  • The purpose of this study is to examine the status of data librarian-related course syllabi in the 2023 American Library Association(ALA)-accredited degree programs in Library and Information Science (LIS). The present study examined LIS course syllabi related to data librarian including course titles, course objectives, course descriptions, weekly topics and assignments. ALA-accredited LIS programs offer various courses in data librarianship such as data management and curation, data analysis and visualization, metadata, information services, research methods, library management, academic libraries, computer programming and databases. This study collected 184 syllabi from the ALA-accredited LIS programs and selected and analyzed 127 syllabi that are related to data librarianship. The study examined 3,045 course titles, 2,559 course description from 61 LIS degree programs overseas, and 1,330 course titles from 37 LIS degree programs in Korea. This study found that LIS degree programs both in Korea and overseas offer various courses for data librarians. The researcher hopes the findings of this study will be used as a starting point to develop or redesign courses related to data librarianship in the information field.

Application Development for Text Mining: KoALA (텍스트 마이닝 통합 애플리케이션 개발: KoALA)

  • Byeong-Jin Jeon;Yoon-Jin Choi;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.2
    • /
    • pp.117-137
    • /
    • 2019
  • In the Big Data era, data science has become popular with the production of numerous data in various domains, and the power of data has become a competitive power. There is a growing interest in unstructured data, which accounts for more than 80% of the world's data. Along with the everyday use of social media, most of the unstructured data is in the form of text data and plays an important role in various areas such as marketing, finance, and distribution. However, text mining using social media is difficult to access and difficult to use compared to data mining using numerical data. Thus, this study aims to develop Korean Natural Language Application (KoALA) as an integrated application for easy and handy social media text mining without relying on programming language or high-level hardware or solution. KoALA is a specialized application for social media text mining. It is an integrated application that can analyze both Korean and English. KoALA handles the entire process from data collection to preprocessing, analysis and visualization. This paper describes the process of designing, implementing, and applying KoALA applications using the design science methodology. Lastly, we will discuss practical use of KoALA through a block-chain business case. Through this paper, we hope to popularize social media text mining and utilize it for practical and academic use in various domains.

Development of Inquiry Activity Materials for Visualizing Typhoon Track using GK-2A Satellite Images (천리안 위성 2A호 영상을 활용한 태풍 경로 시각화 탐구활동 수업자료 개발)

  • Chae-Young Lim;Kyung-Ae Park
    • Journal of the Korean earth science society
    • /
    • v.45 no.1
    • /
    • pp.48-71
    • /
    • 2024
  • Typhoons are representative oceanic and atmospheric phenomena that cause interactions within the Earth's system with diverse influences. In recent decades, the typhoons have tended to strengthen due to rapidly changing climate. The 2022 revised science curriculum emphasizes the importance of teaching-learning activities using advanced science and technology to cultivate digital literacy as a citizen of the future society. Therefore, it is necessary to solve the temporal and spatial limitations of textbook illustrations and to develop effective instructional materials using global-scale big data covered in the field of earth science. In this study, according to the procedure of the PDIE (Preparation, Development, Implementation, Evaluation) model, the inquiry activity data was developed to visualize the track of the typhoon using the image data of GK-2A. In the preparatory stage, the 2015 and 2022 revised curriculum and the contents of the inquiry activities of the current textbooks were analyzed. In the development stage, inquiry activities were organized into a series of processes that can collect, process, visualize, and analyze observational data, and a GUI (Graphic User Interface)-based visualization program that can derive results with a simple operation was created. In the implementation and evaluation stage, classes were conducted with students, and classes using code and GUI programs were conducted respectively to compare the characteristics of each activity and confirm its applicability in the school field. The class materials presented in this study enable exploratory activities using actual observation data without professional programming knowledge which is expected to contribute to students' understanding and digital literacy in the field of earth science.

Study on Method to Develop Case-based Security Threat Scenario for Cybersecurity Training in ICS Environment (ICS 환경에서의 사이버보안 훈련을 위한 사례 기반 보안 위협 시나리오 개발 방법론 연구)

  • GyuHyun Jeon;Kwangsoo Kim;Jaesik Kang;Seungwoon Lee;Jung Taek Seo
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.91-105
    • /
    • 2024
  • As the number of cases of applying IT systems to the existing isolated ICS (Industrial Control System) network environment continues to increase, security threats in the ICS environment have rapidly increased. Security threat scenarios help to design security strategies in cybersecurity training, including analysis, prediction, and response to cyberattacks. For successful cybersecurity training, research is needed to develop valid and reliable security threat scenarios for meaningful training. Therefore, this paper proposes a case-based security threat scenario development methodology for cybersecurity training in the ICS environment. To this end, we develop a methodology consisting of five steps based on analyzing actual cybersecurity incident cases targeting ICS. Threat techniques are standardized in the same form using objective data based on the MITER ATT&CK framework, and then a list of CVEs and CWEs corresponding to the threat technique is identified. Additionally, it analyzes and identifies vulnerable functions in programming used in CWE and ICS assets. Based on the data generated up to the previous stage, develop security threat scenarios for cybersecurity training for new ICS. As a result of verification through a comparative analysis between the proposed methodology and existing research confirmed that the proposed method was more effective than the existing method regarding scenario validity, appropriateness of evidence, and development of various scenarios.

  • PDF