• Title/Summary/Keyword: 실생활문제

Search Result 343, Processing Time 0.027 seconds

Development and Analyses of an PBL-based Digital Logic Education Program using Electrical Circuit Experiments (전기회로실험을 이용한 PBL기반 디지털 논리회로 교육방법 개발 및 적용 분석)

  • Hur, Kyeong
    • Journal of The Korean Association of Information Education
    • /
    • v.13 no.3
    • /
    • pp.341-349
    • /
    • 2009
  • In this paper, we proposed an Electric Circuit manipulation method to identify easily results of Digital Logic Circuits. Using this method for computer science educations, we can feasibly instruct and understand principles of a Digital Logic Circuit which is a basis of real Digital systems. Furthermore, we developed an PBL-based education program for Digital Logic Circuit concept and Boolean Algebra concept by applying the proposed Electric Circuit manipulation method and by explaining real life Digital Instrument examples. The experimental results are analyzed in views of the problem-solving ability and suitability of allocating degrees of difficulties to the developed Digital Logic Circuit problems.

  • PDF

Design of CT-CPS Based Programming Lesson Using NetsBlox for Elementary School Students (초등학생을 위한 NetsBlox를 활용한 CT-CPS기반 프로그래밍 수업 설계)

  • Lee, Seung-Chul;Kim, Tae-Young
    • Proceedings of The KACE
    • /
    • 2018.08a
    • /
    • pp.3-6
    • /
    • 2018
  • 2015 개정 교육과정에 따라 2019년 3월부터 초등학교 5~6학년 학생을 대상으로 소프트웨어 교육이 실시된다. 궁극적인 소프트웨어 교육의 목표는 컴퓨팅 사고력을 갖춘 창의 융합형 인재를 양성하는 것이다. 이를 위해 초등학교에서는 알고리즘과 프로그래밍의 체험을 통해 소프트웨어 기초 소양을 함양하는 것을 목표로 한다. 이러한 컴퓨팅 사고력을 수업에 효과적으로 적용하기 위해 전용주(2017)는 소프트웨어 및 컴퓨팅에 관련된 사고과정과 원리를 실생활의 소재와 관련지어 창의적이고 능동적으로 그 해결방안을 구현해가는 과정으로 제시할 수 있는 수업 구성 원리인 CT-CPS 수업 모형을 개발하였다. 또한 교육부는 2015 개정 교육과정 실시 전, 소프트웨어 교육을 위한 선도학교를 전국에 지정하여 운영하였다. 선도학교에서의 소프트웨어 교육과정을 분석한 결과 주로 컴퓨팅 사고력의 구성요소 중 알고리즘과 자동화에 초점이 맞춰져 있었다. 엔트리와 스크래치와 같은 블록 프로그래밍 도구를 사용한 코딩교육과 로봇교육을 주로 실시했고, 실제 문제에 대한 학생들이 자료를 직접 다루는 시간은 찾아보기 힘들었다. 컴퓨팅사고력 향상을 위해서는 학생들이 실제 자료를 수집, 분석, 표현해보는 활동이 반드시 필요하다. 이에 본 연구에서 NetsBlox을 활용하고자 한다. NetsBlox는 학생들에게 익숙한 블록형 프로그래밍 도구로 실제 데이터를 온라인상에서 쉽게 받아와서 수집, 분석, 표현을 하게 도와주는 역할을 한다. 따라서 본 연구에서는 초등학생을 위한 NetsBlox를 활용한 CT-CPS기반 프로그래밍 수업을 설계하고자 한다.

  • PDF

A Study on account and authority management method of IOT system (IOT 체계의 계정 및 권한관리 방법에 대한 연구)

  • Kim, Min-Hwi;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.225-228
    • /
    • 2017
  • In this paper, we propose a methodology to deal with the IOT system gradually as the use of effective systems such as electronic devices, healthcare, smart cars, smart home, remote meter reading and telemedicine closely related to our real life in the IOT system An IOT integrated account solution is needed as a way to address these needs as the demand grows for the need to identify and manage how users access and use the system for what period of time and at what point in time. We propose the communication algorithms for endpoint system, IOT system management rights policy, user information, and how to apply them to IOT system smart car and smart home on each object internet.

  • PDF

A study of the efficient application of Discretion activity in Mathematics curriculum (수학 교과 재량활동시간의 효율적인 운영에 관한 연구)

  • 김세라;김승동
    • Journal of the Korean School Mathematics Society
    • /
    • v.7 no.1
    • /
    • pp.121-138
    • /
    • 2004
  • For the efficient application of curriculum discretion activity, I developed the program, 'Let's go together', so that curriculum discretion activity can be applied in the classroom. The program consists of several experiences, which are <Man to man paired study>, <the learning materials for Mathematics in our lives>, <the cooperative study in the class> and <the variety experiences about Mathematics>. This study shows the following results: First, T-test about the students' learning attitude and interest in Mathematics, there was dramatic change in students' desire, interest and attitude for mathematics learning. Second, as the role of Baewomi & Dowomi in 'Man to man paired study', Baewomi & Dowomi provided students with confidence of mathematics learning. We were able to ensure this fact from students' essay after the class. Third, teachers found that the number of students who had positive attitude with Self-directed study increased. And students tried to solve mathematical problems by themselves and the time using self-directed learning experience was also increased. This study suggests that there needs more development for learning materials for mathematics in our lives.

  • PDF

A Study on Multiple Resident Activity Recognition using Deep Learning in Smart Home (스마트 홈 환경에서의 딥 러닝을 활용한 다중 거주자 행동 인식에 관한 연구)

  • Ji, Hyo-Sang;Jang, Ki-Young;Auh, Joon-Sun;Yang, Sung-Bong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.830-832
    • /
    • 2019
  • IoT 기술의 도래로 인하여 실생활에 사용되는 사물들에 Sensor가 부착되어 시간마다 Sensor data가 발생하는 세상이 열리게 되었다. 이러한 IoT Device들에 부착되어 있는 sensor를 통하여 수집이 된 data는 방대한 양을 가지기 때문에 Deep Learning에 적용하는데 충분하며 아주 중요한 역할을 한다. 이러한 IoT Device들은 우리의 실제 생활에 아주 가까이 다양한 환경으로 접할 수 있다. 예를 들어 스마트시티, 스마트팩토리, 스마트홈 등이 있다. 이러한 것들은 우리의 일상생활에 편리함과 직결되어 있다. 본 논문에서는 Smart home 환경에서의 Multi Resident Activity Recognition이다. Smart home의 가구에 부착되어 있는 센서에서 발생된 센서데이터를 활용하여 1) Training Similarity Network, 2) Embedding, 3) Clustering, 4) Recognizing 네 단계 프로세스를 거쳐 문제를 해결한다. 그 결과, 우리가 제안한 프로세스를 통하여 차원 축소 효과와 Un-seen data를 효과적으로 처리할수 있게 된다.

Mobile Auto questions and scoring system (국가 사이버안보 시스템 관련 법률안 분석과 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.363-365
    • /
    • 2014
  • Internet baking, e-commerce, business processing, etc on smartphone handing could be possible in present days. Ambiguity between cyber and real life has made vulnerability on infrastructure, Gov't Service and National security by cyber terrorism. Especially, Lots of Infrastructure and Gov't Service based on Information Technology were exposed by Cyber terror. Legal system should be improved to keep from these threats. This paper proposed needs of cyber legal system by analyzing proposed cyber related code on Korean National Assembly, issue on Cyber Control Tower, National Cyber Security Industry and Human resource.

  • PDF

Secure RFID-based Payment System against Various Threats (위.변조에 안전한 RFID 지급결제시스템)

  • Kim, In-Seok;Choi, Eun-Young;Lee, Dong-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.141-146
    • /
    • 2007
  • Barcodes have been widely used to implement automatic identification systems but there are various problems such as security weakness or distance restriction in scanning barcode signals in a barcode-based automatic identifcation systems. Recently researchers are gradually interested in radio frequency identification (RFID) and RFID systems have been applied to various fields than before. Especially one of RFID application fields, a bank system uses RFID tagged bankontes to prevent illegal transactions such as counterfeiting banknotes and money laundering. In this paper, we propose a RFID system for protecting location provacy of a banknote holder. In addition, our paper describes that a trust party can trace a counterfeit banknote holder to provide against emergencies.

Design of traceable Electronic Cash System based on Feige-Fiat-Shamir blind digital signature (Feige-Fiat-Shamir 은닉전자서명에 기반한 추적 가능한 전자화폐 시스템의 설계)

  • 박왕석;박창섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.33-44
    • /
    • 2001
  • E-commerce has various advantages such as saving the cost and no constraint on time and space, unlike real-world commerce. On the other hand, e-commerce has some important issues to solve since the commerce is conducted on the cyberspace. The issues are a mutual confidence of parties participating in the commerce as well as a method of payments. On early days, electronic cash was designed using blind digital signature to protect the personal information from being exposed and to provide the perfect anonymity for user. In this paper, a new blind signature scheme based on Feige-Fiat-Shamir digital signature is proposed, which is very efficient compared with the other schemes in terms of the computational complexity. Also, a traceable Electronic Cash System which is based on the proposed blind digital signature is designed, which has a nice feature of identifying the spender in case of using the money illegally.

Design of Anonymity-Preserving User Authentication and Key Agreement Protocol in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서의 익명성을 보장하는 사용자 인증 및 키 동의 프로토콜 설계)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.3-12
    • /
    • 2006
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'smart space' augmented with intelligence and enhanced with services. However, unless privacy concerns are taken into account early in the design process of various ubiquitous devices(e.g. mobile devices, PDAs, sensors, etc.). we will end up crating ubiquitous surveillance infrastructure. Also, it may inappropriate to use public key techniques for computational constrained devices in ubiquitous computing environment. In this paper, we propose efficient user authentication and ky agreement protocol not only to preserve anonymity for protecting personal privacy but also to be suitable for computational constrained devices in ubiquitous computing environments.

Comparative Analysis of the National Level Academic Achievement Assessment Items between Korea and Japan (한국과 일본의 국가수준 학업성취도 평가 문항 비교 분석)

  • Kim, Bumi;Cho, Hyungmi
    • Journal of the Korean School Mathematics Society
    • /
    • v.24 no.4
    • /
    • pp.407-428
    • /
    • 2021
  • This study compares and analyzes the mathematics assessment items of the middle school's national-level academic achievement tests in Korea and Japan, recently revised as a competency-focused curriculum. By comparing and analyzing the assessment items in each country, the analytic framework is integrated into content areas, contexts, and competencies. The characteristics of each country's assessment items developed for each content area were analyzed using the framework. We suggested some implications on developing and improving national-level academic assessment items.