• Title/Summary/Keyword: 실행분석

Search Result 4,414, Processing Time 0.039 seconds

Exploring Scientific Argumentation Practice from Unproductive to Productive: Focus on Epistemological Resources and Contexts (비생산적 논변에서 생산적 논변으로의 실행 변화 탐색 -인식론적 자원과 맥락을 중심으로-)

  • Lee, Jeonghwa;Kim, Heui-Baik
    • Journal of The Korean Association For Science Education
    • /
    • v.41 no.3
    • /
    • pp.193-202
    • /
    • 2021
  • This study aims to identify what kind of epistemological resources were activated in unproductive and productive practice by students participating in scientific argumentation, and to explore which contexts result in changes in argumentative practice. We collected transcriptions of participants' argumentative lessons and interview, participants' work sheets, and researchers' field notes. The analysis revealed that the focus group activated different kinds of epistemological resources depending on their practice; propagated, belief, and accumulation in unproductive practice and constructed, understanding, accumulation, formation and rebuttal in productive practice. We found two contextual cues that led to these changes; unfamiliar form of argumentative task was provided and emotional, epistemic, and conceptual support of the epistemic authority. This work can be provided as additional case studies to analyze changes in practice according to learner context-dependent epistemology, and we expect to contribute to discussions of productive epistemology and stabilization for students' authentic science engagement.

Design and Implementation of Preprocessing Part for Dynamic Code Analysis (동적 코드 분석을 위한 전처리부 설계 및 구현)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.37-41
    • /
    • 2019
  • Recently, due to the appearance of various types of malware, the existing static analysis exposes many limitations. Static analysis means analyzing the structure of a code or program with source code or object code without actually executing the (malicious) code. On the other hand, dynamic analysis in the field of information security generally refers to a form that directly executes and analyzes (malware) code, and compares and examines and analyzes the state before and after execution of (malware) code to grasp the execution flow of the program. However, dynamic analysis required analyzing huge amounts of data and logs, and it was difficult to actually store all execution flows. In this paper, we propose and implement a preprocessor architecture of a system that performs malware detection and real-time multi-dynamic analysis based on 2nd generation PT in Windows environment (Windows 10 R5 and above).

Analysis on Middle and High School Students' Stages of Concern and Levels of Use on Self-directed Learning in Science Learning (중·고등학생의 과학과 자기주도학습에 대한 관심수준 및 실행수준 분석)

  • Choe, Hyejeong;Jeong, Jin-Su;Kim, Sang-Ho
    • Journal of Science Education
    • /
    • v.39 no.1
    • /
    • pp.28-43
    • /
    • 2015
  • The purpose of this study was to measure middle and high school students' stage of concern(SoC) and their level of use(LoU) on the self-directed learning in science learning based on the CBAM(Concern-Based Adoption Model). Additionally, this research was designed to analyze the difference between the degree of students' SoC and their LoU according to the their background variables. For this, 440 middle and high school students participated in the research. The results of this study were as follow: Firstly, since the students' SoC and LoU about the self-directed learning in science learning are low(Stage0 : awareness and Level II : preparation), we should draw students' immediate concern by developing training programs that would enable them to actually participate in the process of implementing the self-directed learning. Secondly, the students' SoC and LoU on self-directed learning in science learning vary depending on their residence, gender, and grade. This is the reason why we have to develop customized training programs on self-directed learning that suits their background. Thirdly, it shows that students, who have higher concern on self-directed learning in science learning, implement it better than those who are not concerned with it at all. It implies that we need a training program that considers both the students' concern and implementation on self-directed learning in science learning.

  • PDF

한국 교사들의 기업가정신 교육 역량 중요도: 실행도 분석

  • Yun, Seong-Hye;Lee, U-Jin
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2021.11a
    • /
    • pp.63-67
    • /
    • 2021
  • 최근 중등교육에서 기업가정신 교육에 대한 필요성에 대한 인식이 확산되면서, 현장에서 이를 실천할 교사의 역량이 중요해졌다. 본 연구는 기업가정신 교육을 실천할 교사들의 역량을 탐색하고 중요도와 실행도 차이를 분석함으로써, 교육 요구도의 우선순위를 도출하고자 하였다. 이를 위하여 본 연구는 TPACK(Technological Pedagogical Content Knowledge, 테크놀로지내용교수지식) 모델에 기반하여 기업가정신 교육 역량을 개념화하고, 이를 측정하기 위한 도구를 개발하였다. 이를 활용하여 기업가정신 교육에 관심이 있는 중등교사 217명을 대상으로 설문조사를 실시하여 중요도와 실행도의 차이를 분석하였다. 연구결과, TPACK의 모든 하위 요인에 대하여 중요도의 평균이 실행도의 평균보다 높아 교육적 처방이 필요한 것으로 나타났다. 또한 중요도-실행도 매트릭스에서 가장 개선의 우선순위가 높은 요인은 CK(내용지식)인 것으로 나타났다. 이러한 결과를 토대로 교사들의 기업가정신 교육 역량 강화를 위한 시사점을 도출하였다.

  • PDF

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

Analyzing problem of job failures due to low GPU memory when concurrent running inference jobs in a container environment (컨테이너 환경에서 추론 작업 동시 실행 시 GPU 메모리 부족으로 인한 작업 실패 문제 분석)

  • HyungJun Kim;Jihun Kang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.71-74
    • /
    • 2023
  • 인공지능의 추론 작업은 대규모 연산 자원을 필요로 하는 학습 작업과는 다르게 단일 서버에서 다수의 작업을 동시 실행하는 것이 가능하며, 실행 시간이 상대적으로 빠르다는 특성으로 인해 작업 실행을 위해 컴퓨팅 자원을 점유하고 빠르게 작업을 완료한 후 자원을 반환하기 때문에 다수의 추론 작업을 동시에 운용하는데 용이하다. 하지만, 단일 서버의 컴퓨팅 자원은 제한적이다. 이로 인해 컴퓨팅 자원의 허용 범위 내에서 작업을 운용해야 하며, 허용 범위를 초과하는 규모의 추론 작업이 동시에 실행되면 자원 부족으로 인한 경쟁이 발생한다. 본 논문에서는 컨테이너 환경에서 다수의 추론 작업이 동시에 실행될 때 GPU 메모리 부족으로 인한 작업 실패 문제를 실험을 통해 확인한다. 또한, 다수의 추론 작업 사이에서 발생하는 GPU 자원 경쟁과 실행을 실패하는 추론 작업의 GPU 메모리 낭비로 인한 자원 활용률 저하 문제를 분석한다.

A Classification Method for Executable Files based on Comparison of Undocumented Information in the PE Header (실행파일 헤더내 문서화되지 않은 정보의 비교를 통한 실행파일 분류 방법)

  • Kim, Jung-Sun;Kang, Jung-Min;Kim, Kang-San;Shin, Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.1
    • /
    • pp.43-50
    • /
    • 2013
  • File identification and analysis is an important process of computer forensics, since the process determines which subjects are necessary to be collected and analyzed as digital evidence. An efficient file classification aids in the file identification, especially in case of copyright infringement where we often have huge amounts of files. A lot of file classification methods have been proposed by far, but they have mostly focused on classifying malicious behaviors based on known information. In copyright infringement cases, we need a different approach since our subject includes not only malicious codes, but also vast number of normal files. In this paper, we propose an efficient file classification method that relies on undocumented information in the header of the PE format files. Out method is useful in copyright infringement cases, being applied to any sort of PE format executable file whether the file is malicious, packed, mutated, transformed, virtualized, obfuscated, or not.

The Effect of CoP(Community of Practice) Influence Factors on Satisfaction and Learning Culture Activation in R&D Groups: Based on Comparison Analysis by Group Maturity (연구개발 직군의 실행공동체 영향요인이 만족도 및 학습문화 활성화에 미치는 영향:집단 성숙도에 따른 비교 분석)

  • Oh, Sungho;Kim, Bo-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.407-420
    • /
    • 2015
  • This study analyzes the effect of CoP(Community of Practice) influence factors on satisfaction and learning culture activation in R&D groups. Research model and hypothesis is designed the relationship the effect factors for CoP which are consist of personal factor, interacting factor, support factor and environmental factor and satisfaction and the learning culture activation focused on comparing between maturity and immaturity CoP member group. It conducted an analysis based on 371 survey responses significantly. Hence, interacting, supporting and personal factor have a significant positive effect on satisfaction but environmental factor was negative effect to it. CoP Satisfaction has a positive effect on the learning culture activation. However average between two groups has not a statistically significant difference in all of the factors. At the result, interacting between members is the most important factor to the successful CoP development of R&D groups.

Importance-Performance Analysis (IPA) of the Core Competence of Gifted Education Teachers (영재교육 담당교원의 핵심역량 인식에 대한 중요도와 실행도(IPA) 분석)

  • Lee, Mina;Park, Sung Hee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.6
    • /
    • pp.927-949
    • /
    • 2015
  • The purpose of this study was to find out the difference between importance and performance regarding perception of core competence of gifted education teachers through importance-performance analysis (IPA). One hundred fourteen elementary gifted education teachers including math and science participated in the study. The collected survey data was analyzed with IPA matrix. As the result, firstly, there was significant difference between importance and performance regarding perception of core competence of gifted education teachers. Secondly, core competencies of 'understanding knowledge', 'research and instruction', 'passion and motivation', and 'ethics' are high in both perceptions of importance and performance. However, both 'communication and practices' and 'professional curriculum development' are low. Thirdly, there was a difference in core competence of gifted education teachers between math and science at the competence of 'passion and motivation'. Math gifted education teachers perceived 'passion and motivation' high in both importance and performance while science gifted education teachers perceived its importance low and performance high. In addition, math gifted education teachers showed lower performance compared to its importance in the sub-categories; 'knowledge of gifted development', 'gifted child assessment', 'information gathering and its literacy', and 'creative answers to various questions'. However, science gifted education teachers showed lower performance compared to its importance in sub-categories; 'higher-order thinking skills in its subject', 'teaching methodology for self-directed learning', 'problem behavior of the gifted', and 'counseling the gifted'.

Business Intelligence Action Plan Strategy Method Based on Customer Interaction Map (Customer Interaction Map을 근간한 BI 실행 접근 전략 방법)

  • Cho, Young-Suk
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.481-486
    • /
    • 2009
  • 현재 우리나라의 온라인 관련 산업 즉 온라인 쇼핑, 인터넷 게임 등 온라인에서 고객을 접하는 산업의 경우 CRM의 붐이 일던 시절에 CRM을 도입하고 분석하고 있으나 그 실효성에 대한 문제가 발생하고 있으며 실제 실행 전략적 측면에서 접근 하지 못하여 투자 대비 효과가 미비하다는 판단을 하고 있습니다. 특히 게임사의 경우 다양한 고객 접근 채널을 중심으로 다각적 분석이 요구 됨에 있어 그 근간을 설정하지 못하고 고객에 대한 정확한 정의 또한 내리지 못하고 있는 현실에서 CIM 기반 BI 실행 접근 전략 방법을 통하여 온라인 게임 산업의 발전을 도모하고 중장기적 매출 증대를 위한 고객 관리 실행 전략을 소개하고자 합니다.

  • PDF