• Title/Summary/Keyword: 실행분석

Search Result 4,439, Processing Time 0.035 seconds

Elementary Pre-service Teachers' Perception on the Importance and Performance of Good Instruction (초등 예비교사의 좋은 수업에 대한 중요도와 실행도 인식)

  • Jo, Miheon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.435-446
    • /
    • 2020
  • This research analyzed elementary pre-service teachers' perception on the importance and performance of major factors that constitute good instruction, and attempted to find ways to improve pre-service teacher education. A survey was conducted to 157 pre-service teachers who were senior students at a university. The questionnaire consisted of four main areas of good instruction and major factors for each area, and the importance and performance of each factor were answered on a 5-point scale. As the result of the t-test on the difference between importance and performance, significant differences were found between the importance and performance of all 24 factors. In addition, the importance-performance analysis showed that there were 3 factors to be concentrated for the improvement, 9 factors to be kept up because of their good work, 9 factors to have low priority, and 3 factors to avoid excessive effort. Based on the results, the research proposed issues to be considered in organizing and operating the elementary pre-service teacher education program.

Importance-Performance Analysis for Improving Demand Response Transport(DRT) System (수요응답형교통(DRT)의 활성화를 위한 중요도-실행도 분석)

  • Jang, Tae Youn;Kim, Jun Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.3
    • /
    • pp.46-58
    • /
    • 2018
  • DRT should have higher positive benefits to become the public transit than the current backcountry buses having demand deficiency and operation problems. The study examines the factors for activating DRT through importance and performance analysis(IPA) and applies the IPA gap theory to find relationship between the current buses and DRT in the mixed operation area. As a result, the operation area is the urgent improving factor and the next ones are transfer related factors, on-time arrival, safe driving, operation time and vehicles. According to the gap theory to activate DRT and reduce the current bus system, in the case that performance is smaller than importance, the performance of transfer, operating time and area, and vehicles should be up. In the case that performance is higher than importance, the performance of luggage space, vehicle clean, safe driving, operator kindness, transfer, operating elements, and fare should keep going.

Unpacking Malwares (악성 코드의 실행 압축 해제 기술)

  • Guhyeon Jeong;Euijin Choo;Joosuk Lee;Heejo Lee
    • Annual Conference of KIPS
    • /
    • 2008.11a
    • /
    • pp.1537-1539
    • /
    • 2008
  • 최근 많은 악성 코드 제작자들이 실행 압축 기술을 악용하고 있다. 악성코드 제작자들은 자신의 악성코드가 탐지되는 것을 어렵게 만들기 위해 기존의 알려진 실행 압축 알고리즘보다는 새로운 실행 압축 알고리즘을 개발하여 사용하고 암호화 기법 등을 이용하여 분석하기 어렵게 만들고 있다. 본 논문에서는 기존의 실행 압축 해제 기술에 대한 연구들을 분석하여 기존 기술의 한계점을 극복하기 위한 방안과 앞으로의 연구 방향을 제시한다.

Anomaly Detection on Callback Duration in ROS 2 with Machine Learning (머신러닝 기법을 활용한 ROS 2 의 콜백 실행 시간 분석 및 이상 탐지)

  • Kyoung-Hwan Kim;Jeong-Hwan Kang;Dong-Hyun Kwon
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.233-234
    • /
    • 2024
  • ROS 2 는 노드라는 프로세스로 구성되고, 실행기에 의해 실행되는 대부분의 동작은 노드와 연결된 콜백 함수로 정의되어 있다. 따라서, 특정 노드에 연결된 콜백 함수가 정상적으로 동작하지 않을 경우 애플리케이션 전체에 영향을 줄 수 있다. 이에 본 연구에서는 ROS 2 의 실행 정보를 추적하는 도구인 ros2_tracing 을 활용하여 ROS 2 애플리케이션 내에서 동작하는 콜백 함수의 실행 시간을 분석하고, 머신러닝 기법을 사용해 이를 탐지하는 방법을 제안한다.

Design of a Virtual Machine based on the Lua interpreter for the On-Board Control Procedure Execution Environment (탑재운영절차서 실행환경을 위한 Lua 인터프리터 기반의 가상머신 설계)

  • Kang, Sooyeon;Koo, Cheolhea;Ju, Gwanghyeok;Park, Sihyeong;Kim, Hyungshin
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.127-133
    • /
    • 2014
  • In this paper, we present the design, functions and performance analysis of the virtual machine (VM) based on the Lua interpreter for On-Board Control Procedure Execution Environment (OEE). The development of the OEE has been required in order to operate the lunar explorer mission autonomously which is planned by Korea Aerospace Research Institute (KARI) autonomously. The concept of On-Board Control Procedure (OBCP) is already being applied to the deep space missions with a long propagation delay and a limited data transmission capacity since it ensure he autonomy of the mission without the ground intervention. The interpreter is the execution engine in the VM and it interpreters high-level programming codes line by line and executes the VM instructions. So the execution speed is very more slower than that of natively compiled codes. In order to overcome it, we design and implement OEE using register-based Lua interpreter for execution engine in OEE. We present experimental results on a range of additional hardware configurations such as usages of cache and floating point unit. We expect those to utilized to the OBCP scheduling policy and the system with Lua interpreter.

'Techno-scientific Way of Thinking' on Women's Technoscientific Practices : From Barad's Agential Realistic Perspectives (여성들의 기술과학 실행에 대한 '기술-과학적 방식의 생각하기': 캐런 바라드의 행위적 실재론을 중심으로)

  • Leem, So-Yeon
    • Journal of Science and Technology Studies
    • /
    • v.11 no.2
    • /
    • pp.97-119
    • /
    • 2011
  • This paper, as an initiative to fertilize analyses on women's technoscientific practices, reviews theoretical discussions and empirical studies in-between feminism and STS, mainly owing its thinking technologies to Karen Barad's Agential Realism. The first part of this paper shows that women's technoscientific practices as research sites are not only fertile grounds between STS and feminism but also conflict areas between constructivist theories and feminist politics. The second part proposes Agential Realism as an way of thinking to deal with 'conflicts' between STS and feminism in analytical levels. Agential Realism provides useful conceptual tools for 'techno-scientific ways of thinking' through the reconceptualization of agency, the displacement of agency by accountability, and the configuration of STS analysis as 'apparatus.' The third part finds three examples of 'techno-scientific ways of thinking' on women's technscientific practices from previous feminist STS works, which suggests how to analyze not only women's technoscientific practices but also diverse practices of science, technology, and medicine as follows: follow 'the invisible', account for 'ontological choreography', and 'care' for what is analyzed.

  • PDF

Obfuscated malware detection Approach using Dynamic and Static Analysis Data and Deep Learning (동적-정적 분석 데이터와 딥러닝을 이용한 난독화된 악성코드 탐지 기법)

  • Hae-Soo Kim;Mi-Hui Kim
    • Annual Conference of KIPS
    • /
    • 2023.05a
    • /
    • pp.131-133
    • /
    • 2023
  • 악성코드를 유포할 때 프로그램 코드만으로 악성코드의 유무를 확인할 수 없도록 조치하여 분석을 지연시키는 방식을 사용하는 방향으로 발전하고 있다. 악성코드를 실행하지 않고 코드와 구조만으로 분석하는 정적 분석으로는 악성코드를 판별할 수 없어 코드를 직접 실행해 분석하는 동적 분석을 이용해야 한다. 본 논문에서는 난독화된 비정상적인 코드를 직접 실행한 동적 분석데이터와 일반적이지 않은 섹션들의 정보를 추출한 정적 분석데이터를 이용해 동적-정적 분석 데이터와 딥러닝 모델을 통해 난독화 및 패킹된 악성코드를 탐지하는 기법을 제안한다.

Web Service Agent with Re-Planning at execution time (실행시간 Re-planning을 지원하는 웹 서비스 에이전트)

  • Kim Yeo-Jung;Kim Ji-Hyeon;Jin Yun;Kang Ji-Hoon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.751-753
    • /
    • 2005
  • 기존의 시맨틱 웹 서비스 에이전트는 사용자 요구에 의미적으로 부합하는 서비스를 검색하고 합성하는 플래너에 중점을 둔 반면 실행자에는 큰 비중을 두지 않았다. 그러나 기존의 다수 플래닝 알고리즘은 사용자 제약 사항의 일부만을 적용하여 불완전한 결과를 도출함에도 불구하고 플래닝을 완료하는 문제가 있다. 따라서 실행자가 단순히 플래닝된 서비스만을 실행한다면 사용자 요구를 완전히 충족시킬 수 없다. 이를 해결하기 위해 본 논문에서는 플래닝의 취약점을 보완하는 실행자를 제안하고 이를 기반으로 에이전트를 개발하였다. 본 논문에서 제안한 실행자는 서비스 실행 결과를 분석하여 사용자의 요구 사항 중 반영되지 않은 정보의 적용 또는 불필요한 정보의 제거를 위해, 플래너에게 re-planning을 요구하거나 서비스 실행 결과 자체에서 관련 정보를 추출한다. 이를 통해 사용자의 요구 사항에 대한 서비스 결과의 정확도 향상을 도모한다.

  • PDF

Investigating how the tasks' characteristics change according to modifying the textbook tasks and implementing the lesson by secondary preservice teachers: Focused on the mathematical modeling perspectives (중등 예비교사의 교과서 과제 변형 및 수업 실행 중 나타난 과제의 특징 변화: 수학적 모델링 관점을 중심으로)

  • Hye-Yun Jung;Jihyun Lee
    • The Mathematical Education
    • /
    • v.63 no.3
    • /
    • pp.527-547
    • /
    • 2024
  • It is difficult for mathematics teachers to develop mathematical modeling tasks and implement mathematical modeling lessons for their students. These difficulties serve as a reason why mathematical modeling lessons are not implemented well in school mathematics. In this study, we aimed to examine how preservice mathematics teachers (PMTs) modify mathematical modeling tasks in mathematics textbooks as a way to develop mathematical modeling tasks and how they implement the mathematical modeling lesson. In particular, we focused on how the openness and reality reflected in the task and the mathematical modeling process change as PMTs modify the tasks. We collected data through PMTs' evaluation reports on analyzing textbook tasks, task modification, lesson plans and implementations, peer evaluation, and self-evaluation. Then, we analyzed these data according to the case analysis process. The findings revealed that when PMTs modified the textbook task, they focused on and improved the openness and the defining variables and the model stages of mathematical modeling process. However, when PMTs implemented lesson, the openness and the defining variables and the model stages of mathematical modeling process were restricted again. PMTs did not focus on other stages. Based on these results, the theoretical and practical implications of the study was discussed.

Efficient Exploring Multiple Execution Path for Dynamic Malware Analysis (악성코드 동적 분석을 위한 효율적인 다중실행경로 탐색방법)

  • Hwang, Ho;Moon, Daesung;Kim, Ikkun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.377-386
    • /
    • 2016
  • As the number of malware has been increased, it is necessary to analyze malware rapidly against cyber attack. Additionally, Dynamic malware analysis has been widely studied to overcome the limitation of static analysis such as packing and obfuscation, but still has a problem of exploring multiple execution path. Previous works for exploring multiple execution path have several problems that it requires much time to analyze and resource for preparing analysis environment. In this paper, we proposed efficient exploring approach for multiple execution path in a single analysis environment by pipelining processes and showed the improvement of speed by 29% in 2-core and 70% in 4-core through experiment.