• Title/Summary/Keyword: 정적후처리

Search Result 85, Processing Time 0.031 seconds

A Study on Structural Relations between Teachers' Attitudes toward Students and Academic Engagement and Task-Solving Behavior in Physical Education Classes (체육 수업장면에서 학생들을 대하는 교사의 태도와 학업열의 및 과제해결행동의 구조적 관계)

  • Kim, Seung-Yong;Lim, Hyun-Muk;Song, Ki-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.249-256
    • /
    • 2019
  • The purpose of this study was to inquire into the structural relations between teachers' attitudes, academic engagement, task-solving behavior which are perceived in a physical education class. To this end, this study selected a total of 434 copies of questionnaires as final valid samples using the convenience sampling method targeting middle school students at 5 schools located at a metropolitan area. For data processing, this study confirmed the goodness of fit test of the whole model using SPSS 20.0 and AMOS 20.0, and then did hypothesis testing; the study results are as follows: first, teachers' attitudes was to have influence on academic engagement. Second, academic engagement had positive influence on help-seeking, while self-handicapping had significantly negative influence. Third, teachers' attitudes had positive influence on help-seeking, while self-handicapping had significantly negative influence. Lastly, in the relationship between teachers' attitudes and task-solving behavior, academic engagement was found to play an intermediary role.

A Design of Column-Group based Dynamic Page Storage Model for Mixed Workloads (혼합 워크로드 처리를 위한 컬럼 그룹 기반 동적 페이지 저장 관리 설계)

  • Park, Kyounghyun;Wonk, Hee Sun;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.335-341
    • /
    • 2018
  • There exists a limit in efficient processing of mixed workloads that database markets requires in recent years since existing database systems utilize a static page storage model. In this paper we propose a dynamic page storage model that can reflect the characteristics of mixed workloads. We also describe how to extract optimized column groups from given mixed workloads and how to construct pages dynamically. Finally, we show in our experiments that the proposed model is more efficient than the existing model in processing given mixed workloads.

A Function-characteristic Aware Thread-mapping Strategy for an SEDA-based Message Processor in Multi-core Environments (멀티코어 환경에서 SEDA 기반 메시지 처리기의 수행함수 특성을 고려한 쓰레드 매핑 기법)

  • Kang, Heeeun;Park, Sungyong;Lee, Younjeong;Jee, Seungbae
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.13-20
    • /
    • 2017
  • A message processor is server software that receives various message formats from clients, creates the corresponding threads to process them, and lastly delivers the results to the destination. Considering that each function of an SEDA-based message processor has its own characteristics such as CPU-bound or IO-bound, this paper proposes a thread-mapping strategy called "FC-TM" (function-characteristic aware thread mapping) that schedules the threads to the cores based on the function characteristics in multi-core environments. This paper assumes that message-processor functions are static in the sense that they are pre-defined when the message processor is built; therefore, we profile each function in advance and map each thread to a core using the information in order to maximize the throughput. The benchmarking results show that the throughput increased by up to a maximum of 72 % compared with the previous studies when the ratio of the IO-bound functions to the CPU-bound functions exceeds a certain percentage.

EVALUATION OF NONLINEAR FINITE ELEMENT COMPUTER PROGRAM SMAP-S2 (비선형 유한요소 컴퓨터 프로그램 SMAP-S2의 평가)

  • 김광진
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 1991.10a
    • /
    • pp.271-288
    • /
    • 1991
  • SMAP-S2 is an advanced too-dimensional , static finite element computer program developed for the geometric and material nonlinear structure-medium interaction analysis. The program has specific applications for modeling geomechanical problems associated with multi-staged excavation or embankment. Theoretical formulations and computational algorithms are presented along with the description of elasto-plastic material models. Nonlinear features of the code are verified by comparing with known solutions or experimental test results. Capabilities of per- and post-processing programs are discussed.

  • PDF

Self-Organizing Fuzzy Modeling Using Creation of Clusters (클러스터 생성을 이용한 자기구성 퍼지 모델링)

  • Koh, Taek-Beom
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.4
    • /
    • pp.334-340
    • /
    • 2002
  • This paper proposes a self-organizing fuzzy modeling which can create a new hyperplane-shaped cluster by applying multiple regression to input/output data with relatively large fuzzy entropy, add the new cluster to fuzzy rule base and adjust parameters of the fuzzy model in repetition. Tn the coarse tuning, weighted recursive least squared algorithm and fuzzy C-regression model clustering are used and in the fine tuning, gradient descent algorithm is used to adjust parameters of the fuzzy model precisely And learning rates are optimized by utilizing meiosis-genetic algorithm. To check the effectiveness and feasibility of the suggested algorithm, four representative examples for system identification are examined and the performance of the identified fuzzy model is demonstrated in comparison with that of the conventional fuzzy models.

Reengineering Black-box Test Cases (블랙박스 테스트 케이스의 리엔지니어링)

  • Seo Kwang-Ik;Choi Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.573-582
    • /
    • 2006
  • Black-box testing needs to prepare fitting test data, execute software, and examine the result. If we test software effectively, not only selecting test cases but also representing test cases are important. In static testing effectiveness of testing activities also depends on how to represent test cases and checklist to validate. This paper suggests a method for finding ineffective critical test cases and reengineering them. An experiment of reengineering digital set-top box software shows the process and results of checking effectiveness and conformance of current test cases and patching test cases. The result shows how much save the test time and improve test coverage by reengineering test cases. Methods of reuse and restructuring test cases are also studied to fit into embedded product-line software.

Implementation of Testing Tool Verification of ATM Switching Software (ATM교환기 S/W검증을 위한 테스팅 도구 설계 및 구현)

  • Chung, Chang-Sin;Hwang, Sun-Myung;Lee, Kyung-Whan;Kim, Haeng-Kon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.8
    • /
    • pp.1987-1994
    • /
    • 1997
  • ATM switching software should be required high reliability, functionality, extendability and maintainability. After development of the software, it is verified and tested by analyzer whether the software is accomplished the characteristics of it or not. There are so many CASE tools in other area, but the CHILL testing tools that can verify ATM softwares have not various functions are not many. In this paper we develop the testing tool which can evaluate and test CHILL programmed ATM software. This Tool supports testing reports, debugging informations and maintenance informations including parallel process about CHILL original programs.

  • PDF

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 악성 안드로이드 모바일 앱의 최적특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.164-167
    • /
    • 2019
  • 모바일 운영체제 중 안드로이드의 점유율이 높아지면서 모바일 악성코드 위협은 대부분 안드로이드에서 발생하고 있다. 그러나 정상앱이나 악성앱이 진화하면서 권한 등의 단일 특징점으로 악성여부를 연구하는 방법은 유효성 문제가 발생하여 본 논문에서는 다양한 특징점 추출 및 기계학습을 활용하여 극복하고자 한다. 본 논문에서는 APK 파일에서 구동에 필요한 다섯 종류의 특징점들을 안드로가드라는 정적분석 툴을 통해 학습데이터의 특성을 추출한다. 또한 추출된 중요 특징점을 기반으로 모델링을 하는 세 가지 방법을 제시한다. 첫 번째 방법은 보안 전문가에 의해 엄선된 132가지의 특징점 조합을 바탕으로 모델링하는 것이다. 두 번째는 학습 데이터 7,000개의 앱에서 발생 빈도수가 높은 상위 99%인 8,004가지의 특징점들 중 랜덤포레스트 분류기를 이용하여 특성중요도가 가장 높은 300가지를 선정 후 모델링 하는 방법이다. 마지막 방법은 300가지의 특징점을 학습한 다수의 모델을 통합하여 하나의 가중치 투표 모델을 구성하는 방법이다. 최종적으로 가중치 투표 모델인 앙상블 알고리즘 모델을 사용하여 97퍼센트로 정확도가 개선되었고 오탐률도 1.6%로 성능이 개선되었다.

Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File (알려지지 않은 실행파일의 악의적인 특징들을 분석하기 위한 행위추적 프로그램)

  • Kim, Dae-Won;Kim, Ik-Kyun;Oh, Jin-Tae;Jang, Jong-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.941-944
    • /
    • 2011
  • 컴퓨팅 환경에서 각종 보안 위협들의 핵심에는 악성 실행파일들이 있다. 전통적인 시그니처 기반의 보안 시스템들은 악의적인 실행파일들 중에서 알려지지 않은 것들에 대해서는 런타임 탐지에 어려움이 있다. 그러한 이유로 런타임 탐지를 위해 시그니처가 필요 없는 정적, 동적 분석 방법들이 다각도로 연구되어 왔으며, 특히 악성 실행파일을 실제 실행한 후 그 동작상태를 모니터링 하는 행위기반 동적 분석방법들이 많은 발전을 이루어왔다. 그러나 대부분의 행위기반 분석방법들은 단순히 몇 가지 행위나 비순차적인 분석정보를 제공하기 때문에, 차후 악성여부를 최종 판단하는 방법론에 적용하기에는 그 분석정보가 충분하지 않다. 본 논문에서는 악성 실행파일이 실행되는 동안 발생할 수 있는 행위들을 분류하고, 이를 모니터링 하는 프로토타입 프로그램을 구현하였다. 또한, 악성 실행파일을 직접 실행하는 것은 제한된 컴퓨팅 환경에서 이루어지기 때문에, 실제 악성 실행파일을 모니터링 한 결과를 토대로 행위기반 모니터링 방법이 극복해야 될 이슈들에 대해서도 언급하고 있다.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.