• Title/Summary/Keyword: 증명의 의미 지도

Search Result 139, Processing Time 0.029 seconds

An analysis of trends in argumentation research: A focus on international mathematics education journals (논증 연구의 동향 분석: 국외의 수학교육 학술지를 중심으로)

  • Jinam Hwang;Yujin Lee
    • The Mathematical Education
    • /
    • v.63 no.1
    • /
    • pp.105-122
    • /
    • 2024
  • This study analyzed the research trends of 101 articles published in prominent international mathematics education journals over 24 years from 2000, when NCTM's recommendation emphasizing argumentation was released, until September 2023. We first examined the overall trend of argumentation research and then analyzed representative research topics. We found that students were the focus of the studies. However, several studies focused on teachers. More studies were examined in secondary school than in elementary school, and many were conducted in argumentation in classroom contexts. We also found that argumentation research is becoming increasingly popular in international journals. The representative research topics included 'teaching practice,' 'argumentation structure,' 'proof,' 'student understanding,' and 'student reasoning.' Based on our findings, we could categorize three perspectives on argumentation: formal, contextual, and purposeful. This paper concludes with implications on the meaning and role of argumentation in Korean mathematics education.

Semantic Network Analysis of Science Gifted Middle School Students' Understanding of Fact, Hypothesis, Theory, Law, and Scientificness (언어 네트워크 분석법을 통한 중학교 과학영재들의 사실, 가설, 이론, 법칙과 과학적인 것의 의미에 대한 인식 조사)

  • Lee, Jun-Ki;Ha, Minsu
    • Journal of The Korean Association For Science Education
    • /
    • v.32 no.5
    • /
    • pp.823-840
    • /
    • 2012
  • The importance of teaching the nature of science (NOS) has been emphasized in the science curriculum, especially in the science curriculum for science-gifted students. Nevertheless, few studies concerning the structure and formation of students' mental model on NOS have been carried out. This study aimed to explore science-gifted students' understanding of 'fact', 'hypothesis', 'theory', 'law', and 'scientificness' by utilizing semantic network analysis. One hundred ten science-gifted middle school students who were selected by a national university participated in this study. We collected students' written responses of five items and analyzed them by the semantic network analysis(SNA) method. As a result, the core ideas of students' understanding of 'fact' were proof and reality, of 'hypothesis' were tentativeness and uncertainty, of 'theory' was proven hypothesis by experimentation, of 'law' were absoluteness and authority, and of 'scientificness' were factual evidence, verifiability, accurate and logical theoretical framework. The result of integrated semantic network illustrated that the viewpoint of science-gifted students were similar to absolutism and logical positivism (empiricism). Methodologically, this study showed that the semantic network analysis method was an useful tool for visualization of students' mental model of scientific conceptions including NOS.

A study on RFID technology and application of China (중국의 RFID 기술과 응용에 대한 고찰)

  • Li, Peng;Zhang, Yu;Shin, Yun-Ho;Shin, Hyun-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.2
    • /
    • pp.330-336
    • /
    • 2011
  • RFID is the item is at the core of the Internet, promoting action in the online community is a pivotal element. RFID uses radio frequency waves to automatically find the technology to track individuals and items referring to the short-range wireless technology can be included. For example, ZigBee and Bluetooth has a strong ability to track and calculate. In this study, major advances in this technology by analyzing the techniques of intensive discussions, the current progress of mankind, and the impact on the future direction of development is included.

An Efficient In-Place Block Rotation Algorithm and its Complexity Analysis (효율적 In-Place Block Rotation 알고리즘과 복잡도 분석)

  • Kim, Pok-Son;Kutzner, Arne
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.3
    • /
    • pp.428-433
    • /
    • 2010
  • The notion "block rotation" denotes the operation of exchanging two consecutive sequences of elements uv to vu. There are three already well-known block rotation algorithms called BlockRotation, Juggling and Reversal algorithm. Recently we presented a novel block rotation algorithm called QuickRotation. In this paper we compare QuickRotation to these three known block rotation algorithms. This comparison covers a complexity analysis as well as benchmarking and shows that a switch to QuickRotation is almost always advantageous.

Automation-considered SVO Logic for Verifying Authentication and Key Distribution Protocols (인증 및 키 분배 프로토콜의 논리성 검증을 위한 ASVO 로직)

  • 권태경;임선간;박해룡
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.17-37
    • /
    • 2003
  • This paper presents the ASVO (Automation-considered SVO) Logic that can be used for verifying authentication and key distribution protocols. The ASVO logic was designed for automatic verification, in a way to modify the SVO logic, one of the most famous authentication logics. The ASVO logic is syntactically and semantically sound, and requires relatively simple verification steps. Also we implemented the Isabelle/ASVO system which supports semi-automated verification, by using the Isabelle/Isar system.

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.

LPM-Based Digital Watermarking for Forgery Protection in Printed Materials (인쇄물의 위조 방지를 위한 LPM기반의 디지털 워터마킹)

  • Bae Jong-Wook;Lee Sin-Joo;Jung Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1510-1519
    • /
    • 2005
  • We proposed a digital watermarking method that it is possible to identify the copyright because the watermark is detected in the first print-scan and to protect a forgery because the watermark is not detected in the second print-scan. The proposed algorithm uses LPM and DFT transform for the robustness to the distortion of pixel value and geometrical distortion. This methods could improve watermark detection performance and image quality by selecting maximum sampling radius in LPM transform. After analyzing the characteristics of print-scan process, we inserted the watermark in the experimentally selected frequency bands that survives robustly to the first print-scan and is not detected in the second print-scan, using the characteristic of relatively large distortion in high frequency bands of DFT As the experimental result, the original proof is possible because average similarity degree 5.13 is more than the critical value 4.0 in the first print-scan. And the detection of forgery image is also possible because average similarity degree 2.76 is less than the critical value 4.0 in the second print-scan.

  • PDF

An Efficient Execution of Non-Horn Logic Programs (비혼 논리 프로그램의 효율적 수행)

  • Shin, Dong-Ha;Baek, Ynn-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.816-823
    • /
    • 2005
  • Non-Horn logic programs are extended from Horn logic programs to the level of 1st order predicate logic. Even though they are more expressive than Horn logic programs, They are not practically used because we do not have efficient implementations. Currently to execute non-Horn logic programs, we translate them to equivalent Horn logic programs using the proof procedure InH-Prolog and compile the Horn logic programs to WAM(Warren Abstract Machine) instructions. In this paper, we propose EWAM(Extended Warren Machine) that executes non-Horn logic programs more efficiently and a compilation scheme that compiles non-Horn logic programs to the EWAM instruction. We implement an EWAM emulator and a compiler and measured the performance of the EWAM emulator and the compiler and found that they are very efficient.

A Security Analysis of Zhao and Gu's Key Exchange Protocol (Zhao와 Gu가 제안한 키 교환 프로토콜의 안전성 분석)

  • Nam, Jung-Hyun;Paik, Ju-Ryon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.91-101
    • /
    • 2012
  • Key exchange protocols are essential for building a secure communication channel over an insecure open network. In particular, password-based key exchange protocols are designed to work when user authentication is done via the use of passwords. But, passwords are easy for human beings to remember, but are low entropy and thus are subject to dictionary attacks. Recently, Zhao and Gu proposed a new server-aided protocol for password-based key exchange. Zhao and Gu's protocol was claimed to be provably secure in a formal adversarial model which captures the notion of leakage of ephemeral secret keys. In this paper, we mount a replay attack on Zhao and Gu's protocol and thereby show that unlike the claim of provable security, the protocol is not secure against leakage of ephemeral secret keys. Our result implies that Zhao and Gu's proof of security for the protocol is invalid.

A Method to Specify and Verify Requirements for Safety Critical System (안전 필수 시스템을 위한 요구사항 명세 및 검증 방법)

  • Lim, Hye Sun;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.893-907
    • /
    • 2017
  • In safety-critical systems, software defects may have serious consequences. Therefore, defects should be considered during the requirements specification process, which is the first step of a software development lifecycle. Stakeholder requirements that are usually written in natural language are difficult to derived, and there may also be defects due to ambiguity and inaccuracy. To address these issues, we propose a requirement specification method using a standardized Boilerplate and a GSN Model. The Boilerplate is a semi-standard language that follows a predefined format. Due to its ability to provide a consistent representation of the requirements, boilerplate helps stakeholders avoid ambiguities about what they mean and to define the exact meaning of the requirement. Meanwhile, GSN is recognized notation to prepare a Safety Case to prove to authorities that a system is safe. It can be expressed as a functional goal, e.g., Safety Evidence, etc. The proposed study allows an analyst to easily identify a fault from the early stage of the software development lifecycle. The Boilerplate and GSN Model are designed to specify the requirements of safety critical systems and to prove safety conformity through a connection with Safety Evidence. In addition, the proposed approach is also useful to develop secure software by correcting deficiencies in the requirements found during this process.