• Title/Summary/Keyword: 프로그래밍 방법

Search Result 1,138, Processing Time 0.032 seconds

A Study on the Effectiveness of AI-based Learner-led Assessment in Elementary Software Education (초등 소프트웨어 교육에서 AI기반의 학습자 주도 평가의 효과성 고찰)

  • Shin, Heenam;Ahn, Sung Hun
    • Journal of Creative Information Culture
    • /
    • v.7 no.3
    • /
    • pp.177-185
    • /
    • 2021
  • In future education, the paradigm of education is changing due to changes in learner-led and assessment methods. In addition, AI-based learning infrastructure and software education are increasingly needed. Thus, this study aims to examine the effectiveness of AI-based evaluation in future education by combining it with learner-led assessment. Using AI education and evaluation literature and Step 7 of the Learner-Driven Software Assessment Method, we sought to extract evaluation elements tailored to elementary school level in conjunction with the 2015 revised elementary practical course content elements, software understanding, procedural problem solving, and structural evaluation elements. In the future, we will develop a grading system that applies AI-based learner-led evaluation elements in software education and continuously demonstrate its effectiveness, and help the school site prepare for future education independently through AI-based learner-led assessment in software education.

Prediction of Material's Formation Energy Using Crystal Graph Convolutional Neural Network (결정그래프 합성곱 인공신경망을 통한 소재의 생성 에너지 예측)

  • Lee, Hyun-Gi;Seo, Dong-Hwa
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.35 no.2
    • /
    • pp.134-142
    • /
    • 2022
  • As industry and technology go through advancement, it is hard to search new materials which satisfy various standards through conventional trial-and-error based research methods. Crystal Graph Convolutional Neural Network(CGCNN) is a neural network which uses material's features as train data, and predicts the material properties(formation energy, bandgap, etc.) much faster than first-principles calculation. This report introduces how to train the CGCNN model which predicts the formation energy using open database. It is anticipated that with a simple programming skill, readers could construct a model using their data and purpose. Developing machine learning model for materials science is going to help researchers who should explore large chemical and structural space to discover materials efficiently.

A Case Study of Educational Effectiveness by Software Subjects for Humanities College Students

  • Seo, Joo-Young;Shin, Seung-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.267-277
    • /
    • 2022
  • Recently, the topics of SW liberal-arts education are diversifying, from 'Computational Thinking(CT)' to 'Programming, Data Analysis and Artificial Intelligence(AI)' in universities. We expect that the diversification of SW liberal-arts subjects does not just mean that the learning contents are different, but also differentiates the educational goals and educational effects of each subject. In this paper, we conducted a case study to analyze the educational effect according to the educational goals of two SW liberal-arts subjects, CT and Data Analysis Fundamentals(DA), for humanities college students. We confirmed that the educational effect of 'CT Efficacy' increased significantly in accordance with the common educational goal of 'Improving CT-based SW convergence competency' in both subjects. However, we also analyzed the difference in the educational effects of 'CT(the goal of basic SW education)' and 'DA(the goal of major-friendly SW education)', which have different subject goals. 'CT' mainly showed an educational effect on how to solve general daily problems, and 'DA' showed confidence in how to solve major problems along with general problems.

Study on Course-Embedded Learning Achievement Evaluation and Adaptive Feedback (교과기반 학습성취 평가 및 적응형 피드백 시스템 설계)

  • Chung, Hyun-Sook;Kim, Jung-Min
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.553-560
    • /
    • 2022
  • The research of course-embedded learning evaluation method, which can be used to measure the competency of learners by evaluation of learning outcomes, has been performed for competency-based education in the university. In this paper, we propose an learning evaluation and adaptive feedback model based on learning outcomes, learning subjects, learning concepts graph, and an evaluation matrix. Firstly, we define the layered learning outcomes, a graph of learning subjects and concepts, and two association matric. Secondly, we define algorithms to calculate the level of learning achievement and the learning feedback to learners. We applied the proposed method to a specific course, "Java Programing", to validate the effectiveness of our method. The experimental results show that our proposed method can be useful to measure the learning achievement of learners and provide adaptive feedbacks to them.

Development and application of supervised learning-centered machine learning education program using micro:bit (마이크로비트를 활용한 지도학습 중심의 머신러닝 교육 프로그램의 개발과 적용)

  • Lee, Hyunguk;Yoo, Inhwan
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.995-1003
    • /
    • 2021
  • As the need for artificial intelligence (AI) education, which will become the core of the upcoming intelligent information society rises, the national level is also focusing attention by including artificial intelligence-related content in the curriculum. In this study, the PASPA education program was presented to enhance students' creative problem-solving ability in the process of solving problems in daily life through supervised machine learning. And Micro:bit, a physical computing tool, was used to enhance the learning effect. The teaching and learning process applied to the PASPA education program consists of five steps: Problem Recoginition, Argument, Setting data standard, Programming, Application and evaluation. As a result of applying this educational program to students, it was confirmed that the creative problem-solving ability improved, and it was confirmed that there was a significant difference in knowledge and thinking in specific areas and critical and logical thinking in detailed areas.

Social perception of the Arduino lecture as seen in big data (빅데이터 분석을 통한 아두이노 강의에 대한 사회적 인식)

  • Lee, Eunsang
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.935-945
    • /
    • 2021
  • The purpose of this study is to analyze the social perception of Arduino lecture using big data analysis method. For this purpose, data from January 2012 to May 2021 were collected using the Textom website as a keyword searched for 'arduino + lecture' in blogs, cafes, and news channels of NAVER website. The collected data was refined using the Textom website, and text mining analysis and semantic network analysis were performed by opening the Textom website, Ucinet 6, and Netdraw programs. As a result of text mining analysis such as frequency analysis, TF-IDF analysis, and degree centrality it was confirmed that 'education' and 'coding' were the top keywords. As a result of CONCOR analysis for semantic network analysis, four clusters can be identified: 'Arduino-related education', 'Physical computing-related lecture', 'Arduino special lecture', and 'GUI programming'. Through this study, it was possible to confirm various meaningful social perceptions of the general public in relation to Arduino lecture on the Internet. The results of this study will be used as data that provides meaningful implications for instructors preparing for Arduino lectures, researchers studying the subject, and policy makers who establish software education or coding education and related policies.

Automation Review of Road Design Standard using Visual Programming (비주얼 프로그래밍 기법을 활용한 도로설계기준 자동검토 방안)

  • Hyoun-seok Moon;Hyeoun-seung Kim
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.891-898
    • /
    • 2022
  • Purpose: There is not much time left for mandatory BIM implementation for all sectors and stages of the construction industry. Therefore, it is necessary to find a way to secure technology to substantially improve the productivity of BIM work. In the research, we proposed a method to automatically verify related construction standards for major objects produced by BIM modeling procedures so that engineers can verify construction standards in the BIM-based design process. Method: We defined a modeling work procedure for BIM-based road design work and prepared a method for constructing related design standards in a database. In addition, a process map for developing a BIM-based design basis review automation system was also presented. Result: A BIM-based design standard review automation module was developed using Civil3D and Dynamo. And it was confirmed by the test application that it is possible to quickly judge whether the BIM object manufactured in the design process conforms to the construction design standard. Conclusion: BIM-based design standard review automation technology can improve the productivity of BIM model production work and secure the quality of the BIM model.

Mobile Office Construction on a Geotechnical Information System (지반정보시스템 기반의 Mobile Office 구축)

  • Kim, Su-Young;Jung, Seung-Hyun;Kang, Yu-Jin;Cho, Wan-Sup
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.125-135
    • /
    • 2010
  • Mobile office is becoming common as advances in mobile devices such as PDAs, Smart-phones, or wireless Internet. In this paper, we construct a mobile office environment on a geotechnical information system(GIS). Especially, web services and XML technology combined with SOA (service oriented services) are adopted for various types of mobile devices and services in a minimum cost. Web service and XML can provide an excellent SW reusability, extensibility, and interoperability even for heterogeneous distributed systems. Applications can exploit web services by just knowing server's address. Prototype system integrates a client in Visual Basic.Net and server in Java via the web services and XML data exchange. We verify effectiveness of the approach through the implementation of prototype system.

ECPS: Efficient Cloud Processing Scheme for Massive Contents (클라우드 환경에서 대규모 콘텐츠를 위한 효율적인 자원처리 기법)

  • Na, Moon-Sung;Kim, Seung-Hoon;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.17-27
    • /
    • 2010
  • Major IT vendors expect that cloud computing technology makes it possible to reduce the contents service cycle, speed up application deployment and skip the installation process, reducing operational costs, proactive management etc. However, cloud computing environment for massive content service solutions requires high-performance data processing to reduce the time of data processing and analysis. In this study, Efficient_Cloud_Processing_Scheme(ECPS) is proposed for allocation of resources for massive content services. For high-performance services, optimized resource allocation plan is presented using MapReduce programming techniques and association rules that is used to detect hidden patterns in data mining, based on levels of Hadoop platform(Infrastructure as a service). The proposed ECPS has brought more than 20% improvement in performance and speed compared to the traditional methods.

Clip Toaster : Pastejacking Attack Detection and Response Technique (클립 토스터 : 페이스트재킹 공격 탐지 및 대응 기술)

  • Lee, Eun-young;Kil, Ye-Seul;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.192-194
    • /
    • 2022
  • This paper analyzes the attack method of pastejacking and proposes a clip toaster that can effectively defend it. When programming, developers often copy and paste code from GitHub, Stack Overflow, or blogs. Pastejacking is an attack that injects malicious data into the clipboard when a user copies code posted on the web, resulting in security threats by executing malicious commands that the user does not intend or by inserting dangerous code snippets into the software. In this paper, we propose clip toaster to visualize and alertusers of threats to defend pastejacking that threatens the security of the developer's terminal and program code. Clip Toaster can visualize security threat notifications and effectively detect and respond to attacks without interfering with user actions.

  • PDF