• Title/Summary/Keyword: Computer Instruction Method

Search Result 181, Processing Time 0.027 seconds

Requirements Analysis for an Adaptive Courseware (적응형 코스웨어를 위한 요구 분석)

  • Lee, Jae-Mu
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.2
    • /
    • pp.173-180
    • /
    • 2012
  • This study looks for the requirements for adaptive courseware and provides background for developing effective adaptive courseware. Most adaptive courseware does not adequately reflect the requirements of learners. If it properly reflected learners' requirements well, it could be used more effectively. therefore, this study analyzes and suggests the requirements of an adaptive courseware for pre-service teachers who are majoring in computer education. The study methods were factor analysis and frequency analysis through survey. The results show that the important elements of an adaptive courseware are a learning style designed according to individual differences as well as an instruction model appropriate to the subject domain. The study examined adaption by learner level, by learning objective, by learning style, by method of learning content, and by learning history in that order. Therefore while the most of adaptive courseware support learning style; we propose that the adaptive courseware will support learning objects and instruction model as well.

  • PDF

The Effects of Learning Activities on the Application of Augmented Reality Contents in Elementary Science Instruction (초등학교 과학수업에서 AR 콘텐츠 활용이 학습 활동에 미치는 효과)

  • Kim, Kyung-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.75-85
    • /
    • 2009
  • This study compared the differences between a group that studied with AR contents and a group that studied in a traditional method to examine the effects of AR contents use in elementary school science classes. The effects in four areas of studying were examined : study focus rate, study activities consuming variables, study participation activeness and instructional climate. As a result, there was no significant difference in study concentration rate between the AR and traditional groups. For study participation activeness, the AR group had higher participation actions, but there was no difference between the groups for language participation. For study activities consuming variables, the AR group stimulated more diverse study activities than the traditional group. For instruction climate, the AR contents group contributed more to creating a positive climate compared to the traditional group. Therefore, the results showed that application of AR contents on science classes would stimulate active participation of students and various study activities and help create a positive instructional climate.

  • PDF

The Development of Blended-Learning Teaching Model for Effective Operating Extra-Curriculum in ACHS (방송고 특별활동의 효과적인 운영을 위한 Blended-Learning 수업 모형 개발)

  • Kim, Mee-Yong;Jeong, Young-Sik;Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.12 no.5
    • /
    • pp.49-62
    • /
    • 2009
  • The Extra-Curriculum in The Air and Correspondence High School(ACHS), which play a role as an organization of lifelong learning, has not been operating properly for lack of appropriate circumstances and also educational research. So this research applied the Extra-Curriculum on-line contents to ACHS as an example to search for the effective operation solution in ACHS Extra-Curriculum, and derived the implications which are necessary to class operation. According to the implications which are obtained by the analysis of the application result, selected the five main areas in Blended-Learning which are necessary to the operation of ACHS Extra-Curriculum, and developed the direct instruction model by blending the teaching-learning method and strategy which is suitable for the ACHS Extra-Curriculum. Finally, based on these research results, this research developed the Blended-Learning Teaching Model for ACHS Extra-Curriculum by reflecting the peculiarity of ACHS student and characteristics of Extra-Curriculum contents.

  • PDF

Development and Implementation of a Self-directed Critical Care Nursing e-Learning Program (자기주도형 중환자간호 이러닝 프로그램 개발 및 적용)

  • Kim, Keum Soon;Kim, Jin-A;Ahn, Jung Won
    • Perspectives in Nursing Science
    • /
    • v.9 no.1
    • /
    • pp.51-60
    • /
    • 2012
  • Purpose: The purpose of this study was to develop a self-directed e-learning program for ICU nurses and to evaluate how the proposed e-learning program affects the level of knowledge, nursing performance and job satisfaction of ICU nurses. Methods: The e-learning program was developed with the Computer Assisted Instruction Design Model using sources of self-efficacy which included the inactive attainment, vicarious experience, and verbal persuasion of ICU nurses. The program was evaluated by experts. Following the revision of the program, it was applied to a total of 59 ICU nurses (experimental group n=29, control group n=30) from three hospitals. Four weeks later, we measured the level of knowledge, nursing performance and job satisfaction. Results: The level of knowledge significantly improved in the experimental group (t=5.691, p<.001). Moreover, the level of nursing performance significantly increased in the areas of circulatory diagnostic test (t=2.143, p=.039), EKG (t=2.911, p=.006), aortic balloon pump (t=2.491, p=.017), and nebulizer therapy (t=2.085, p=.044). Overall, job satisfaction did not significantly increase (t=1.664, p=.105); however, job satisfaction in terms of relationships with coworkers (t=2.371, p=.023) and the needs of nursing performance (t=2.940, p=.006) were significantly increased. Conclusion: The results showed that the proposed e-learning program using sources of self-efficacy from ICU nurses was an effective learning method to increase the level of knowledge and nursing performance. The propose de-learning program would be a useful teaching tool for ICU nurses improving the quality of ICU patient care.

  • PDF

A Comparative Study of Strength and Weakness of the Face-to-Face Instruction and WBI in IT Instruction (IT교육과정에서 면대면방식과 WBI방식의 장.단점 분석 및 개선점 연구 -IT업계 종사자를 대상으로-)

  • Lee Soo-Bok;Kim Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.813-816
    • /
    • 2006
  • Today us the creation of knowledge and find, accumulation and use ability is living in the knowledge base society where the base of social advancement becomes. The social members as sleep and the production where is not the consumer of knowledge, own lead whole life studying as they sleep and, they are soft and an open accident, must equip the hazard which gets information and the knowledge which are new the whole life must endeavor. From the hazard which is adapted to like this social change the education for a technical find was necessary absolutely, the education against an updated technology became essential element from the If field which changes soddenly specially. From the dissertation which it sees if in the object facing each other from IT curriculum analyzes the merit and demerit of method and the WBI and against the hereafter developmental subject for an efficient education to sleep it researches the IT industry worker and it does.

  • PDF

A Translator of MUSS-80 for CYBER-72l

  • 이용태;이은구
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.1 no.1
    • /
    • pp.23-35
    • /
    • 1983
  • In its global meaning language translation refers to the process whereby a program which is executable in one computer can be executed in another computer directly to obtain the same result. There are four different ways of approaching translation. The first way is translation by a Translator or a Compier, the second way is Interpretation, the third way is Simulation, the last way is Emulation. This paper introduces the M-C Translator which was designed as the first way of translation. The MUSS 80 language (the subsystem of the UNIVAC Solid State 80 S-4 assembly language system) was chosen as the source language which includes forty-three instructions, using the CYBER COMPASS as the object language. The M-C translator is a two pass translator and is a two pas translator and es written in Fortran Extended language. For this M-C Translation, seven COMPASS subroutines and a set of thirty-five macros were prepared. Each executable source instruction corresponds to a macro, so it will be a macro instruction within the object profram. Subroutines are used to retain and handle the source data representation the same way in the object program as in the source system, and are used to convert the decimal source data into the equivalent binary result into the equivalent USS-80digits before and after arithmetic operations. The source instructions can be classified into three categories. First, therd are some instructions which are meaningless in the object system and are therefore unnecessary to translate, and the remaining instructions should be translated. Second, There are some instructions are required to indicate dual address portions. Third, there are Three instructions which have overflow conditions, which are lacking in the remaining instructions. The construction and functions of the M-C Translator, are explained including some of the subroutines, and macros. The problems, difficulties and the method of solving them, and easier features on this translation are analysed. The study of how to save memory and time will be continued.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

A design of a floating point unit with 3 stages for a 3D graphics shader engine

  • Lee, Kwang-Yeob
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.358-363
    • /
    • 2007
  • This paper presents a floating point unit(FPU) with 3 stages for a 3D graphics shader engine. It targeted to accelerate 3D graphics in portable device environments. In order to design a balanced architecture for a shader engine, we analyzed shader assembly instructions and estimated the performance of FPU with the method we propose. The proposed unit handles 4-dimensional data through separated two paths that are lead to general operation module and special function module. The proposed FPU is compiled as a form of the cascade FPU with 3 stages to efficiently handle a matrix operation with relatively low hardware overhead. Except some complex instructions that are executed using macro instructions, all instructions complete an operation in a single instruction cycle at 100MHz frequency. A special function module performs all operations in a single clock cycle using the Newton Raphson method with the look-up table.

  • PDF

Fuzzy Rule Based Multimedia Information Data Acquisition Method

  • Oh, Kab-Suk;Hirota, Kaoru;Pedrycz, Witold
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.252-257
    • /
    • 1998
  • A method of multimedia information data acquisition based on fuzzy rules is proposed, where the multimedia means the five senses of a human being. Observed information is characterized by VAGOT(visual, acoustic, gustatory, olfactory and tactile) time series data and the goal is to extract an appropriate subset of the VAGOT data based on a given instruction. Fuzzy rules based on visual and acoustic information are used to identify the appropriate time interval on the fireworks multimedia information.

  • PDF

Simplified teaching of a playback-type industrial robot using ultrasonic devices

  • Ishimatsu, T.;Araki, T.;Akizuki, K.;Kumon, K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1987.10a
    • /
    • pp.926-931
    • /
    • 1987
  • The present study is devoted to the development of a simplified teaching method whereby the control data of the 3-dimensional operations of a playback-type trial robot can be stored in a personal computer. The control data of the 3-dimensional operations are given using an instruction wand handled by an operator. The operator's task is only to track a desired robot path with the wand. The 3-dimensional position of the wand are measured by ultrasonic devices, the principle of which was developed for this study and is introduced in detail. In order to clarify the applicability of this method, experts were performed with respect to a continuous-path teaching and a pick-and-place task teaching which are typical jobs of robot operators.

  • PDF