• Title/Summary/Keyword: Flow Control Instruction

Search Result 31, Processing Time 0.026 seconds

The Effects of Sharing Nature Learning Program in Elementary Science Class - Focused the Plants Units of the 4th Grade (초등과학 수업에서 자연 나눔 학습 방법의 적용 효과 - 4학년 식물 단원을 중심으로-)

  • Choi, Sun-Young;Kim, Hye-Ran
    • Journal of Korean Elementary Science Education
    • /
    • v.30 no.1
    • /
    • pp.83-92
    • /
    • 2011
  • The purpose of this study was to develop the learning program using sharing nature that can be utilized in Korean elementary science classes and explore the its effects of science academic achievement, inquiry ability, scientific attitude of students after applying it. Sharing Nature used a playful and inspirational teaching strategy and was named after Flow Learning based on universal principles of how people learn. To examine the effects of Sharing Nature Learning Program this learning materials were applied to elementary science curriculum, and an experimental group and a control group were selected from 4th graders at a elementary school located in Icheon City, Gyeong-gi province. The results of this study found significant difference in the student's enhancement of the science academic achievement, inquiry ability, scientific attitude. In conclusion, Sharing Nature Learning Program is useful to develop the elementary school student's science academic achievement, inquiry ability, scientific attitude and had better be widely applied to science education.

WWW Based Instruction Systems for English Learning: GAIA

  • Park, Phan-Woo
    • Journal of The Korean Association of Information Education
    • /
    • v.3 no.2
    • /
    • pp.113-119
    • /
    • 2000
  • I studied a distance education model for English learning on the Internet. Basic WWW files, that contain courseware, are constructed with HTML, and functions, which are required in learning, are implemented with Java. Students and educators can access the preferred unit composed of the appropriate text, voice and image data by using a WWW browser at any time. The education system supports the automatic generation facility of English problems to practice reading and writing by making good use of the courseware data or various English text resources located on the Internet. Our system has functions to manage and control the flow of distance learning and to offer interaction between students and the system in a distributed environment. Educators can manage students' learning and can immediately be aware of who is attending and who is quitting the lesson in virtual space. Also, students and educators in different places can communicate and discuss a topic through the server. I implemented these functions, which are required in a client/server environment of distance education, with the use of Java. The URL for this system is "http://park.taegu-e.ac.kr" in the name of GAIA.

  • PDF

EST for Analysis of Flow Control Language (흐름 제어 언어의 통합분석을 위한 확장 ST)

  • Jeong, Eun-Young;Kim, Sun-Ju;Kim, Tae-Wan;Chang, Chun-Hyon;Kim, Moon-Hea
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.1013-1016
    • /
    • 2002
  • 제어 시스템에 사용되는 흐름 제어 언어로는 IL(Instruction List), ST(Structured Text), FBD(Function Block Diagram), SFC(Sequential Function Chart), LD (Ladder Diagram)가 있다. 일반적으로 제어 시스템에 탑재하여 사용하는 언어는 상기 언어 중 두 종류 이하의 특정 언어로 제한되어 있다. 이러한 제약을 보완하기 위해, 모든 흐름 제어 언어를 통합 분석할 수 있는 통합 분석기가 필요하다. 본 논문에서는 흐름 제어 언어의 통합 분석 처리가 가능하도록 그래픽 표현의 FBD 를 문자 표현의 EST(Extended Structured Text)로 변형하는 규칙과 문자 표현의 EST 를 IL 로 변형하는 규칙을 제시한다. 언어간의 변형 과정에서 FBD 를 ST 로 표현할 수 없는 부분을 EST 로 정의한다. 또한 본 논문에서 제안된 EST 를 기반으로 통합 분석기의 구조를 제시한다.

  • PDF

The Effects of Academic Self-Efficacy of Beauty Specialized High School Students On Learning Flow (미용특성화고등학교 학생들의 학업적 자기효능감이 학습몰입에 미치는 영향)

  • Kang, Eun-Ju
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.170-175
    • /
    • 2019
  • This study aimed to analyse the effects of academic self-efficacy of beauty specialized high school students on learning flow and provide basic data needed for their learning instruction. For the purpose, this study surveyed 327 students of beauty specialized high schools located in B metropolitan city and N city. The responses were analysed with the use of the SPSS WIN 21.0. The results are presented as follows: Academic self-efficacy had a significant effect on learning flow and in particular, self-control efficacy and task difficulty preference were important factors. Based on the results above, it is suggested that teachers should present data that is properly converged by techniques and academic knowledge according to levels and steps so that students can have experiences of academic achievements and be encouraged to have higher self-efficiency.

Cross-architecture Binary Function Similarity Detection based on Composite Feature Model

  • Xiaonan Li;Guimin Zhang;Qingbao Li;Ping Zhang;Zhifeng Chen;Jinjin Liu;Shudan Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.8
    • /
    • pp.2101-2123
    • /
    • 2023
  • Recent studies have shown that the neural network-based binary code similarity detection technology performs well in vulnerability mining, plagiarism detection, and malicious code analysis. However, existing cross-architecture methods still suffer from insufficient feature characterization and low discrimination accuracy. To address these issues, this paper proposes a cross-architecture binary function similarity detection method based on composite feature model (SDCFM). Firstly, the binary function is converted into vector representation according to the proposed composite feature model, which is composed of instruction statistical features, control flow graph structural features, and application program interface calling behavioral features. Then, the composite features are embedded by the proposed hierarchical embedding network based on a graph neural network. In which, the block-level features and the function-level features are processed separately and finally fused into the embedding. In addition, to make the trained model more accurate and stable, our method utilizes the embeddings of predecessor nodes to modify the node embedding in the iterative updating process of the graph neural network. To assess the effectiveness of composite feature model, we contrast SDCFM with the state of art method on benchmark datasets. The experimental results show that SDCFM has good performance both on the area under the curve in the binary function similarity detection task and the vulnerable candidate function ranking in vulnerability search task.

Motor Imagery based Brain-Computer Interface for Cerebellar Ataxia (소뇌 운동실조 이상 환자를 위한 운동상상 기반의 뇌-컴퓨터 인터페이스)

  • Choi, Young-Seok;Shin, Hyun-Chool;Ying, Sarah H.;Newman, Geoffrey I.;Thakor, Nitish
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.609-614
    • /
    • 2014
  • Cerebellar ataxia is a steadily progressive neurodegenerative disease associated with loss of motor control, leaving patients unable to walk, talk, or perform activities of daily living. Direct motor instruction in cerebella ataxia patients has limited effectiveness, presumably because an inappropriate closed-loop cerebellar response to the inevitable observed error confounds motor learning mechanisms. Recent studies have validated the age-old technique of employing motor imagery training (mental rehearsal of a movement) to boost motor performance in athletes, much as a champion downhill skier visualizes the course prior to embarking on a run. Could the use of EEG based BCI provide advanced biofeedback to improve motor imagery and provide a "backdoor" to improving motor performance in ataxia patients? In order to determine the feasibility of using EEG-based BCI control in this population, we compare the ability to modulate mu-band power (8-12 Hz) by performing a cued motor imagery task in an ataxia patient and healthy control.

Analyzing Differences of Binary Executable Files using Program Structure and Constant Values (프로그램의 구조와 상수 값을 이용하는 바이너리 실행 파일의 차이점 분석)

  • Park, Hee-Wan;Choi, Seok-Woo;Seo, Sun-Ae;Han, Tai-Sook
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.7
    • /
    • pp.452-461
    • /
    • 2008
  • Binary diffing is a method to find differences in similar binary executables such as two different versions of security patches. Previous diffing methods using flow information can detect control flow changes, but they cannot track constant value changes. Biffing methods using assembly instructions can detect constant value changes, but they give false positives which are due to compiling methods such as instruction reordering. We present a binary diffing method and its implementation named SCV which utilizes both structure and value information. SCV summarizes structure and constant value information from disassembled code, and matches the summaries to find differences. By analyzing a Microsoft Windows security patches, we showed that SCV found necessary differences caused by constant value changes which the state-of-the-art binary diffing tool BinDiff failed to find.

Hiding Shellcode in the 24Bit BMP Image (24Bit BMP 이미지를 이용한 쉘코드 은닉 기법)

  • Kum, Young-Jun;Choi, Hwa-Jae;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.691-705
    • /
    • 2012
  • Buffer overflow vulnerability is the most representative one that an attack method and its countermeasure is frequently developed and changed. This vulnerability is still one of the most critical threat since it was firstly introduced in middle of 1990s. Shellcode is a machine code which can be used in buffer overflow attack. Attackers make the shellcode for their own purposes and insert it into target host's memory space, then manipulate EIP(Extended Instruction Pointer) to intercept control flow of the target host system. Therefore, a lot of research to defend have been studied, and attackers also have done many research to bypass security measures designed for the shellcode defense. In this paper, we investigate shellcode defense and attack techniques briefly and we propose our new methodology which can hide shellcode in the 24bit BMP image. With this proposed technique, we can easily hide any shellcode executable and we can bypass the current detection and prevention techniques.

Static Timing Analysis Tool for ARM-based Embedded Software (ARM용 내장형 소프트웨어의 정적인 수행시간 분석 도구)

  • Hwang Yo-Seop;Ahn Seong-Yong;Shim Jea-Hong;Lee Jeong-A
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.15-25
    • /
    • 2005
  • Embedded systems have a set of tasks to execute. These tasks can be implemented either on application specific hardware or as software running on a specific processor. The design of an embedded system involves the selection of hardware software resources, Partition of tasks into hardware and software, and performance evaluation. An accurate estimation of execution time for extreme cases (best and worst case) is important for hardware/software codesign. A tighter estimation of the execution time bound nay allow the use of a slower processor to execute the code and may help lower the system cost. In this paper, we consider an ARM-based embedded system and developed a tool to estimate the tight boundary of execution time of a task with loop bounds and any additional program path information. The tool we developed is based on an exiting timing analysis tool named 'Cinderella' which currently supports i960 and m68k architectures. We add a module to handle ARM ELF object file, which extracts control flow and debugging information, and a module to handle ARM instruction set so that the new tool can support ARM processor. We validate the tool by comparing the estimated bound of execution time with the run-time execution time measured by ARMulator for a selected bechmark programs.

Development of Hospice Oriented Medical Record (HOMR) for Cancer Patients (호스피스 암 환자를 위한 의무기록지의 개발)

  • Seng, Jeong-Won;Hong, Sung-Moon;Kim, Si-Wan;Kim, Jeong-A;Park, Joon-Chul;Kim, Su-Hyun;Seo, Min-Jeong;Her, Sin-Hoe;Kim, Hye-Won;Hong, Myung-Ho;Choi, Youn-Seon
    • Journal of Hospice and Palliative Care
    • /
    • v.7 no.1
    • /
    • pp.49-63
    • /
    • 2004
  • Purpose: The Hospice Oriented Medical Record (HOMR) was developed for assessing the pain and symptoms of terminal cancer patients. Methods and Results: The HOMR consists of an instruction for users and 2 assessment pages which include the graph showing vital signs (temperature, blood pressure, pulse, respiration rate and pain score), current problem lists, performance status, laboratory data, pain characteristics and management, sedation score, associated symptoms and drug side effects, etc. Pilot study was performed in the inpatient Hospice Care Unit in Guro Hospital, Korea University Medical Center. Because an one-week progress data was recorded in HOMR as a flow sheet, the patient's condition and pain control status could be seen at a glance. Conclusion: The HOMR is useful for assessing the terminal cancer patients because it is simple and convenient to use. Further research is needed before it can be universally used in the clinical settings.

  • PDF