• Title/Summary/Keyword: Problem-posing activity

Search Result 26, Processing Time 0.019 seconds

A Study on the System for measuring the Activity of Honeybees inside and outside the Beehive

  • Kim, Joon Ho;Han, Wook;Chung, Wonki;Mo, Changyeon;Han, Xiongzhe;Kim, Subae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.511-517
    • /
    • 2022
  • Recently, due to rapid climate change, the population of honey bees has decreased, posing a great threat to the existence of the Earth's ecosystem. In particular, the colony collapse phenomenon in which bees disappeared nationwide in early 2022 had devastating consequences for beekeepers. In order to solve the problems of beekeeping due to climate change, it is urgent to develop a system that can monitor the situation inside the hive through various IoT sensors. This paper develops a system that can measure the activity of bees inside the hive and uses it to measure the number of times of entry and exit of the hive. The data measured by the developed system can be monitored in real time on a smartphone through the cloud server. The system developed in this paper can monitor the ecology of bees according to climate change and measure internal and external bee activities. Using this method, it is possible to check in advance for the colony collapse phenomenon in which bees disappeared in early 2022. This is very meaningful in that it presents an alternative that can identify the cause of the problem through early detection.

A Comparison of Students' Reasoning Shown in Solving Open-Ended and Multiple-Choice Problems (개방형 문제와 선택형 문제 해결에 나타난 학생의 추론 비교)

  • Lee, Myoung Hwa;Kim, Sun Hee
    • School Mathematics
    • /
    • v.19 no.1
    • /
    • pp.153-170
    • /
    • 2017
  • This study conducted an analysis of types of reasoning shown in students' solving a problem and processes of students' reasoning according to type of problem by posing an open-ended problem where students' reasoning activity is expected to be vigorous and a multiple-choice problem with which students are familiar. And it examined teacher's role of promoting the reasoning in solving an open-ended problem. Students showed more various types of reasoning in solving an open-ended problem compared with multiple-choice problem, and showed a process of extending the reasoning as chains of reasoning are performed. Abduction, a type of students' probable reasoning, was active in the open-ended problem, accordingly teacher played a role of encouragement, prompt and guidance. Teachers posed a problem after varying it from previous problem type to open-ended problem in teaching and evaluation, and played a role of helping students' reasoning become more vigorous by proper questioning when students had difficulty reasoning.

Using the Cabri3D Program for Enhancing Problem Solving Ability (문제해결력 신장을 위한 Cabri3D의 교육적 활용)

  • Kim, Nam-Hee
    • Journal of Educational Research in Mathematics
    • /
    • v.16 no.4
    • /
    • pp.345-366
    • /
    • 2006
  • In this study, we investigated the methods of using the Cabri3D program for education of problem solving in school mathematics. Cabri3D is the program that can represent 3-dimensional figures and explore these in dynamic method. By using this program, we can see mathematical relations in space or mathematical properties in 3-dimensional figures vidually. We conducted classroom activity exploring Cabri3D with 15 pre-service leachers in 2006. In this process, we collected practical examples that can assist four stages of problem solving. Through the analysis of these examples, we concluded that Cabri3D is useful instrument to enhance problem solving ability and suggested it's educational usage as follows. In the stage of understanding the problem, it can be used to serve visual understanding and intuitive belief on the meaning of the problem, mathematical relations or properties in 3-dimensional figures. In the stage of devising a plan, it can be used to extend students's 2-dimensional thinking to 3-dimensional thinking by analogy. In the stage of carrying out the plan, it can be used to help the process to lead deductive thinking. In the stage of looking back at the work, it can be used to assist the process applying present work's result or method to another problem, checking the work, new problem posing.

  • PDF

Development and Application of a Science Camp Program for Gifted Elementary School Students (초등과학 영재 캠프 프로그램의 개발 및 적용)

  • Kwon, Chi-Soon;Kim, Jae-Young;Kim, Nam-Il;Lim, Chae-Seong;Jhun, Young-Seok
    • Journal of Korean Elementary Science Education
    • /
    • v.25 no.spc5
    • /
    • pp.522-531
    • /
    • 2007
  • A Science Camp Program was developed and applied as an intensified course for gifted students. The implications for the development and implementation of out-of-school science activities were also deduced through the analysis of the preliminary application results. The key point of the science camp program is to boost students' science inquiry skills through self-directed activities. Several positive effects in terms of interest and participation in the program were observed and some implications were derived as follows; (1) The program should provide the students with more opportunities for discussion and debate in group activities. (2) The tasks need be divided into two parts; basic tasks and optional tasks in order to ensure that the students engage in fewer tasks more intensively. (3) Each activity needs sufficient orientation taking consideration of the possibility that not all students may be ready for the inquiry. (4) The use of real examples of scientific research processes can help the students develop open inquiry skills and problem posing skills.

  • PDF

Analysis of the Effect of the Havruta Method in Engineering Education (공학교육에서 하브루타 수업방식의 효과 분석)

  • Eom, Mi Ri;Lee, Young In
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.1
    • /
    • pp.149-157
    • /
    • 2020
  • This study aimed to explore the change of engineering students' competencies through the havruta class. In the havruta class, engineering students' competencies were compared with pre-test and post-test. The research tool was developed by selecting learning readiness, academic self-efficacy, and communication ability as the learner's competence in the havruta class. Finally, 105 data were analyzed with SPSS 21.0 for windows. First, there was a statistically significant difference in learning readiness. Second, there was no statistically significant difference in academic self-efficacy. Third, there was a statistically significant difference in communication ability. It was found that there was a positive change of competencies in learning readiness ability and communication ability in the havruta class. Although the findings are difficult to generalize to all majors, these results will be a useful basis for instructors who want to apply the havruta class.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF