• Title/Summary/Keyword: Tactics

Search Result 377, Processing Time 0.031 seconds

Design of Computational Thinking Instruction Based on ARCS Model in Liberal Arts Education (교양교육에서 ARCS 모형 기반의 컴퓨팅 사고력 수업 설계)

  • Jun, Soo-jin;Shin, Chwa-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.90-93
    • /
    • 2019
  • Recently, as SW education has been emphasized in college, interest in Computing Thinking (CT) class at the liberal level has increased. In order to effectively educate students, various methods of teaching and learning are required to reduce the burden on CT education and motivation of students. The purpose of this study is to design teaching and learning using ARCS model to improve learners' learning motivation and learning achievement in CT course as liberal arts education. In this study, the learning elements of CT were selected based on previous research on the characteristics of education in the liberal arts education of the university and analysis of the CT content. In addition, Keller 's ARCS learning motive model was selected to match the instructional tactics according to the motivational factors of Attention, Relevance, Confidence, and Satisfaction. In order to effectively teach these CT contents, detailed strategies based on the ARCS model were designed and presented weekly.

  • PDF

Process Evaluation of a Mobile Weight Loss Intervention for Truck Drivers

  • Wipfli, Brad;Hanson, Ginger;Anger, Kent;Elliot, Diane L.;Bodner, Todd;Stevens, Victor;Olson, Ryan
    • Safety and Health at Work
    • /
    • v.10 no.1
    • /
    • pp.95-102
    • /
    • 2019
  • Background: In a cluster-randomized trial, the Safety and Health Involvement For Truck drivers intervention produced statistically significant and medically meaningful weight loss at 6 months (-3.31 kg between-group difference). The current manuscript evaluates the relative impact of intervention components on study outcomes among participants in the intervention condition who reported for a post-intervention health assessment (n = 134) to encourage the adoption of effective tactics and inform future replications, tailoring, and enhancements. Methods: The Safety and Health Involvement For Truck drivers intervention was implemented in a Web-based computer and smartphone-accessible format and included a group weight loss competition and body weight and behavioral self-monitoring with feedback, computer-based training, and motivational interviewing. Indices were calculated to reflect engagement patterns for these components, and generalized linear models quantified predictive relationships between participation in intervention components and outcomes. Results: Participants who completed the full program-defined dose of the intervention had significantly greater weight loss than those who did not. Behavioral self-monitoring, computer-based training, and health coaching were significant predictors of dietary changes, whereas behavioral and body weight self-monitoring was the only significant predictor of changes in physical activity. Behavioral and body weight self-monitoring was the strongest predictor of weight loss. Conclusion: Web-based self-monitoring of body weight and health behaviors was a particularly impactful tactic in our mobile health intervention. Findings advance the science of behavior change in mobile health intervention delivery and inform the development of health programs for dispersed populations.

Retelling Silence, Rewriting Experience: Production and Reproduction of Anne Askew's Examinations

  • Hwang, Su-kyung
    • English & American cultural studies
    • /
    • v.14 no.2
    • /
    • pp.311-336
    • /
    • 2014
  • The essay examines two different editions of Anne Askew's Examinations published in the sixteenth century: John Bale's the First Examination and the Latter Examination and John Foxe's Acts and Monuments, and argues that retelling and rewriting one's experience is the process of storytelling that necessitates the repetition and communication of the experience. The essay looks at the parts the sixteenth-century editors particularly rewrote or retold the original version, and discusses how Askew's story was retold, repeated, and communicated through various storytellers who delivered not only the original text but also the original experience toward larger audience. While attempting to interpret, analyze, and expand on the story she did not tell, or the story she could not tell, Bale and Foxe developed her personal and anecdotal story into a communal narrative to share. Bale wrote a weak woman's martyrology by adding his interpretation and analysis, showing the way for the readers to follow in understanding her enigmatic silence and gestures. On the other hand, Foxe made the story a more dramatic and more seamlessly flowing narrative of the heroic sacrifice of a martyr. Foxe filled the room left by Askew's silence with directly quoted conversations and the graphic that could help explain what was between the lines. Apart from the rewritings of the reformists, the essay focuses on the fact that the editing, rearranging, and reinterpreting process already started with Askew's own writing. Although Askew declares herself an objective recorder of the series of events, her writing is carefully constructed with complex ideological fractures and rhetorical tactics, and her experience is tailored to fit a particular purpose. Along with Bale's and Foxe's rewritings, Askew's story of a reading woman should be also read as an intentional and interpretative storytelling on her own experience.

Analysis on the Type and Characteristics of Penalty in World Judo (세계유도 반칙 유형 및 특성 분석)

  • Lee, Seung Hun;Lee, Man Gi
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.607-614
    • /
    • 2020
  • The purpose of this study is to analyze the penalty types and characteristics of world judo players. Using a total of 19,889 penalties in 9,737 matches at the World Judo Grand Prix, the team draws a difference in the types and time of fouls according to gender, weight class and time. Results Both foul play and warning showed gender differences, and both men and women affected warning rates in weight class and time classification. In addition, fouls caused by non-combat behavior and camouflage attacks have a forward direction of time, and a low time of fouling by heavyweight athletes. Judo athletes and leaders expect to be used as basic data based on scientific data, such as training, skills, tactics and motivation, taking into account the characteristics of the foul type. Requires follow-up studies of scoring relationships and winning factors.

New Obligations of Health Insurance Review and Assessment Service: Taking Full-fledged Action Against the COVID-19 Pandemic

  • Yoo, Seung Mi;Chung, Seol Hee;Jang, Won Mo;Kim, Kyoung Chang;Lee, Jin Yong;Kim, Sun Min
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.17-21
    • /
    • 2021
  • In 2020, the coronavirus disease 2019 (COVID-19) pandemic has caused unprecedented disruptions to global health systems. The Korea has taken full-fledged actions against this novel infectious disease, swiftly implementing a testing-tracing-treatment strategy. New obligations have therefore been given to the Health Insurance Review and Assessment Service (HIRA) to devote the utmost effort towards tackling this global health crisis. Thanks to the universal national health insurance and state-of-the-art information communications technology (ICT) of the Korea, HIRA has conducted far-reaching countermeasures to detect and treat cases early, prevent the spread of COVID-19, respond quickly to surging demand for the healthcare services, and translate evidence into policy. Three main factors have enabled HIRA to undertake pandemic control preemptively and systematically: nationwide data aggregated from all healthcare providers and patients, pre-existing ICT network systems, and real-time data exchanges. HIRA has maximized the use of data and pre-existing network systems to conduct rapid and responsive measures in a centralized way, both of which have been the most critical tactics and strategies used by the Korean healthcare system. In the face of new obligations, our promise is to strive for a more responsive and resilient health system during this prolonged crisis.

Preference of Apple Leaves of Three Cultivars, Fuji, Tsugaru and Hongro by Tetranychus urticae Koch and Its Life Table Analysis (점박이응애의 사과 품종(후지, 쓰가루, 홍로)에 대한 선호성과 생명표 분석)

  • Kim, Young-Il;Jung, Chuleui
    • Korean journal of applied entomology
    • /
    • v.60 no.1
    • /
    • pp.63-70
    • /
    • 2021
  • Two-spotted spider mite (TSSM), Tetranychus urticae Koch (Acari: Tetranychidae) is one of the major pests in apple orchards. TSSM was known to show different population dynamics depending on apple cultivars. We tested the host plant preference and fitness of TSSM on the leaves of 3 apple cultivars, Fuji, Tsugaru, and Hongro. TSSM showed higher behavioral preference to Fuji than Tsugaru and Hongro, and showed a higher fecundity in Fuji. The immature development of this mite was the shortest in Fuji and longest in Hongro. Total fecundities were not significantly different among cultivars, but daily fecundity was higher and longevity was lower in Fuji. Hongro was the less preferred cultivar for TSSM, and showed the lowest fitness by life table parameters. These results could explain the possible mechanisms of differential population dynamics among apple cultivars. Further study including diverse apple cultivars currently available in Korea could help to deploy time- and cultivar- specific IPM tactics.

Learning-Backoff based Wireless Channel Access for Tactical Airborne Networks (차세대 공중전술네트워크를 위한 Learning-Backoff 기반 무선 채널 접속 방법)

  • Byun, JungHun;Park, Sangjun;Yoon, Joonhyeok;Kim, Yongchul;Lee, Wonwoo;Jo, Ohyun;Joo, Taehwan
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.12-19
    • /
    • 2021
  • For strengthening the national defense, the function of tactical network is essential. tactics and strategies in wartime situations are based on numerous information. Therefore, various reconnaissance devices and resources are used to collect a huge amount of information, and they transmit the information through tactical networks. In tactical networks that which use contention based channel access scheme, high-speed nodes such as recon aircraft may have performance degradation problems due to unnecessary channel occupation. In this paper, we propose a learning-backoff method, which empirically learns the size of the contention window to determine channel access time. The proposed method shows that the network throughput can be increased up to 25% as the number of high-speed mobility nodes are increases.

Environment Dynamism and Strategic Technology Resource Protection: Claims of Priority of Korean High-tech Electronics Firms (환경 역동성과 전략적 기술자원의 보호: 한국 하이테크 전자기업의 우선권주장출원)

  • Kim, Doyoon;Shin, Dongyoub
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.57-84
    • /
    • 2021
  • In this paper, we explore market and environmental factors which affecting organization's priority claim application which is more powerful and prompt strategic method to protect technology from competitors under uncertain and volatile environments. This study empirically examines why organizations strategically choose the priority claim application which is more strong tactics to protect technology as the source of sustainable competitive advantage. We suggest that market and environmental factors, such as exogenous shock, volatility, and uncertainty, may also affect strategic decision that organization take patent application with claiming priority. The results of our analysis of priority claim application in the Korean high-tech electronics industry from 1994 to 2008 showed that these three strategic factors affected the technology protection decision and organization's status also moderate theses effects, as predicted in our hypotheses.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

Virtual-Constructive Simulation Interoperation for Aircombat Battle Experiment (Virtual-Constructive 시뮬레이션 연동을 활용한 공중전 전투 실험)

  • Kim, Dongjun;Shin, Yongjin;An, Kyeong-Soo;Kim, Young-Gon;Moon, Il-Chul;Bae, Jang Won
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.1
    • /
    • pp.139-152
    • /
    • 2021
  • Simulations enable virtually experiencing rare events as well as analytically analyzing such events. Defense modeling and simulation research and develops the virtual and the constructive simulations to support these utilizations. These virtual and constructive(VC) simulations can interoperate to simultaneously virtual combat experience as well as evaluations on tactics and intelligence of combat entities. Moreover, recently, for artificial intelligence researches, it is necessary to retrieve human behavior data to proceed the imitation learning and the inverse reinforcement learning. The presented work illustrates a case study of VC interoperations in the aircombat scenario, and the work analyze the collected human behavior data from the VC interoperations. Through this case study, we discuss how to build the VC simulation in the aircombat area and how to utilize the collected human behavior data.