• Title/Summary/Keyword: Task Solving

Search Result 408, Processing Time 0.031 seconds

Differences of Science Writing Tendencies according to the Level of Meta-cognition Between General and Gifted Students (영재 선발을 위한 초인지 사고 수준에 따른 학생들의 과학글쓰기 경향성 분석)

  • Son, Jeong-Woo
    • Journal of Gifted/Talented Education
    • /
    • v.20 no.1
    • /
    • pp.131-150
    • /
    • 2010
  • This research was planned to analyze the students' science writing tendencies according to the level of meta-cognition for using as materials of selection of gifted students. To get results, meta-cognition writing tests which measured critical thinking ability and problem solving ability were developed, and the students' the level of meta-cognition was measured. Thereafter We analyzed the students' science writing tendencies in accordance with the level of meta-cognition through the science writing with meta-cognition task(the main theme are expectation; explanation; claim; criticism; imagination), and found out the students' ability of science writing was different with the level of meta-cognition. Students with the low level meta-cognition did not represent their thinking well, but students with the high level meta-cognition were try to upgrade their writing through highly concentration and perceiving theirs writing mistakes. As this results, science writing is useful as materials of selection of gifted students.

Characteristics of Experimental Design and Evidence Choice of Elementary School Students in Problem Solving Process Related to Controlling Variable (변인통제 문제해결 과정에서 나타난 초등학생의 실험설계 및 증거제시 특성)

  • Kim, Sun-Ja;Choi, Byung-Soon
    • Journal of The Korean Association For Science Education
    • /
    • v.25 no.2
    • /
    • pp.111-121
    • /
    • 2005
  • The purpose of this study was to analyze characteristics of experimental design and evidence choice of the elementary school students in problem solving process related to controlling variable. For this study, 96 6th grade students were selected and tested with Science Reasoning Task. This study revealed that the types of experimental design were categorized as variance of control variable, controlling of causal variable, perfect controlling variable, imperfect controlling variable, variance of all variable. Prior belief had a strong influence on student's experimental design. The types of evidence choice were categorized as perfect controlling variable, controlling causal variable, variance of causal variable. The degree of controlling variable in evidence choice process was much lower than that in experimental design. Most students tended to choose evidence according to prior belief without controlling variable. The results of this study implied that student's prior belief and characteristic of science process skills should be considered to develop program for promoting controlling variable ability.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

Network human-robot interface at service level

  • Nguyen, To Dong;Oh, Sang-Rok;You, Bum-Jae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1938-1943
    • /
    • 2005
  • Network human-robot interface is an important research topic. In home application, users access the robotic system directly via voice, gestures or through the network. Users explore a system by using the services provided by this system and to some extend users are enable to participate in a service as partners. A service may be provided by a robot, a group of robots or robots and other network connected systems (distributed sensors, information systems, etc). All these services are done in the network environment, where uncertainty such as the unstable network connection, the availability of the partners in a service, exists. Moreover, these services are controlled by several users, accessing at different time by different methods. Our research aimed at solving this problem to provide a high available level, flexible coordination system. In this paper, a multi-agent framework is proposed. This framework is validated by using our new concept of slave agents, a responsive multi-agent environment, a virtual directory facilitator (VDF), and a task allocation system using contract net protocol. Our system uses a mixed model between distributed and centralized model. It uses a centralized agent management system (AMS) to control the overall system. However, the partners and users may be distributed agents connected to the center through agent communication or centralized at the AMS container using the slave agents to represent the physical agents. The system is able to determine the task allocation for a group of robot working as a team to provide a service. A number of experiments have been conducted successfully in our lab environment using Issac robot, a PDA for user agent and a wireless network system, operated under our multi agent framework control. The experiments show that this framework works well and provides some advantages to existing systems.

  • PDF

Services Identification based on Use Case Recomposition (유스케이스 재구성을 통한 서비스 식별)

  • Kim, Yu-Kyong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.145-163
    • /
    • 2007
  • Service-Oriented Architecture is a style of information systems that enables the creation of applications that are built by combining loosely coupled and interoperable services. A service is an implementation of business functionality with proper granularity and invoked with well-defined interface. In service modeling, when the granularity of a service is finer, the reusability and flexibility of the service is lower. For solving this problem concerns with the service granularity, it is critical to identify and define coarse-grained services from the domain analysis model. In this paper, we define the process to identify services from the Use Case model elicited from domain analysis. A task tree is derived from Use Cases and their descriptions, and Use Cases are reconstructed by the composition and decomposition of the task tree. Reconstructed Use Cases are defined and specified as services. Because our method is based on the widely used UML Use Case models, it can be helpful to minimize time and cost for developing services in various platforms and domains.

  • PDF

Development Process of Systems Engineering Management Plan(SEMP) for Large-Scale Complex System Programs (대형 복합 시스템 개발을 위한 효과적인 시스템공학 관리계획 개발 프로세스)

  • 유일상;박영원
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.4
    • /
    • pp.82-90
    • /
    • 2003
  • The Systems Engineering, as a methodology for engineering and management of today's ever-growing complex system, is a comprehensive and iterative problem-solving process. The process centers on the analysis and management of the stakeholders' needs throughout the entire life-cycle of a system and searches for an optimized system architecture. There are many essential needs and requirements to be met when a system development task is carried out. Systems Engineering Management Plan(SEMP), as a specification for system development process, must be established to satisfy constraints and requirements of stakeholders successfully and to prevent cost overrun and schedule delay. SEMP defines technical management functions and comprehensive plans for managing and controlling the entire system development process, specialty engineering processes, etc. Especially. in the case of a large-scale complex system development program where various disciplinary engineering such as mechanical; electrical; electronics; control; telecommunication; material; civil engineering etc. must be synthesized, it Is essential to develop SEMP to ensure systematic and continuous process improvements for quality and to prevent cost/schedule overruns. This study will enable the process knowledge management on the subject of SEMP as a core systems engineering management effort, that is, definitely defining and continuously managing specification of development process about requirements, functions, and process realization of it using a computer-aided systems engineering software. The paper suggests a systematic SEMP development process and demonstrates a data model and schema for computer-aided systems engineering software, RDD-100, for use in the development and management of SEMP. These are being applied to the systems engineering technology development task for the next-generation high-speed railway systems in progress.

A Study on Fast Handover Scheme for Seamless Multimedia Transmission in Wireless Networks (무선환경에서 끊김없는 멀티미디어 전송을 위한 고속의 핸드오버 기법 연구)

  • Song, Min-Ho;Park, Byung-Joo;Park, Gil-Cheol;Kim, Yong-Tae;Lee, Dong-Cheul;Chang, Byeong-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.101-108
    • /
    • 2009
  • Since the use of wireless communication instruments was standardized, users expect to be provided with seamless information whenever and wherever they use the instruments. Also, some technology is required to satisfy the users' needs which will cover their mobility. To support the mobility of host, the Internet Engineering Task Force (lETF) Mobile IP Working Group proposed a protocol called MIPv6 (Mobile IPv6). But in the case of the existing MIPv6, sometimes Mobile Node cannot receive data packet if Handover occurs although it is a temporal phenomenon. For solving these Handover problems, there are many methods like FMIPv6 (Fast Handover for Mobile IPv6) and HMIPv6 (Hierarchical Mobile IPv6) have been suggested. This paper suggested the use of Dual Buffer of Access Point and an effective way of registration as a way of reducing delayed time caused by Handover. Also, it analyzed and compare the existing MIPv6 with a proposed scheme concerning delayed time of Handover. Finally, the main objective of this paper is to proposed scheme that can reduce the delayed time of Handover compare to the existing MIPv6.

  • PDF

Variation of EEG Band Powers Related with Human Errors in Knowledge-based Responses (지식기반 반응 시 인간과오 관련 뇌파 밴드파워의 변화)

  • Lim, Hyeon-Kyo;Kim, Hong-Young
    • Journal of the Korean Society of Safety
    • /
    • v.28 no.3
    • /
    • pp.107-113
    • /
    • 2013
  • Problem solving and/or decision making process usually encountered in human living consists of a sequence of human behaviors based upon his/her knowledge. Thus, Rasmussen introduced Skill-Rule-Knowledge paradigm to countermeasure human errors that can occur in Nuclear Power Plants. Unfortunately however, it was not so easy as expected since objective evidence have not been obtainable with conventional research techniques. With the help of EEG band pawer ratio techniques, this study tried to get psycho-physiological symptoms of human errors, if any, while human beings perform knowledge-based behaviors such as simple arithmetic computations with different difficulty level. A set of simulated works was carried out with a computer station. Four kinds of arithmetic computation tasks were given to 10 health male under-graduate students on different day individually, and during the experiment, EEG and ECG was measured continuously for objective psycho-physiological analysis. According to the results, ${\alpha}$/(${\alpha}+{\beta}$) as well as ${\alpha}/{\beta}$ band power ratio were sensitive to task difficulty level which consistently decreased both. However, any one of them failed to reveal the influence of tasks with different difficulty level in the aspect of task duration time. On the contrary, Heart Rate Variability was more suggestive than expected. To make a conclusion, it can be said that band power of EEG waves will be helpful in not only assessment of work difficulty level but also assessment of workers' skill development if supported by cardiac function such as HRV.

An Analysis of Elements of the Information Literacy Process within Common Inquiry Tasks of Textbooks in Korean Middle Schools Social Studies (중학교 「사회」 교과서의 공통 탐구 과제에 포함된 정보활용과정 요소 분석)

  • Song, Gi-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.3
    • /
    • pp.233-252
    • /
    • 2015
  • The purpose of this study is to analyze inquiry tasks of textbooks in middle schools social studies under the information literacy process and find out teacher librarians' educational information service on the side of information literacy education. Results of the analysis show that middle school students who carry out the inquiry tasks of social studies should select sources, seek its' related information and create their products through writing reports or presentation. Compared with information literacy process of the "Library and Information Skills", the First step of task definition and figuring out information needs and the Third step of representation of information are being implemented. For this reason, teacher librarian could reduce social studies teachers' burden of class and promote students' inquiry activities by teaching skills of suitable materials seeking strategies for solving their task, understanding and synthesizing the information and evaluating their process and result. Therefore, it is necessary to activate collaborative teaching between the teacher librarian and the social studies teacher based on the information literacy.

A Deep Learning Application for Automated Feature Extraction in Transaction-based Machine Learning (트랜잭션 기반 머신러닝에서 특성 추출 자동화를 위한 딥러닝 응용)

  • Woo, Deock-Chae;Moon, Hyun Sil;Kwon, Suhnbeom;Cho, Yoonho
    • Journal of Information Technology Services
    • /
    • v.18 no.2
    • /
    • pp.143-159
    • /
    • 2019
  • Machine learning (ML) is a method of fitting given data to a mathematical model to derive insights or to predict. In the age of big data, where the amount of available data increases exponentially due to the development of information technology and smart devices, ML shows high prediction performance due to pattern detection without bias. The feature engineering that generates the features that can explain the problem to be solved in the ML process has a great influence on the performance and its importance is continuously emphasized. Despite this importance, however, it is still considered a difficult task as it requires a thorough understanding of the domain characteristics as well as an understanding of source data and the iterative procedure. Therefore, we propose methods to apply deep learning for solving the complexity and difficulty of feature extraction and improving the performance of ML model. Unlike other techniques, the most common reason for the superior performance of deep learning techniques in complex unstructured data processing is that it is possible to extract features from the source data itself. In order to apply these advantages to the business problems, we propose deep learning based methods that can automatically extract features from transaction data or directly predict and classify target variables. In particular, we applied techniques that show high performance in existing text processing based on the structural similarity between transaction data and text data. And we also verified the suitability of each method according to the characteristics of transaction data. Through our study, it is possible not only to search for the possibility of automated feature extraction but also to obtain a benchmark model that shows a certain level of performance before performing the feature extraction task by a human. In addition, it is expected that it will be able to provide guidelines for choosing a suitable deep learning model based on the business problem and the data characteristics.