• 제목/요약/키워드: computer

검색결과 88,739건 처리시간 0.068초

2007개정 교육과정 분석을 통한 중학교 컴퓨터 교육과정 개선 (An Improvement of the Computer Curriculum of the Middle School through the Analysis of 2007 Revised Curriculum)

  • 하태현;신동숙
    • 디지털융복합연구
    • /
    • 제7권2호
    • /
    • pp.21-33
    • /
    • 2009
  • The aim of this study is to find out problems between the '7th National Curriculum' and '2007 Revised National Curriculum' that would initially apply from 2009 and then to suggest better ways to improve computer education in Middle schools. A survey was carried out with a questionnaire. Based on the result, a comparison was made and a suggestion has been derived: Firstly, the computer subject should not be treated as a rival to others anymore, rather it should be considered as an essential subjects. Secondly, teachers who take computer subjects as their major should be allocated to middle schools. Thirdly, computer subjects should be taught systematically from elementary and be continued throughout in order to promote the level of the computer science education. Fourthly, the advantages of computer utilisation should be taken into account to layout the computer curriculum that is practicable and learner-centered. Finally, teachers should recognise the main aim of computer education and teach computer subjects to be useful in education. Though the revised version is not perfect the more the curriculums are revised, the better they might be expected to be developed. Consequently, whenever the newly revised computer curriculum emerges, the defects should be identified and addressed in order to achieve the aim of the computer curriculum.

  • PDF

남자청소년의 컴퓨터 게임이용과 게임 중독성 및 공격성 (Computer-game Activities, Addiction and Aggression of Middle School Boys)

  • 정유정;이숙
    • 대한가정학회지
    • /
    • 제39권8호
    • /
    • pp.67-80
    • /
    • 2001
  • The purpose of this research was to find the relationships between use of computer games, computer game addiction and middle school boy's aggression. The subjects were 511 boys of 2 middle schools in Kwang-ju, Korea. The method was self-reporting questionnaire. For data analysis, frequency distribution, percentage, Cronbach's u coefficient were estimated. ANOVA, Duncan test, Pearson's coefficient, and multiple regression analysis were used. The major findings of the research are as follows ; First, most boys(91.4%) play computer game more than once in a week. And have over 2 years computer game experience. Second, computer game addiction score and aggression score, in general, tend to be below the mean scores. Third, boys who play computer game activities of high frequency, start play computer game at earner age, spent playing longer times of computer game, and like more on-line game were addicted to the computer game more than who don't. And boys who spent playing long times on computer game were more aggressive than who don't. Fourth, the influencies of computer game activities variables on aggression were not found significantly. But the influencies of computer game addiction were found significantly.'Negative sentiment $.$ sociality' was the most influencial variable on aggression. The influncies of 'Distortion of the reality'and 'Lost of self-control' was followed.

  • PDF

Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh

  • Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.199-208
    • /
    • 2022
  • The world health organization classified the emerging coronavirus (known as Covid-19) as a pandemic after confirming the extent of spread and scale. As a matter of fact, outbreaks of similar scale or even worse have been witnessed throughout history. Thus, the development of prevention strategies exists to protect against such calamaties. One of the widely proven measures that controls the spread of any contagious diseases is social distancing. As a result, this paper will demonstrate the concept of an application "Be Aware" on enabling the implementation of this preventive measure. In particular "Be aware" evaluates the extent of congestion in public places using current time data. The proposed project will use Global Positioning System (GPS), and Application Programming Interface (API), to ensure information accuracy, and the API use Crowdsourcing to collect Real-Time Data (RTD) from the selected places. One line

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • 제22권3호
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

병원 전산시스템 활용에 영향을 주는 컴퓨터불안과 제변수간의 관계 (A Correlation of the Computer Anxiety and the Variables Affecting the Application of a Hospital Computer System)

  • 김용순;박지원
    • 대한간호학회지
    • /
    • 제25권4호
    • /
    • pp.617-632
    • /
    • 1995
  • Nowadays, most big hospitals have a computer system to manage their administration. For maxi mum effectiveness in managing the computer system, an analysis of the variables affecting its implementation is necessary from the beginning. This study was done to analyze the variables influencing the operation of a hospital information system (HIS). The theoretical base for this study considered the combined effects of user expectations of computerization, and computer-anxiety. The relationship between variables in the theoretical base were analyzed and the individual characteristics influencing each variable were also analyzed. This study was done in two steps. First, 344 nurses were given an initial questionnaire developed to evaluate the reliability of the items. Based on the results, a second revised questionnaire was administered to 88 nurses who had been working in the areas where HIS was applied. The results of the first and second steps of the study are as follows 1. The initial study was done with nurses who were trained on the computer system briefly before HIS was implemented. The individual characteristics influencing computer anxiety and expectation regarding computer system usage in that initial study included, length of career, type of degree or certification, previous experiences with a computer, training on a computer, desire for computer training, and level of acceptance of a computerized work environment. But in the second study with nurses working in areas of the hospital where HIS was introduced, the work site was the only influencing characteristics. There-fore, in applying a computer system, overcoming work-environment barriers will be more import-ant than any individual characteristics. 2. The computer anxiety of the nurses in both groups, before and after the computer system ap-plication, was below the average level but the expectation of the effects of computerization was above average. The nurses using the computer program showed an above average level of satis-faction with the computer system itself, and with its effect on their efficiency. Therefore, the ability of nurses operating HIS will be positively. predictive. 3. For the variables included in the theoretical framework of the study, all of the correlational coefficients were statistically significant in the analysis of variation correlation. Therefore, the theoretical base of the study, "expectation in con junction with computer anxiety" can be considered an model which can be evaluated. Accord-ing to our analysis, the higher the level of nurses' motivation to use the computer system and the lower the anxiety about computer usage, the higher the possibility of computer system acceptance by nurses. The results of this study showed that in applying a computer system in the hospital, the main characteristic influencing acceptance was where the individual worked rather than personal characteristics such as length of career, type of degree or certification, and previous experiences with a computer. Therefore, it is suggested that the first step in uncovering and eliminating hindrance factors in ap-plication of a computer system should be an analysis of working conditions in relation to the functional content of the computer system. The suitability of the theoretical model based on the hypothesis ap-plied in this study should be further tested.

  • PDF

컴퓨터 자기효능의 조절변수로서의 필요성의 인식에 관한 연구 ("Needs to Learn" as a Moderator for Computer Self-Efficacy)

  • 이정우;김사임
    • 한국경영과학회지
    • /
    • 제29권1호
    • /
    • pp.127-146
    • /
    • 2004
  • While 'Computer self-efficacy' is widely studied In the social science field with regard to the training effectiveness, little research has focused on clarifying the role of 'needs' in relation to self-efficacy and outcome expectations. in this regard, this study investigated the effects of 'needs to learn computer shills,' extending the social cognitive theory. A survey instrument was adopted and modified from previous studies to measure behavioral modeling, prior experience, Perceived computer self-efficacy, Perceived needs to learn computer skills and outcome expectations. A total of 209 practitioners were surveyed in this study. As a result, most part of the social cognitive theory was again Proven to be effective, and the 'needs to learn computer skills' was proven to be significant as a moderating variable between computer self-efficacy and outcome expectations. Implications of the research were discussed, and further studies were suggested at the end.

비전공자 컴퓨터교육과 학습보조 자료의 활용 (Computer Science Education and Use of Learning Materials)

  • 나정은
    • 공학교육연구
    • /
    • 제22권6호
    • /
    • pp.21-27
    • /
    • 2019
  • In the last few years, interest in computer science education has increased significantly. The curriculum is being revised to introduce computer science. Although interest has focused on coding as the main subject, in fact the computer science includes much more than coding. It engages people in being creative with technology as well as understanding the fundamental principles of computer science. Therefore, it is important to consider the curriculum to provide a foundation by teaching and learning computer science. The curriculum is required the development of courses to teach computer science for non-majors in general education. To think like a computer scientist on the knowledge of computer science is computational thinking. In order to maximize the effectiveness of teaching and learning for computational thinking, various teaching methods and supplementary learning materials, and activities should be developed and provided.

농촌지도사의 컴퓨터 사용에 관한 조사연구 (A Study the Computer Use of Rural Change Agents)

  • 김수욱;박성렬;강정옥
    • 농촌지도와개발
    • /
    • 제1권1호
    • /
    • pp.67-74
    • /
    • 1994
  • The objectives of this study were to review the present situations of computer use, computer education and training, and attitude to computer of agricultural extension agents. The research subjects were 279 agricultural extension agents in 15 City and Gun Rural Extension Offices Which were sampled by random sampling method among 182 City and Gun Rural Extension Offices. The major findings of the study were as follows; 1. Only 28% of the agricultural extension agents had personal computer in their home. 2. Agricultural extension agents mainly used word processor program, but hardly used data base, spreadsheet, and computer language. 3. About 40% of the respondents had not chance to be participated in computer education/training program yet. 4. Generally, rural change agents agreed that computer is very valuable for their job and that they should learn high computer technology. 5. Concludly, various contents of computer education/training program should be prepared for rural change agents and they should take full advantage of computer facilities.

  • PDF

Computer Technologies as A Method to Create A Contemporary Ex-Libris

  • Romanenkova, Julia;Bratus, Ivan;Varyvonchyk, Anastasia;Sharikov, Denis;Karpenko, Olga;Tkachuk, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.332-338
    • /
    • 2022
  • The article is dedicated to the phenomenon of modern ex-libris created with the help of computer graphics. The process of evolution in the use of various techniques of book plate creating is analyzed, the role of computer technologies in the popularization of the modern book plate is emphasized. The debatable nature of the issue of the danger of displacement, replacement of traditional techniques of printed graphics with computer technologies is emphasized. Computer graphics are positioned as an effective way to popularize the Ukrainian ex-libris in the foreign art space. The characteristic features of the Ukrainian computer ex-libris are highlighted, a parallel with the book plate created with the help of computer graphics by masters of other countries (Belgium, China, the Netherlands, Poland, Turkey) is drawn

SYN Flood DoS Detection System Using Time Dependent Finite Automata

  • Noura AlDossary;Sarah AlQahtani;Reem Alzaher;Atta-ur-Rahman
    • International Journal of Computer Science & Network Security
    • /
    • 제23권6호
    • /
    • pp.147-154
    • /
    • 2023
  • Network intrusion refers to any unauthorized penetration or activity on a computer network. This upsets the confidentiality, integrity, and availability of the network system. One of the major threats to any system's availability is a Denial-of-Service (DoS) attack, which is intended to deny a legitimate user access to resources. Therefore, due to the complexity of DoS attacks, it is increasingly important to abstract and describe these attacks in a way that will be effectively detected. The automaton theory is used in this paper to implement a SYN Flood detection system based on Time-Dependent Finite Automata (TDFA).