• Title/Summary/Keyword: computer tools

Search Result 1,673, Processing Time 0.042 seconds

The Evaluation Tool and Process for Effective Education Outcomes Measurement and Analysis of Computer Education

  • Kim, Young-Tak;Sim, Gab-Sig
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.9
    • /
    • pp.149-156
    • /
    • 2016
  • This paper is concerned with education courses operating practices for basic computer literacy training. In this study, we propose an example for students to effectively measure and evaluate the achievement of defined ability in the performance measurement and analysis, learning objectives and learning outcomes set in operation throughout the course. Through research and development use case presents the tools for teaching method and effective and objective measurement of the related subjects. And based on the results, we propose the possibility of utilizing NCS-based course operation and education certification. In this study, the measurement process is based on the association with the objective of the development and operation, and measurement tools, measuring tools for measuring learning outcomes associated with the curriculum design methods for the measurement and evaluation of the case of the operation of the course units of learning outcomes and the method proposed.

Study on Comparative Analysis of Daylight Evaluation Tools for Building Environment (건물 주광환경 평가도구의 비교분석에 관한 연구)

  • Park, K.E.;Kim, J.T.
    • Journal of the Korean Solar Energy Society
    • /
    • v.22 no.4
    • /
    • pp.26-34
    • /
    • 2002
  • Daylighting in building is very important as it has an effect on work performance as well as on their visual health. It is also regarded as a good energy conservation measure in saving energy used for lighting. There are many daylighting evaluation tools such as empirical equations, tables, nomograms, diagrams, protractors, computer simulation, scale models. This study conducted initial daylight measurements to analyze luminous environment in classrooms of elementary school and comparative analysis on three daylighting evaluation tools, such as daylight factor calculation formula, the graphic method with BRE Protractor and computer simulation with Adeline 3.0. It is found that the computer simulation tool produced the closest result to actual measurements of luminous environment in elementary school classroom, and the other simplified tools made appropriate results so that they can be used in the early stage of daylighting design process.

A Comparison of Ontology Tools Based on OWL (OWL 기반의 온톨로지 도구 비교분석)

  • Ihm, Hyoung-Shin;Hwang, Yun-Young;Eom, Dong-Myuong;Lee, Kyu-Chul
    • Korean Journal of Oriental Medicine
    • /
    • v.12 no.1
    • /
    • pp.1-12
    • /
    • 2006
  • Recently according to the WIPO's policy of preserving traditional knowledge, constructing the database of traditional knowledge is in progress. To maximize the retrieving power of the knowledge resource systems which will be developed later, it is necessary to construct the ontology for the concepts used by traditional knowledge. In order to construct the ontology systematically, a standardized ontology representation method is needed, and OWL(Web Ontology Language) is the recommendation of W3C(World Wide Web Consortium) and is widely used. Ontology tools can be used to ease the construction of OWL ontology, but no research about the comparison of OWL ontology tools exists. This paper compares the tools of OWL by an objective point of view and with that one can make a decision of using the appropriate tool for constructing OWL ontologies.

  • PDF

A Study on Tools for Android Malware Analysis

  • Almokhtar, Ali;Kwon, Dong-Hyun;Paek, Yun-Heung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.510-512
    • /
    • 2014
  • Malware Analysis tools are being main topic research for many mobile security companies, in this survey, we are trying to go through the most popular tools used to find out the malicious codes and suspected android programs through reverse engineering process. There are so many malware tools have been made and implemented and some of them are efficient enough and others are quite slow and consuming high processing, however we are going to compare briefly some of them.

Visualizer: An Interactive Execution Tool for Java Programs

  • Kim, Hyung-Rok;Kim, Yong-Seok
    • Journal of Industrial Technology
    • /
    • v.26 no.B
    • /
    • pp.215-220
    • /
    • 2006
  • Effective use of debugging in computer science education is a topic that has received little attention. Existing tools either are too overwhelming for the novice or are too basic and inflexible. Furthermore, the integration of the debugger into complex IDEs have unfamiliar debuggers from students, resulting in a harmful proliferation of console I/O. In this paper, a new stand-alone educational debugging tool is presented, with simple but powerful tools for easily observing and modifying program execution state. This tool is analyzed from an user perspective, and is compared with existing tools.

  • PDF

Development of Sustainable Home-Network Security Tool

  • Hamid, Erman;Hasbullah, M. Syafiq E.;Harum, Norharyati;Anawar, Syarulnaziah;Ayop, Zakiah;Zakaria, Nurul Azma;Shah, Wahidah Md
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.257-265
    • /
    • 2021
  • Home networking and its security issues are directly related. Previous studies have shown that home-network and understanding the security of it is a problem for non-technical users. The existing network management tools or ISP adapter tools are far too technical and difficult to be understood by ordinary home-network users. Its interface is not non-technical user-directed and does not address the home user's needs in securing their network. This paper presents an interactive security monitoring tool, which emphasizes support features for home-network users. The tool combines an interactive visual appearance with a persuasive approach that supports sustainability. It is not only an easy-to-use tool for all categories of home-network users but also acts as a monitoring feature for the user to secure their home-network.

Honeypots Tools Study and Analysis

  • Al-Jameel, Sultan;Alanazi, Adwan Alownie
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.162-173
    • /
    • 2021
  • The Honeypot is the mechanism that is made to learn more about the attackers like knowing about the method and pattern of attack and is also used to obtain very useful info about all intrusive activities. Honeypots usually categorized according to the interaction's level as (high, medium, low) interaction. The main purpose which is used as honey production and honey research. This paper includes a detailed study of two honeypot tools. The different honey pot findings are put in in this paper to illustrate how honey is working in a real environment and even how it reacts when undesirable interest obtain in this network, and these tools are used to improve the concept of security, protection and confidentiality within or outside the organization to avoid attacks, vulnerabilities and breaches.

Verifying Orthologous Paralogenes using Whole Genome Alignment

  • Chan, P.Y.;Lam, T.W.;Yiu, S.M.
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2005.09a
    • /
    • pp.109-112
    • /
    • 2005
  • Identifying orthologous paralogenes is a fundamental problem in comparative genomics and can facilitate the study of evolutionary history of the species. Existing approaches for locating paralogs make use of local alignment based algorithms such as BLAST. However, there are cases that genes with high alignment scores are not paralogenes. On the other hand, whole genome alignment tools are designed to locate orthologs. Most of these tools are based on some unique substrings (called anchors) in the corresponding orthologous pair to identify them. Intuitively, these tools may not be useful in identifying orthologous paralogenes as paralogenes are very similar and there may not be enough unique anchors. However, our study shows that this is not true. Paralogenes although are similar, they have undergone different mutations. So, there are enough unique anchors for identifying them. Our contributions include the followings. Based on this counter-intuitive finding, we propose to employ the whole genome alignment tools to help verifying paralogenes. Our experiments on five pairs of human-mouse chromosomes show that our approach is effective and can identify most of the mis-classified paralog groups (more than 80%). We verify our finding that whole genome alignment tools are able to locate orthologous paralogenes through a simulation study. The result from the study confirms our finding.

  • PDF

Study on Social Media Business Model Design through Visual Thinking (시각적 사고를 통한 소셜미디어 비즈니스모델 설계에 대한 연구)

  • Park, Sang Hyeok;Sung, Haeng Nam;Cho, Hyun Dal
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.289-297
    • /
    • 2012
  • It is a recent trend to utilize a variety of visual tools(process map, mindmap, ERD) to create, when we create the design of information system or business models. Theses visual tool is standardized tools as process map or BPMN, on the other hand, there is also a non-standardized tools as mindmap. The utilization of the non-standardized tools as mindmap in startups is a increasing trend, because of the order the release of creative thinking to design new business model. Mindmaps can be divided into pen-based mindmap(of hand-written) and computer-based mindmap. This study was conducted under the premise of a different thinking pattern, when you take advantage of pen-based mindmap and computer-based mindmap. In other words, the pen-based mindmap is a tool for deductive reasoning and the computer-based mindmap is a tool would be more appropriate for inductive thinking. The purpose of this study is to investigate these relationships through experiments. In this study propose guidelines how visual tools, when designing a social media business models.

A Multiagent System for Workflow-Based Bioinformatics Tool Integration

  • Sohn, Bong-Ki;Lee, Keon-Myung;Kim, Hak-Joon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.133-137
    • /
    • 2003
  • Various bioinformatics tools for biological data processing have been developed and most of them are available in public. Most bioinformatics works are carried out by a composite application of those tools. Several integration approaches have been proposed for easy use of the tools. This paper proposes a new multi agent system to integrate bioinformatics tools in the perspective of workflow since the composite applications of tools can be regarded as workflows. For the easy integration, the proposed system employs wrapper agents for existing tools, uses XML-based messages in the inter-agent communication, and agents are supposed to extract necessary information from the received messages. This allows new tools to be easily added on the integration framework. The proposed method allows various control structures in workflow definition and provides the progress monitoring capability of the on-going workflows. In particular, agents in this system have the rule-based architecture which allows the defined rule set to be a special role agent. This feature provides fast and flexible agent development to aid in managing the complexity of bioinformatics application. This system has been partially implemented and has been proven to be a viable implementation for workflow-based bioinformatics tool integration.