• Title/Summary/Keyword: computer tools

Search Result 1,663, Processing Time 0.037 seconds

Analysis and Application of Front-End Code Playground Tools for Web Programming Education

  • Aaron Daniel Snowberger;Semin Kim;SungHee Woo
    • Journal of Practical Engineering Education
    • /
    • v.16 no.1_spc
    • /
    • pp.11-19
    • /
    • 2024
  • Web programming courses are often included in university Computer Science programs as introductory and foundational computer programming courses. However, amateur programmers often have difficulty learning how to integrate HTML, CSS, JavaScript, and various preprocessors or libraries to create websites. Additionally, many web programming mistakes do not produce visible output in the browser. Therefore, in recent years, Front-End Code Playground (FECP) tools that incorporate HTML, CSS, and JavaScript into a single, online web-based application have become popular. These tools allow web coding to happen directly in the browser and provide immediate visual feedback to users. Such immediate visual feedback can be particularly beneficial for amateur coders to learn and practice with. Therefore, this study gathers data on various FECP tools, compares their differences, and provides an analysis of how such tools benefit students. This study concludes with an outline of the application of FECP to web programming courses to enhance the learning experience.

Development of Scale Tools for Measure Programming Task Value and Learning Persistence at Elementary School Students

  • Kim, Ji-Yun;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.187-192
    • /
    • 2017
  • In this paper, we have studied scale tools for measure programming task value and learning persistence at elementary school students. In order to develop complete test tools, we have improved the completeness by revising tests through stepwise verification. The first scales were constructed based on the previous studies. As a result of the content validity test, 5 out of 14 items of the task value test tool and 1 out of 10 items of the learning persistence test were not suitable. The second test tools were constructed by revising and supplementing the first scale, and consisted of 13 items of task value and 8 items of learning persistence. As a result of the contents validity test, all the items included in the test tool proved to be valid. The reliability of the secondary testing tools were also found to be reliable at ${\alpha}=.970$ and ${\alpha}=.975$, respectively.

A Digital Forensic Analysis of Timestamp Change Tools for Windows NTFS

  • Cho, Gyu-Sang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.51-58
    • /
    • 2019
  • Temporal analysis is very useful and important for digital forensics for reconstructing the timeline of digital events. Forgery of a file's timestamp can lead to inconsistencies in the overall temporal relationship, making it difficult to analyze the timeline in reconstructing actions or events and the results of the analysis might not be reliable. The purpose of the timestamp change is to hide the data in a steganographic way, and the other purpose is for anti-forensics. In both cases, the time stamp change tools are requested to use. In this paper, we propose a classification method based on the behavior of the timestamp change tools. The timestamp change tools are categorized three types according to patterns of the changed timestamps after using the tools. By analyzing the changed timestamps, it can be decided what kind of tool is used. And we show that the three types of the patterns are closely related to API functions which are used to develop the tools.

Development Roadmap Analysis for Automatic Testing Tools of Software (소프트웨어 자동 테스팅 도구의 발전 로드맵 분석)

  • 정창신;정순기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.17-23
    • /
    • 2004
  • Testing tools help software developers and test engineers to automate a part or the whole of test process and reduce the time and cost of software test. However. no automatic tools meet a variety of test requirements with various domains In this paper, we suggest a categorical taxonomy of automatic testing tools and analyze numerous commercial testing tools on its basis. Then we propose a development roadmap of software automatic testing tools. As a result of those analysis. we try to understand the complementary relations of the testing tools and seek for the direction of further development of the testing tools.

  • PDF

A Multiagent Approach to Integrating Bioinformatics Tools

  • Lee, Keon-Myung;Sohn, Bong-Ki;Hwang, Kyung-Soon;Kim, Young-Chang
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.94-97
    • /
    • 2003
  • Various bioinformatics tools for biological data processing have been developed and most of them are available in public. Most bioinformatics works are carried out by a composite application of those tools. Several integration approaches have been proposed for easy use of the tools. This paper proposes a new multiagent system architecture to integrate bioinformatics tools in the perspective of workflow since the composite applications of tools can be regarded as workflows. For the easy integration, the proposed architecture employs wrapper agents for existing tools, uses XML-based messages in the inter-agent communication, and agents are supposed to extract necessary information from the received messages. This allows new tools to be easily added on the integration framework. The proposed method allows various control structures in workflow definition and provides the progress monitoring capability of the on-going workflows. We implemented a prototype system of the proposed architecture for annotating the genes of a bacterium called Sphingomonas Chungbukensis DJ77.

  • PDF

Static Analysis Tools Against Cross-site Scripting Vulnerabilities in Web Applications : An Analysis

  • Talib, Nurul Atiqah Abu;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.125-142
    • /
    • 2021
  • Reports of rampant cross-site scripting (XSS) vulnerabilities raise growing concerns on the effectiveness of current Static Analysis Security Testing (SAST) tools as an internet security device. Attentive to these concerns, this study aims to examine seven open-source SAST tools in order to account for their capabilities in detecting XSS vulnerabilities in PHP applications and to determine their performance in terms of effectiveness and analysis runtime. The representative tools - categorized as either text-based or graph-based analysis tools - were all test-run using real-world PHP applications with known XSS vulnerabilities. The collected vulnerability detection reports of each tool were analyzed with the aid of PhpStorm's data flow analyzer. It is observed that the detection rates of the tools calculated from the total vulnerabilities in the applications can be as high as 0.968 and as low as 0.006. Furthermore, the tools took an average of less than a minute to complete an analysis. Notably, their runtime is independent of their analysis type.

A comparative analysis on concept mapping tools for computer-supported collaborative learning (컴퓨터기반 협력학습을 위한 개념도작성도구의 비교 분석 및 고찰)

  • Lee, Hyojin;Jeong, Seunghee;Yang, Sunyoung;Eun, Jihye;Kim, Kyungjin;Kim, Dongsik
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.3
    • /
    • pp.37-47
    • /
    • 2015
  • The purpose of this study is to review the concept mapping tools and provide implications for designing tools that support collaborative learning activities. For this purpose, representative concept mapping tools - Convince Me, Knowledge Forum, Cmaptools, Mindmeister, Belvedere - was analyzed by using the 3C(Communication, Coordination, Cooperation) framework. We have applied three research methods; 1) literature review on design principles of tools, 2) heuristic evaluation, 3) focus group interview. As a result, most of comcept mapping tools supported communication functions but partialy supported coordication and cooperation features.

Evaluation of Static Analyzers for Weakness in C/C++ Programs using Juliet and STONESOUP Test Suites

  • Seo, Hyunji;Park, Young-gwan;Kim, Taehwan;Han, Kyungsook;Pyo, Changwoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.17-25
    • /
    • 2017
  • In this paper, we compared four analyzers Clang, CppCheck, Compass, and a commercial one from a domestic startup using the NIST's Juliet test suit and STONESOUP that is introduced recently. Tools showed detection efficacy in the order of Clang, CppCheck, the domestic one, and Compass under Juliet tests; and Clang, the domestic one, Compass, and CppCheck under STONESOUP tests. We expect it would be desirable to utilize symbolic execution for vulnerability analysis in the future. On the other hand, the results of tool evaluation also testifies that Juliet and STONESOUP as a benchmark for static analysis tools can reveal differences among tools. Finally, each analyzer has different CWEs that it can detect all given test programs. This result can be used for selection of proper tools with respect to specific CWEs.

Mixed-Integer Programming based Techniques for Resource Allocation in Underlay Cognitive Radio Networks: A Survey

  • Alfa, Attahiru S.;Maharaj, B.T.;Lall, Shruti;Pal, Sougata
    • Journal of Communications and Networks
    • /
    • v.18 no.5
    • /
    • pp.744-761
    • /
    • 2016
  • For about the past decade and a half research efforts into cognitive radio networks (CRNs) have increased dramatically. This is because CRN is recognized as a technology that has the potential to squeeze the most out of the existing spectrum and hence virtually increase the effective capacity of a wireless communication system. The resulting increased capacity is still a limited resource and its optimal allocation is a critical requirement in order to realize its full benefits. Allocating these additional resources to the secondary users (SUs) in a CRN is an extremely challenging task and integer programming based optimization tools have to be employed to achieve the goals which include, among several aspects, increasing SUs throughput without interfering with the activities of primary users. The theory of the optimization tools that can be used for resource allocations (RA) in CRN have been well established in the literature; convex programming is one of them, in fact the major one. However when it comes to application and implementation, it is noticed that the practical problems do not fit exactly into the format of well established tools and researchers have to apply approximations of different forms to assist in the process. In this survey paper, the optimization tools that have been applied to RA in CRNs are reviewed. In some instances the limitations of techniques used are pointed out and creative tools developed by researchers to solve the problems are identified. Some ideas of tools to be considered by researchers are suggested, and direction for future research in this area in order to improve on the existing tools are presented.