Korean | English

pISSN : 1598-849X / eISSN : 2383-9945

Home > Explore Content > All Issues > Article List

2014, Vol.19, No.12

  • 1.

    Multicore DVFS Scheduling Scheme Using Parallel Processing for Reducing Power Consumption of Periodic Real-time Tasks

    Pak Sue Hee | 2014, 19(12) | pp.1~10 | number of Cited : 0
    Abstract PDF
    This paper proposes a scheduling scheme that enhances power consumption efficiency of periodicreal-time tasks using DVFS and power-shut-down mechanisms while meeting their deadlines on multicoreprocessors. The proposed scheme is suitable for dependent multicore processors in which processingcores have an identical speed at an instant, and resolves the load unbalance of processing cores by exploiting parallel processing because the load unbalance causes inefficient power consumption in previousmethods. Also the scheme activates a part of processing cores and turns off the power of unused cores. The number of activated processing cores is determined through mathematical analysis. Evaluationexperiments show that the proposed scheme saves up to 77% power consumption of the previous method.
  • 2.

    An Intelligent Agent System using Multi-View Information Fusion

    Hyun-Sook Rhee | 2014, 19(12) | pp.11~19 | number of Cited : 2
    Abstract PDF
    In this paper, we design an intelligent agent system with the data mining module and information fusionmodule as the core components of the system and investigate the possibility for the medical expertsystem. In the data mining module, fuzzy neural network, OFUN-NET analyzes multi-view data andproduces fuzzy cluster knowledge base. In the information fusion module and application module, theyserve the diagnosis result with possibility degree and useful information for diagnosis, such as uncertaintydecision status or detection of asymmetry. We also present the experiment results on the BI-RADS-basedfeature data set selected form DDSM benchmark database. They show higher classification accuracy thanconventional methods and the feasibility of the system as a computer aided diagnosis system.
  • 3.

    Development of a Robot Performance System Employing a Motion Database

    Hyun-Gon Seo , 김지환 | 2014, 19(12) | pp.21~29 | number of Cited : 2
    Abstract PDF
    In this paper, we propose an efficient Robot Performance System (RPS). For the proposed system, asoundboard was developed and inserted into the body of a humanoid robot to enable audio playbackwithout an external playback device; the hardware required to enable the external storage device withinthe soundboard to remember the sound sources necessary for performances was developed. Furthermore,a specialized performance scenario planning software called Robot Performance Planning DevelopmentProgram (RPPDP) was developed to allow users to search through a motion database for the robot’sdefault motions, applied motions, and motions for special circumstances, allowing anyone to plan a robotperformance at a low cost in a short amount of time.
  • 4.

    Applying tilt mechanism for high-resolution image acquisition

    송천호 | 2014, 19(12) | pp.31~37 | number of Cited : 7
    Abstract PDF
    In this paper, to compensate the degraded performance in high-resolution infrared sensor due toassembling error, the influence of each component was evaluated through the sensitivity analysis of lensassembly, axis mirror, and detector and also suggested detector tilt mechanism for compensation. 3detector tilt mechanisms were investigated. The first one is 'Shim plate' method which is applying shim oninstalling plane. The second one is 'Tilting screw' method that is using tilt screw for adjusting detectionplane. The last one is 'Micrometer head' method that is installing micrometer on detection plane andacquiring quantitative data. Based on the investigation result, 'Tilting screw' method was applied due toease of user control, small volume, and real-time controllability, thereby we could acquire high-resolution infrared images. The research result shows that the tilting mechanism is necessary technology for theimplementation of high-resolution infrared imaging system.
  • 5.

    Instructional Methodology for Video Editing in Image Content Production

    Park Sung Dae , 박성훈 | 2014, 19(12) | pp.39~48 | number of Cited : 6
    Abstract PDF
    This thesis suggests a methodology of video editing education that is a part of post-production process. The methodology is educating students on contents, theories, technology in phases according to thecharacteristics of each process. It is based on the training results from the class 'Understanding of VideoContents Production Technology' conducted for high school students between December, 2013 and August,2014. The result of the satisfaction survey by enrolled students indicated that high educational satisfactioncan be obtained by the education methodology.
  • 6.

    Study on Principal Sentiment Analysis of Social Data

    Phil-Sik Jang | 2014, 19(12) | pp.49~56 | number of Cited : 16
    Abstract PDF
    In this paper, we propose a method for identifying hidden principal sentiments among large scale textsfrom documents, social data, internet and blogs by analyzing standard language, slangs, argots,abbreviations and emoticons in those words. The IRLBA(Implicitly Restarted Lanczos BidiagonalizationAlgorithm) is used for principal component analysis with large scale sparse matrix. The proposed systemconsists of data acquisition, message analysis, sentiment evaluation, sentiment analysis and integration andresult visualization modules. The suggested approaches would help to improve the accuracy and expandthe application scope of sentiment analysis in social data.
  • 7.

    The Success of Animation in Korean Film Industry: An Exploratory Analysis

    Hyo Kim | 2014, 19(12) | pp.57~70 | number of Cited : 5
    Abstract PDF
    The study proposes an exploratory analysis on the success of animation films in Korea industry. Itidentifies animation films that have been successful in the Korean film industry during 2004-2013 periodand explores (1) how the number of screens allocated to the films have been changed; (2) what are themajor factors that influence the success of the films; (3) what are the differences between Japan and theUS animation in terms of plots and genres; and (4) how the characteristics of the US animations are related to the success of the US market, the global market, and Korean market. Analyses show that thenumber of screens allocated to the animation films has been consistently increased due to the verticalintegration of Korean film industry; and the (FTA) period, months in year (summer and winter breakmonths for middle and high school students), and the number of screens allocated to the films were themajor factors influencing the financial success of animations. It also finds that specific characteristicsembedded in its own cultural trait were shown in the plots and genres in the animations. Lastly the studyalso finds that specific set of characteristics extracted from IMDB site influence certain markets. Budgetsand actor’s power were found to influence the success in the US market while period (pre-FTA, FTA,post-FTA) only influence the success in Korean market. The study points out that the success of the USand Japan animations in Korean film industry are due to the historicity of animation cultures which are notfound in Korean animation industry.
  • 8.

    MPTCP based Handover Scheme in PMIPv6 domain

    Youn Joo Sang , Choi Hun , Heo Gyeongyong | 2014, 19(12) | pp.71~80 | number of Cited : 0
    Abstract PDF
    Recently, most mobile nodes, such as smartphones, will have multiple wireless radio interfaces. This feature allows a mobile node to access a multi-network through multiple wireless radiointerfaces simultaneously. Accordingly, various networking technology has been studied to usewireless multi-interface more efficiently. In this paper, MPTCP based handover scheme isproposed to reduce data loss and end-to-end latency during the handover in PMIPv6 domain. Theproposed scheme performs 2-step flow mobility on the multi-path established through themulti-interface of mobile node in the handover procedure and uses MPTCP subflow function toovercome end-to-end disconnection during the handover. Therefore, the proposed scheme takesthe advantage of being able to minimize data loss and a latency generated during performing the handover of mobile node.
  • 9.

    Resource Allocation Scheme for Macro-Femtocell Overlaid LTE-Advanced Networks

    Jongchan Lee , Lee Moonho | 2014, 19(12) | pp.81~89 | number of Cited : 8
    Abstract PDF
    The heterogeneous LTE-Advanced networks comprising a macrocell and femtocells can provide anefficient solution not only to extend macrocell coverage but also to deal with packet traffics increasingexplosively within macrocells. Efficient resource management schemes are necessary to maintain the QoSrequirements of versatile multimedia applications in LTE-Advanced networks because theirservice-continuity may be defected by some delay and information loss. In this paper, we propose aresource allocation method for the heterogeneous LTE-Advancedl networks overlaid with femtocells. Performances are analyzed by simulation.
  • 10.

    An Analysis of Human Gesture Recognition Technologies for Electronic Device Control

    최민석 , Jang, Beakcheol | 2014, 19(12) | pp.91~100 | number of Cited : 0
    Abstract PDF
    In this paper, we categorize existing human gesture recognition technologies to camera-based,additional hardware-based and frequency-based technologies. Then we describe several representativetechniques for each of them, emphasizing their strengths and weaknesses. We define importantperformance issues for human gesture recognition technologies and analyze recent technologies accordingto the performance issues. Our analyses show that camera-based technologies are easy to use and have high accuracy, but they have limitations on recognition ranges and need additional costs for their devices. Additional hardware-based technologies are not limited by recognition ranges and not affected by light ornoise, but they have the disadvantage that human must wear or carry additional devices and needadditional costs for their devices. Finally, frequency-based technologies are not limited by recognitionranges, and they do not need additional devices. However, they have not commercialized yet, and theiraccuracies can be deteriorated by other frequencies and signals.
  • 11.

    The Big Data Analysis and Medical Quality Management for Wellness

    Youngbok Cho , SungHee Woo , Lee, Sang-ho | 2014, 19(12) | pp.101~109 | number of Cited : 9
    Abstract PDF
    Medical technology development and increase the income level of a "Long and healthy Life=Wellness,"with the growing interest in actively promoting and maintaining health and wellness has become enlarged. In addition, the demand for personalized health care services is growing and extensive medical moves ofbig data, disease prevention, too. In this paper, the main interest in the market, highlighting wellness inorder to support big data-driven healthcare quality through patient-centered medical services purposes. Patients with drug dependence treatment is not to diet but to improve disease prevention and treatment based on analysis of big data. Analysing your Tweets-daily information and wellness disease preventionand treatment, based on the purpose of the dictionary. Efficient big data analysis for node while increasingprocessing time experiment. Test result case of total access time efficient 26% of one node to three nodesand case of data storage is 63%, case of data aggregate is 18% efficient of one node to three nodes.
  • 12.

    An Anti-Collision Algorithm with 4-Slot in RFID Systems

    김용환 , Kim Sung soo , Ryoo, Myung-Chun and 2 other persons | 2014, 19(12) | pp.111~121 | number of Cited : 0
    Abstract PDF
    In this paper, we propose tree-based hybrid query tree architecture utilizing time slot. 4-Bit PatternSlot Allocation(4-SL) has a 8-ary tree structure and when tag ID responses according to query of thereader, it applies a digital coding method, the Manchester code, in order to extract the location and thenumber of collided bits. Also, this algorithm can recognize multiple Tags by single query using 4 fixed timeslots. The architecture allows the reader to identify 8 tags at the same time by responding 4 time slotsutilizing the first bit([prefix+1]th, F ∈ {‘0’ or ‘1’}) and bit pattern from second ~ third bits([prefix+2]th ~[prefix+3]th, B2 ∈ {“00” or “11”}, B1 ∈ {“01” or “10”}) in tag ID. we analyze worst case of the numberof query nodes(prefix) in algorithm to extract delay time for recognizing multiple tags. The identification delay time of the proposed algorithm was based on the number of query-responses and query bits, andwas calculated by each algorithm.
  • 13.

    A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device

    박재경 , 이상훈 , 권미영 and 1 other persons | 2014, 19(12) | pp.123~132 | number of Cited : 0
    Abstract PDF
    In this paper, we study the verification techniques for OS integrity that can be more fatal thanapplications in case of security issues. The dissemination of smartphones is rapidly progressing and thereare many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system thatcan comprehensively respond to this. As a way to prevent these risks, integrity checking method onoperation system is being researched. As most integrity checking algorithms are classified by verificationfrom the levels before booting the OS and at the time of passing on the control to the OS, in which, thereare minor differences in the definitions of integrity checking or its methods. In this paper, we suggests theintegrity verification technique of OS using a boot loader and a physically independent storing device in themobile device.
  • 14.

    Adaptive Frequency Scaling for Efficient Power Management in Pipelined Deep Packet Inspection Systems

    김한수 | 2014, 19(12) | pp.133~141 | number of Cited : 0
    Abstract PDF
    An efficient method for reducing power consumption in pipelined deep packet inspection systems isproposed. It is based on the observation that the number of memory accesses is dominant for the powerconsumption and the number of accesses drops drastically as the input goes through stages of thepipelined AC-DFA. A DPI system is implemented where the operating frequency of the stages that are notfrequently used in the pipeline is reduced to eliminate the waste of power consumption. The powerconsumption of the proposed DPI system is measured upon various input character set and up to 25% of reduction of total power consumption is obtained, compared to those of the recent DPI systems. Themethod can be easily applied to other pipelined architecture and string searching applications.
  • 15.

    Study on the Technical Security Factor for the Implementation of Secure DB System

    Sunhee Yoon | 2014, 19(12) | pp.143~152 | number of Cited : 1
    Abstract PDF
    This paper introduces Database security to prevent the rapidly increasing issue of private informationleakage. The Database security examined in the paper separates into DB access control area and DBencryption area which further leads the paper to analyze the factors of the two areas and suggestnecessary elements for creating stable Database security. In addition, the paper examines previous DBsecurity programs by areas and analyzes pros and cons from the tested result. The experiment indicatedthat while DB access control presents less degradation and reduced the need to modify the existing DBMS since the access control operates at the end point of the network, DB encryption presented strength inprotecting the data from unauthorized access. On the other hand, DB access control is less useful inpreventing the attack in advance which leaves the log to enable tracking afterward while DB encryptioncan only be operated by limited types of Database and causes degradation due to system load and showshigher percentage of failure when creating the system. This paper examines characteristics of Databasesecurity areas in order to be used as a reference for institutions or companies seeking stable Databasesecurity.
  • 16.

    Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage

    Wonseok Choi , 정경호 , Kim Sung soo and 2 other persons | 2014, 19(12) | pp.153~160 | number of Cited : 0
    Abstract PDF
    The Streganography method for digital images has to insert secret data into the image without imagedistortion. Side match method is that size of secret data is calculated by difference of embedded pixel valueand mean value of side pixels. And the secret value is embedded into the embedded pixel. Therefore, themore secret data increases, the more image distortion increases, too. In this paper, we propose theenhanced method that calculates embedded pixel value by difference of secret value and mean value of sidepixels. In proposed method, more secret data is embedded and image distortion has to decreases.
  • 17.

    Digital Forensics Ontology for Intelligent Crime Investigation System

    윤한국 , Lee Sang Hoon | 2014, 19(12) | pp.161~169 | number of Cited : 2
    Abstract PDF
    Digital forensics is the process of proving criminal charges by collecting and analyzing digital evidencewhich is related to the crime in question. Most digital forensic research is focused on digital forensictechniques themselves or cyber crime. In this paper, we designed a digital forensics-criminal investigationlinked model in order to effectively apply digital forensics to various types of criminal investigations. Digital forensic ontology was developed based on this model. For more effective application of digitalforensics to criminal investigation we derived specific application fields. The ontology has legality rulesand adequacy rules, so it can support investigative decision-making. The ontology can be developed intoan intelligent criminal investigation system.
  • 18.

    Maximum Sugar Loss Lot First Production Algorithm for Cane Sugar Production Problem

    Sang-Un, Lee | 2014, 19(12) | pp.171~175 | number of Cited : 1
    Abstract PDF
    Guéret et al. tries to obtain the solution using linear programming with O(m⁴)time complexity for canesugar production problem a kind of bin packing problem that is classified as NP-complete problem. On theother hand, this paper suggests the maximum loss of lot first production greedy rule algorithm with O(mlog m) polynomial time complexity underlying assumption of the polynomial time rule to find thesolution is exist. The proposed algorithm sorts the lots of sugar loss slope into descending order. Then,we select the lots for each slot production capacity only, and swap the exhausted life span of lots forlastly selected lots. As a result of experiments, this algorithm reduces the O(m⁴) of linear programmingto O(mlog m) time complexity. Also, this algorithm better result than linear programming.
  • 19.

    Development of a Web-based Interactive Education systems

    장충성 , Hwa-Kyung Rim , Choi Hyo Hyun | 2014, 19(12) | pp.177~185 | number of Cited : 2
    Abstract PDF
    The smart devices are used more and more, these days. It make the teaching method using smartdevices possible and it is considered as important method in the modern society. Though this kind ofapproach is prospering in foreign countries, it is not so in the domestic education system. Therefore, thispaper proposes the mobile web system supporting the active interaction between the teacher and thestudents for the domestic education. This system can be used everywhere smart device is connected to the internet. The teacher set a question and the students answers against it through the system in realtime. All questions and answers are written into the system and it can be checked again visually. It makesteachers and students trace and evaluate their interaction. And the teacher can download those result inmicrosoft Excel file format. We did a survey on this system to students and got positive response.
  • 20.

    Modeling of the Optimal Operation Pattern for Energy Saving of The Trains

    김정현 , SeHoon Lee , Chun, Sang Pyo | 2014, 19(12) | pp.187~196 | number of Cited : 1
    Abstract PDF
    In this paper, Minimize driving energy for operation within a defined distance yeokgan fixedtime-resolved and determine the nature of the train is traveling, and to model mathematically. Urban railcar cruise in general by the PID controller is used instead of automatically tracking a target value whiletraveling in energy consumption to be minimized by using optimal control model railroad charyangreul wasdesigned under real operating conditions the same. The actual track conditions apply to the minimum valueor a separate listing of cars around the track facility without a driving energy of the automatic operationand to reduce the driving energy. Therefore, actual route chosen straight line 8 / gradient segment / curvefor the measured data analysis, such as sections within the city-minute drive each section and presented how the trains to save energy, depending on the pattern of the train station in the region.
  • 21.

    Automatic extraction of golf swing features using a single Kinect

    Kim,Pyeoung-Kee | 2014, 19(12) | pp.197~207 | number of Cited : 1
    Abstract PDF
    In this paper, I propose an automatic extraction method of golf swing features using a practical TOFcamera Kinect. I extracted 7 key swing frames and features using joints and depth information from aKinect. I tested the proposed method on 50 swings from 10 players and showed the performace. It ismeaningful that 3D swing features are extracted automatically using an inexpensive and simple system andspecific numerical feature values can be used for the building of automatic swing analysis system.
  • 22.

    A Broker-Based Framework for QoS-Aware Mobile Web Services Selection

    염귀덕 , LEE, KUN CHANG | 2014, 19(12) | pp.209~218 | number of Cited : 1
    Abstract PDF
    The more mobile devices consuming web services, the more QoS-aware selection of mobile webservices, we need. A QoS(Quality of Service) contract is an agreement between the web service providerand the mobile user that specifies the level of the service quality. Web services users can be assured ofthe level of the service quality specified by the QoS contract. We propose a broker-based framework forQoS-aware mobile web services selection in this work. Under this architecture, the mobile users canrequest the web services through the service broker on the wireless networks. The service broker utilizesagents to monitor the web services quality and manages the service quality by notifying the service provider and mobile user of the service contract violation. Reliability, response time, and cost were themetrics used for QoS monitoring. Futhermore mobile users can select a web service best suited for his/herneeds through the service broker.
  • 23.

    Application of Optimized Gompertz Algorithm for Estimation of Controlled Drug Release

    Se-woon Choe , Woo, Young Woon | 2014, 19(12) | pp.219~225 | number of Cited : 1
    Abstract PDF
    A Gompertz modeling, sigmoid in shape, is a widely used application for social science, natural science,engineering, and medical research to allow confident approximation and accurate analysis and has beenapplied to estimate an elderly population on aging of population. Due to the high toxicity of currentlyavailable drug delivery vehicles, various efforts have been made to reduce side-effects in clinical fields,but its application to preclinical and clinical studies is limited and there are some difficulties to optimizethe parameters of Gompertz modeling applicable to preclinical studies. Therefore, in this study, we demonstrated the ability of sickle red blood cells loaded by hypotonic dialysis then photosensitized andlight-activated ex vivo for controlled release and simultaneously optimized Gompertz function to evaluatecontrolled drug release properties of photosensitized sickle red blood cells to reduce pain-relatedtreatments in cancer patients.
  • 24.

    Development of Textile Fabrics Flexible Platform based Multiple Bio-Signal Central Monitoring System for Emergency Situational Awareness in High-Risk Working Environments

    전기만 , Ko, Kwang Cheol , 이현민 and 1 other persons | 2014, 19(12) | pp.227~237 | number of Cited : 0
    Abstract PDF
    The purpose of this paper is to implement a multiple bio-signal central monitoring system based on textile fabrics flexible platform which can obtain and monitor bio signals(heart rate, body temperature,electrocardiography, electromyogram) of workers in special working environments and additionalsituational information (3-axis acceleration, temperature, humidity, illumination, surrounding image). Thissystem can prevent various accidents that may occur in the remote work environment and provide fast andefficient response by detecting workers’situations in real-time. For it, the textile fabrics flexible platformwas made as innerwear or outerwear so that it does not interfere with workers’ performance whilecollecting bio-signal and situational information, and obtained information is sent to the central monitoringsystem through wireless communication. The central monitoring system is based on wireless medicaltelemetry service of WMTS (Wireless Medical Telemetry Service); can monitor from 2 to 32 peoplesimultaneously; and was designed so that it can be expanded. Also, in this study, to verify performance ofthe WMTS communication model, packet transmission rates were compared according to the distance.
  • 25.

    A Method to Decide the Number of Additional Edges and Their Locations to Integrate the Communities by Using Fitness Function

    전병현 , Sang-Hoon Lee , Han Chi-Geun | 2014, 19(12) | pp.239~246 | number of Cited : 0
    Abstract PDF
    In this paper, we propose a method to decide the additional edges in order to integrate two communitites A,B(lAl ≧ lBl,|·|is the size of the set). The proposed algorithm uses a fitness function that shows the property of a community and the fitness function is defined by the number of edges which exist in the community and connect two nodes, one is in the community and the other is out of the community. The community has a strong property when the function has a large value. The proposed algorithm is a kind of greedy method and when a node of B is merged to A , the minimum number of additional edges is decided to increase the fitness function value of A . After determining the number of additional edges, we define the community connectivity measures using the node centrality to determine the edges locations. The connections of the new edges are fixed to maximize the connectivity measure of the combined community. The procedure is applied for all nodes in B to integrate A and B . The effectiveness of the proposed algorithm is shown by solving the Zachary Karate Club network.
  • 26.

    Advanced Bus Information System Using Smart Phone GPS

    PARK JAE HEUNG , 강선희 , Yeong Geon Seo | 2014, 19(12) | pp.247~255 | number of Cited : 9
    Abstract PDF
    This study supplements the existing bus information system’s weakness which is a text-based system,transmits GUI based user request contents, design and implements the bus information system usingsmart-phone GPS. The existing bus information system had to install the terminals on the bus and takeenormous expenses on maintenance with setting up the direction board on each bus station. The proposedsystem provides bus route and user location using the smart-phone map screen, finds the nearest busstation, indicates the bus route on map screen, applies our algorithm which increases accuracy of the bus arriving time, and provides route construction of the inner-cycle bus. The accuracy of the estimated busarriving time has increased to about 88.71% which is 22.71% more than the existing system whoseaccuracy is 67% and improved into GUI form that the existing system was on text and table UI. Consequently, the upgraded bus information system uses the smart-phone GPS to supplement the existingbus information system and satisfies different requests of users.
  • 27.

    An eBook Service System based on VOD Broadcasting Contents of Smart TV

    전응섭 , Yong Sik Chang | 2014, 19(12) | pp.257~266 | number of Cited : 3
    Abstract PDF
    In this paper, we propose the development of an eBook Service System based on VOD BroadcastingContents(eBSS-VOD) which protects the illegal copy through the effective DRM strategy. Here,eBSS-VOD is composed of three sub-systems - eBook server management system, ePub Builder, andeBook App - according to the functional points of view. The eBook server management system operatesto manage the eBooks, the encription keys, the VOD contents, the membership and the history of users'viewing log. The ePub Builder assists to produce eBooks by DRM strategy. The eBook App provides users with the utility services of VOD viewing and eBook purchase processing. The proposed eBSS-VOD,differently from the current eBook systems, helps to increase the users' interests in reading books and tomotivate the users' purchasing needs and it also makes new distribution channel for eBooks based on VODbroadcasting contents through smart applications. We provides the differentiated eBook builder which arebased on ePub3.0 and DRM strategy. Through empirical survey results on users' interests and purchaseintention for eBooks, we show that the proposed eBSS-VOD has the comparative effects compared to thecurrent systems.
  • 28.

    Automatic Database Lecture Management System

    Tai-Sung Hur | 2014, 19(12) | pp.267~274 | number of Cited : 0
    Abstract PDF
    Even though computer based college lecture management system was developed long ago and has beenused ever since, developing perfect lecture management is not simple. The main objective of this systemis to develop appropriate online lecture supportive management program suitable for college lectures. Thissystem [ADLEMS] mainly focuses on the management of college database lectures, exams, and grades. This system supports management and grading of attendance, reports, quizzes, mid-term, and final exams. Exam management categorizes into multiple choice questions, essay questions, short answer questions, andSQL. Especially for SQL, division analysis was applied when developing grading system for more effectivegrade management. For essay questions and short answer questions, manual [hand] grading method was used. Every student can verify the grading process in person to alleviate the problems occurring duringthe grading process.
  • 29.

    A study on the Stress of Using Social Networking Services and Its Discontinuance Intention

    Kyoung-Ja Park , PARK SEUNG BONG | 2014, 19(12) | pp.275~285 | number of Cited : 17
    Abstract PDF
    The development of ICT has promoted the infusion of ‘social,’ which is not only ‘personal,’ but alsostrengthens social connection and communication; and SNS lies in the center of the infusion. Although SNShas been positioning itself as a significant domain in our lives based on the developed technologies, suchas openness, extendibility and real-time, it has caused social concerns due to unexpected side effects. Therefore, this study aims to identify the stressors causing SNS stress and the factors influencingdiscontinuance of SNS. As a result, 5 factors including ‘techno-overload,’ ‘techno-invasion,’ ‘techno-insecurity,’‘techno-complexity’ and ‘pace of change' were found to be SNS stressors. It is thought that this studywould provide an academic implication for the future studies of stress and discontinuance related to SNSand a guideline for establishing practical strategies.
  • 30.

    The Impact of Structural and Relational Social Capital on SNS User Satisfaction and Continuous Information Sharing Intention

    Yoojung Kim | 2014, 19(12) | pp.287~298 | number of Cited : 11
    Abstract PDF
    This study is to identify how social capital is accumulated and used in SNS space, furthermore, is toexamine the impact of structural and relational social capital on SNS user satisfaction, and continuousintention of information sharing. The empirical test showed that social interaction ties have a significantand positive impact on relational social capital(trust in SNS site, trust in SNS user, reciprocity). In addition, it was proven that trust in SNS site played a critical role in satisfying SNS user whereas trust in user andreciprocity was not related to SNS user satisfaction. Finally, trust in SNS site and reciprocity were provento be key determinants of continuous information sharing intention, whereas trust in user was not relatedto continuous information sharing intention.
  • 31.

    A Study on The Evaluation for Quality Factors of SNS and SNS Media by Using AHP

    이남 , Park, Deuk | 2014, 19(12) | pp.299~307 | number of Cited : 8
    Abstract PDF
    Nowadays, SNS media has become one of the most common and economic communication methods inthe modern word. With the rapid development of communication technology, a variety of SNS media makeseasier for us to reach other people everywhere and people are getting more and more reliant on them. The surge in SNS media users and SNS media diversity gets more important every day, but academicresearch on SNS media evaluation program is scanty. In order to present an evaluation program on the SNS media, this study selected some applicablemeasurement factors based on reference research, and then evaluate major SNS medias by using AHPanalysis method. With these purposes, Kakaotalk, Twitter and Facebook, are the three major SNS mediasthat were chosen for the analysis. Through collections and analysis of usability evaluation factors aboutSNS quality from related literature, some factors were concluded: system quality, information quality,interface quality and service quality, to build an AHP frame. And to achieve these purposes, this studyapplied comprehend mutual questionnaire survey for experts and users to gather research date. Empiricalstudies about the results were performed using AHP method with Microsoft Office Excel 2010. In this study, the final SNS media evaluation result is that Kakaotalk ranks first of the three SNS media,Facebook is in the second place, and Twitter as least. When SNS media are evaluated, system quality,information quality, interface quality and service quality should be considered. Among all factors, servicequality is the most important.
  • 32.

    A Study on the Applicability of Data Mining for Crime Prediction : Focusing on Burglary

    방승환 , 김태훈 , 조현보 | 2014, 19(12) | pp.309~317 | number of Cited : 9
    Abstract PDF
    Recently, crime prediction and prevention are the most important social issues, and global and localgovernments have tried to prevent crime using various methodologies. One of the methodologies, datamining can be applied at various crime fields such as crime pattern analysis, crime prediction, etc. However, there is few researches to find the relationships between the results of data mining and crimecomponents in terms of criminology. In this study, we introduced environmental criminology, and identified relationships between environment factors related with crime and variables using at data mining. Then,using real burglary data occurred in South Korea, we applied clustering to show relations of results of datamining and crime environment factors. As a result, there were differences in the crime environment causedby each cluster. Finally, we showed the meaning of data mining use at crime prediction and preventionarea in terms of criminology.
  • 33.

    The Study on the Global Emission Reduction Commitments and Environment Change After Climate Agreement

    Kyungwoo Kim | 2014, 19(12) | pp.319~328 | number of Cited : 0
    Abstract PDF
    Although most of the debate on global climate change policy has focused on quantity controls due to their political appeal, this paper argues that agreement commitment are more efficient. Scenarios show that to have a likely chance of limiting the increase in global mean temperature to two degrees Celsius, means lowering global greenhouse gas emissions by 40 to 70 percent compared with 2010 by mid-century, and to near-zero by the end of this century. Ambitious mitigation may even require removing carbon dioxide from the atmosphere. This paper emphasizes on global cooperation which is a key for preventing global warming and toward sustainable development, and fair emission reduction targets among countries are significant for achieving emission reductions.
  • 34.

    Comparative Research of Competitiveness and Influence Factors of Computer and Information Service Trade of South Korea, China and Japan

    Liang Rui , Zi-Yang Liu | 2014, 19(12) | pp.329~338 | number of Cited : 0
    Abstract PDF
    The paper chooses four trade competitiveness assessment indices to compare the international competitiveness of Computer and Information Service(C&IS) trade between South Korea, China and Japan. The results show that the competitiveness of China is the strongest, Japan secondary and Korea the weakest among the three countries. However, the competitiveness of Korea can be promoted the most quickly and it has exceeded Japan according to TC and NXRCA indices. Meanwhile, there was still a huge gap between the three countries and the two world strong countries—India and Ireland. The main findings of empirical research on influencing factors show that domestic market demand and trade opening degree are the two most important factors influencing the competitiveness of three-country C&IS trade. At the same time, improving the utilization of C&IS and realizing good interaction of C&IS trade and electronic information, communication and other relevant and auxiliary industries can also contribute to the competitiveness improvement.
  • 35.

    A Study on An Improvement Scheme of the External Auditing System by Enforcing K-IFRS

    Rack-In Choi | 2014, 19(12) | pp.339~348 | number of Cited : 2
    Abstract PDF
    This study searches an improvement scheme of auditing on international financial environment sinceenforcing IFRS in order to secure transparency and reliability in corporate accounting and credibility inexternal audit from 2011 K-IFRS. As improvement schemes for the issue of the audit on K-GAAP are:First, the guarantee of the auditor’s qualities of duties and talents about the lack of accountability andawareness and independence of auditor are needed. Secondly, the free acceptance or certified publicaccountant is adopted. Third, the non-Executive Director shall be granted. Fourth, the external auditor CPA and Auditor’s remuneration should be increased. Fifth, the auditor’s shares shall be limited. Sixth, theexternal audit to supervise and the ratio of supervision should increase. Finally, the foreign corporation forthe time being limited to increase our competitiveness.
  • 36.

    Study on the public interest type of the senior's job programme, Efficiency measures in the market-type

    Cho Woo Hong | 2014, 19(12) | pp.349~357 | number of Cited : 1
    Abstract PDF
    Korea is going to the structure of low fertility and aging population, which is so difficult to find aprecedent in the world. Furthermore, since population structure is changing to the upside down pyramidtype, it acts as a factor that makes the production population matters worse. In this situation, senior's jobprogramme has fixed those problems to a certain extent, but more effective support system should beprovided in the respect of economic and social integration. Also efforts should be made for a view to awide range of job creation and dissemination. Decent jobs can be created in the area of culture, welfare,health care, tourism, by utilizing skills and experience that senior had before they retired. In conclusion,this study provides a theoretical basis for an efficient measure of senior's job programme.
  • 37.

    Teaching Process Synchronization with the Bank Account Problem

    Heejae Yang | 2014, 19(12) | pp.359~368 | number of Cited : 0
    Abstract PDF
    Process synchronization is one of the most difficult subject for students learning the Operating Systemcourses. It is due to the fact that concurrent process environment, where many events occur at the sametime, is difficult to understand for ordinary human who thinks only one thing at a time. Classicalsynchronization examples like the Bounded buffer problem or the Dining philosopher problem fail to hookattention and interest from lower grade students who just begin to study the Operating System courses incollege because these examples are either too technical or too unrealistic. In this paper we proposeanother synchronization example named the Bank account problem as an alternative to the classical ones. Bank account problem is proved to succeed getting high interest and understanding from the student as itis easy and realistic, and almost every student has the experience using bank account in real life. Various synchronization subjects including controlling the execution sequence of each process, incorrect result dueto the race conditions, use of semaphores, deadlock, and monitor are considered to apply them to the Bankaccount problem.
  • 38.

    Development of a Convergent Teaching-Learning Materials based on Logic Gates using Water-flow for the Secondary Informatics Gifted Students

    Hyung-Bong Lee , Ki-Hyeon Kwon | 2014, 19(12) | pp.369~384 | number of Cited : 7
    Abstract PDF
    Since the start of gifted education in 2002, educational support system has now been established, andsufficient growth in quantitative aspects has been achieved in Korea. On the other hand, they report thatthere are insufficient points in terms of education quality. In other words, most of the gifted educationsimply expands knowledge by prior-learning. In order to improve the quality of gifted education, they should enhance critical-thinking and creativity able to apply interdisciplinary principles or phenomena forsolving problems. In this study, we designed and developed a convergent teaching-learning materialsbased on the concept of integrated education, which explore the process that basic logic operations suchas AND, OR, XOR do the role of computer cells. A survey result showed that studentsatisfaction(usefulness, understanding, interest) of the materials is significantly higher than that of othertraditional learning topics, and the design intent was met.